Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 209 matches
- 2012
- Ahmed E. A. A. Abdulla, Hiroki Nishiyama, Nei Kato:
Extending the lifetime of wireless sensor networks: A hybrid routing algorithm. Comput. Commun. 35(9): 1056-1063 (2012) - Yehuda Afek, Anat Bremler-Barr, Yaron Koral:
Space efficient deep packet inspection of compressed web traffic. Comput. Commun. 35(7): 810-819 (2012) - Amir M. Ahmadzadeh, Juan Eulogio Sánchez-García, B. Saavedra-Moreno, Antonio Portilla-Figueras, Sancho Salcedo-Sanz:
Capacity estimation algorithm for simultaneous support of multi-class traffic services in Mobile WiMAX. Comput. Commun. 35(1): 109-119 (2012) - Luca Maria Aiello, Giancarlo Ruffo:
LotusNet: Tunable privacy for distributed online social network services. Comput. Commun. 35(1): 75-88 (2012) - Hüseyin Akcan, Cem Evrendilek:
GPS-free directional localization via dual wireless radios. Comput. Commun. 35(9): 1151-1163 (2012) - Hussein Al-Zubaidy, Ioannis Lambadaris, Yannis Viniotis:
Optimal scheduling in multi-server queues with random connectivity and retransmissions. Comput. Commun. 35(13): 1626-1638 (2012) - Stuart M. Allen, Ian M. Cooper, Roger M. Whitaker:
Optimising multi-rate link scheduling for wireless mesh networks. Comput. Commun. 35(16): 2014-2024 (2012) - Eitan Altman, Konstantin Avrachenkov, Sreenath Ramanath:
Multiscale fairness and its application to resource allocation in wireless networks. Comput. Commun. 35(7): 820-828 (2012) - Navid Amini, Alireza Vahdatpour, Wenyao Xu, Mario Gerla, Majid Sarrafzadeh:
Cluster size optimization in sensor networks with decentralized cluster-based protocols. Comput. Commun. 35(2): 207-220 (2012) - Min Kyung An, Nhat X. Lam, Dung T. Huynh, Trac N. Nguyen:
Minimum latency data aggregation in the physical interference model. Comput. Commun. 35(18): 2175-2186 (2012) - Luca Anchora, Marco Mezzavilla, Leonardo Badia, Michele Zorzi:
A performance evaluation tool for spectrum sharing in multi-operator LTE networks. Comput. Commun. 35(18): 2218-2226 (2012) - Sergey D. Andreev, Pavel Gonchukov, Nageen Himayat, Yevgeni Koucheryavy, Andrey M. Turlikov:
Energy efficient communications for future broadband cellular networks. Comput. Commun. 35(14): 1662-1671 (2012) - Shin'ichi Arakawa, Tetsuya Takine, Masayuki Murata:
Analyzing and modeling router-level internet topology and application to routing control. Comput. Commun. 35(8): 980-992 (2012) - A. Argento, Matteo Cesana, Nicola Gatti, Ilaria Malanchini:
A game theoretical study of access point association in wireless mesh networks. Comput. Commun. 35(5): 541-553 (2012) - Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi, Ali Aydin Selçuk:
GLP: A cryptographic approach for group location privacy. Comput. Commun. 35(12): 1527-1533 (2012) - Usman Ashraf, Slim Abdellatif, Guy Juanole:
Interference-Aware Bandwidth Reservation in multi-radio multi-channel mesh networks. Comput. Commun. 35(17): 2138-2149 (2012) - Muhammad Ayaz, Azween B. Abdullah, Ibrahima Faye, Yasir Batira:
An efficient Dynamic Addressing based routing protocol for Underwater Wireless Sensor Networks. Comput. Commun. 35(4): 475-486 (2012) - Serkan Ayaz, Felix Hoffmann, Ulrich Epple, Reinhard German, Falko Dressler:
Performance evaluation of network mobility handover over future aeronautical data link. Comput. Commun. 35(3): 334-343 (2012) - Seyed Vahid Azhari, Maryam Homayouni, Hani Nemati, Javad Enayatizadeh, Ahmad Akbari:
Overload control in SIP networks using no explicit feedback: A window based approach. Comput. Commun. 35(12): 1472-1483 (2012) - Ataul Bari, Arunita Jaekel, Jin Jiang, Yufei Xu:
Design of fault tolerant wireless sensor networks satisfying survivability and lifetime requirements. Comput. Commun. 35(3): 320-333 (2012) - Roohollah Barzamini, Masoud Shafiee, Aresh Dadlani:
Adaptive generalized minimum variance congestion controller for dynamic TCP/AQM networks. Comput. Commun. 35(2): 170-178 (2012) - Hakem Beitollahi, Geert Deconinck:
Ferris wheel: A ring based onion circuit for hidden services. Comput. Commun. 35(7): 829-841 (2012) - Hakem Beitollahi, Geert Deconinck:
Analyzing well-known countermeasures against distributed denial of service attacks. Comput. Commun. 35(11): 1312-1332 (2012) - Nadjet Belblidia, Marcelo Dias de Amorim, Luís Henrique Maciel Kosmalski Costa, Jeremie Leguay, Vania Conan:
Part-whole dissemination of large multimedia contents in opportunistic networks. Comput. Commun. 35(15): 1786-1797 (2012) - Victoria Beltran, Josep Paradells:
Control mechanisms of presence updates: A tradeoff between traffic optimization and information consistency. Comput. Commun. 35(17): 2093-2105 (2012) - Djohara Benyamina, Abdelhakim Hafid, Nasreddine Hallam, Michel Gendreau, J. C. Maureira:
A hybrid nature-inspired optimizer for wireless mesh networks design. Comput. Commun. 35(10): 1231-1246 (2012) - Robert Birke, Csaba Király, Emilio Leonardi, Marco Mellia, Michela Meo, Stefano Traverso:
A delay-based aggregate rate control for P2P streaming systems. Comput. Commun. 35(18): 2237-2244 (2012) - Azzedine Boukerche, Dionysios Efstathiou, Sotiris E. Nikoletseas, Christoforos L. Raptopoulos:
Exploiting limited density information towards near-optimal energy balanced data propagation. Comput. Commun. 35(18): 2187-2200 (2012) - Manel Bourguiba, Kamel Haddadou, Guy Pujolle:
Packet aggregation based network I/O virtualization for cloud computing. Comput. Commun. 35(3): 309-319 (2012) - Swastik Brahma, Mainak Chatterjee, Kevin A. Kwiat, Pramod K. Varshney:
Traffic management in wireless sensor networks: Decoupling congestion control and fairness. Comput. Commun. 35(6): 670-681 (2012)
skipping 179 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 20:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint