Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 81 matches
- 2014
- Hrishikesh B. Acharya:
On rule width and the unreasonable effectiveness of policy verification. LCN 2014: 314-321 - M. Mehdi Afsar, Mohamed F. Younis:
An energy- and proximity-based unequal clustering algorithm for Wireless Sensor Networks. LCN 2014: 262-269 - Sardar Ali, Kui Wu, Hassan Khan:
Traffic Anomaly Detection in the presence of P2P traffic. LCN 2014: 482-485 - Peggy Begerow, Silvia Krug, Atheer Al Rubaye, Karsten Renhak, Jochen Seitz:
Delay tolerant handover for heterogeneous networks. LCN 2014: 370-373 - Yigal Bejerano, Hyoung-Gyu Choi, Seung-Jae Han:
Spatial unfairness in IEEE 802.11 networks. LCN 2014: 390-393 - Yigal Bejerano, Pramod V. Koppol:
Resource reservation comparison of fault resilient routing schemes. LCN 2014: 81-89 - Mohammad M. Bhuiyan, Mike H. MacGregor:
Modelling vegetation effects on RF propagation. LCN 2014: 450-453 - Rodrigo do Carmo, Justus Hoffmann, Volker Willert, Matthias Hollick:
Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection. LCN 2014: 345-353 - Yogita Chapre, Aleksandar Ignjatovic, Aruna Seneviratne, Sanjay K. Jha:
CSI-MIMO: Indoor Wi-Fi fingerprinting system. LCN 2014: 202-209 - Guo Chen, Dan Pei, Youjian Zhao:
CQRD: A switch-based approach to flow interference in Data Center Networks. LCN 2014: 107-115 - Kenneth J. Christensen, Bruce Nordman:
Back to the future: A need for multi-drop Ethernet for cost-effective power distribution. LCN 2014: 378-381 - Jorge Arturo Cobb, Suparn Gupta:
An approximation to rate-equalization fairness with logarithmic complexity for QoS. LCN 2014: 426-429 - Ioan Sorin Comsa, Mehmet Aydin, Sijing Zhang, Pierre Kuonen, Jean-Frédéric Wagen, Yao Lu:
Scheduling policies based on dynamic throughput and fairness tradeoff control in LTE-A networks. LCN 2014: 418-421 - Waltenegus Dargie, Jianjun Wen:
A seamless handover for WSN using LMS filter. LCN 2014: 442-445 - Rana Diab, Gérard Chalhoub, Michel Misson:
Evaluation of a hybrid multi-channel MAC protocol for periodic and burst traffic. LCN 2014: 454-457 - Mohammed Elmorsy, Ehab S. Elmallah:
Breach path to target area detection reliability in Wireless Sensor Networks. LCN 2014: 253-261 - Mahmoud Elsaadany:
Optimal power allocation in cognitive networks using non-orthogonal AF relays. LCN 2014: 410-413 - Raphael Ernst, Sascha Alexander Jopen, Tobias Bartelt:
Reducing MANET neighborhood discovery overhead. LCN 2014: 374-377 - Lobna M. Eslim, Hossam S. Hassanein, Walid M. Ibrahim, Abdallah Y. Alma'aitah:
A cooperative localization scheme using RFID crowdsourcing and time-shifted multilateration. LCN 2014: 185-192 - Adil Fahad, Kurayman Alharthi, Zahir Tari, Abdulmohsen Almalawi, Ibrahim Khalil:
CluClas: Hybrid clustering-classification approach for accurate and efficient network classification. LCN 2014: 168-176 - Fabien Geyer, Stefan Schneele, Georg Carle:
Towards stochastic flow-level network modeling: Performance evaluation of short TCP flows. LCN 2014: 462-465 - Aaron D. Goldman, A. Selcuk Uluagac, John A. Copeland:
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking. LCN 2014: 142-149 - Liyi Gu, Jun Zhang, Brahim Bensaou:
Unleashing the shrew: a stealth greedy targeted attack on TCP traffic in wireless LANs. LCN 2014: 337-344 - Sven Hager, Frank Winkler, Björn Scheuermann, Klaus Reinhardt:
MPFC: Massively Parallel Firewall Circuits. LCN 2014: 305-313 - Sherin Abdel Hamid, Hossam S. Hassanein, Glen Takahara, Hesham Farahat:
Caching-assisted access for vehicular resources. LCN 2014: 28-36 - Seon-Yeong Han, Byoungheon Shin, Dongman Lee:
A fine-grain partial MAC virtualization to support cross layer design in wireless ad hoc networks. LCN 2014: 506-509 - David A. Hayes, Simone Ferlin, Michael Welzl:
Practical passive shared bottleneck detection using shape summary statistics. LCN 2014: 150-158 - Daniel Herrmann, Martin Turba, Arjan Kuijper, Immanuel Schweizer:
Inbound interdomain traffic engineering with LISP. LCN 2014: 458-461 - Feng Hong, Yongtuo Zhang, Zhao Zhang, Meiyu Wei, Yuan Feng, Zhongwen Guo:
WaP: Indoor localization and tracking using WiFi-Assisted Particle filter. LCN 2014: 210-217 - Andriana Ioannou, Stefan Weber:
Towards on-path caching alternatives in Information-Centric Networks. LCN 2014: 362-365
skipping 51 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-27 00:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint