Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 49 matches
- 2016
- Murad Abusubaih:
Measurement-based methods for channel selection in 802.11 WLANs. Int. J. Wirel. Mob. Comput. 10(4): 386-392 (2016) - Ibrahim M. Al-Jabri:
Customers' perceptions of mobile banking services: are there any differences between men and women in Saudi Arabia? Int. J. Wirel. Mob. Comput. 10(3): 205-213 (2016) - Khaled Almiani, Anastasios Viglas, Frans Schalekamp, Reza Abrishambaf:
Flow-based scheme for time-constrained data gathering in wireless sensor networks. Int. J. Wirel. Mob. Comput. 10(1): 1-12 (2016) - Kailash Chandra Bandhu, Rajeev G. Vishwakarma:
Performance evaluation of TCP Vegas in WiMAX network asymmetry. Int. J. Wirel. Mob. Comput. 10(2): 97-103 (2016) - Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki El Alaoui El Belrhiti:
A smart scanning-based authentication framework for critical mobile cloud computing applications and services. Int. J. Wirel. Mob. Comput. 10(4): 325-334 (2016) - Radja Boukharrou, Jean-Michel Ilié, Djamel-Eddine Saïdouni:
Contextual time reasoning for mobile ambient agents. Int. J. Wirel. Mob. Comput. 10(3): 250-260 (2016) - Lianlian Cao, Sheng Ding, Xiaowei Fu, Li Chen:
Otsu multilevel thresholding segmentation based on quantum particle swarm optimisation algorithm. Int. J. Wirel. Mob. Comput. 10(3): 272-277 (2016) - Xiaoshuang Chen, Hui Xiao, Yejun Guo, Qi Kang:
A multivariate grey RBF hybrid model for residual useful life prediction of industrial equipment based on state data. Int. J. Wirel. Mob. Comput. 10(1): 90-96 (2016) - Lu Dai, Xiong Chen:
Design of online water quality monitoring system and prediction based on probabilistic neural network. Int. J. Wirel. Mob. Comput. 10(4): 371-377 (2016) - Xiaonan Fang, Xiyuan Zheng, Yanyan Tan, Huaxiang Zhang:
Highly imbalanced classification using improved rotation forests. Int. J. Wirel. Mob. Comput. 10(1): 35-41 (2016) - Zheng Feng, Jiancong Fan:
A novel validity index in fuzzy clustering algorithm. Int. J. Wirel. Mob. Comput. 10(2): 183-190 (2016) - Zeineb Guizani, Noureddine Hamdi:
Joint scheduling, queues management and routing aware fairness in a cell downlink network. Int. J. Wirel. Mob. Comput. 10(3): 278-285 (2016) - Chuanhua He, Jiangfeng Li, Zhenyu Liao, Chenxi Zhang:
MPS: a multipath publish/subscribe model in information-centric network. Int. J. Wirel. Mob. Comput. 10(2): 130-137 (2016) - Chen Hou, Nan Li, Meng Zhang:
Efficient string matching on graphics processing unit using bit-parallelism. Int. J. Wirel. Mob. Comput. 10(4): 345-350 (2016) - Rui Huang, Dawei Sun:
Analysing and evaluating topology structure of online application in Big Data stream computing environment. Int. J. Wirel. Mob. Comput. 10(4): 317-324 (2016) - Huafu Jiang, Guangbin Wang:
Spatial equilibrium of housing provident fund in China based on data mining cluster analysis. Int. J. Wirel. Mob. Comput. 10(2): 138-147 (2016) - Huafu Jiang, Guangbin Wang:
Prediction of supply and demand of housing provident fund from the aspect of equilibrium warning. Int. J. Wirel. Mob. Comput. 10(3): 286-292 (2016) - Yuhong Jiang, Sanyou Zeng, Hong Zhang, Xi Li:
Wide-band helical antenna designed by dynamic constrained multi-objective evolutionary algorithm. Int. J. Wirel. Mob. Comput. 10(1): 26-34 (2016) - Wende Ke:
Study of preferential vector of particle swarm with hierarchical reinforcement. Int. J. Wirel. Mob. Comput. 10(3): 293-300 (2016) - Feixiang Li, Xiaotao Rong, Zhihua Cui:
A hybrid CRBA-SVM model for software defect prediction. Int. J. Wirel. Mob. Comput. 10(2): 191-196 (2016) - Yanni Liu, Dongsheng Liu, Yi Zhao, Liming Wang:
The reliability analysis of wireless sensor networks based on the energy restrictions. Int. J. Wirel. Mob. Comput. 10(4): 399-406 (2016) - Li Lv, Longzhe Han, Tanghuai Fan, Jia Zhao:
Artificial bee colony algorithm with accelerating convergence. Int. J. Wirel. Mob. Comput. 10(1): 76-82 (2016) - P. R. Mini, S. Mridula, Binu Paul, P. Mohanan:
A novel algorithm for adaptive NLMS beamformer. Int. J. Wirel. Mob. Comput. 10(2): 122-129 (2016) - Noureddine Moussa, Abdelbaki Elbelrhiti Elalaoui:
Fault tolerant routing protocols in wireless sensor networks: a decision support tool. Int. J. Wirel. Mob. Comput. 10(4): 361-370 (2016) - Senthil Madasamy Nallakannu, Thiagarajan Revathi:
A secure P2P file sharing model using trust management and data integrity verification. Int. J. Wirel. Mob. Comput. 10(4): 335-344 (2016) - Arthur Menaka Pushpa, Kannan Kathiravan:
A comparative survey of security solutions for multicast and unicast routing protocols in mobile ad hoc networks. Int. J. Wirel. Mob. Comput. 10(3): 232-249 (2016) - Gang-Zhu Qiao, Jianchao Zeng, Ming Zhao:
Mobile wireless sensor network localisation algorithm for coal mine. Int. J. Wirel. Mob. Comput. 10(1): 68-75 (2016) - Junlin Qiu, Lili Zhang, Tanghuai Fan, Yuan Wang, Huibin Wang:
Data fusion algorithm of multilayer neural network by ZigBee protocol architecture. Int. J. Wirel. Mob. Comput. 10(3): 214-223 (2016) - M. Venkata Ramana, P. Venkata Krishna:
An approach for routing in delay tolerant mobile ad-hoc networks using quadrant-based look-ahead method. Int. J. Wirel. Mob. Comput. 10(3): 301-307 (2016) - L. Shakkeera, Latha Tamilselvan:
QoS and load balancing aware task scheduling framework for mobile cloud computing environment. Int. J. Wirel. Mob. Comput. 10(4): 309-316 (2016)
skipping 19 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-20 14:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint