default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 209 matches
- 2015
- Emad Abd-Elrahman, Adel Mounir Sareh Said, Thouraya Toukabri, Hossam Afifi, Michel Marot:
A hybrid model to extend vehicular intercommunication V2V through D2D architecture. ICNC 2015: 754-759 - Iman Abdalla, Tamer A. ElBatt, Mohammed Nafie, Fadel F. Digham:
Towards optimal power control for delay-constrained cognitive radio networks. ICNC 2015: 469-475 - Rana A. Abdelaal, Alireza Shahan Behbahani, Ahmed M. Eltawil:
Advanced base station precoding and user receiver designs for LTE-Advanced networks. ICNC 2015: 1024-1028 - Ahmed Abdel-Hadi, Charles Clancy:
An optimal resource allocation with joint carrier aggregation in 4G-LTE. ICNC 2015: 138-142 - Mohamed Abdelraheem, Mustafa El-Nainay, Scott F. Midkiff:
Spectrum occupancy analysis of cooperative relaying technique for cognitive radio networks. ICNC 2015: 237-241 - Sarmad A. Abdulazeez, Abdennour El Rhalibi, Madjid Merabti, Dhiya Al-Jumeily:
Survey of solutions for Peer-to-Peer MMOGs. ICNC 2015: 1106-1110 - Mansour Abdulaziz, Robert Simon:
Multi-channel network coding in tree-based wireless sensor networks. ICNC 2015: 924-930 - Joydeep Acharya, Salam Akoum:
Optimizing vertical sectorization for high-rises. ICNC 2015: 1-5 - Andreas Achtzehn, Ljiljana Simic, Marina Petrova, Petri Mähönen:
IEEE 802.11 Wi-Fi access point density estimation with capture-recapture models. ICNC 2015: 153-159 - Salam Akoum, Joydeep Acharya:
Vertical beamforming for three-dimensional user placement. ICNC 2015: 336-340 - Hanan Al-Tous, Imad Barhumi:
Resource allocation for two-sources single-relay AF-OFDMA systems. ICNC 2015: 989-993 - Ahmed M. Alaa, Mahmoud H. Ismail, Hazim Tawfik:
Opportunistic spectrum sharing using dumb basis patterns: The Line-of-Sight interference scenario. ICNC 2015: 445-450 - Huda Alhazmi, Swapna S. Gokhale, Derek Doran:
Understanding social effects in online networks. ICNC 2015: 863-868 - Nathaniel D. Amsden, Lei Chen:
Analysis of Facebook steganographic capabilities. ICNC 2015: 67-71 - Bushra Anjum:
Optimizing channel access for bandwidth versus latency in 802.11ac WLANs. ICNC 2015: 128-132 - Ahmed H. Anwar, Ahmed El Shafie, Amr Mohamed, Tamer A. ElBatt, Mohsen Guizani:
Interference-based optimal power-efficient access scheme for cognitive radio networks. ICNC 2015: 962-967 - Aisha Arar, Amr A. El-Sherif, Amr Mohamed, Victor C. M. Leung:
Optimum power and rate allocation in cluster based video sensor networks. ICNC 2015: 183-188 - Mahmoud Ashour, Ahmed El Shafie, Amr Mohamed, Tamer Khattab:
Power-optimal feedback-based random spectrum access for an energy harvesting cognitive user. ICNC 2015: 462-468 - Yuanyuan Bao, Wenting Huang, Chengqi Yi, Jingchi Jiang, Yibo Xue, Yingfei Dong:
Effective deployment of monitoring points on social networks. ICNC 2015: 62-66 - Nader Bargshady, Kaveh Pahlavan, Nayef A. Alsindi:
Hybrid WiFi/UWB, cooperative localization using Particle Filter. ICNC 2015: 1055-1060 - Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, Robert F. Erbacher, Hasan Cam:
On simulation studies of jamming threats against LTE networks. ICNC 2015: 99-103 - Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, David W. Griffith, Nada Golmie:
Optimizing the location deployment of dynamic mobile base stations. ICNC 2015: 579-583 - Alessandro Biason, Michele Zorzi:
Transmission policies for an energy harvesting device with a data queue. ICNC 2015: 189-195 - Sanjay Kumar Biswash, Mahasweta Sarkar, Santosh V. Nagaraj:
Bee system-based energy efficient base station operation in mobile cellular networks. ICNC 2015: 357-362 - Bastian Bloessl, Christoph Sommer, Falko Dressler, David Eckhoff:
The scrambler attack: A robust physical layer attack on location privacy in vehicular networks. ICNC 2015: 395-400 - Tracy Camp, Marc J. Rubin, Santiago Gonzalez:
Challenges in developing intelligent geosystems (and the pros/cons of interdisciplinary research). ICNC 2015: 591-597 - Timothy J. Carbino, Michael A. Temple, Trevor J. Bihl:
Ethernet card discrimination using unintentional cable emissions and constellation-based fingerprinting. ICNC 2015: 369-373 - Abdulkadir Celik, Ramzi R. Saifan, Ahmed E. Kamal:
Sensing strategies for channel discovery in Cognitive Radio Networks. ICNC 2015: 637-641 - Oktay Cetinkaya, Özgür B. Akan:
A ZigBee based reliable and efficient power metering system for energy management and controlling. ICNC 2015: 515-519 - Donald C. D. Chang, Joe Lee, Tzer-Hso Lin:
A new perspective on satellite communications via incompatible signal polarization features and wavefront multiplexing techniques. ICNC 2015: 390-394
skipping 179 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-20 12:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint