default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 67 matches
- 2023
- Sharu Bansal, Dilip Kumar:
Enhancing constrained application protocol using message options for internet of things. Clust. Comput. 26(3): 1917-1934 (2023) - Qinbin Zhou, Xiaomin Chen, Jue Wang, Ye Li, Hui Li, Tony Q. S. Quek:
Network Coded Constrained Application Protocol With Improved Energy Efficiency for IIoT Networks. IEEE Internet Things J. 10(12): 10893-10906 (2023) - Mohit Sahni, Saurabh Tripathi:
Constrained Application Protocol (CoAP) Transfer for the Certificate Management Protocol. RFC 9482: 1-9 (2023) - 2022
- Nabil Makarem, Wafaa Bou Diab, Imad Mougharbel, Naceur Malouch:
On the design of efficient congestion control for the Constrained Application Protocol in IoT. Comput. Networks 207: 108824 (2022) - Godfrey Anuga Akpakwu, Gerhard P. Hancke, Adnan M. Abu-Mahfouz:
An optimization-based congestion control for constrained application protocol. Int. J. Netw. Manag. 32(1) (2022) - Dhia Jenzeri, Abdellah Chehri:
Data Analysis for IoT System Using 6LoWPAN and Constrained Application Protocol for Environmental Monitoring. KES 2022: 1472-1481 - Nabil Makarem, Wafaa Bou Diab, Imad Mougharbel, Naceur Malouch:
A non-Hidden Markovian Modeling of the Reliability Scheme of the Constrained Application Protocol in Lossy Wireless Networks. MSWiM 2022: 147-156 - Peter van der Stok, Panos Kampanakis, Michael C. Richardson, Shahid Raza:
EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol. RFC 9148: 1-41 (2022) - Christian Amsüss, John Preuß Mattsson, Göran Selander:
Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing. RFC 9175: 1-27 (2022) - Mohamed Boucadair, Jon Shallow:
Constrained Application Protocol (CoAP) Block-Wise Transfer Options Supporting Robust Transmission. RFC 9177: 1-41 (2022) - Jari Arkko, Anders Eriksson, Ari Keränen:
Building Power-Efficient Constrained Application Protocol (CoAP) Devices for Cellular Networks. RFC 9178: 1-14 (2022) - Thomas Fossati, Carsten Bormann:
Concise Problem Details for Constrained Application Protocol (CoAP) APIs. RFC 9290: 1-21 (2022) - 2021
- Nabil Makarem:
Performance evaluation and improvement of congestion control of the constrained application protocol for the Internet-of-things. (Évaluation des performances et amélioration du contrôle de la congestion dans le Protocole des Applications à Contraintes (CoAP) pour l'Internet des objets). Sorbonne University, Paris, France, 2021 - Kamalam Gobichettipalayam Krishnasamy, Anandamurugan Selvaraj:
Enhanced constrained application protocol for secured medical data transmission model for internet of things. Comput. Intell. 37(3): 1014-1033 (2021) - Arvin Ghotbou, Mohammad Khansari:
VE-CoAP: A constrained application layer protocol for IoT video transmission. J. Netw. Comput. Appl. 173: 102855 (2021) - Xiaoqiong Xu, Gang Sun, Hongfang Yu:
An Efficient Blockchain PBFT Consensus Protocol in Energy Constrained IoT Applications. UCET 2021: 152-157 - Ana Minaburo, Laurent Toutain, Ricardo Andreasen:
Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP). RFC 8824: 1-30 (2021) - Klaus Hartke, Michael C. Richardson:
Extended Tokens and Stateless Clients in the Constrained Application Protocol (CoAP). RFC 8974: 1-20 (2021) - 2020
- Rolando Herrero:
Analysis of the constrained application protocol over quick UDP internet connection transport. Internet Things 12: 100328 (2020) - Fahd A. Alhaidari, Ebtesam J. Alqahtani:
Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey. J. Commun. 15(1): 14-30 (2020) - Thomas Fossati, Klaus Hartke, Carsten Bormann:
Multipart Content-Format for the Constrained Application Protocol (CoAP). RFC 8710: 1-9 (2020) - Mohamed Boucadair, Tirumaleswar Reddy, Jon Shallow:
Constrained Application Protocol (CoAP) Hop-Limit Option. RFC 8768: 1-8 (2020) - 2019
- Björn Konieczek:
Deterministische und interoperable Kommunikation mit dem Constrained Application Protocol. Rostock University, Germany, 2019 - Sukhavasi Suman, Thinagaran Perumal, Norwati Mustapha, Razali Yaakob, Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi:
Semantic Interoperability Test Method for Data Schema Comparison with Constrained Application Protocol. GCCE 2019: 640-641 - Nabil Makarem, Wafaa Bou Diab, Imad Mougharbel, Naceur Malouch:
Performance study of the constrained application protocol in lossy networks. Networking 2019: 1-2 - Felix Seidel, Konrad-Felix Krentz, Christoph Meinel:
Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers. WF-IoT 2019: 201-206 - Ari Keränen:
"Too Many Requests" Response Code for the Constrained Application Protocol. RFC 8516: 1-6 (2019) - 2018
- Hyung-Woo Kang, Seok-Joo Koh:
Enhanced group communication in constrained application protocol-based Internet-of-things networks. Int. J. Distributed Sens. Networks 14(4) (2018) - James H. Nguyen, Wei Yu, Daniel T. Ku:
Reliable Transport for Mobile Ad Hoc Networks with Constrained Application Protocol (CoAP) over Negative-Acknowledgment Oriented Reliable Multicast (NORM). ICNC 2018: 361-366 - Yuji Dong, Kaiyu Wan, Yong Yue, Xin Huang:
Support Context-Adaptation in the Constrained Application Protocol (CoAP). ICSOC Workshops 2018: 294-305
skipping 37 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-25 01:22 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint