Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 103 matches
- 2014
- Hatem Abou-zeid, Hossam S. Hassanein, Nizar Zorba:
Enhancing mobile video streaming by lookahead rate allocation in wireless networks. CCNC 2014: 471-476 - Shadi Abu-Surra, Sridhar Rajagopal, Xiaojie Zhang:
Synchronization sequence design for mmWave cellular systems. CCNC 2014: 617-622 - Khandakar Ahmed, Mark A. Gregory:
Distributed data centric similarity storage scheme in wireless sensor network. CCNC 2014: 599-604 - Navid Alamatsaz, Arash Boustani, Murtuza Jadliwala, Vinod Namboodiri:
AgSec: Secure and efficient CDMA-based aggregation for smart metering systems. CCNC 2014: 489-494 - Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Mansour Alsaleh, Abdulrahman Alarifi, Abel Sanchez, Anas Alfaris, John R. Williams:
A malicious activity detection system utilizing predictive modeling in complex environments. CCNC 2014: 371-379 - Karl Andersson, Ved P. Kafle:
Disaster-resilient mobile network architecture. CCNC 2014: 157-162 - Shintaro Arai, Yasutaka Shiraki, Takaya Yamazato, Hiraku Okada, Toshiaki Fujii, Tomohiro Yendo:
Multiple LED arrays acquisition for image-sensor-based I2V-VLC using block matching. CCNC 2014: 605-610 - Arjun P. Athreya, Harry Chan-Maestas, Edward Katz, Patrick Tague, Bob Iannucci:
Energy-governed resilient networked systems. CCNC 2014: 56-61 - Mohamed Chaker Bali, Chiheb Rebai:
DSP-based implementation of soft Viterbi decoder for power line communications. CCNC 2014: 62-67 - Arash Boustani, Navid Alamatsaz, Murtuza Jadliwala, Vinod Namboodiri:
LocJam: A novel jamming-based approach to secure localization in wireless networks. CCNC 2014: 336-344 - Yuanlong Cao, Changqiao Xu, Jianfeng Guan, Hongke Zhang:
SCTP-C2: Cross-layer Cognitive SCTP for multimedia streaming over multi-homed wireless networks. CCNC 2014: 233-238 - Kishor Chandra Joshi, R. Venkatesha Prasad, Ignas G. Niemegeers, Abdur Rahim Biswas:
Adaptive beamwidth selection for contention based access periods in millimeter wave WLANs. CCNC 2014: 458-464 - Yuh-Shyan Chen, Chih-Shun Hsu, Shu-Yu Lin:
Delay-bounded routing on hybrid-solar vehicular ad-hoc networks. CCNC 2014: 68-73 - Yangyang Chen, Xavier Lagrange:
Downlink capacity gain analysis of mobile relay in LTE-Advanced network. CCNC 2014: 544-550 - Lei Chen, Guangrong Yue, Xiantao Cheng, Shaoqian Li:
Time-domain frequency-dependent I/Q imbalance compensation based on golay sequence. CCNC 2014: 531-536 - Baldomero Coll-Perales, Javier Gozálvez, Vasilis Friderikos:
Opportunistic networking for improving the energy efficiency of multi-hop cellular networks. CCNC 2014: 569-574 - Juan Camilo Corena, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake, Tomoaki Ohtsuki:
XOR network coding pollution prevention without homomorphic functions. CCNC 2014: 293-300 - Tao Ding, Zhenhui Yuan, Shengyang Chen, Gabriel-Miro Muntean:
Smartphone energy consumption models for multimedia services using multipath TCP. CCNC 2014: 239-244 - Son Dinh-Van, Quang Dinh Tam Duong, Oh-Soon Shin:
User grouping for device-to-device communications underlaying cellular networks. CCNC 2014: 563-568 - Bjoern Dusza, Peter Marwedel, Olaf Spinczyk, Christian Wietfeld:
A context-aware battery lifetime model for carrier aggregation enabled LTE-A systems. CCNC 2014: 13-19 - Herman Arnold Engelbrecht, Gregor Schiele:
Transforming Minecraft into a research platform. CCNC 2014: 257-262 - Petro Pesha Ernest, H. Anthony Chan, Olabisi Emmanuel Falowo, Linoh A. Magagula, Sandra Céspedes Umaña:
Network-based distributed mobility management for network mobility. CCNC 2014: 417-425 - Clément Escoffier, Stéphanie Chollet, Philippe Lalanda:
Lessons learned in building pervasive platforms. CCNC 2014: 7-12 - Ugo Fiore, Francesco Palmieri, Aniello Castiglione, Vincenzo Loia, Alfredo De Santis:
Multimedia-based battery drain attacks for Android devices. CCNC 2014: 145-150 - Yago Sánchez de la Fuente, Ralf Globisch, Thomas Schierl, Thomas Wiegand:
Low complexity cloud-video-mixing using HEVC. CCNC 2014: 213-218 - Keisuke Fujita, Yumi Takaki, Chikara Ohta, Hisashi Tamaki:
Side trip multi-path routing protocol for spatial node failure tolerance in data-gathering WSNs. CCNC 2014: 411-416 - Marco Ghiglieri, Erik Tews:
A privacy protection system for HbbTV in Smart TVs. CCNC 2014: 357-362 - Yang Guan, Yao Xiao, Leonard J. Cimini Jr., Chien-Chung Shen:
Power efficient peer-to-peer streaming to co-located mobile users. CCNC 2014: 321-326 - Jung-Han Han, Seung-Jae Han:
Nonintrusive estimation of expected throughput for IEEE 802.11 devices. CCNC 2014: 275-280 - Edwin A. Heredia, Shailendra Kumar, Jun Nishimura, George Hsieh, Alan Messer:
Contextual proactivity for media sharing scenarios in proximity networks. CCNC 2014: 465-470
skipping 73 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-31 17:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint