default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 144 matches
- 2005
- Mehran Abolhasan, Justin Lipman:
Efficient and Highly Scalable Route Discovey for On-demand Routing Protocols in Ad hoc Networks. LCN 2005: 358-366 - Nadeem Ahmed, Salil S. Kanhere, Sanjay K. Jha:
Probabilistic Coverage in Wireless Sensor Networks. LCN 2005: 672-681 - Wayne Allen, Art Martin, Anand Rangarajan:
Designing and Deploying a Rural Ad-Hoc Community Mesh Network Testbed. LCN 2005: 740-743 - Jalal Almhana, Vartan Choulakian, Robert McGorman:
A Mobile Terminal Location Tracking Model for Personal Communication Systems. LCN 2005: 599-607 - Zahid Anwar, William Yurcik, Salman Baset, Henning Schulzrinne, Roy H. Campbell:
A First Step Towards Call Survivability in Cellular Networks. LCN 2005: 501-502 - Srivatsan Balasubramanian, Wensheng He, Arun K. Somani:
Light-Trail Networks: Design and Survivability. LCN 2005: 174-181 - André M. Barroso, Utz Roedig, Cormac J. Sreenan:
Use of Framelets for Efficient Transmitter-Receiviver rendezvous in Wireless Sensor Networks. LCN 2005: 664-671 - André Beller, Edgard Jamhour, Manoel Camillo Penna:
Dynamic DiffServ Configuration Using COPS-PR. LCN 2005: 458-467 - Robert Benkoczi, Hossam S. Hassanein, Selim G. Akl, Sylvia Tai:
Data relaying with optimal resource management in wireless sensor networks (Extended Abstract). LCN 2005: 617-618 - Azzedine Boukerche, Kaouther Abrougui, Tingxue Huang:
QoS and Fault-Tolerant Based Distributed Dynamic Channel Allocation Protocol for Cellular Networks. LCN 2005: 59-67 - Azzedine Boukerche, Raed Al-Shaikh, Bo Marleau:
Disconnection-Resilient File System for Mobile Clients. LCN 2005: 608-614 - Azzedine Boukerche, Richard Werner Nelem Pazzi, Regina Borges de Araujo:
HPEQ A Hierarchical Periodic, Event-driven and Query-based Wireless Sensor Network Protocol. LCN 2005: 560-567 - Robert Brännström, Christer Åhlund, Arkady B. Zaslavsky:
Maintaining Gateway Connectivity in Multi-hop Ad hoc Networks. LCN 2005: 682-689 - José Carlos Brustoloni:
Automatic VPN Client Recovery from IPsec Pass-through Failures. LCN 2005: 756-763 - Jason But, Urs Keller, Grenville J. Armitage:
Passive TCP Stream Estimation of RTT and Jitter Parameters. LCN 2005: 433-441 - Miguel Elias M. Campista, Luís Henrique Maciel Kosmalski Costa, Otto Carlos Muniz Bandeira Duarte:
Improving the Data Transmission Throughput over the Home Electrical Wiring. LCN 2005: 318-327 - Yu Chen, Kai Hwang, Yu-Kwong Kwok:
Filtering of Shrew DDoS Attacks in Frequency Domain. LCN 2005: 786-793 - Min Chen, Taekyoung Kwon, Yanghee Choi:
Data Dissemination based on Mobile Agent in Wireless Sensor Networks. LCN 2005: 527-529 - Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Zheng, Yixin Jiang:
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN. LCN 2005: 748-755 - Kwan-Wu Chin, Darryn Lowe:
A Simulation Study of TCP over the IEEE 802.15.3 MAC. LCN 2005: 476-477 - Bao Linh Dang, Ignas G. Niemegeers:
Analysis of IEEE 802.11 in Radio over Fiber Home Networks. LCN 2005: 744-747 - Thomas Dreibholz, Avril IJsselmuiden, John L. Adams:
An Advanced QoS Protocol for Mass Content. LCN 2005: 517-518 - Thomas Dreibholz, Erwin P. Rathgeb:
On the Performance of Reliable Server Pooling Systems. LCN 2005: 200-208 - Stephan Eichler, Bernd Müller-Rathgeber:
Performance Analysis of Scalable Certificate Revocation Schemes for Ad Hoc Networks. LCN 2005: 382-391 - Paal Engelstad, Olav N. Østerbø:
Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler. LCN 2005: 639-646 - Paal Engelstad, Olav N. Østerbø:
Delay and Throughput Analysis of IEEE 802.11e EDCA with Starvation Prediction. LCN 2005: 647-655 - Frank Eyermann, Péter Rácz, Burkhard Stiller, Christian Schaefer, Thomas Walter:
Service-oriented Accounting Configuration Management based on Diameter. LCN 2005: 621-623 - Xing Fan, Magnus Jonsson:
Guaranteed Real-Time Services over Standard Switched Ethernet. LCN 2005: 490-492 - Ayman G. Fayoumi, Fahad Ahmed Al-Zahrani, Abdulgader A. Habiballa, Anura P. Jayasumana:
Performance Analysis of Multi-Fiber Synchronous Photonic Share-per-link Packet Switches. LCN 2005: 182-189 - Thierry K. Feuzeu, Bernard Cousin:
A New Scheme for Interconnecting LANs with Label Switching Bridges. LCN 2005: 303-310
skipping 114 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-19 23:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint