Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 183 matches
- 2009
- Ahmad Ababnah, Balasubramaniam Natarajan:
Sensor Deployment as an Optimal Control Problem. ICCCN 2009: 1-5 - Richard O. Afolabi, Kiseon Kim, Aftab Ahmad:
On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic Signature. ICCCN 2009: 1-5 - Andrei Agapi, Sebastien Soudan, Marcelo Pasin, Pascale Vicat-Blanc Primet, Thilo Kielmann:
Optimizing Deadline-Driven Bulk Data Transfers in Overlay Networks. ICCCN 2009: 1-8 - Sachin Agarwal:
Smart Peer-to-Peer Video Streaming: Comparing Adaptation Under Heterogeneous Conditions. ICCCN 2009: 1-6 - S. Amaar Ahmad, Juan D. Deaton, Umesh Shukla, Ryan E. Irwin, Luiz A. DaSilva, Allen B. MacKenzie:
A Comparison of Channel Assignment Techniques with Power Control in Ad Hoc Networks. ICCCN 2009: 1-6 - Mohsen Akbari, Fabrice Labeau:
Adaptive Downsampling in Oversampled Filter Banks in the Presence of Quantization Noise. ICCCN 2009: 1-6 - Mohammad Al-Otaibi, Hamdy S. Soliman:
Efficient Controlled Routeless Routing Protocol With Fixed Channel's Width for Mobile Ad Hoc Sensor Networks. ICCCN 2009: 1-7 - Yohannes D. Alemseged, Ha Nguyen Tran, Chen Sun, Hiroshi Harada:
Dual-Purpose Spectrum Sensor Using IEEE802.15.4a UWB PHY and Energy Detection. ICCCN 2009: 1-5 - Ayoub Alsarhan, Anjali Agarwal:
Cluster-Based Spectrum Management Using Cognitive Radios in Wireless Mesh Network. ICCCN 2009: 1-6 - Baber Aslam, Ping Wang, Cliff Changchun Zou:
Pervasive Internet Access by Vehicles through Satellite Receive-Only Terminals. ICCCN 2009: 1-6 - Kareem E. Baddour, Oktay Ureten, Tricia J. Willink:
Efficient Clustering of Cognitive Radio Networks Using Affinity Propagation. ICCCN 2009: 1-6 - Ataul Bari, Ritu Chaturvedi, Arunita Jaekel, Subir Bandyopadhyay:
Energy Aware Distributed Clustering in Two-Tiered Sensor Networks. ICCCN 2009: 1-8 - Ataul Bari, Da Teng, Arunita Jaekel:
Optimal Relay Node Placement in Hierarchical Sensor Networks with Mobile Data Collector. ICCCN 2009: 1-6 - Stanley J. Barr, Benyuan Liu, Jie Wang:
Underwater Sensor Barriers with Auction Algorithms. ICCCN 2009: 1-6 - Spiridon F. Beldianu, Roberto Rojas-Cessa, Eiji Oki, Sotirios G. Ziavras:
Re-Configurable Parallel Match Evaluators Applied to Scheduling Schemes for Input-Queued Packet Switches. ICCCN 2009: 1-6 - Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu:
Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks. ICCCN 2009: 1-6 - Kaigui Bian, Jung-Min Park:
A Coexistence-Aware Spectrum Sharing Protocol for 802.22 WRANs. ICCCN 2009: 1-6 - Amitava Biswas, Suneil Mohan, Rabi N. Mahapatra:
Search Co-Ordination by Semantic Routed Network. ICCCN 2009: 1-7 - Andrew Blaich, Aaron Striegel:
Is High Definition a natural DRM? ICCCN 2009: 1-4 - Gennaro Boggia, Pietro Camarda, Rossella Fortuna, Luigi Alfredo Grieco:
A Scheduling Strategy to Avoid Playout Interruptions in Video Streaming Systems. ICCCN 2009: 1-6 - Yacine Boufkhad, Fabien Mathieu, Fabien de Montgolfier, Diego Perino, Laurent Viennot:
Fine Tuning of a Distributed VoD System. ICCCN 2009: 1-7 - Jack Brassil, Rick McGeer, Puneet Sharma, Praveen Yalagandula, Brian L. Mark, S. Zhang, Stephen Schwab:
The Case for Service Overlays. ICCCN 2009: 1-6 - Amos Brocco, Béat Hirsbrunner:
Service Provisioning Framework for a Self-Organized Grid. ICCCN 2009: 1-6 - Girish B. C., Ramaswamy Govindarajan:
Reducing Buffer Requirements in Core Routers Using Dynamic Buffering. ICCCN 2009: 1-6 - Thomas E. Carroll, Daniel Grosu:
A Game Theoretic Investigation of Deception in Network Security. ICCCN 2009: 1-6 - Zesheng Chen, Chao Chen, Qian Wang:
Delay-Tolerant Botnets. ICCCN 2009: 1-6 - Yiping Chen, Jimmy Leblet, Gwendal Simon:
On Reducing the Inter-AS Traffic of Box-Powered CDN. ICCCN 2009: 1-6 - Xiao Chen, Jian Shen, Taylor L. Groves, Jie Wu:
Probability Delegation Forwarding in Delay Tolerant Networks. ICCCN 2009: 1-6 - Hyun Jung Choe, Preetam Ghosh, Kalyan Basu, Sajal K. Das:
Class-Based Data Reporting Scheme in Heterogeneous Wireless Sensor Networks. ICCCN 2009: 1-6 - Mooi Choo Chuah, Peng Yang:
Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme. ICCCN 2009: 1-6
skipping 153 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 12:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint