Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 98 matches
- 2008
- Zhiqiang Wu, E. Paul Ratazzi, Vasu Devan Chakravarthy, Lang Hong:
Performance Evaluation of Adaptive Non-contiguous MC-CDMA and Non-contiguous CI/MC-CDMA for Dynamic Spectrum Access. CrownCom 2008: 1-6 - Athanassios V. Adamis, Konstantinos N. Maliatsos, Philip Constantinou:
Methods for Reducing Interference caused to Licensed Systems by Overlay-CSMA/CA Cognitive Radios. CrownCom 2008: 1-6 - Santhanakrishnan Anand, Rajarathnam Chandramouli:
On the Secrecy Capacity of Fading Cognitive Wireless Networks. CrownCom 2008: 1-5 - Zhiquan Bai, Dongfeng Yuan, Haixia Zhang, Kyungsup Kwak:
Cognitive Pulse Shaping for M-ary Direct Sequence BPAM UWB System. CrownCom 2008: 1-4 - Maria-Gabriella Di Benedetto, Luca De Nardis:
Cognitive routing models in UWB networks. CrownCom 2008: 1-6 - Jack L. Burbank:
Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security. CrownCom 2008: 1-7 - Dave Cavalcanti, Monisha Ghosh:
Cognitive Radio Networks: Enabling New Wireless Broadband Opportunities. CrownCom 2008: 1-6 - Sachin Chaudhari, Visa Koivunen, H. Vincent Poor:
Distributed Autocorrelation-Based Sequential Detection of OFDM Signals in Cognitive Radios. CrownCom 2008: 1-6 - Joy Iong-Zong Chen, Chin-Chung Yu, You-Fu Chung, Shi-Han Yan:
On the Impact of CFO for OFDM Systems with Un-equal Gain Diversity Schemes over Small-term Fading. CrownCom 2008: 1-5 - Dawei Chen, Qian Zhang, Weijia Jia:
Aggregation Aware Spectrum Assignment in Cognitive Ad-hoc Networks. CrownCom 2008: 1-6 - Nack Hyun Choi, Jae Ho Hwang, Guanbo Zheng, Ning Han, Jae Moung Kim:
A Cognitive UWB Testbed Employing Adaptive Pulse Generation. CrownCom 2008: 1-6 - Hyun-Ho Choi, Kyunghun Jang, Yoon-Chae Cheong:
Adaptive Sensing Threshold Control Based on Transmission Power in Cognitive Radio Systems. CrownCom 2008: 1-6 - T. Charles Clancy, Nathan Goergen:
Security in Cognitive Radio Networks: Threats and Mitigation. CrownCom 2008: 1-8 - Nicolas Colson, Apostolos A. Kountouris, Armelle Wautier, Lionel Husson:
Cognitive Decision Making Process Supervising the Radio Dynamic Reconfiguration. CrownCom 2008: 1-7 - Christian Doerr, Dirk Grunwald, Douglas C. Sicker:
Local Independent Control of Cognitive Radio Networks. CrownCom 2008: 1-9 - Hao Feng, Yanbo Wang, Shiju Li:
Statistical Test Based on Finding the Optimum Lag in Cyclic Autocorrelation for Detecting Free Bands in Cognitive Radios. CrownCom 2008: 1-6 - Stanislav A. Filin, Kentaro Ishizu, Homare Murakami, Hiroshi Harada, Goh Miyamoto, Ha Nguyen Tran, Shuzo Kato, Mikio Hasegawa:
Dynamic Spectrum Assignment and Access Scenarios, System Architecture, Functional Architecture and Procedures for IEEE P1900.4 Management System. CrownCom 2008: 1-7 - Hiromasa Fujii, Hitoshi Yoshino:
Spectrum Sharing by Adaptive Transmit Power Control for Low Priority Systems and its Achievable Capacity. CrownCom 2008: 1-6 - Long Gao, Shuguang Cui:
Power and Rate Control for Cognitive Radios: A Dynamic Programming Approach. CrownCom 2008: 1-7 - Kaveh Ghaboosi, Matti Latva-aho, Yang Xiao:
A Distributed Multi-channel Cognitive MAC Protocol for IEEE 802.11s Wireless Mesh Networks. CrownCom 2008: 1-8 - Monisha Ghosh, Vasanth Gaddam, Gene Turkenich, Kiran S. Challapali:
Spectrum Sensing Prototype for Sensing ATSC and Wireless Microphone Signals. CrownCom 2008: 1-7 - Lorenza Giupponi, Ana I. Pérez-Neira:
Fuzzy-based Spectrum Handoff in Cognitive Radio Networks. CrownCom 2008: 1-6 - Lei Gong, Jie Chen, Wanbin Tang, Shaoqian Li:
Application of clustering structure in the hierarchical spectrum sharing network based on cognitive radio. CrownCom 2008: 1-5 - Majed Haddad, Aawatif Menouni Hayar, Geir E. Øien, Saad G. Kiani:
Uplink Distributed Binary Power Allocation for Cognitive Radio Networks. CrownCom 2008: 1-4 - Hao He, Jie Chen, Shoufeng Deng, Shaoqian Li:
Game Theoretic Analysis of Joint Channel Selection and Power Allocation in Cognitive radio Networks. CrownCom 2008: 1-5 - Anh Tuan Hoang, Ying-Chang Liang:
Dynamic Spectrum Allocation with Second-Price Auctions: When Time is Money. CrownCom 2008: 1-6 - Gang Hu, Qian Zhang, Ming Xu:
Contention-Aware Spectrum Sensing and Access Algorithm of Cognitive Network. CrownCom 2008: 1-8 - Sung-Hyun Hwang, Jung-Sun Um, Myung Sun Song, Chang-Joo Kim, Hyung Rae Park, Yun Hee Kim:
Design and Verification of IEEE 802.22 WRAN Physical Layer. CrownCom 2008: 1-6 - Md Habibul Islam, Choo Leng Koh, Ser Wah Oh, Xianming Qing, Yoke Yong Lai, Cavin Wang, Ying-Chang Liang, Bee Eng Toh, Francois P. S. Chin, Geok-Leng Tan, William Toh:
Spectrum Survey in Singapore: Occupancy Measurements and Analyses. CrownCom 2008: 1-7 - Pierre Jallon:
A Spread Signals Detection Algorithm based on the Second Order Statistics in Semi-Blind Contexts. CrownCom 2008: 1-4
skipping 68 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-05 21:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint