Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 77 matches
- 2002
- Sanghyun Ahn, Yujin Lim, Wonjun Lee, Eunyong Ha:
Infrastructure-Less Multicast Protocol in Mobile Ad-Hoc Networks. ICOIN (2) 2002: 321-332 - JinHo Ahn, Sung-Gi Min, Chong-Sun Hwang:
Consistent and Efficient Recovery for Causal Message Logging. ICOIN (2) 2002: 565-574 - Keijirou Arai, Katsuya Tanaka, Makoto Takizawa:
Group Protocol for Delivering Requests to Replicas. ICOIN (2) 2002: 724-735 - Tohru Asami, Takahiro Kikuchi, Kenji Rikitake, Hiroshi Nagata, Tatsuaki Hamai, Yoshinori Hatori:
A Taxonomy of Spam and a Protection Method for Enterprise Networks. ICOIN (2) 2002: 442-452 - MaengSoon Baik, Jin Gon Shon, Kibom Kim, JinHo Ahn, Chong-Sun Hwang:
An Efficient Coordinated Checkpointing Scheme Based on PWD Model. ICOIN (2) 2002: 780-790 - Jin Seek Choi, Bum Sik Bae, Hyeong Ho Lee, Hyeung Sub Lee:
Round-Robin Scheduling Algorithm with Multiple Distributed Windows. ICOIN (2) 2002: 814-820 - Yoonsuk Choi, Howon Jung, Kyungshik Lim:
A Comparative Performance Evaluation of the Transport Layer Protocols for Wireless Transaction Processing in Mobile Internet Environments. ICOIN (2) 2002: 11-21 - Seong Gon Choi, Hyun Joo Kang, Jun Kyun Choi:
Mobility Management with Low Latency Time by Using the GSMP on the MPLS Network. ICOIN (2) 2002: 74-80 - Eun Hye Choi, Tatsuhiro Tsuchiya, Tohru Kikuno:
Optimal k-Coteries That Maximize Availability in General Networks. ICOIN (2) 2002: 596-608 - Yingfei Dong, Zhi-Li Zhang, Yiwei Thomas Hou:
Server-Based Dynamic Server Selection Algorithms. ICOIN (2) 2002: 575-584 - Nobuo Funabiki, Toru Nakanishi, Tokumi Yokohira, Shigeto Tajima, Teruo Higashino:
A Proposal of a Quasi-Solution State Evolution Algorithm for Channel Assignment Problems. ICOIN (2) 2002: 32-41 - Steffen Göbel, Sven Buchholz, Thomas Ziegert, Alexander Schill:
Software Architecture for the Adaptation of Dialogs and Contents to Different Devices. ICOIN (2) 2002: 42-51 - Moon Seog Han, Sang Yun Park, Young Ik Eom:
A File Migration Scheme for Reducing File Access Latency in Mobile Computing Environments. ICOIN (2) 2002: 644-655 - Koji Hashimoto, Yoshitaka Shibata, Norio Shiratori:
Mobile Agent-Based Adaptive Multimedia Communication. ICOIN (2) 2002: 467-478 - Tae-Chul Hong, In-Ho Roh, Young Yong Kim:
TCP Throughput Improvement for Semi-Soft & Soft Handoff. ICOIN (2) 2002: 52-61 - Yungoo Huh, Cheeha Kim:
Group-Based Location Management Scheme in Personal Communication Networks. ICOIN (2) 2002: 81-90 - Yeong Min Jang:
Buffer Dimensioning of ATM Satellite Link Using Probabilistic Burstiness Curve. ICOIN (2) 2002: 333-341 - Dongwon Jeong, Doo-Kwon Baik:
AMC: An Adaptive Mobile Computing Model for Dynamic Resource Management in Distributed Computing Environments. ICOIN (2) 2002: 671-678 - Jin-Woo Jung, Jung-Hoon Cheon, Sangwoo Nam, Youn-Joo Lee, Hyun-Kook Kahng:
Fast Move Detection over Mobile IP. ICOIN (2) 2002: 136-142 - YunHee Kang, Ho-sang Ham, Chong-Sun Hwang:
A Hybrid Fault-Tolerant Scheme Based on Checkpointing in MASs. ICOIN (2) 2002: 679-690 - Ji-Eun Kang, Dong-Min Kim, Yong-Chul Shin, Hee-Yoon Park, Jai-Yong Lee:
Performance Evaluation of TCP over WCDMA RLC. ICOIN (2) 2002: 221-228 - Hyun-jeong Kang, Mee-jeong Lee:
A Multi-source Multicast Routing Protocol for Ad-Hoc Networks. ICOIN (2) 2002: 309-320 - Takashi Katoh, Tetsuo Kinoshita, Norio Shiratori:
Dynamic Behavior of Multiagents with Subjective Cooperative Relations. ICOIN (2) 2002: 634-643 - Byoung-Koo Kim, Jong-Su Jang, Tai-Myung Chung:
Design of Network Security Control System for Cooperative Intrusion Detection. ICOIN (2) 2002: 389-398 - Jinoh Kim, Kiyoung Kim, Jongsoo Jang:
Policy-Based Intrusion Detection and Automated Response Mechanism. ICOIN (2) 2002: 399-408 - Nam-Yeun Kim, Hyun-Sung Kim, Won-Ho Lee, Kee-Young Yoo:
A Power-Sum Systolic Architecture in GF(2m). ICOIN (2) 2002: 409-417 - Sung Pil Kim, Jong Kap Oh, Myoung Jin Kim, Ho Seong Ahn, Seung Moon Ryu:
On the Selection of Code Set for Binary Multi-code CDMA System. ICOIN (2) 2002: 264-275 - Geon Woo Kim, So-Hee Park, Jaehoon Nah, Sung Won Sohn:
Security Policy Deployment in IPsec. ICOIN (2) 2002: 453-466 - Sung Wan Kim, Pan Seop Shin, Youn Hee Kim, Jaeho Lee, Hae Chull Lim:
A Data Model and Algebra for Document-Centric XML Document. ICOIN (2) 2002: 714-723 - Yoshiaki Kitaguchi, Haruo Okazawa, Syunsuke Shinomiya, Yutaka Kidawara, Katsuya Hakozaki, Shin-ichi Nakagawa:
Development of a High-Accurate Time Server for Measurements of the Internet. ICOIN (2) 2002: 351-358
skipping 47 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 14:28 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint