default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
Likely matches
- Ad Hoc Networks
- Annual International Conference on Mobile Computing and Networking (MobiCom)
also: International Workshop on Vehicular Ad Hoc Networks (VANET @ MobiCom) - International Colloquium on Automata, Languages and Programming (ICALP)
also: Workshop on Cryptography for Ad-hoc Networks (WCAN @ ICALP) - Ad Hoc & Sensor Wireless Networks
- International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (MobiHoc)
also: ACM Interational Symposium on Mobile Ad Hoc Networking and Computing
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27,163 matches
- 2025
- Rafael Silva Barbon, Edmundo R. M. Madeira, Ademar Takeo Akabane:
A two-context-aware approach for navigation: A case study for vehicular route recommendation. Ad Hoc Networks 166: 103655 (2025) - Mohammed Hassanin, Marwa Keshk, Sara Salim, Majid Alsubaie, Dharmendra Sharma:
PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks. Ad Hoc Networks 166: 103645 (2025) - Baogang Li, Jiale Chen, Xinlong Yu, Zhi Yang, Jingxi Zhang:
Cross-domain gesture recognition via WiFi signals with deep learning. Ad Hoc Networks 166: 103654 (2025) - Akhtar Saeed, Mikail Erdem, Özgür Gürbüz, Mustafa Alper Akkas:
THz band drone communications with practical antennas: Performance under realistic mobility and misalignment scenarios. Ad Hoc Networks 166: 103644 (2025) - 2024
- Christopher Kohlstruck:
Development and Evaluation of Protocols for the Operation of Wireless Ad-Hoc Networks with Quality-of-Service Requirements. Kaiserslautern University of Technology, Germany, 2024 - Adulam Jeyasothy:
Génération d'explications post-hoc personnalisées. (Generation of personalized post-hoc explanations). Sorbonne University, Paris, France, 2024 - Reza Shahin:
Incorporating Ad Hoc Stops in Public Transport: A Study on Flex-Route Transit. (Intégrer des arrêts ad hoc dans les transports publics: une étude sur le transport en commun Flex-Route). Gustave Eiffel University, Champs-sur-Marne, France, 2024 - Aravindan S, Rajaram A:
Hybrid Secure Cluster-Based Routing Algorithm for Enhanced Security and Efficiency in Mobile Ad Hoc Networks. Appl. Artif. Intell. 38(1) (2024) - Debabrata Dansana, Prafulla Kumar Behera, S. Gopal Krishna Patro, Noorulhasan Naveed Quadri, Ayodele Lasisi, Anteneh Wogasso Wodajo:
BSMACRN: Design of an Efficient Blockchain-Based Security Model for Improving Attack-Resilience of Cognitive Radio Ad-hoc Networks. IEEE Access 12: 10047-10058 (2024) - Muhammad Ismail, Fazal Muhammad, Zeeshan Shafiq, Muhammad Irfan, Saifur Rahman, Salim Nasar Faraj Mursal, Grzegorz Nowakowski, Eduard Zharikov:
Line-of-Sight-Based Coordinated Channel Resource Allocation Management in UAV-Assisted Vehicular Ad Hoc Networks. IEEE Access 12: 25245-25253 (2024) - Imran Abbas Khawaja, Kamran Abid, Uzma Farooq, Zaki Malik, Adnan Abid:
Empowering Collaborative Application Development: A Robust Framework for Ad-Hoc Distributed Systems. IEEE Access 12: 62296-62316 (2024) - Joydeep Kundu, Sahabul Alam, Jadav Chandra Das, Arindam Dey, Debashis De:
Trust-Based Flying Ad Hoc Network: A Survey. IEEE Access 12: 99258-99281 (2024) - Angel Ornelas-Gutierrez, César Vargas Rosales, Rafaela Villalpando Hernandez, Jaime Zuniga-Mejia:
SINR Management in Roundabout Vehicular Ad Hoc Networks: A Control and Reinforcement Learning With Digital Beamforming Approach. IEEE Access 12: 85580-85600 (2024) - Kashif Naseer Qureshi, Hanaa Nafea, Ibrahim Tariq Javed, Kayhan Zrar Ghafoor:
Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks. IEEE Access 12: 95390-95401 (2024) - Ruicheng Yang, Guofang Dong:
A Secure and Efficient Multi-Dimensional Perception Data Aggregation in Vehicular Ad Hoc Networks. IEEE Access 12: 96592-96602 (2024) - Ammar Kamal Abasi, Moayad Aloqaily, Mohsen Guizani, Bassem Ouni:
Metaheuristic Algorithms for 6G wireless communications: Recent advances and applications. Ad Hoc Networks 158: 103474 (2024) - Tabouche Abdeldjalil, Badis Djamaa, Mustapha Réda Senouci:
HPS: A Hybrid Proactive Scheduler with adaptive channel selection for industrial 6TiSCH networks. Ad Hoc Networks 161: 103527 (2024) - Mohamed Abdou, Hanan M. Amer, Mohamed M. Abdelsalam, Abeer Twakol Khalil:
EVRP: A novel geometrical based energy efficient eye vision routing protocol for wireless sensor networks based on the k-means algorithm. Ad Hoc Networks 160: 103528 (2024) - Haitham Y. Adarbah, Mehdi Sookhak, Mohammed Atiquzzaman:
A digital twin-based traffic light management system using BIRCH algorithm. Ad Hoc Networks 164: 103613 (2024) - Mohammed Aissaoui, Chiraz Houaidia, Adrien van den Bossche, Thierry Val, Leïla Azouz Saïdane:
Distributed Physical-layer Network Coding MAC protocol. Ad Hoc Networks 153: 103344 (2024) - Muna Al-Hawawreh, Nour Moustafa:
Explainable deep learning for attack intelligence and combating cyber-physical attacks. Ad Hoc Networks 153: 103329 (2024) - Mehbub Alam, Nurzaman Ahmed, Rakesh Matam, Ferdous Ahmed Barbhuiya:
Analyzing the suitability of IEEE 802.11ah for next generation Internet of Things: A comparative study. Ad Hoc Networks 156: 103437 (2024) - Bechir Alaya, Lamaa Sellami, Pascal Lorenz:
An ontological approach to the detection of anomalies in vehicular ad hoc networks. Ad Hoc Networks 156: 103417 (2024) - Saqib Ali, Qianmu Li, Abdullah Yousafzai:
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey. Ad Hoc Networks 152: 103320 (2024) - Ahmed Almutairi, Alireza Keshavarz-Haddad, Ehsan Aryafar:
A deep learning framework for blockage mitigation and duration prediction in mmWave wireless networks. Ad Hoc Networks 162: 103562 (2024) - Omar Imhemed Alramli, Zurina Mohd Hanapi, Mohamed Othman, Idawaty Ahmad, Normalia Samian:
RTTV-TCP: Adaptive congestion control algorithm based on RTT variations for mmWave networks. Ad Hoc Networks 164: 103611 (2024) - Ibrahim Alrashdi, Karam M. Sallam, Majed Abdullah Alrowaily, Omar Alruwaili, Bilal Arain:
FIDWATCH: Federated incremental distillation for continuous monitoring of IoT security threats. Ad Hoc Networks 165: 103637 (2024) - Saeed Hamood Alsamhi, Ammar Hawbani, Radhya Sahal, Sumit Srivastava, Santosh Kumar, Liang Zhao, Mohammed A. A. Al-qaness, Jahan Hassan, Mohsen Guizani, Edward Curry:
Towards sustainable industry 4.0: A survey on greening IoE in 6G networks. Ad Hoc Networks 165: 103610 (2024) - Alireza Ansaripour, Milad Heydariaan, Omprakash Gnawali:
Link characteristics study of ultra-wideband radios. Ad Hoc Networks 156: 103402 (2024) - Guilherme B. Araújo, Leobino Sampaio:
A scalable, dynamic, and secure traffic management system for vehicular named data networking applications. Ad Hoc Networks 158: 103476 (2024)
skipping 27,133 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 16:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint