default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2024
- Kan Yu, Jiguo Yu, Zhiyong Feng, Honglong Chen:
A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling. IEEE/ACM Trans. Netw. 32(1): 238-252 (2024) - 2022
- Pedro R. Magalhães, Pedro B. P. S. Reis, Diogo Vila-Viçosa, Miguel Machuqueiro, Bruno L. Victor:
Optimization of an in Silico Protocol Using Probe Permeabilities to Identify Membrane Pan-Assay Interference Compounds. J. Chem. Inf. Model. 62(12): 3034-3042 (2022) - Yongqiang Zhou, Qihao Wang, Zhenggang Song, Suoping Li, Nana Yang:
Modeling and Performance Analysis of ECS-HTCARQ Protocol in Interference Scenario. J. Electr. Comput. Eng. 2022: 7054024:1-7054024:13 (2022) - 2018
- Mohamed Gaafar:
Interference Modelling and Broadcast Protocols for Cognitive Radio Mesh Networks. University of Calgary, Alberta, Canada, 2018 - Jeffrey Wildman, Steven Weber:
On Protocol and Physical Interference Models in Poisson Wireless Networks. IEEE Trans. Wirel. Commun. 17(2): 808-821 (2018) - Ashwin Ganesan:
Performance of distributed algorithms for QoS in wireless ad hoc networks: arbitrary networks under the primary interference model, and line networks under the protocol interference model. CoRR abs/1810.04109 (2018) - 2016
- Jeffrey Wildman, Steven Weber:
Minimizing the Bayes risk of the protocol interference model in wireless Poisson networks. WiOpt 2016: 203-210 - Jeffrey Wildman, Steven Weber:
On protocol and physical interference models in Poisson wireless networks. CoRR abs/1609.05314 (2016) - 2015
- Prateek R. Kapadia, Om P. Damani, Animesh Kumar:
Interference-constrained coverage algorithms in the protocol and SINR models. Wirel. Networks 21(4): 1391-1409 (2015) - 2014
- Hongwei Zhang, Xin Che, Xiaohui Liu, Xi Ju:
Adaptive instantiation of the protocol interference model in wireless networked sensing and control. ACM Trans. Sens. Networks 10(2): 28:1-28:48 (2014) - Piergiuseppe Di Marco, Fortunato Santucci, Carlo Fischione:
Modeling anti-collision protocols for RFID Systems with multiple access interference. ICC 2014: 5938-5944 - 2013
- Guomin Yan, Jiguo Yu, Congcong Chen, Lili Jia:
Virtual Backbone Construction Algorithms Based on Protocol Interference Model. CWSN 2013: 31-40 - Bowu Zhang, Wei Cheng, Limin Sun, Xiuzhen Cheng, Taieb Znati, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model. MiSeNet@MobiCom 2013: 11-20 - 2012
- Xianlong Jiao, Wei Lou, Xiaodong Wang, Jiannong Cao, Ming Xu, Xingming Zhou:
Data Aggregation Scheduling in Uncoordinated Duty-Cycled Wireless Sensor Networks under Protocol Interference Model. Ad Hoc Sens. Wirel. Networks 15(2-4): 315-338 (2012) - Haisheng Tan, Tiancheng Lou, Amy Yuexuan Wang, Yongcai Wang, Francis C. M. Lau:
Average Interference Minimization under the Protocol Model in Wireless Sensor Networks. J. Interconnect. Networks 13(1-2) (2012) - 2011
- Gyeongyeon Kang, Yoshiaki Taniguchi, Go Hasegawa, Hirotaka Nakano:
Parameter Tuning of the Protocol Interference Model Using SINR for Time Slot Assignment in Wireless Mesh Networks. IEICE Trans. Inf. Syst. 94-D(11): 2191-2200 (2011) - 2010
- Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang:
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks. SECON 2010: 64-72 - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall:
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. USENIX Security Symposium 2010: 257-272 - 2009
- Yi Shi, Y. Thomas Hou, Jia Liu, Sastry Kompella:
How to correctly use the protocol interference model for multi-hop wireless networks. MobiHoc 2009: 239-248 - 2008
- Christian Scheideler, Andréa W. Richa, Paolo Santi:
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model. MobiHoc 2008: 91-100 - 2006
- Prateek R. Kapadia, Om P. Damani:
Interference-constrained wireless coverage in a protocol model. MSWiM 2006: 207-211 - 2003
- Carlos de M. Cordeiro, Dharma P. Agrawal, Djamel Fawzi Hadj Sadok:
Interference modeling and performance of Bluetooth MAC protocol. IEEE Trans. Wirel. Commun. 2(6): 1240-1246 (2003) - 2001
- Carlos de M. Cordeiro, Djamel Sadok, Dharma P. Agrawal:
Piconet interference modeling and performance evaluation of Bluetooth MAC protocol. GLOBECOM 2001: 2870-2874 - 1996
- Kazuki Joe, Akira Fukuda:
Applying the Semi-Markov Memory and Cache Coherence Interference Model to an Updating Based Cache Coherence Protocol. Euro-Par, Vol. II 1996: 706-713
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-21 18:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint