Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 68 matches
- 2013
- Bo Li, Baochun Li, Fangming Liu:
Cloud and data center performance [Guest Editorial]. IEEE Netw. 27(4): 1-0 (2013) - Saeed Abu-Nimeh, Ernest Foo, Igor Nai Fovino, Manimaran Govindarasu, Thomas Morris:
Cyber security of networked critical infrastructures [Guest Editorial]. IEEE Netw. 27(1): 3-4 (2013) - Yong woon Ahn, Albert M. K. Cheng, Jinsuk Baek, Minho Jo, Hsiao-Hwa Chen:
An auto-scaling mechanism for virtual resources to support mobile, pervasive, real-time healthcare applications in cloud computing. IEEE Netw. 27(5): 62-68 (2013) - Saurabh Amin, Galina A. Schwartz, Alefiya Hussain:
In quest of benchmarking security risks to cyber-physical systems. IEEE Netw. 27(1): 19-24 (2013) - Carlos Jesus Bernardos, Ulas C. Kozat, Joerg Widmer, Michele Zorzi:
Video over mobile networks [Guest editorial]. IEEE Netw. 27(2): 6-7 (2013) - Kaigui Bian, Jung-Min Park, Xiaojiang Du, Xiaoming Li:
Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention. IEEE Netw. 27(3): 16-21 (2013) - Yueping Cai, Yao Yan, Zhenghao Zhang, Yuanyuan Yang:
Survey on converged data center networks with DCB and FCoE: standards and protocols. IEEE Netw. 27(4): 1-0 (2013) - Huayang Cao, Peidong Zhu, Xicheng Lu, Andrei V. Gurtov:
A layered encryption mechanism for networked critical infrastructures. IEEE Netw. 27(1): 12-18 (2013) - Emiliano Casalicchio, Marco Caselli, Alessio Coletta:
Measuring the global domain name system. IEEE Netw. 27(1): 25-31 (2013) - Min Chen, Hai Jin, Yonggang Wen, Victor C. M. Leung:
Enabling technologies for future data center networking: a primer. IEEE Netw. 27(4): 1-0 (2013) - Changlong Chen, Min Song, Chunsheng Xin, Jonathan D. Backens:
A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Netw. 27(3): 22-27 (2013) - Yu Cheng:
New books and multimedia. IEEE Netw. 27(2): 4 (2013) - Yu Cheng:
New books and multimedia. IEEE Netw. 27(4): 1-0 (2013) - Nuno Filipe Coutinho, Susana Sargento:
On the analysis of hierarchical autonomic control of multiparty services. IEEE Netw. 27(1): 45-51 (2013) - Emiliano De Cristofaro, Claudio Soriente:
Participatory privacy: Enabling privacy in participatory sensing. IEEE Netw. 27(1): 32-36 (2013) - Yousef-Awwad Daraghmi, Chih-Wei Yi, Ivan Stojmenovic:
Forwarding methods in data dissemination and routing protocols for vehicular Ad Hoc networks. IEEE Netw. 27(6): 74-79 (2013) - Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, Mostafa Fouda:
Intrusion detection system (IDS) for combating attacks against cognitive radio networks. IEEE Netw. 27(3): 51-55 (2013) - Reza Farahbakhsh, Noël Crespi, Ángel Cuevas, Rubén Cuevas Rumín, Roberto Gonzalez:
Understanding the evolution of multimedia content in the internet through bittorrent glasses. IEEE Netw. 27(6): 80-88 (2013) - Muhamad Felemban, Saleh M. Basalamah, Arif Ghafoor:
A distributed cloud architecture for mobile multimedia services. IEEE Netw. 27(5): 20-27 (2013) - Bo Fu, Daniele Munaretto, Telemaco Melia, Bessem Sayadi, Wolfgang Kellerer:
Analyzing the combination of different approaches for video transport optimization for next generation cellular networks. IEEE Netw. 27(2): 8-14 (2013) - Weigang Hou, Lei Guo, Yejun Liu, Qingyang Song, Xuetao Wei:
Virtual network planning for converged optical and data centers: ideas and challenges. IEEE Netw. 27(6): 52-58 (2013) - Guangwu Hu, Ke Xu, Jianping Wu, Yong Cui, Fan Shi:
A general framework of source address validation and traceback for IPv4/IPv6 transition scenarios. IEEE Netw. 27(6): 66-73 (2013) - Dijiang Huang, Tianyi Xing, Huijun Wu:
Mobile cloud computing service models: a user-centric approach. IEEE Netw. 27(5): 6-11 (2013) - Salekul Islam, Jean-Charles Grégoire:
Converged access of IMS and web services: A virtual client model. IEEE Netw. 27(1): 37-44 (2013) - Minho Jo, Longzhe Han, Do-Hoon Kim, Hoh Peter In:
Selfish attacks and detection in cognitive radio Ad-Hoc networks. IEEE Netw. 27(3): 46-50 (2013) - Miroslaw Klinkowski, Krzysztof Walkowiak:
On the advantages of elastic optical networks for provisioning of cloud computing traffic. IEEE Netw. 27(6): 44-51 (2013) - Panayiotis Kolios, Vasilis Friderikos, Katerina Papadaki:
Energy-aware mobile video transmission utilizing mobility. IEEE Netw. 27(2): 34-40 (2013) - Katarzyna Kosek-Szott, Marek Natkaniec, Szymon Szott, Artem N. Krasilov, Andrey I. Lyakhov, Alexander A. Safonov, Ilenia Tinnirello:
What's new for QoS in IEEE 802.11? IEEE Netw. 27(6): 95-104 (2013) - Victor C. M. Leung, Min Chen, Mohsen Guizani, Branka Vucetic:
Cloud-assisted mobile computing and pervasive services [Guest Editorial]. IEEE Netw. 27(5): 4-5 (2013) - Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, Y. Thomas Hou:
Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27(4): 1-0 (2013)
skipping 38 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 03:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint