Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 65 matches
- 2000
- Mohammad Abdulrahman Al-Fawzan, Fahad Hoymany:
Placement of network servers in a wide-area network. Comput. Networks 34(3): 355-361 (2000) - Abdulmohsen A. Alheraish, D. G. Smith:
Cell rate moderation of VBR video under an FEC environment in ATM networks. Comput. Networks 34(1): 23-35 (2000) - Claudio Allocchio:
Guest editorial. Comput. Networks 34(6): 821-822 (2000) - Antonios F. Atlasis, Nikolaos H. Loukas, Athanasios V. Vasilakos:
The use of learning algorithms in ATM networks call admission control problem: a methodology. Comput. Networks 34(3): 341-353 (2000) - Pantelis Balaouras, Ioannis Stavrakakis, Lazaros F. Merakos:
Potential and limitations of a teleteaching environment based on H.323 audio-visual communication systems. Comput. Networks 34(6): 945-958 (2000) - Francesco Balestrieri, Pantelis L. Panteli, Vasillios Dionissopoulos, Trevor G. Clarkson:
ATM connection admission control using pRAM based artificial neural networks. Comput. Networks 34(1): 49-63 (2000) - Madalina Baltatu, Antonio Lioy, Fabio Maino, Daniele Mazzocchi:
Security issues in control, management and routing protocols. Comput. Networks 34(6): 881-894 (2000) - Monique Becker, André-Luc Beylot:
Performance comparison criteria for ATM switch models. Comput. Networks 34(1): 85-95 (2000) - Madhu D. K. Bhabuta, Peter G. Harrison:
Optimising bandwidth of ABR sources. Comput. Networks 34(1): 115-128 (2000) - Torsten Bissel, Manfred Bogen, Christian Bonkowski, Volker Hadamschek:
Service level management with agent technology. Comput. Networks 34(6): 831-841 (2000) - Eerke A. Boiten, Howard Bowman, John Derrick, Peter F. Linington, Maarten Steen:
Viewpoint consistency in ODP. Comput. Networks 34(3): 503-537 (2000) - Pierluigi Bonetti, Stefano Ravaioli, Simone Piergallini:
The Italian academic community's electronic voting system. Comput. Networks 34(6): 851-860 (2000) - Thomas Boudier, David M. Shotton:
VIDOS, a system for video editing and format conversion over the Internet. Comput. Networks 34(6): 931-944 (2000) - Claudio Casetti, Renato Lo Cigno, Marco Mellia:
Load-balancing solutions for static routing schemes in ATM networks. Comput. Networks 34(1): 169-180 (2000) - Yue-Shan Chang, Shyan-Ming Yuan, Winston Lo:
A new multi-search engine for querying data through an Internet search service on CORBA. Comput. Networks 34(3): 467-480 (2000) - Fawzi Daoud:
Hybrid satellite/terrestrial networks integration. Comput. Networks 34(5): 781-797 (2000) - Dee Denteneer, Verus Pronk, J. M. Griffiths, Laurie G. Cuthbert:
Impact of the resource needed for renegotiating ATM rates. Comput. Networks 34(1): 211-225 (2000) - Luca Deri, Stefano Suin:
Practical network security: experiences with ntop. Comput. Networks 34(6): 873-880 (2000) - Tien Van Do, Thong T. Nguyen, Hung Tuan Tran, Gábor Kalvach, Balázs Varga:
Topology optimization of an overlay ATM network in an SDH infrastructure. Comput. Networks 34(1): 199-210 (2000) - A. Evangelatos, Th. Rapsomanikis, Nikolas Mitrou, George I. Stassinopoulos:
A burst-level traffic analysis tool. Comput. Networks 34(1): 3-22 (2000) - Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark R. Heckman, Dave Peticolas, Rick Crawford, Lee A. Benzinger, Sue Rho, Stephen Wu:
Intrusion detection inter-component adaptive negotiation. Comput. Networks 34(4): 605-621 (2000) - Tiziana Ferrari:
End-to-end performance analysis with traffic aggregation. Comput. Networks 34(6): 905-914 (2000) - Deborah A. Frincke, Ming-Yuh Huang:
Recent advances in intrusion detection systems. Comput. Networks 34(4): 541-545 (2000) - Brahim Ghribi, Luigi Logrippo:
Understanding GPRS: the GSM packet radio service. Comput. Networks 34(5): 763-779 (2000) - Fabrice Guillemin, Olivier Dugeon, Jacqueline Boyer, Christophe Mangin:
Lightweight signaling in ATM networks for high quality transfer of Internet traffic. Comput. Networks 34(2): 263-278 (2000) - Robert Haas, Patrick Droz, Daniel Bauer:
PNNI Augmented Routing (PAR) and Proxy-PAR. Comput. Networks 34(3): 399-418 (2000) - Shatha K. Habra, Ahmed E. Kamal:
An MCR-weighted protocol for multipoint-to-point communication over ABR service. Comput. Networks 34(3): 363-378 (2000) - Peter Herrmann, Heiko Krumm:
A framework for modeling transfer protocols. Comput. Networks 34(2): 317-337 (2000) - Gertraud Hoffmann:
G-WiN - the Gbit/s infrastructure for the German scientific community. Comput. Networks 34(6): 959-964 (2000) - Ferdinand Hommes, Eva Pless, Lothar Zier:
Did MPOA achieve its objective? Comput. Networks 34(6): 895-904 (2000)
skipping 35 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-30 16:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint