


Остановите войну!
for scientists:


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
- ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom)
- ACM Interational Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
- IEEE International Conference on Distributed Computing Systems (ICDCS)
- International Conference on Ad-Hoc, Mobile and Wireless Networks (ADHOC-NOW)
- International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 6,744 matches
- 2023
- Zhe Li, Jing Zhao, Te Han:
The Performance Analysis of SPMA Protocol in High Speed Mobile Ad Hoc Network. IEEE Access 11: 23485-23494 (2023) - Cansu Cav, Aysegül Altin-Kayhan
:
Coverage hole optimization with a mobile sensor in wireless sensor networks for smart grid. Ad Hoc Networks 140: 103039 (2023) - Jeril Kuriakose, Sandeep Joshi
, Amit Kumar Bairwa:
EMBN-MANET: A method to Eliminating Malicious Beacon Nodes in Ultra-Wideband (UWB) based Mobile Ad-Hoc Network. Ad Hoc Networks 140: 103063 (2023) - Yanjing Lei, Jiamin Yu
, Di Cao, Zehui Feng, Sixian Chan:
An energy urgency priority based mobile charging scheme in Wireless Rechargeable Sensor Network. Ad Hoc Networks 140: 103067 (2023) - Ramviyas Parasuraman, Byung-Cheol Min, Petter Ögren:
Rapid prediction of network quality in mobile robots. Ad Hoc Networks 138: 103014 (2023) - Girish Sharma, Jyoti Grover
, Abhishek Verma:
QSec-RPL: Detection of version number attacks in RPL based mobile IoT using Q-Learning. Ad Hoc Networks 142: 103118 (2023) - Manoj Kumar Somesula
, Rashmi Ranjan Rout, Durvasula V. L. N. Somayajulu:
Greedy cooperative cache placement for mobile edge networks with user preferences prediction and adaptive clustering. Ad Hoc Networks 140: 103051 (2023) - Xudong Yang, Chengming Luo, Lingli Zhang, Fantong Kong, Cheng He, Gaifang Xin:
A coarse to accurate noise-tolerant positioning evaluation for mobile target based on modified genetic algorithm. Ad Hoc Networks 143: 103123 (2023) - Mahendra Prasad
, Sachin Tripathi, Keshav P. Dahal
:
A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network. Appl. Intell. 53(6): 7169-7185 (2023) - Sohaib A. Latif
, Xianwen Fang
, Syed Muhammad Mohsin
, Syed Muhammad Abrar Akber, Sheraz Aslam
, Hana Mujlid
, Kaleem Ullah
:
An Enhanced Virtual Cord Protocol Based Multi-Casting Strategy for the Effective and Efficient Management of Mobile Ad Hoc Networks. Comput. 12(1): 21 (2023) - S. Saravanan
, D. Prabakar, S. S. Sathya:
Trust aware ad hoc routing protocol with key management based mechanism and optimal energy-efficient cluster head selection in mobile ad hoc networks. Concurr. Comput. Pract. Exp. 35(7) (2023) - Mahendra Prasad
, Sachin Tripathi, Keshav P. Dahal
:
An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks. Eng. Appl. Artif. Intell. 119: 105760 (2023) - Vanitha M
, Sujatha Jamuna Anand, Radhamani V, N. R. Rajalakshmi:
Dual-channel capsule generation adversarial network based blockchain technology for a secured dynamic optimal routing in mobile ad hoc network. Trans. Emerg. Telecommun. Technol. 34(2) (2023) - Juhi Agrawal
, Monit Kapoor
:
ARMS-EGR - Adaptive ranking and mobile sink-enabled energy-efficient geographic routing protocol in flying ad hoc networks. Int. J. Commun. Syst. 36(4) (2023) - P. Rahul
, B. Kaarthick:
Proficient link state routing in mobile ad hoc network-based deep Q-learning network optimized with chaotic bat swarm optimization algorithm. Int. J. Commun. Syst. 36(1) (2023) - Ramesh Vatambeti
, Shridhar Sanshi, D. Pramodh Krishna:
An efficient clustering approach for optimized path selection and route maintenance in mobile ad hoc networks. J. Ambient Intell. Humaniz. Comput. 14(1): 305-319 (2023) - D. Hemanand
, N. Sankar Ram, D. S. Jayalakshmi:
FSSAM: A Five Stage Security Analysis Model for Detecting and Preventing Wormhole Attack in Mobile Ad-Hoc Networks Using Adaptive Atom Search Algorithm. Wirel. Pers. Commun. 128(1): 487-506 (2023) - Kota Makino, Takeshi Hirai, Tutomu Murase:
Mobility Control of Avoiding Interference for Autonomous Mobile Robot Ad Hoc Networks. ICCE 2023: 1-6 - 2022
- David Cordova Morales:
Blockchain Application for Mesh and Mobile Ad Hoc Networks. (Applications Blockchain pour les réseaux Mesh et Ad hoc mobiles). Sorbonne University, Paris, France, 2022 - Duc N. M. Hoang
, Jong Myung Rhee, Sang Yoon Park
:
Fault-Tolerant Ad Hoc On-Demand Routing Protocol for Mobile Ad Hoc Networks. IEEE Access 10: 111337-111350 (2022) - Hyungu Hwang
, Jae-Min Ahn:
Evolved Wireless ad Hoc Network: Design and Operating Principle for Wireless Resource Management of Mobile Terminals. IEEE Access 10: 72155-72170 (2022) - Dimitrios Kafetzis, Spyridon Vassilaras, Georgios Vardoulias
, Iordanis Koutsopoulos
:
Software-Defined Networking Meets Software-Defined Radio in Mobile ad hoc Networks: State of the Art and Future Directions. IEEE Access 10: 9989-10014 (2022) - Nishit Shah
, Hosam El-Ocla
, Pearly Shah
:
Adaptive Routing Protocol in Mobile Ad-Hoc Networks Using Genetic Algorithm. IEEE Access 10: 132949-132964 (2022) - Uppalapati Srilakshmi
, Saleh Ahmed Alghamdi, Veera Ankalu Vuyyuru, Neenavath Veeraiah
, Youseef Alotaibi
:
A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks. IEEE Access 10: 14260-14269 (2022) - Ala Altaweel
, Chen Yang, Radu Stoleru, Suman Bhunia, Mohammad Sagor, Maxwell Maurice
, Roger Blalock:
RSock: A resilient routing protocol for mobile Fog/Edge networks. Ad Hoc Networks 134: 102926 (2022) - Qian Dong, Zhao-Rong Lai, Mi Lu:
Echo state neural network-assisted mobility-aware seamless handoff in mobile WSNs. Ad Hoc Networks 130: 102818 (2022) - Xiaowu Liu
, Jiguo Yu
, Kan Yu, Guijuan Wang, Xingjian Feng:
Trust secure data aggregation in WSN-based IIoT with single mobile sink. Ad Hoc Networks 136: 102956 (2022) - Evangelos Papapetrou
, Aristidis Likas:
A replication strategy for mobile opportunistic networks based on utility clustering. Ad Hoc Networks 125: 102738 (2022) - Haiqing Yao
, Chaoqun Zheng, Xiuwen Fu, Yongsheng Yang, Ioan Ungurean:
Charger and receiver deployment with delay constraint in mobile wireless rechargeable sensor networks. Ad Hoc Networks 126: 102756 (2022) - Rupayan Das, Dinesh Dash:
A Comprehensive Survey on Mobile Sink- Based Data Gathering Schemes in WSNs. Ad Hoc Sens. Wirel. Networks 52(1-2): 1-43 (2022)
skipping 6,714 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2023-03-26 19:56 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint