Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 53 matches
- 2012
- Ernst W. Biersack, Quentin Jacquemart, Fabian Fischer, Johannes Fuchs, Olivier Thonnard, Georgios Theodoridis, Dimitrios Tzovaras, Pierre-Antoine Vervier:
Visual analytics for BGP monitoring and prefix hijacking identification. IEEE Netw. 26(6): 33-39 (2012) - Nicola Bui, Angelo Paolo Castellani, Paolo Casari, Michele Zorzi:
The internet of energy: a web-enabled smart grid system. IEEE Netw. 26(4): 39-45 (2012) - Bin Cao, Qinyu Zhang, Jon W. Mark, Lin X. Cai, H. Vincent Poor:
Toward efficient radio spectrum utilization: user cooperation in cognitive radio networking. IEEE Netw. 26(4): 46-52 (2012) - Pedro Casas, Johan Mazel, Philippe Owezarski:
Knowledge-independent traffic monitoring: Unsupervised detection of network attacks. IEEE Netw. 26(1): 13-21 (2012) - Philippe Chanclou, Anna Cui, Frank Geilhardt, Hirotaka Nakamura, Derek Nesset:
Network operator requirements for the next generation of optical access networks. IEEE Netw. 26(2): 8-14 (2012) - Yu-Chun Chang, Chi-Jui Chang, Kuan-Ta Chen, Chin-Laung Lei:
Radar chart: scanning for satisfactory QoE in QoS dimensions. IEEE Netw. 26(4): 25-31 (2012) - Thomas M. Chen, Xuemin Shen:
Editor's note. IEEE Netw. 26(1): 2 (2012) - Jong-Moon Chung, Yeonghun Nam, Kyucheol Park, Hyoung Jun Cho:
Exploration time reduction and sustainability enhancement of cooperative clustered multiple robot sensor networks. IEEE Netw. 26(3): 41-48 (2012) - Yong Cui, Peng Wu, Mingwei Xu, Jianping Wu, Yiu L. Lee, Alain Durand, Chris Metz:
4over6: network layer virtualization for IPv4-IPv6 coexistence. IEEE Netw. 26(5): 44-48 (2012) - Alberto Dainotti, Antonio Pescapè, Kimberly C. Claffy:
Issues and future directions in traffic classification. IEEE Netw. 26(1): 35-40 (2012) - Maxime Dumas, Jean-Marc Robert, Michael J. McGuffin:
Alertwheel: radial bipartite graph visualization applied to intrusion detection system alerts. IEEE Netw. 26(6): 12-18 (2012) - Xi Fang, Satyajayant Misra, Guoliang Xue, Dejun Yang:
Managing smart grid information in the cloud: opportunities, model, and applications. IEEE Netw. 26(4): 32-38 (2012) - Camillo Gentile, David W. Griffith, Michael R. Souryal:
Wireless network deployment in the smart grid: Design and evaluation issues. IEEE Netw. 26(6): 48-53 (2012) - John R. Goodall, Florian Mansmann, John Gerth:
Computer network visualization [Guest Editorial]. IEEE Netw. 26(6): 4-5 (2012) - María Guinaldo, Gonzalo Farias, Ernesto Fábregas, José Sánchez Moreno, Sebastián Dormido-Canto, Sebastián Dormido:
An interactive simulator for networked mobile robots. IEEE Netw. 26(3): 14-20 (2012) - Ashwin Gumaste, Klaus Pulverer, António L. J. Teixeira, Jun Shan Wey, Ali Nouroozifar, Curt Badstieber, Helmut Schink:
Medium access control for the next-generation passive optical networks: the OLIMAC approach. IEEE Netw. 26(2): 49-56 (2012) - Lane Harrison, Aidong Lu:
The future of security visualization: Lessons from network visualization. IEEE Netw. 26(6): 6-11 (2012) - Guoqiang Hu, Wee-Peng Tay, Yonggang Wen:
Cloud robotics: architecture, challenges and applications. IEEE Netw. 26(3): 21-28 (2012) - Mahesa Jeyakanthan, Amiya Nayak:
Policy management: leveraging the open virtualization format with contract and solution models. IEEE Netw. 26(5): 22-27 (2012) - Koji Kamei, Shuichi Nishio, Norihiro Hagita, Miki Sato:
Cloud networked robotics. IEEE Netw. 26(3): 28-34 (2012) - Burak Kantarci, Hussein T. Mouftah:
Energy efficiency in the extended-reach fiber-wireless access networks. IEEE Netw. 26(2): 28-35 (2012) - Dimitris Katsianis, Theodoros Rokkas, Ioannis Neokosmidis, Markos Tselekounis, Dimitris Varoutas, Ioannis Zacharopoulos, Apostolia Bartzoudi:
Risks associated with next generation access networks investment scenarios. IEEE Netw. 26(4): 11-17 (2012) - Seong-Lyun Kim, Dapeng Oliver Wu, Klaus Schilling:
Machine and robotic networking [Guest Editorial]. IEEE Netw. 26(3): 4-5 (2012) - Simon Knight, Nickolas J. G. Falkner, Hung X. Nguyen, Paul Tune, Matthew Roughan:
I can see for miles: Re-visualizing the internet. IEEE Netw. 26(6): 26-32 (2012) - Adlen Ksentini, Yassine Hadjadj Aoul, Tarik Taleb:
Cellular-based machine-to-machine: overload control. IEEE Netw. 26(6): 54-60 (2012) - Toshiaki Kuri, Hiroaki Harai, Naoya Wada, Tetsuya Kawanishi, Mizuhiko Hosokawa:
Adaptable access system: pursuit of ideal future access system architecture. IEEE Netw. 26(2): 42-48 (2012) - Aris Leivadeas, Chrysa Papagianni, Symeon Papavassiliou:
Socio-aware virtual network embedding. IEEE Netw. 26(5): 35-43 (2012) - Martin Maier, Martin Lévesque, Liviu Ivanescu:
NG-PONs 1&2 and beyond: the dawn of the uber-FiWi network. IEEE Netw. 26(2): 15-21 (2012) - Alexander Marold, Peter Lieven, Björn Scheuermann:
Probabilistic parallel measurement of network traffic at multiple locations. IEEE Netw. 26(1): 6-12 (2012) - Frédéric Massicotte, Mathieu Couture, Hugues Normandin, Mathieu Letourneau:
Navigating and visualizing the malware intelligence space. IEEE Netw. 26(6): 19-25 (2012)
skipping 23 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-27 03:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint