Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 1994
- Salah Aidarous, Stephen B. Weinstein:
Distributed systems for telecommunications. IEEE Netw. 8(1): 5 (1994) - Megan Babson, David Buster, Gary DeVal, Joseph S. Xavier:
ATM switching and CPE adaptation in the North Carolina Information Highway. IEEE Netw. 8(6): 40-46 (1994) - David Bantz, Frédéric J. Bauchot:
Wireless LAN design alternatives. IEEE Netw. 8(2): 43-53 (1994) - William A. Bruwer, John D. Loop, James A. Symon, B. G. Thompson:
VISTAnet and MICA: medical applications leading to the NCIH. IEEE Netw. 8(6): 24-31 (1994) - Robert L. Capell, David A. Kettler, Randall L. Corn, Robert Morris:
Evolution of the North Carolina Information Highway. IEEE Netw. 8(6): 64-70 (1994) - Kwang-Cheng Chen:
Medium access control of wireless LANs for mobile computing. IEEE Netw. 8(5): 50-63 (1994) - Thomas M. Chen, Steven S. Liu:
Management and control functions in ATM switching systems. IEEE Netw. 8(4): 27-40 (1994) - Fernando Cuervo, Dia Helmy:
Applying the IN-service life cycle process to UPT. IEEE Netw. 8(1): 45-51 (1994) - Ravi Damodaram, Kenneth T. Stephens, William S. Bishop, Peter O. Brackett, Stephen C. Farkouh, Amelendu Chatterjee:
Network management for the NCIH. IEEE Netw. 8(6): 48-54 (1994) - George P. Eleftheriadis, Michael Theologou:
User profile identification in future mobile telecommunications systems. IEEE Netw. 8(5): 33-39 (1994) - Leonard J. N. Franken, Boudewijn R. Haverkort:
The performability manager. IEEE Netw. 8(1): 24-32 (1994) - Joan García-Haro, Andrzej Jajszczyk:
ATM shared-memory switching architectures. IEEE Netw. 8(4): 18-26 (1994) - Larry W. Grovenstein, Charlie Pittman, Joe H. Simpson, Dan R. Spears:
NCIH services, architecture, and implementation. IEEE Netw. 8(6): 18-22 (1994) - Andy Harter, Andy Hopper:
A distributed location system for the active office. IEEE Netw. 8(1): 62-70 (1994) - Geert Heijenk, Xinli Hou, Ignas G. Niemegeers:
Communication systems supporting multimedia multi-user applications. IEEE Netw. 8(1): 34-44 (1994) - Andrew Herbert:
An ANSA overview. IEEE Netw. 8(1): 18-23 (1994) - James P. Hughes, William R. Franta:
Geographic extension of HIPPI channels via high speed SONET. IEEE Netw. 8(3): 42-53 (1994) - David R. Irvin:
The role of customer-premises bandwidth management. IEEE Netw. 8(3): 18-25 (1994) - Gregory Lauer:
IN architectures for implementing universal personal telecommunications. IEEE Netw. 8(2): 6-16 (1994) - Edward H. Lipper, Michael P. Rumsewicz:
Teletraffic considerations for widespread deployment of PCS. IEEE Netw. 8(5): 40-49 (1994) - Refik Molva, Didier Samfat, Gene Tsudik:
Authentication of mobile users. IEEE Netw. 8(2): 26-34 (1994) - Biswanath Mukherjee, Todd L. Heberlein, Karl N. Levitt:
Network intrusion detection. IEEE Netw. 8(3): 26-41 (1994) - Donal O'Mahony:
Security considerations in a network management environment. IEEE Netw. 8(3): 12-17 (1994) - Girish Pathak, Renu Chipalkatti, Hao-Jen Fu, Willis Stinson, Shaygan Kheradpir:
Integrated network and service management for the NCIH. IEEE Netw. 8(6): 56-63 (1994) - Jane Smith Patterson, William L. Smith:
The North Carolina information highway. IEEE Netw. 8(6): 12-17 (1994) - Vern Paxson:
Growth trends in wide-area TCP connections. IEEE Netw. 8(4): 8-17 (1994) - Gregory P. Pollini, Zygmunt J. Haas:
E-BAMA vs. RAMA [multiple access protocols]. IEEE Netw. 8(2): 18-25 (1994) - Harvey Rubin, Narayanan Natarajan:
A distributed software architecture for telecommunication networks. IEEE Netw. 8(1): 8-17 (1994) - Bill N. Schilit, Marvin M. Theimer:
Disseminating active map information to mobile hosts. IEEE Netw. 8(5): 22-32 (1994) - Chris Schmandt:
Multimedia nomadic services on today's hardware. IEEE Netw. 8(5): 12-21 (1994)
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 11:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint