default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2009
- Hai Lin, Houda Labiod:
Advance reservation optimization in IP-based mobile networks. PM2HW2N@MSWiM 2009: 89-93 - Sarah Omar Al-Humoud, Lewis M. Mackenzie, Wim Vanderbauwhede:
Dynamic counter-based broadcast in MANETs. PM2HW2N@MSWiM 2009: 84-88 - Tara Ali-Yahiya, Hakima Chaouchi:
An optimized handover decision for heterogenous wireless networks. PM2HW2N@MSWiM 2009: 137-142 - Husnain Mansoor Ali, Anthony Busson, Véronique Vèque:
Channel assignment algorithms: a comparison of graph based heuristics. PM2HW2N@MSWiM 2009: 120-127 - Vitor Bernardo, Kostas Pentikousis, Jarno Pinola, Esa Piri, Marília Curado:
Multi-client video streaming over wirelessMAN-OFDMA. PM2HW2N@MSWiM 2009: 46-53 - Mohamed Salah Bouassida, Mohamed Shawky:
Verification and performance evaluation of a congestion control approach within vehicular ad hoc networks. PM2HW2N@MSWiM 2009: 183-190 - Brendan Cody-Kenny, David Guérin, Desmond Ennis, Ricardo Simon Carbajo, Meriel Huggard, Ciarán Mc Goldrick:
Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes. PM2HW2N@MSWiM 2009: 25-30 - Daniel Peter Dallas, Leif W. Hanlen:
Optimal transmission range and node degree for multi-hop routing in wireless sensor networks. PM2HW2N@MSWiM 2009: 167-174 - Eugenio Giordano, Flavio Fabbri, Roberto Verdone:
An analytical model for IEEE802.11 networks running query-based applications. PM2HW2N@MSWiM 2009: 151-158 - Philipp M. Glatz, Reinhold Weiss:
LINDONCS: localized in-network detection of network coding structures in wireless sensor networks. PM2HW2N@MSWiM 2009: 17-24 - Soroush Jahromizadeh, Veselin Rakocevic:
Rate control for delay-sensitive traffic in multihop wireless networks. PM2HW2N@MSWiM 2009: 99-106 - Vinay Joseph, Vinod Sharma, Utpal Mukherji:
Joint power control, scheduling and routing for multihop energy harvesting sensor networks. PM2HW2N@MSWiM 2009: 128-136 - Taesoo Jun, Christine Julien:
Delay analysis for symmetric nodes in mobile ad hoc networks. PM2HW2N@MSWiM 2009: 191-200 - Imre Kelényi, Jukka K. Nurminen:
Bursty content sharing mechanism for energy-limited mobile devices. PM2HW2N@MSWiM 2009: 216-223 - Yaser M. Khamayseh, Ghadeer Obeidat, Asmahan Abu Alhassan:
Enhanced VON-AODV based on delayed rebroadcast scheme. PM2HW2N@MSWiM 2009: 78-83 - Anat Lerner, Vladimir Miliavsky:
Compass enhanced ORRP for wireless sensor networks. PM2HW2N@MSWiM 2009: 1-8 - Jesús Llor, Esteban Torres, P. Pablo Garrido, Manuel Pérez Malumbres:
Analyzing the behavior of acoustic link models in underwater wireless sensor networks. PM2HW2N@MSWiM 2009: 9-16 - Abdallah Makhoul, Rachid Saadi, Congduc Pham:
Adaptive scheduling of wireless video sensor nodes for surveillance applications. PM2HW2N@MSWiM 2009: 54-60 - Francisco J. Martinez, Juan-Carlos Cano, Carlos T. Calafate, Pietro Manzoni, Jose Manuel Barrios:
Assessing the feasibility of a VANET driver warning system. PM2HW2N@MSWiM 2009: 39-45 - Majid Nabi, Milos Blagojevic, Twan Basten, Marc Geilen, Teun Hendriks:
Configuring multi-objective evolutionary algorithms for design-space exploration of wireless sensor networks. PM2HW2N@MSWiM 2009: 111-119 - Christos A. Papageorgiou, Konstantinos Birkos, Tasos Dagiuklas, Stavros Kotsopoulos:
Simulating mission critical mobile ad hoc networks. PM2HW2N@MSWiM 2009: 143-150 - Gianluigi Pibiri, Ciarán Mc Goldrick, Meriel Huggard:
Using active queue management to enhance performance in IEEE802.11. PM2HW2N@MSWiM 2009: 70-77 - Mohamad Salhani, Riadh Dhaou, André-Luc Beylot:
QoS mapping and connection admission control in the WiMAX - DVB-RCS access network. PM2HW2N@MSWiM 2009: 94-98 - Jaakko M. Seppälä, Timo Bräysy, Pekka Lilja:
Simulating devices with adaptive antenna arrays using OPNET integrated with MATLAB. PM2HW2N@MSWiM 2009: 159-166 - Ki-Eun Shin, Hyoung-Kee Choi, Jongmin Jeong:
A practical security framework for a VANET-based entertainment service. PM2HW2N@MSWiM 2009: 175-182 - Barbara Staehle, Dirk Staehle, Rastin Pries, Matthias Hirth, Peter Dely, Andreas Kassler:
Measuring one-way delay in wireless mesh networks: an experimental investigation. PM2HW2N@MSWiM 2009: 31-38 - Christina Thorpe, Seán Murphy, Liam Murphy:
IEEE802.11k enabled adaptive physical carrier sense mechanism for wireless networks (K-APCS). PM2HW2N@MSWiM 2009: 209-215 - Jie Xu, Guofang Tu, Yuming Jiang:
Opportunistic decoding of unequal erasure protected partially-decodable scalable source. PM2HW2N@MSWiM 2009: 61-69 - Yang Yu, Seán Murphy, Liam Murphy:
Interference aware relay station location planning for IEEE 802.16j mobile multi-hop relay network. PM2HW2N@MSWiM 2009: 201-208 - Zhenxia Zhang, Richard W. Pazzi, Azzedine Boukerche:
Mobility management protocols for wireless mesh networks. PM2HW2N@MSWiM 2009: 107-110
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-01 20:10 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint