default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2019
- Jeman Park, Manar Mohaisen, Aziz Mohaisen:
Investigating DNS Manipulation by Open DNS Resolvers. CoNEXT Companion 2019: 45-46 - Qiang Liu, Tao Han:
When Network Slicing meets Deep Reinforcement Learning. CoNEXT Companion 2019: 29-30 - Marcelo Abranches, Eric Keller:
Stateless TCP. CoNEXT Companion 2019: 70-71 - Ahmed Abusnaina, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:
Examining the Security of DDoS Detection Systems in Software Defined Networks. CoNEXT Companion 2019: 49-50 - Niket Agrawal, Jan S. Rellermeyer, Aaron Yi Ding:
IoT Resource-aware Orchestration Framework for Edge Computing. CoNEXT Companion 2019: 62-64 - Licia Amichi, Aline Carneiro Viana, Mark Crovella, Antonio A. F. Loureiro:
Mobility profiling: Identifying scouters in the crowd. CoNEXT Companion 2019: 9-11 - Arnau Badia-Sampera, José Suárez-Varela, Paul Almasan, Krzysztof Rusek, Pere Barlet-Ros, Albert Cabellos-Aparicio:
Towards more realistic network models based on Graph Neural Networks. CoNEXT Companion 2019: 14-16 - Ismael Castell-Uroz, Xavier Marrugat-Plaza, Josep Solé-Pareta, Pere Barlet-Ros:
A first look into Alexa's interaction security. CoNEXT Companion 2019: 4-6 - Greg Cusack, Maziyar Nazari, Sepideh Goodarzy, Prerit Oberai, Eric Rozner, Eric Keller, Richard Han:
Efficient Microservices with Elastic Containers. CoNEXT Companion 2019: 65-67 - Wendi Feng, Zhi-Li Zhang, Chuanchang Liu, Junliang Chen:
Clé: Enhancing Security with Programmable Dataplane Enabled Hybrid SDN. CoNEXT Companion 2019: 76-77 - Osvaldo L. H. M. Fonseca, Ítalo Cunha, Elverton C. Fazzion, Brivaldo Junior, Ronaldo A. Ferreira, Ethan Katz-Bassett:
Tracking Down Sources of Spoofed IP Packets. CoNEXT Companion 2019: 51-53 - Garegin Grigoryan, Yaoqing Liu, Minseok Kwon:
iLoad: In-network Load Balancing with Programmable Data Plane. CoNEXT Companion 2019: 17-19 - A. F. M. Saniul Haq, Mahmudur Khan, Murat Yuksel:
Asynchronous LOS Discovery Algorithm for Aerial Nodes Using In-band Full-Duplex Transceivers. CoNEXT Companion 2019: 26-28 - Heesang Jin, Minkoo Kang, Gyeongsik Yang, Chuck Yoo:
CLEO: Machine Learning for ECMP. CoNEXT Companion 2019: 1-3 - Yusuke Koda, Jihong Park, Mehdi Bennis, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura:
One Pixel Image and RF Signal Based Split Learning for mmWave Received Power Prediction. CoNEXT Companion 2019: 54-56 - Abhishek Kulkarni, Alvin Lim:
Preliminary Study on Indoor Localization using Smartphone-Based IEEE 802.11mc. CoNEXT Companion 2019: 43-44 - Giuseppe Di Lena, Andrea Tomassilli, Damien Saucez, Frédéric Giroire, Thierry Turletti, Chidung Lac:
Demo Proposal - Distrinet: a Mininet implementation for the Cloud. CoNEXT Companion 2019: 82-83 - Sebastian Lettner, Andreas Blenk:
Adversarial Network Algorithm Benchmarking. CoNEXT Companion 2019: 31-33 - Kunal Mahajan, Saket Mahajan, Vishal Misra, Dan Rubenstein:
Exploiting content similarity to address cold start in container deployments. CoNEXT Companion 2019: 37-39 - Mojtaba MalekpourShahraki, Brent E. Stephens, Balajee Vamanan:
Ward: Implementing Arbitrary Hierarchical Policies using Packet Resubmit in Programmable Switches. CoNEXT Companion 2019: 34-36 - Shideh Yavary Mehr, Byrav Ramamurthy:
An SVM Based DDoS Attack Detection Method for Ryu SDN Controller. CoNEXT Companion 2019: 72-73 - Yu Mi, An Wang:
ML-Pushback: Machine Learning Based Pushback Defense Against DDoS. CoNEXT Companion 2019: 80-81 - Chrysa Papagianni, Koen De Schepper:
PI2 for P4: An Active Queue Management Scheme for Programmable Data Planes. CoNEXT Companion 2019: 84-86 - Li Quan, Qin Huang:
Transparent Coded Blockchain. CoNEXT Companion 2019: 12-13 - Fabricio Rodriguez, Christian Esteve Rothenberg, Gergely Pongrácz:
In-network P4-based Low Latency Robot Arm Control. CoNEXT Companion 2019: 59-61 - AmirHossein Seyri, Abhisek Pan, Balajee Vamanan:
Dynamically Sharing Memory between Memcached Tenants using Tingo. CoNEXT Companion 2019: 40-42 - Charles Shelbourne, Leonardo Linguaglossa, Aldo Lipani, Tianzhu Zhang, Fabien Geyer:
On the Learnability of Software Router Performance via CPU Measurements. CoNEXT Companion 2019: 23-25 - Amir Varasteh, Wolfgang Kellerer, Carmen Mas Machuca:
Network in the Air. CoNEXT Companion 2019: 20-22 - Shicheng Wang, Chang Liu, Ying Liu, Guanyu Li, Menghao Zhang, Yangyang Wang, Mingwei Xu:
Fast Multi-string Pattern Matching using PISA. CoNEXT Companion 2019: 74-75 - Shaoqing Wang, Youjian Zhao, Hui Xie:
PKN: Improving Survivability of LEO Satellite Network through Protecting Key Nodes. CoNEXT Companion 2019: 7-8
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-29 00:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint