Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 59 matches
- 2017
- David Perez Abreu, Karima Velasquez, Alexandre Miguel Pinto, Marília Curado, Edmundo Monteiro:
Describing the Internet of Things with an ontology: The SusCity project case study. ICIN 2017: 294-299 - Armen Aghasaryan, Makram Bouzid, Dimitre Kostadinov:
Stimulus-based sandbox for learning resource dependencies in virtualized distributed applications. ICIN 2017: 238-245 - Shohreh Ahvar, Gabriel Santos, Nouredine Tamani, Bernard Istasse, Isabel Praça, Paul-Emmanuel Brun, Yacine Ghamri-Doudane, Noël Crespi:
Ontology-based model for trusted critical site supervision in FUSE-IT. ICIN 2017: 313-315 - Ali Saeed Dayem Alfoudi, Mohammed Dighriri, Gyu Myoung Lee, Rubem Pereira, Fung Po Tso:
Traffic management in LTE-WiFi slicing networks. ICIN 2017: 268-273 - Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram M. Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - Luigi Atzori, Roberto Girau, Salvatore Martis, Virginia Pilloni, Marco Uras:
A SIoT-aware approach to the resource management issue in mobile crowdsensing. ICIN 2017: 232-237 - Antoine Auger, Ernesto Exposito, Emmanuel Lochin:
Sensor observation streams within cloud-based IoT platforms: Challenges and directions. ICIN 2017: 177-184 - Osamah L. Barakat, David Koll, Xiaoming Fu:
Gavel: Software-defined network control with graph databases. ICIN 2017: 279-286 - Reinhard Behrens, Ali Ahmed:
Internet of Things: An end-to-end security layer. ICIN 2017: 146-149 - Jaafar Bendriss, Imen Grida Ben Yahia, Djamal Zeghlache:
Forecasting and anticipating SLO breaches in programmable networks. ICIN 2017: 127-134 - Hassan Bostani, Jean-Charles Grégoire:
Usable authentication systems for real time web-based audio/video communications. ICIN 2017: 117-121 - Amina Boubendir, Emmanuel Bertin, Noëmie Simoni:
A VNF-as-a-service design through micro-services disassembling the IMS. ICIN 2017: 203-210 - Christos Bouras, Anastasia Kollia, Andreas Papazois:
SDN & NFV in 5G: Advancements and challenges. ICIN 2017: 107-111 - Bruno Chatras, Steve Tsang Kwong U, Nicolas Bihannic:
NFV enabling network slicing for 5G. ICIN 2017: 219-225 - Rebecca Copeland, Michael Copeland:
Independently Verifiable Identity Scheme (IVIS). ICIN 2017: 196-198 - Fariborz Derakhshan, Horst Roessler, Peter Schefczik, Sabine Randriamasy:
On prediction of resource consumption of service requests in cloud environments. ICIN 2017: 169-176 - Nam H. Do, Tien Van Do, Xuan Thi Tran, Lóránt Farkas, Csaba Rotter:
A scalable routing mechanism for stateful microservices. ICIN 2017: 72-78 - Olivier Dugeon, Rabah Guedrez, Samer Lahoud, Géraldine Texier:
Demonstration of Segment Routing with SDN based label stack optimization. ICIN 2017: 143-145 - Federico Fernandez, Álvaro Alonso, Lourdes Marco, Joaquín Salvachúa:
A model to enable application-scoped access control as a service for IoT using OAuth 2.0. ICIN 2017: 322-324 - Hitomi Fuji, Kazuya Tsukamoto, Akira Nagata, Katsuichi Nakamura:
Effective data collection scheme for real-spatial group communication among mobile nodes. ICIN 2017: 343-348 - Smail Ghoul, Weijia Jia:
Techno-economic analysis and prediction for the deployment of 5G mobile network. ICIN 2017: 9-16 - Jean-Charles Grégoire:
Mediation-based communications. ICIN 2017: 274-278 - Jean-Charles Grégoire, Song Nhi Nguyen:
Tell me again, why should i talk to strangers? ICIN 2017: 316-318 - Dina Hussein, Emmanuel Bertin, Vincent Frey:
Access control in IoT: From requirements to a candidate vision. ICIN 2017: 328-330 - Camille Jaggernauth, Douglas Gubbe:
An extended SNMP based IoT context-aware model for dynamic adaptability of embedded systems software. ICIN 2017: 211-213 - Said El Kafhali, Khaled Salah:
Stochastic modelling and analysis of cloud computing data center. ICIN 2017: 122-126 - Paridhika Kayal, Harry G. Perros:
A comparison of IoT application layer protocols through a smart parking implementation. ICIN 2017: 331-336 - Ahmed Khalid, Jason J. Quinlan, Cormac J. Sreenan:
MiniNAM: A network animator for visualizing real-time packet flows in Mininet. ICIN 2017: 229-231 - Mohsin Khalil, Junaid Qadir, Oluwakayode Onireti, Muhammad Ali Imran, Shahzad Younis:
Feasibility, architecture and cost considerations of using TVWS for rural Internet access in 5G. ICIN 2017: 23-30 - Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache:
Scalable and cost-efficient algorithms for VNF chaining and placement problem. ICIN 2017: 92-99
skipping 29 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-20 16:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint