default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 69 matches
- 2013
- Teuku Yuliar Arif, Riri Fitri Sari:
DCF and EDCA throughput improvement using Selective Anomalous Slot Avoidance (SASA). ICON 2013: 1-7 - Zoebir Bong, Derrick Lim Teck Leong, Bu-Sung Lee:
Domain-based Hybrid OpenFlow Network (HON). ICON 2013: 1-4 - Christos Bouras, Vaggelis Kapoulas, Apostolos Gkamas, Dimitra Politaki, Enea Tsanai:
Evaluation of routing protocols for video transmission over MANETs that use multiple interfaces and multiple channels per node. ICON 2013: 1-6 - Maurizio Casoni, Carlo Augusto Grazia, Natale Patriciello:
On the performance of Linux Container with Netmap/VALE for networks virtualization. ICON 2013: 1-6 - Lekha Chaisorn, Yongkang Wong:
Video analytics for surveillance camera networks. ICON 2013: 1-6 - Liang Chen, Limin Meng, Zhijiang Xu, Jiangxin Zhang, Wei Jiang:
A design of degree distribution for systematic fountain codes. ICON 2013: 1-5 - Prasun Chowdhury, Iti Saha Misra:
Queue size analysis of QoS-aware Weighted Hybrid Packet Scheduling Scheme for BWA networks. ICON 2013: 1-6 - Jorge Arturo Cobb:
Generalized fairness in QoS scheduling. ICON 2013: 1-6 - Roberto Ramos Colletti, Renato Mariz de Moraes:
Evaluation of link lifetime for the Random Waypoint mobility model. ICON 2013: 1-5 - Pavarit Dairinram, Damras Wongsawang, Pagaporn Pengsart:
SIEM with LSA technique for Threat identification. ICON 2013: 1-6 - Rajaiah Dasari, Malla Reddy Perati:
Loss behavior of an Internet router with self-similar input traffic via Fractal point process. ICON 2013: 1-6 - Zhenjie Deng, Yinlong Liu, Lei Qian, Yahui Hu, Song Ci:
ADPSM: An Adaptive Delay-based Packet Splitting Mechanism for Concurrent Multipath Transfer over heterogeneous paths. ICON 2013: 1-6 - Xin Fang, Sheng Fang, Na Ying, Haiyan Cao, Chao Liu:
The performance of massive MIMO systems under correlated channel. ICON 2013: 1-4 - Jan Gäbler, Hartmut König:
Enhancing group communication systems with mobility support. ICON 2013: 1-6 - Wei Gan, Zhiqiang Shi, Chen Zhang, Limin Sun, Dan Ionescu:
MERPL: A more memory-efficient storing mode in RPL. ICON 2013: 1-5 - Jochen Gruen, Michael Karl, Thorsten Herfet:
Network supported congestion avoidance in software-defined networks. ICON 2013: 1-6 - Doan B. Hoang, Hoang M. Phung, Elaine Lawrence:
A collaborative task planning and development environment on the Cloud/Grid. ICON 2013: 1-6 - Menglan Hu, Yang Wang, Wei Shi:
Scheduling soft aperiodic messages on FlexRay in-vehicle networks. ICON 2013: 1-6 - Chung-Ping Hung, Paul S. Min:
Access LUT without CAM - Improved Pearson hashing for collision reduction. ICON 2013: 1-5 - Chung-Ping Hung, Paul S. Min:
Deriving and visualizing the lower bounds of information gain for prefetch systems. ICON 2013: 1-6 - Ray Hunt:
Security testing in Android networks - A practical case study. ICON 2013: 1-6 - Kohei Ichikawa, Susumu Date, Hirotake Abe, Hiroaki Yamanaka, Eiji Kawai, Shinji Shimojo:
A network performance-aware routing for multisite virtual clusters. ICON 2013: 1-5 - Shuji Ishii, Eiji Kawai, Yoshihiko Kanaumi, Shuichi Saito, Tomoaki Takata, Kazumasa Kobayashi, Shinji Shimojo:
A study on designing OpenFlow controller RISE 3.0. ICON 2013: 1-5 - Zoltán Jakó, Ádám Knapp, Sándor Imre, Gábor Jeney:
Application of LTE small cells in urban environments for higher capacity. ICON 2013: 1-6 - Punyawi Jamjareegulgarn:
Performance evaluation for cooperative diversity-based wireless body area network. ICON 2013: 1-6 - Yao Yeboah Junior, Xiaojun Hei:
Evaluating the performance of cloud services in a browser-based network measurement platform. ICON 2013: 1-6 - Renuga Kanagavelu, Bu-Sung Lee, Miguel Rodel Felipe, Le Nguyen The Dat, Luke Ng Mingjie:
Software defined network based adaptive routing for data replication in Data Centers. ICON 2013: 1-6 - Michael Karl, Jochen Gruen, Thorsten Herfet:
Multimedia optimized routing in OpenFlow networks. ICON 2013: 1-6 - Hyunbum Kim, Jorge Arturo Cobb:
Maximum lifetime of reinforced barrier-coverage in Wireless Sensor Networks. ICON 2013: 1-6 - Jaebeom Kim, Daewook Shin, Young-Bae Ko:
TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks. ICON 2013: 1-6
skipping 39 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-25 09:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint