Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 45 matches
- 2001
- Jörn Altmann, Karyen Chu:
How to charge for network services - flat-rate or usage-based? Comput. Networks 36(5/6): 519-531 (2001) - Isabelle Attali, Denis Caromel, Carine Courbis, Ludovic Henrio, Henrik Nilsson:
An integrated development environment for Java Card. Comput. Networks 36(4): 391-405 (2001) - James Aweya, Michel Ouellette, Delfin Y. Montuno:
A control theoretic approach to active queue management. Comput. Networks 36(2/3): 203-235 (2001) - James Aweya, Michel Ouellette, Delfin Y. Montuno, Alan Chapman:
A load adaptive mechanism for buffer management. Comput. Networks 36(5/6): 709-728 (2001) - M. Ayedemir, L. Bottomley, Marie Coffin, Clark Jeffries, Peter C. Kiessler, K. Kumar, W. Ligon, J. Marin, Arne A. Nilsson, J. McGovern, Andrew J. Rindos, Ken V. Vu, Steven P. Woolet, A. Zaglou, K. Zhu:
Two tools for network traffic analysis. Comput. Networks 36(2/3): 169-179 (2001) - Stefano Basagni, Imrich Chlamtac, Violet R. Syrotiuk:
Location aware, dependable multicast for mobile ad hoc networks. Comput. Networks 36(5/6): 659-670 (2001) - Francesco Bellotti, Alessandro De Gloria, Daniele Grosso, Luca Noli:
WLESS-frame: a simulation-based development environment for 802.11 stations. Comput. Networks 36(5/6): 625-641 (2001) - Johan Borst, Bart Preneel, Vincent Rijmen:
Cryptography on smart cards. Comput. Networks 36(4): 423-435 (2001) - Ming-Feng Chang, Yi-Bing Lin, Wei-Zu Yang:
Performance of hot billing mobile prepaid service. Comput. Networks 36(2/3): 269-290 (2001) - Jon Crowcroft, Michael Fry, David Hutchison, Ian Marshall, Morris Sloman, Ian Wakeman:
Active networks and services. Comput. Networks 36(1): 1-3 (2001) - Gabriel Dermler, Beat Liver:
The economics of networking. Comput. Networks 36(5/6): 491-492 (2001) - Shlomi Dolev, Boris Fitingof, Avraham A. Melkman, Olga Tubman:
Smooth and adaptive forward erasure correcting. Comput. Networks 36(2/3): 343-355 (2001) - Josep Domingo-Ferrer, Pieter H. Hartel:
Current directions in smart cards. Comput. Networks 36(4): 377-379 (2001) - Khalil Drira, Pierre Azéma, Pierre de Saqui-Sannes:
Testability analysis in communicating systems. Comput. Networks 36(5/6): 671-693 (2001) - Hossam Mahmoud Ahmad Fahmy:
Reliability evaluation in distributed computing environments using the AHP. Comput. Networks 36(5/6): 597-615 (2001) - Amila Fernando, Darren Williams, Alan D. Fekete, Bob Kummerfeld:
Dynamic network service installation in an active network. Comput. Networks 36(1): 35-48 (2001) - Atanu Ghosh, Michael Fry, Glen MacLarty:
An infrastructure for application level active networking. Comput. Networks 36(1): 5-20 (2001) - Jesús González, Ignacio Rojas, Héctor Pomares, Moisés Salmerón, Alberto Prieto, Juan Julián Merelo Guervós:
Optimization of web newspaper layout in real time. Comput. Networks 36(2/3): 311-321 (2001) - Louis C. Guillou, Michel Ugon, Jean-Jacques Quisquater:
Cryptographic authentication protocols for smart cards. Comput. Networks 36(4): 437-451 (2001) - Dirk Husemann:
Standards in the smart card world. Comput. Networks 36(4): 473-487 (2001) - Changhee Joo, Saewoong Bahk:
Analysis of start-up transition dynamics of TCP NewReno. Comput. Networks 36(2/3): 237-250 (2001) - Stamatis Karnouskos:
Security implications of implementing active network infrastructures using agent technology. Comput. Networks 36(1): 87-100 (2001) - Chris Kenyon, Giorgos Cheliotis:
Stochastic models for telecom commodity prices. Comput. Networks 36(5/6): 533-555 (2001) - Turgay Korkmaz, Marwan Krunz:
A randomized algorithm for finding a path subject to multiple QoS requirements. Comput. Networks 36(2/3): 251-268 (2001) - Jessica A. Kornblum, Danny Raz, Yuval Shavitt:
The active process interaction with its environment. Comput. Networks 36(1): 21-34 (2001) - Gerta Köster:
Improving the automatic congestion control functionality in SS7-signaling networks. Comput. Networks 36(5/6): 617-624 (2001) - L. Keng Lim, Jun Gao, T. S. Eugene Ng, Prashant R. Chandra, Peter Steenkiste, Hui Zhang:
Customizable virtual private network service with QoS. Comput. Networks 36(2/3): 137-151 (2001) - Alfio Lombardo, Giacomo Morabito, Giovanni Schembra:
Statistical traffic modeling and guaranteed service disciplines: a performance evaluation paradigm. Comput. Networks 36(5/6): 579-595 (2001) - David M'Raïhi, Moti Yung:
E-commerce applications of smart cards. Comput. Networks 36(4): 453-472 (2001) - Ian W. Marshall, Chris M. Roadknight:
Provision of quality of service for active services. Comput. Networks 36(1): 75-85 (2001)
skipping 15 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-18 04:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint