default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2024
- Amruta Chandrakant Amune, Himangi Pande:
Multitier scalable clustering wireless network design approach using honey bee ratel optimization. J. High Speed Networks 30(2): 203-219 (2024) - Leonard Barolli:
Performance evaluation of six mesh router replacement methods for wireless mesh networks: A comparison study for small and middle scale networks considering two islands distribution of mesh clients. J. High Speed Networks 30(2): 239-250 (2024) - Muhammad Saad Chughtai, Irfana Bibi, Shahid Karim, Syed Wajid Ali Shah, Asif Ali Laghari, Abdullah Ayub Khan:
Deep learning trends and future perspectives of web security and vulnerabilities. J. High Speed Networks 30(1): 115-146 (2024) - Hang-chao Ding, Huayun Tang, Chen Jia, Yanzhao Wang:
Multi-distribution bi-deniable inner product encryption based on Decision-LWE. J. High Speed Networks 30(3): 445-459 (2024) - Mohamed Y. Elmahi, N. I. M. Osman:
Design of a load balancing Objective Function for RPL. J. High Speed Networks 30(3): 297-319 (2024) - Weimin Gao, Jiaming Zhong, Caihong Peng, Xinlong Li, Xiangbai Liao:
Fine-grained load balancing with proactive prediction and adaptive rerouting in data center. J. High Speed Networks 30(1): 83-96 (2024) - Shantappa G. Gollagi, S. S. Maheswari, Pallavi V. Sapkale, Sabbineni Poojitha:
Channel estimation for pilot contamination in massive MIMO-NOMA system. J. High Speed Networks 30(3): 355-373 (2024) - Daniele Granata, Michele Mastroianni, Massimiliano Rak, Pasquale Cantiello, Giovanni Salzillo:
GDPR compliance through standard security controls: An automated approach. J. High Speed Networks 30(2): 147-174 (2024) - Samuel O. Hassan:
AD-RED: A new variant of random early detection AQM algorithm. J. High Speed Networks 30(1): 53-67 (2024) - Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A comparison study of two implemented fuzzy-based models for decision of logical trust. J. High Speed Networks 30(2): 279-295 (2024) - Preeti Kabra, D. Sudha Rani:
Enhanced LA-HBO technique for optimal position of PMU with complete prominence. J. High Speed Networks 30(3): 427-443 (2024) - Cong Li, Haiyang Wang, Weipeng Liang, Yunhao Li, Hongyang Yan, Teng Huang, Bo Li, Jianwei He:
LEOCN: Real-time and complete network simulation framework for LEO constellation networks1. J. High Speed Networks 30(1): 1-18 (2024) - Zhang Ling, Gui Qi, Huang Min:
Intrusion detection using rough-fuzzy set and parallel quantum genetic algorithm. J. High Speed Networks 30(1): 69-81 (2024) - Qiuyu Lu, Haibo Li, Jianping Zheng, Jianru Qin, Yinguo Yang, Li Li, Keteng Jiang:
Research on fault detection and remote monitoring system of variable speed constant frequency wind turbine based on Internet of Things. J. High Speed Networks 30(2): 175-189 (2024) - S. Muthukumar, A. K. Ashfauk Ahamed:
A novel framework of DDoS attack detection in network using hybrid heuristic deep learning approaches with attention mechanism. J. High Speed Networks 30(2): 251-277 (2024) - Puligundla Neelakantan, Malige Gangappa, Mummalaneni Rajasekar, Talluri Sunil Kumar, Gali Suresh Reddy:
Resource allocation for content distribution in IoT edge cloud computing environments using deep reinforcement learning. J. High Speed Networks 30(3): 409-426 (2024) - Sang-Yeob Oh, Chul-Ho Park:
Efficient dynamic IP datacasting mobility management based on LRS in mobile IP networks. J. High Speed Networks 30(3): 321-331 (2024) - Niemah Izzeldin Osman:
Energy efficiency of cache collaboration in core content distribution networks. J. High Speed Networks 30(1): 97-114 (2024) - Subramanyam Radha, G. Josemin Bala, Prophess Raj Kumar Nalluri, G. Indumathi, Perattur Nagabushanam:
Optimal relay nodes placement with game theory optimization for Wireless Sensor Networks. J. High Speed Networks 30(1): 29-51 (2024) - Surabhi Sushant Sawant, Jagdish B. Helonde, Prakash G. Burade:
Felis bee optimization-based localization for energy-efficient communication in IoT-assisted WSN. J. High Speed Networks 30(3): 375-408 (2024) - Aishita Sharma, Sunil K. Singh, Sudhakar Kumar, Ruchika Thakur, Brij B. Gupta, Varsha Arya:
IoT-enabled smart farming with Industry 5.0. J. High Speed Networks 30(3): 477-496 (2024) - C. P. Shirley, Jaydip Kumar, Kantilal Pitambar Rane, Narendra Kumar, Deevi Radha Rani, Kuntamukkula Harshitha, Mohit Tiwari:
IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security. J. High Speed Networks 30(2): 191-201 (2024) - Charanjeet Singh, Pawan Kumar Singh:
Transmit antenna selection in M-MIMO system using metaheuristic aided model. J. High Speed Networks 30(2): 221-238 (2024) - Sonam, Rahul Johari, Sanya Garg, Prabhnoor Bawa, Deeksha Aggarwal:
MIAWM: MQTT based IoT Application for Weather Monitoring. J. High Speed Networks 30(3): 333-354 (2024) - Junchi Wang, Hong Xiao, Wenchao Jiang, Ping Li, Zelin Li, Tao Wang:
Transfer learning based cross-process fault diagnosis of industrial robots. J. High Speed Networks 30(3): 461-475 (2024) - Siqi Yu, Mengxue Shang, Fengyin Li:
A lattice-based efficient heterogeneous signcryption scheme for secure network communications. J. High Speed Networks 30(1): 19-27 (2024)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-13 06:22 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint