default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2012
- Onur Ascigil, Kenneth L. Calvert:
Implications of source routing. StudentWorkshop@CoNEXT 2012: 11-12 - Karyn Benson, Alberto Dainotti, kc claffy, Emile Aben:
Gaining insight into AS-level outages through analysis of internet background radiation. StudentWorkshop@CoNEXT 2012: 63-64 - Jean-Claude Bermond, David Coudert, Gianlorenzo D'Angelo, Fatima Zahra Moataz:
Diverse routing in networks with star SRLGs. StudentWorkshop@CoNEXT 2012: 23-24 - Ivan Beschastnikh:
Inferring networked system models from behavior traces. StudentWorkshop@CoNEXT 2012: 13-14 - Thomas Bourgeau, Timur Friedman:
Toward fast and efficient IP-level network topology capture. StudentWorkshop@CoNEXT 2012: 5-6 - Zdravko Bozakov, Panagiotis Papadimitriou:
AutoSlice: automated and scalable slicing for software-defined networks. StudentWorkshop@CoNEXT 2012: 3-4 - Matthew Broadbent, Nicholas J. P. Race:
OpenCache: exploring efficient and transparent content delivery mechanisms for video-on-demand. StudentWorkshop@CoNEXT 2012: 15-16 - Dominik Charousset, Thomas C. Schmidt, Matthias Wählisch:
Actors and publish/subscribe: an efficient approach to scalable distribution in data centers. StudentWorkshop@CoNEXT 2012: 53-54 - Xinming Chen, Abhishek Dwaraki, Hao Cai, Tilman Wolf:
Specification and composition of network services in future internet architectures. StudentWorkshop@CoNEXT 2012: 45-46 - Hongyi Chen, Zhigang Sun, Bin Huang, Tao Li, Xilong Mao:
Who is more reliable?: an evaluation method for distributed-memory aggregation in the internet. StudentWorkshop@CoNEXT 2012: 41-42 - Aaron Yi Ding, Pan Hui, Markku Kojo, Sasu Tarkoma:
Enabling energy-aware mobile data offloading for smartphones through vertical collaboration. StudentWorkshop@CoNEXT 2012: 27-28 - Paul Francis:
Reactions on advice given by others on the business of becoming a researcher. StudentWorkshop@CoNEXT 2012: 31-32 - Maksym Gabielkov, Arnaud Legout:
The complete picture of the Twitter social graph. StudentWorkshop@CoNEXT 2012: 19-20 - YiXi Gong, Dario Rossi, Claudio Testa, Silvio Valenti, M. Dave Täht:
Interaction or interference: can AQM and low priority congestion control successfully collaborate? StudentWorkshop@CoNEXT 2012: 25-26 - David Gugelmann, Dominik Schatzmann, Vincent Lenders:
AFR: automatic multi-stage forensic data retrieval. StudentWorkshop@CoNEXT 2012: 9-10 - Paul Jakma, Marcin Orczyk, Colin S. Perkins, Marwan Fayed:
Distributed k-core decomposition of dynamic graphs. StudentWorkshop@CoNEXT 2012: 39-40 - Junchen Jiang, Hui Zhang:
Deadline-aware data plane for internet video. StudentWorkshop@CoNEXT 2012: 55-56 - Yanhua Li, Moritz Steiner, Limin Wang, Zhi-Li Zhang, Jie Bao:
Dissecting foursquare venue popularity via random region sampling. StudentWorkshop@CoNEXT 2012: 21-22 - Marc Mendonca, Katia Obraczka, Thierry Turletti:
The case for software-defined networking in heterogeneous networked environments. StudentWorkshop@CoNEXT 2012: 59-60 - Sebastian Meyer, Matthias Wählisch, Thomas C. Schmidt:
Exploring reachability via settlement-free peering. StudentWorkshop@CoNEXT 2012: 49-50 - Zubair Nabi, Toby Moncaster, Anil Madhavapeddy, Steven Hand, Jon Crowcroft:
Evolving TCP.: how hard can it be? StudentWorkshop@CoNEXT 2012: 35-36 - Eduardo Mucelli Rezende Oliveira, Aline Carneiro Viana:
From your routine to hotspot deployment for data offloading. StudentWorkshop@CoNEXT 2012: 17-18 - Konstantina Papagiannaki:
10 years in the making: a retrospective to a research career. StudentWorkshop@CoNEXT 2012: 1-2 - Truong Khoa Phan, Joanna Moulierac, Cuong Ngoc Tran, Nam Thoai:
Xcast6 treemap islands: revisiting multicast model. StudentWorkshop@CoNEXT 2012: 33-34 - Qifan Pu, Wenjun Hu:
Smooth transmission over unsychronized VLC links. StudentWorkshop@CoNEXT 2012: 51-52 - Alina Quereilhac, Thierry Turletti, Walid Dabbous:
A multi-platform event-driven controller for network experiments. StudentWorkshop@CoNEXT 2012: 37-38 - Ashwin Rao, Justine Sherry, Arnaud Legout, Arvind Krishnamurthy, Walid Dabbous, David R. Choffnes:
Meddle: middleboxes for increased transparency and control of mobile traffic. StudentWorkshop@CoNEXT 2012: 65-66 - Riccardo Ravaioli, Chadi Barakat, Guillaume Urvoy-Keller:
Chkdiff: checking traffic differentiation at internet access. StudentWorkshop@CoNEXT 2012: 57-58 - Wenyu Ren, Yong Li, Depeng Jin, Pan Hui:
Optimal storage allocation for road side unit aided vehicular mobile content dissemination. StudentWorkshop@CoNEXT 2012: 67-68 - Johann Schlamp, Georg Carle, Ernst W. Biersack:
How to prevent AS hijacking attacks. StudentWorkshop@CoNEXT 2012: 29-30
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-28 08:49 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint