Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iet-net/iet-net2.bht:"
@article{DBLP:journals/iet-net/AnsariMK13, author = {Mohammad Saeed Ansari and Ali Mahani and Yousef Seifi Kavian}, title = {Energy-efficient network design via modelling: optimal designing point for energy, reliability, coverage and end-to-end delay}, journal = {{IET} Networks}, volume = {2}, number = {1}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0024}, doi = {10.1049/IET-NET.2012.0024}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/AnsariMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/BagheriEG13, author = {Nasour Bagheri and Reza Ebrahimpour and Navid Ghaedi}, title = {Differential fault analysis on PRINTcipher}, journal = {{IET} Networks}, volume = {2}, number = {1}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0117}, doi = {10.1049/IET-NET.2012.0117}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/BagheriEG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/BithasLA13, author = {Petros S. Bithas and Athanasios S. Lioumpas and Angeliki Alexiou}, title = {Mitigating shadowing effects through cluster-head cooperation techniques}, journal = {{IET} Networks}, volume = {2}, number = {2}, pages = {71--80}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0136}, doi = {10.1049/IET-NET.2012.0136}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/BithasLA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/ChenL13, author = {Whai{-}En Chen and Ssu{-}Hsien Li}, title = {Client-based Internet Protocol version 4-Internet Protocol version 6 translation mechanism for Session Initiation Protocol multimedia services in next generation networks}, journal = {{IET} Networks}, volume = {2}, number = {3}, pages = {115--123}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0084}, doi = {10.1049/IET-NET.2012.0084}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/ChenL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/DikbiyikMT13, author = {Ferhat Dikbiyik and Biswanath Mukherjee and Massimo Tornatore}, title = {Adaptive time- and location-aware routing in telecom mesh networks}, journal = {{IET} Networks}, volume = {2}, number = {1}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0093}, doi = {10.1049/IET-NET.2012.0093}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/DikbiyikMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/GottapuTK13, author = {Gottapu Sasi Bhushana Rao and Madhavi Tatineni and M. N. V. S. S. Kumar}, title = {Performance analysis of collision alleviating distributed coordination function protocol in congested wireless networks - a markov chain analysis}, journal = {{IET} Networks}, volume = {2}, number = {4}, pages = {204--213}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0187}, doi = {10.1049/IET-NET.2012.0187}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/GottapuTK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/Goudarzi13, author = {Pejman Goudarzi}, title = {A video distribution game with enhanced quality of experience for wireless networks}, journal = {{IET} Networks}, volume = {2}, number = {3}, pages = {162--170}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0223}, doi = {10.1049/IET-NET.2012.0223}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/Goudarzi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/HanPW13, author = {Hongyu Han and Daiyuan Peng and Lian Wang}, title = {Upper bounds for the failure probability of random linear network coding for multicast network}, journal = {{IET} Networks}, volume = {2}, number = {4}, pages = {181--187}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0231}, doi = {10.1049/IET-NET.2012.0231}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/HanPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/HoltH13, author = {Alan Holt and Chi{-}Yu Huang}, title = {Energy consumption of mobile agents in a wireless ad hoc network environment}, journal = {{IET} Networks}, volume = {2}, number = {2}, pages = {63--70}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0100}, doi = {10.1049/IET-NET.2012.0100}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/HoltH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/HosszuMTM13, author = {{\'{E}}va Hosszu and Ehsan Sarvghad Moghaddam and J{\'{a}}nos Tapolcai and Daniel Mazroa}, title = {Physical impairments of monitoring trails in all optical transparent networks}, journal = {{IET} Networks}, volume = {2}, number = {4}, pages = {196--203}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0114}, doi = {10.1049/IET-NET.2012.0114}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/HosszuMTM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/IslamOO13, author = {Mohammad Kamrul Islam and Ihsen Aziz Ou{\'{e}}draogo and Eiji Oki}, title = {Smart failure insensitive routing: smart failure insensitive routing to enhance resource utilisation and robustness}, journal = {{IET} Networks}, volume = {2}, number = {2}, pages = {45--52}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2011.0033}, doi = {10.1049/IET-NET.2011.0033}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/IslamOO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/KariaG13, author = {Deepak Chatrabhuj Karia and Vaibhav Godbole}, title = {New approach for routing in mobile ad-hoc networks based on ant colony optimisation with global positioning system}, journal = {{IET} Networks}, volume = {2}, number = {3}, pages = {171--180}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0087}, doi = {10.1049/IET-NET.2012.0087}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/KariaG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/KhosraviK13, author = {Adle Khosravi and Yousef Seifi Kavian}, title = {New approach for mobile ad-hoc networks unity issue in a suspicious environment}, journal = {{IET} Networks}, volume = {2}, number = {1}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0013}, doi = {10.1049/IET-NET.2012.0013}, timestamp = {Tue, 30 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/KhosraviK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/KimKL13, author = {Meejoung Kim and Yong Sang Kim and Wooyong Lee}, title = {Analysis of directional neighbour discovery process in millimetre wave wireless personal area networks}, journal = {{IET} Networks}, volume = {2}, number = {2}, pages = {92--101}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0095}, doi = {10.1049/IET-NET.2012.0095}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/KimKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/LeeH13, author = {Jung{-}San Lee and Ming{-}Huang Hsieh}, title = {Preserving user-participation for insecure network communications with {CAPTCHA} and visual secret sharing technique}, journal = {{IET} Networks}, volume = {2}, number = {2}, pages = {81--91}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2011.0019}, doi = {10.1049/IET-NET.2011.0019}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/LeeH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/LiuYGW13, author = {Waixi Liu and Shun{-}Zheng Yu and Ying Gao and Wei{-}Tao Wu}, title = {Caching efficiency of information-centric networking}, journal = {{IET} Networks}, volume = {2}, number = {2}, pages = {53--62}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0177}, doi = {10.1049/IET-NET.2012.0177}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-net/LiuYGW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/ManjappaG13, author = {Kiran Manjappa and Ram Mohana Reddy Guddeti}, title = {Mobility aware-termite: a novel bio inspired routing protocol for mobile ad-hoc networks}, journal = {{IET} Networks}, volume = {2}, number = {4}, pages = {188--195}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0203}, doi = {10.1049/IET-NET.2012.0203}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/ManjappaG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/MatsumuraH13, author = {Ryutaro Matsumura and Haruhisa Hasegawa}, title = {Link capacity design for shared protection with limited traffic information}, journal = {{IET} Networks}, volume = {2}, number = {1}, year = {2013}, url = {https://doi.org/10.1049/iet-net2012.0016}, doi = {10.1049/IET-NET2012.0016}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/MatsumuraH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/MehbodniyaKYA13, author = {Abolfazl Mehbodniya and Faisal Kaleem and Kang K. Yen and Fumiyuki Adachi}, title = {Wireless network access selection scheme for heterogeneous multimedia traffic}, journal = {{IET} Networks}, volume = {2}, number = {4}, pages = {214--223}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0188}, doi = {10.1049/IET-NET.2012.0188}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/MehbodniyaKYA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/Tsai13, author = {Chun{-}Wei Tsai}, title = {Incremental particle swarm optimisation for intrusion detection}, journal = {{IET} Networks}, volume = {2}, number = {3}, pages = {124--130}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0209}, doi = {10.1049/IET-NET.2012.0209}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/Tsai13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/VasuMMK13, author = {Kantubukta Vasu and Sumit Maheshwari and Sudipta Mahapatra and Cheruvu Siva Kumar}, title = {Energy and quality of service aware FUZZY-technique for order preference by similarity to ideal solution based vertical handover decision algorithm for heterogeneous wireless networks}, journal = {{IET} Networks}, volume = {2}, number = {3}, pages = {103--114}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0183}, doi = {10.1049/IET-NET.2012.0183}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/VasuMMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/VoTHL13, author = {Phuong Luu Vo and Nguyen Hoang Tran and Choong Seon Hong and Sungwon Lee}, title = {Network utility maximisation framework with multiclass traffic}, journal = {{IET} Networks}, volume = {2}, number = {3}, pages = {152--161}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0120}, doi = {10.1049/IET-NET.2012.0120}, timestamp = {Sat, 29 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/VoTHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/Yingnan13, author = {Zhang Yingnan}, title = {Transmission protocol selection for dual-hop amplifyand-forward relaying networks}, journal = {{IET} Networks}, volume = {2}, number = {3}, pages = {141--151}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0198}, doi = {10.1049/IET-NET.2012.0198}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/Yingnan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/ZhaoGZO13, author = {Liqiang Zhao and Lu Gao and Xiaodong Zhao and Shumao Ou}, title = {Power and bandwidth efficiency of wireless mesh networks}, journal = {{IET} Networks}, volume = {2}, number = {3}, pages = {131--140}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2012.0061}, doi = {10.1049/IET-NET.2012.0061}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/ZhaoGZO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.