
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 437 matches
- 2021
- Zhongbao Chen
, Jonkyce Kim, Minyung Lee:
Named-Data Network based secure communication strategy for smart cities. Internet Technol. Lett. 4(1) (2021) - Divya Mohan, Geetha Mary Amalanathan
:
The efficacy of handoff strategy based spectrum allocation using TSB-MFO for D2D and CU communications. Peer Peer Netw. Appl. 14(1): 279-295 (2021) - Vittoria Musa, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia:
A Feedback Control Strategy for Energy-Harvesting in Diffusion-Based Molecular Communication Systems. IEEE Trans. Commun. 69(2): 831-844 (2021) - Zongwang Li, Zhuochen Xie, Xuwen Liang:
Dynamic Channel Reservation Strategy Based on DQN Algorithm for Multi-Service LEO Satellite Communication System. IEEE Wirel. Commun. Lett. 10(4): 770-774 (2021) - 2020
- Guanyu Chen
, Peng Sun, Jieyong Zhang:
Repair Strategy of Military Communication Network Based on Discrete Artificial Bee Colony Algorithm. IEEE Access 8: 73051-73060 (2020) - Chang Li
, Zhili Zhou
, Guihua Cui
, Zhenzhou Tang
, Xiukai Ruan
, Qibo Cai
:
A Partial Amplify and Forward Cooperative Communication Strategy Based on Blind Signal Detection. IEEE Access 8: 128665-128673 (2020) - Ying Sun, Zhipeng Su, Ying Zhao, Dan Deng
, Fusheng Zhu, Junjuan Xia
:
Mobile Cooperative Sensing Based Secure Communication Strategy of Edge Computational Networks for Smart Cities. IEEE Access 8: 150750-150758 (2020) - Jing Wang
, Yao Mao
, Ziqiang Li
, Junwei Gao
, Huabo Liu
:
Robust Fusion Estimation for Multisensor Uncertain Systems With State Delay Based on Data-Driven Communication Strategy. IEEE Access 8: 151888-151897 (2020) - Ammar Ahmed, Shuimei Zhang, Yimin D. Zhang:
Antenna selection strategy for transmit beamforming-based joint radar-communication system. Digit. Signal Process. 105: 102768 (2020) - Siyu Tao, Hongyi Yu, Qing Li, Yanqun Tang:
Performance analysis of user association strategy based on power-domain non-orthogonal multiple access in visible light communication multi-cell networks. EURASIP J. Wirel. Commun. Netw. 2020(1): 80 (2020) - Ario Yudo Husodo, Grafika Jati, Amarulla Octavian, Wisnu Jatmiko:
Switching target communication strategy for optimizing multiple pursuer drones performance in immobilizing Kamikaze multiple evader drones. ICT Express 6(2): 76-82 (2020) - K. Selvamani, K. Kumar:
Optimal Resource allocation in NOMA-based M2M communication using Hybrid Rider Optimization with FireFly: Power Saving Strategy of IoT. Int. J. Commun. Syst. 33(12) (2020) - Cheng-Lin Liu, Shuai Liu, Ya Zhang, Yang-Yang Chen:
Consensus seeking of multi-agent systems with intermittent communication: a persistent-hold control strategy. Int. J. Control 93(9): 2161-2167 (2020) - K. Y. S. Putri, Zulhamri Bin Abdullah, Elisabeth Nugrahaeni, Rachmat Darmawan, Latifa Latifa:
Learning Management Strategy of Communication Studies through Blended Learning in Higher Education. Int. J. Interact. Mob. Technol. 14(16): 117-132 (2020) - Fatima Zohra Mostefa, Zoulikha Mekkakia Maaza, Claude Duvallet:
Secure Communications by Tit-for-Tat Strategy in Vehicular Networks. Int. J. Networked Distributed Comput. 8(4): 214-221 (2020) - Sen Du, Junjie Hou, Shijin Song, Yuefeng Song, Yongxin Zhu:
A geographical hierarchy greedy routing strategy for vehicular big data communications over millimeter wave. Phys. Commun. 40: 101065 (2020) - Birsen Sirkeci-Mergen:
Combine-and-forward: A linear cooperative multi-level communication strategy for distributed MIMO relays. Phys. Commun. 38: 100922 (2020) - Weizhi Zhong, Yong Gu, Qiuming Zhu, Penghui Li, Xiaomin Chen:
A novel spatial beam training strategy for mmWave UAV communications. Phys. Commun. 41: 101106 (2020) - Tianyi Liu, Ruyu Luo, Fangmin Xu, Chaoqiong Fan, Chenglin Zhao:
Distributed Learning Based Joint Communication and Computation Strategy of IoT Devices in Smart Cities. Sensors 20(4): 973 (2020) - Bo Zhang, Chunxia Dou
, Dong Yue
, Zhanqiang Zhang
, Tengfei Zhang
:
A Cyber-Physical Cooperative Hierarchical Control Strategy for Islanded Microgrid Facing With Random Communication Failure. IEEE Syst. J. 14(2): 2849-2860 (2020) - Jing-Jing Bao, Qiang Mai, Jih-Fu Tu:
Study of Cooperative Strategy Based on Space-Time Labeling Diversity in Indoor Visible Light Communication Systems. Symmetry 12(5): 702 (2020) - Changkun Du, Xiangdong Liu
, Wei Ren
, Pingli Lu, Haikuo Liu:
Finite-Time Consensus for Linear Multiagent Systems via Event-Triggered Strategy Without Continuous Communication. IEEE Trans. Control. Netw. Syst. 7(1): 19-29 (2020) - Hui Zhao
, Xuewu Dai
, Ping Zhou
, Tao Yang
:
Distributed Robust Event-Triggered Control Strategy for Multiple High-Speed Trains With Communication Delays and Input Constraints. IEEE Trans. Control. Netw. Syst. 7(3): 1453-1464 (2020) - Guo-Ping Liu
:
Coordinated Control of Networked Multiagent Systems With Communication Constraints Using a Proportional Integral Predictive Control Strategy. IEEE Trans. Cybern. 50(11): 4735-4743 (2020) - Huiyuan Xiong
, Zhirong Tan, Ronghui Zhang
, Shan He:
A New Dual Axle Drive Optimization Control Strategy for Electric Vehicles Using Vehicle-to-Infrastructure Communications. IEEE Trans. Ind. Informatics 16(4): 2574-2582 (2020) - Wangli He
, Tinghui Luo, Yang Tang
, Wenli Du
, Yu-Chu Tian
, Feng Qian
:
Secure Communication Based on Quantized Synchronization of Chaotic Neural Networks Under an Event-Triggered Strategy. IEEE Trans. Neural Networks Learn. Syst. 31(9): 3334-3345 (2020) - Runzhou Li
, Peilin Hong
, Kaiping Xue
, Ming Zhang, Te Yang:
Energy-Efficient Resource Allocation for High-Rate Underlay D2D Communications With Statistical CSI: A One-to-Many Strategy. IEEE Trans. Veh. Technol. 69(4): 4006-4018 (2020) - Sandeepika Sharma, Brahmjit Singh:
Context aware autonomous resource selection and Q-learning based power control strategy for enhanced cooperative awareness in LTE-V2V communication. Wirel. Networks 26(6): 4045-4060 (2020) - Mohammad Reza Tarihi, Mohammad Mahdinejad Noori, Mohammad Hossein Madani:
Improving the Performance of HALE UAV Communication Link Through MIMO Cooperative Relay Strategy. Wirel. Pers. Commun. 113(2): 1051-1071 (2020) - Myriam Cielo Pérez, Rohit Singh, Dinesh Chandra, Valéry Ridde, Aaditeshwar Seth, Mira Johri:
Development of an mHealth Behavior Change Communication Strategy: A case-study from rural Uttar Pradesh in India. COMPASS 2020: 274-278
skipping 407 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-18 04:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint