Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 80 matches
- 2012
- Sung Won Ahn, Chuck Yoo:
Multiple-streaming method for SVC video by virtualization of network interface in wireless environment. ICON 2012: 360-363 - Hazem M. Al-Najjar, Moath H. A. Jarrah:
Smart job scheduling with backup system in grid environment. ICON 2012: 210-215 - Hazem M. Al-Najjar, Nadia Rousan:
Trusted network coding framework. ICON 2012: 103-108 - Ahmed Al-amri, Sami Al-zahrani, Mohammed Al-harthi, Mohanned al-qarni, Irfan Ahmed:
Hybrid frequency-time domain proportional fair resource allocation scheme for LTE downlink. ICON 2012: 286-290 - King-Seng Ang, Chen-Khong Tham:
Smartphone-based vehicular and activity sensing. ICON 2012: 1-6 - Teuku Yuliar Arif, Riri Fitri Sari:
An analytical model of A-MSDU scheme with enhanced Block ACK for IEEE 802.11n networks. ICON 2012: 291-298 - Rameez Asif, Muhammad Khawar Islam, Muhammad Zafrullah:
Effective negative Kerr non-linear coefficient using highly non-linear fibers: A scalable backward propagation approach. ICON 2012: 98-102 - Rameez Asif, Chien-Yu Lin, Bernhard Schmauss:
Non-uniform step-size based split step fourier method for mitigating fiber transmission impairments in N-channel 224Gbit/s PolMux-16QAM system. ICON 2012: 109-113 - Debraj Basu, Gourab Sen Gupta, Giovanni S. Moretti:
Issues of data reliability in indoor channel: Impact on the energy efficiency of battery powered wireless sensor nodes. ICON 2012: 465-470 - Muthusubramanian Bharanidharan, Xue Jun Li, Yunye Jin, Jaya Shankar Pathmasuntharam, Gaoxi Xiao:
Design and implementation of a real time locating system utilizing Wi-Fi signals from iPhones. ICON 2012: 299-303 - Rachel Cardell-Oliver, Andreas Willig, Christof Huebner, Thomas Buehring, Alvaro Monsalve:
Error control strategies for transmit-only sensor networks: A case study. ICON 2012: 453-458 - Sandip Chakraborty, Sukumar Nandi:
Achieving fairness for multi-class traffic in directional multi-interface IEEE 802.11s MCCA. ICON 2012: 143-148 - Xiaolin Chang, Jogesh K. Muppala, Bin Wang, Jiqiang Liu, Longmei Sun:
Migration cost aware virtual network re-embedding in presence of resource failures. ICON 2012: 24-29 - Ehsan Elahi, Amir Qayyum, Sheneela Naz:
The effect of payload length on QoS in IEEE 802.11s Wireless Mesh Networks. ICON 2012: 70-73 - Jannatul Fardous, Salil S. Kanhere:
On the use of location window in geo-intelligent HTTP adaptive video streaming. ICON 2012: 46-51 - Reuben A. Farrugia:
Resilient video coding using difference expansion and histogram modification. ICON 2012: 349-354 - Samoda Gamage, Ajith Pasqual:
High performance parallel packet Classification architecture with Popular Rule Caching. ICON 2012: 52-57 - Pradeep Kumar Gautam, Mahesh Kumar P. Jagtap:
Extensible processor speeds up IP lookup. ICON 2012: 411-415 - Rafael L. Gomes, Luiz F. Bittencourt, Edmundo R. M. Madeira:
A generic SLA negotiation protocol for Virtualized Environments. ICON 2012: 7-12 - Ismo Hakala, Sanna Laine:
Using WMS log files as an indicator of QoS and application performance in on-demand streaming videos. ICON 2012: 58-63 - Mahbub Hassan:
A performance model of pedestrian dead reckoning with activity-based location updates. ICON 2012: 64-69 - Ping He, Hui Tian, Hong Shen:
Energy-efficient cooperative MIMO routing in wireless sensor networks. ICON 2012: 74-79 - Donghyeok Ho, Hwangjun Song:
Resource allocation algorithm based on social relation for video streaming services over P2P network. ICON 2012: 185-190 - Vinh Dien Hoang, Xin Zhang, Stanislav A. Filin, Hiroshi Harada:
Introduction to 1900.7 network architecture, design and current status. ICON 2012: 315-319 - Menglan Hu, Jun Luo:
Dynamic real-time scheduling with task migration for handling bag-of-tasks applications on clusters. ICON 2012: 222-226 - Menglan Hu, Jun Luo, Bharadwaj Veeravalli:
Optimal provisioning for scheduling divisible loads with reserved cloud resources. ICON 2012: 204-209 - Zhao Hu, Yuesheng Zhu, Limin Ma:
An improved Kerberos protocol based on Diffie-Hellman-DSA key exchange. ICON 2012: 400-404 - Xu Huang, Dharmendra Sharma, Muhammad Ahmed, Hongyan Cui:
Protecting an WSN from internal attack based on epistemic uncertainties. ICON 2012: 389-394 - Ray Hunt:
Emerging Wireless Personal Area Networks (WPANs): - An analysis of techniques, tools and threats. ICON 2012: 274-279 - Ray Hunt:
New developments in network forensics - Tools and techniques. ICON 2012: 376-381
skipping 50 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 16:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint