default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2006
- Nabeel Ahmed, Srinivasan Keshav:
SMARTA: a self-managing architecture for thin access points. CoNEXT 2006: 9 - Miriam Allalouf, Yuval Shavitt:
A comparison of token-bucket based multi-color marking techniques. CoNEXT 2006: 38 - Brice Augustin, Timur Friedman, Renata Teixeira:
Exhaustive path tracing with Paris traceroute. CoNEXT 2006: 49 - Awais Ahmed Awan, Andrew W. Moore:
Synergy: blending heterogeneous measurement elements for effective network monitoring. CoNEXT 2006: 41 - Salman Baset, Eli Brosh, Vishal Misra, Dan Rubenstein, Henning Schulzrinne:
Understanding the behavior of TCP for real-time CBR workloads. CoNEXT 2006: 57 - Laurent Bernaille, Renata Teixeira, Kavé Salamatian:
Early application identification. CoNEXT 2006: 6 - Wafa Berrayana, Habib Youssef, Stéphane Lohier, Guy Pujolle:
Proposition of a cross-layer architecture model for the support of QoS in ad-hoc networks. CoNEXT 2006: 50 - Gennaro Boggia, Pietro Camarda, Alessandro D'Alconzo, Luigi Alfredo Grieco, Saverio Mascolo, Eitan Altman, Chadi Barakat:
Modeling the AIADD paradigm in networks with variable delays. CoNEXT 2006: 16 - Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy:
Stealth distributed hash table: a robust and flexible super-peered DHT. CoNEXT 2006: 19 - Carlos Alberto Vieira Campos, Luís Felipe M. de Moraes:
Investigating the user mobility in wireless mobile networks through real measurements. CoNEXT 2006: 58 - Gion Reto Cantieni, Gianluca Iannaccone, Chadi Barakat, Christophe Diot, Patrick Thiran:
Reformulating the monitor placement problem: optimal network-wide sampling. CoNEXT 2006: 5 - Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis:
Resisting against aggregator compromises in sensor networks. CoNEXT 2006: 24 - Edith Cohen, Nadav Grossaug, Haim Kaplan:
Processing top k queries from samples. CoNEXT 2006: 7 - Michael Conrad:
Non-repudiation mechanisms for peer-to-peer networks: enabling technology for peer-to-peer economic markets. CoNEXT 2006: 30 - Alberto Dainotti, Alessio Botta, Antonio Pescapè, Giorgio Ventre:
Searching for invariants in network games traffic. CoNEXT 2006: 43 - Natalie Degrande, Danny De Vleeschauwer, Robert E. Kooij, M. R. H. Mandjes:
Modeling ping times in first person shooter games. CoNEXT 2006: 14 - Benoit Donnet, Bruno Baynat, Timur Friedman:
Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives. CoNEXT 2006: 13 - Simon Fischer, Nils Kammenhuber, Anja Feldmann:
REPLEX: dynamic traffic engineering based on wardrop routing policies. CoNEXT 2006: 1 - Michael Gellman:
Quality of service routing in peer-to-peer overlays. CoNEXT 2006: 35 - Domenico Giustiniano, Giuseppe Bianchi:
Are 802.11 link quality broadcast measurements always reliable? CoNEXT 2006: 47 - Johann Großschädl:
TinySA: a security architecture for wireless sensor networks. CoNEXT 2006: 55 - Elyes Ben Hamida, Guillaume Chelius, Eric Fleury:
Neighbor discovery analysis in wireless sensor networks. CoNEXT 2006: 26 - Wenjun Hu, Miguel Castro, Jon Crowcroft, Greg O'Shea, Antony I. T. Rowstron:
Network coding with traffic engineering. CoNEXT 2006: 40 - Pan Hui, Jon Crowcroft:
How small labels create big improvements. CoNEXT 2006: 34 - Christophe Jelger, Christian F. Tschudin:
Dynamic names and private address maps: complete self-configuration for MANETs. CoNEXT 2006: 4 - Guillaume Jourjon, Emmanuel Lochin, Patrick Sénac:
Towards a versatile transport protocol. CoNEXT 2006: 21 - Mohamed Ali Kâafar, Laurent Mathy, Thierry Turletti, Walid Dabbous:
Virtual networks under attack: disrupting internet coordinate systems. CoNEXT 2006: 12 - Elliott Karpilovsky, Jennifer Rexford:
Using forgetful routing to control BGP table size. CoNEXT 2006: 2 - Chang Kim, Jennifer Rexford:
Reconciling zero-conf with efficiency in enterprises. CoNEXT 2006: 22 - Torsten Klie, Lars C. Wolf:
Autonomic policy-based management using web services. CoNEXT 2006: 28
skipping 30 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-28 10:47 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint