default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 310 matches
- 2016
- Naser Al-Falahy, Omar Y. K. Alani:
The Impact of Higher Order Sectorisation on the Performance of Millimetre Wave 5G Network. NGMAST 2016: 1-5 - Fatma Alrayes, Alia I. Abdelmoty:
Towards Location Privacy Awareness on Geo-Social Networks. NGMAST 2016: 105-114 - George A. Audu, Samya Bhattacharya, Jaafar M. H. Elmirghani:
TDMA-based MAC (CVTMAC) in Green Vehicular Networks. NGMAST 2016: 24-29 - Abir Awad, Sara Kadry, Brian Lee, Gururaj Maddodi, Eoin O'Meara:
Integrity Assurance in the Cloud by Combined PBA and Provenance. NGMAST 2016: 127-132 - Mahesh G., K. R. Jayahari, Kamal Bijlani:
A Smart Phone Integrated Smart Classroom. NGMAST 2016: 88-93 - Irfan Hanif, Muhammad Zeeshan, Akhlaque Ahmed:
Traffic Pattern Based Adaptive Spectrum Handoff Strategy for Cognitive Radio Networks. NGMAST 2016: 18-23 - Sherief S. Helwa, Michael Ibrahim, Salwa Elramly:
Universal Filtered Multi-carrier Performance Analysis with Multipath Fading Channels. NGMAST 2016: 35-40 - Samaneh Igder, Samya Bhattacharya, Jaafar M. H. Elmirghani:
Energy Efficient Fog Servers for Internet of Things Information Piece Delivery (IoTIPD) in a Smart City Vehicular Environment. NGMAST 2016: 99-104 - Samaneh Igder, Samya Bhattacharya, Bilal R. Qazi, Jaafar M. H. Elmirghani:
Standalone Green Cache Points for Vehicular Content Distribution Networks. NGMAST 2016: 59-64 - Afiza Ismail, Syed Abdullah Syed Abdul Kadir, AzharAbdul Aziz, Mudiana Mokhsin, Anitawati Mohd Lokman:
iTourism Travel Buddy Mobile Application. NGMAST 2016: 82-87 - Kyoung Don Jang, Donghyun Kang, Do Hyoung Kim, Hyun Jin Park, Young Ik Eom:
A Lightweight Pseudo CPU Hotplug Mechanism for Mobile Devices. NGMAST 2016: 53-58 - Seung Yong Jeon, Jihyoung Ahn, Tae-Jin Lee:
Data Distribution in IoT Networks with Estimation of Packet Error Rate. NGMAST 2016: 94-98 - J. A. Johnson, A. A. Adekunle:
Human Workflow Modelling in Homogeneous Computor Networks. NGMAST 2016: 65-71 - Yong-Kul Ki, Jin-Wook Choi, Kwang-Soo Bae, Gye-Hyeong Ahn, Kyu-Cheol Cho:
An Efficient Failure Detection Algorithm for CCTV and Roadside Equipment (RSE). NGMAST 2016: 77-81 - Maria Anna V. San Luis, Rowel O. Atienza, Amado M. San Luis:
Immersive Virtual Reality as a Supplement in the Rehabilitation Program of Post-Stroke Patients. NGMAST 2016: 47-52 - Marian Margraf, Steffen Lange, Florian Otterbein:
Security Evaluation of Apple Pay at Point-of-Sale Terminals. NGMAST 2016: 115-120 - Johan Mollevik:
Evaluation of Strategies for Pedestrian Guidance Using Commodity Smartphones. NGMAST 2016: 41-46 - Fady Nabil, Yasmine A. Fahmy:
Search Space Allocation Schemes Review for Control Channels in LTE and LTE-advanced. NGMAST 2016: 30-34 - Farhan Pervez, Muhammad Salman Raheel, Jibran Gill, Kashif Iqbal:
Uplink Resource Allocation of Multiple DASH Streams for QoE-based Real and Non-real Time Viewing over LTE. NGMAST 2016: 12-17 - Ankit Saxena, Ravi Sindal:
Performance Analysis of MAC Scheduler in LTE (EUTRAN) for "ASAR": Resource Allocation. NGMAST 2016: 6-11 - Zigrid Shehu, Claudio Ciccotelli, Daniele Ucci, Leonardo Aniello, Roberto Baldoni:
Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware. NGMAST 2016: 121-126 - Nurwahida Faradila Taharim, Anitawati Mohd Lokman, Wan Abdul Rahim Wan Mohd Isa:
Emotion and Playful Elements in Mobile Learning. NGMAST 2016: 72-76 - Khalid Al-Begain:
10th International Conference on Next Generation Mobile Applications, Security and Technologies, NGMAST 2016, Cardiff, United Kingdom, August 24-26, 2016. IEEE 2016, ISBN 978-1-5090-0949-7 [contents] - 2015
- Hayder Al-Salihi, Fatin Said:
Performance Evaluation of Massive MIMO in Correlated Rician and Correlated Nakagami-m Fading. NGMAST 2015: 222-227 - Ashraf Ali, Mazin Alshamrani, Alhad Kuwadekar, Khalid Al-Begain:
Evaluating SIP Signaling Performance for VoIP over LTE Based Mission-Critical Communication Systems. NGMAST 2015: 199-205 - Wesam Almobaideen, Maha Saadeh, Noor Al-Anbaki, Rawan Zaghloul, Aryaf Aladwan:
Geographical Route Selection Based on User Public Transportation and Service Preferences. NGMAST 2015: 144-149 - Wael Alosaimi, Mazin Alshamrani, Khalid Al-Begain:
Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud. NGMAST 2015: 60-65 - Wael Alosaimi, Michal Zák, Khalid Al-Begain:
Denial of Service Attacks Mitigation in the Cloud. NGMAST 2015: 47-53 - Mohammed Alreshoodi, John Woods, Emad Danish, Anil Fernando:
Resource Allocation Scheme Based on Online QoE Estimation of Mobile H.264 Video Streaming. NGMAST 2015: 324-328 - Nathan Amanquah, Mjumo Mzyece:
Lessons from Addressing Challenges in an Agricultural Extension Scheme Using Mobile Apps. NGMAST 2015: 359-364
skipping 280 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-15 16:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint