Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 220 matches
- 2008
- Nael B. Abu-Ghazaleh, Enrique Alba, Carla-Fabiana Chiasserini, Renato Lo Cigno:
Guest Editorial. Comput. Networks 52(1): 1-3 (2008) - Sandeep Kour Ahuja, Srinivasan Ramasubramanian:
All-to-all disjoint multipath routing using cycle embedding. Comput. Networks 52(7): 1506-1517 (2008) - Özgür B. Akan, Pascal Frossard, Qian Zhang, Nikil Jayant:
Special issue on wireless multimedia sensor networks. Comput. Networks 52(13): 2529-2531 (2008) - Kemal Akkaya, S. Janapala:
Maximizing connected coverage via controlled actor relocation in wireless sensor and actor networks. Comput. Networks 52(14): 2779-2796 (2008) - Ian F. Akyildiz, Fernando Brunetti, Cristina Blázquez:
Nanonetworks: A new communication paradigm. Comput. Networks 52(12): 2260-2279 (2008) - Ian F. Akyildiz, Harry Rudin:
Editorial. Comput. Networks 52(3): 473-474 (2008) - Dawood Al-Abri, Janise McNair:
On the interaction between localization and location verification for wireless sensor networks. Comput. Networks 52(14): 2713-2727 (2008) - Jamal N. Al-Karaki, Ahmed E. Kamal:
Efficient virtual-backbone routing in mobile ad hoc networks. Comput. Networks 52(2): 327-350 (2008) - Stuart M. Allen, Roger M. Whitaker, Steve Hurley:
Personalised subscription pricing for optimised wireless mesh network deployment. Comput. Networks 52(11): 2172-2188 (2008) - I. Kuban Altinel, Necati Aras, Evren Güney, Cem Ersoy:
Binary integer programming formulation and heuristics for differentiated coverage in heterogeneous sensor networks. Comput. Networks 52(12): 2419-2431 (2008) - Edoardo Amaldi, Antonio Capone, Matteo Cesana, Ilario Filippini, Federico Malucelli:
Optimization models and methods for planning wireless mesh networks. Comput. Networks 52(11): 2159-2171 (2008) - Chee-Wei Ang, Chen-Khong Tham:
iMST: A bandwidth-guaranteed topology control algorithm for TDMA-based ad hoc networks with sectorized antennas. Comput. Networks 52(9): 1675-1692 (2008) - Alireza Attar, Seyed Ali Ghorashi, Mahesh Sooriyabandara, A. Hamid Aghvami:
Challenges of real-time secondary usage of spectrum. Comput. Networks 52(4): 816-830 (2008) - Chen Avin, Bhaskar Krishnamachari:
The power of choice in random walks: An empirical study. Comput. Networks 52(1): 44-60 (2008) - Christian Awad, Brunilde Sansò, André Girard:
DiffServ for differentiated reliability in meshed IP/WDM networks. Comput. Networks 52(10): 1988-2012 (2008) - Yoshinari Awaji, Hideaki Furukawa, Naoya Wada, Eddie Kong, Peter Chan, Ray Man:
Guidelines for amplification of optical packets in WDM environment regarding impact of transient response of erbium-doped fiber amplifier. Comput. Networks 52(10): 2087-2093 (2008) - Baochun Bai, Janelle J. Harms, Yuxi Li:
Configurable active multicast congestion control. Comput. Networks 52(7): 1410-1432 (2008) - Athanasios Bamis, Azzedine Boukerche, Ioannis Chatzigiannakis, Sotiris E. Nikoletseas:
A mobility aware protocol synthesis for efficient routing in ad hoc mobile networks. Comput. Networks 52(1): 130-154 (2008) - Anirban Banerjee, Michalis Faloutsos, Laxmi N. Bhuyan:
The P2P war: Someone is monitoring your activities. Comput. Networks 52(6): 1272-1280 (2008) - Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean Mayo:
MuON: Epidemic based mutual anonymity in unstructured P2P networks. Comput. Networks 52(5): 915-934 (2008) - Daniel M. Batista, Nelson L. S. da Fonseca, Flávio Keidi Miyazawa, Fabrizio Granelli:
Self-adjustment of resource allocation for grid applications. Comput. Networks 52(9): 1762-1781 (2008) - Alexandre de Baynast, Petri Mähönen, Marina Petrova:
ARQ-based cross-layer optimization for wireless multicarrier transmission on cognitive radio networks. Comput. Networks 52(4): 778-794 (2008) - Pietro Belotti, Antonio Capone, Giuliana Carello, Federico Malucelli:
Multi-layer MPLS network design: The impact of statistical multiplexing. Comput. Networks 52(6): 1291-1307 (2008) - Marco Benini, Sabrina Sicari:
Assessing the risk of intercepting VoIP calls. Comput. Networks 52(12): 2432-2446 (2008) - Oleg Berzin:
Mobility label based network: Mobility support in label switched networks with multi-protocol BGP. Comput. Networks 52(9): 1732-1744 (2008) - Bin Liu, Chuang Lin, Jian Qiao, Jianping He, Peter D. Ungsunan:
A NetFlow based flow analysis and monitoring system in enterprise networks. Comput. Networks 52(5): 1074-1092 (2008) - Igor Bisio, Mario Marchese:
Performance evaluation of bandwidth allocation methods in a geostationary satellite channel in the presence of internet traffic. Comput. Networks 52(1): 275-291 (2008) - Raffaele Bolla, Roberto Bruschi, Franco Davoli, Matteo Repetto:
Hybrid optimization for QoS control in IP Virtual Private Networks. Comput. Networks 52(3): 563-580 (2008) - Luciano Bononi, Marco Di Felice, Gabriele D'Angelo, Michele Bracuto, Lorenzo Donatiello:
MoVES: A framework for parallel and distributed simulation of wireless vehicular ad hoc networks. Comput. Networks 52(1): 155-179 (2008) - Alessio Botta, Antonio Pescapè, Giorgio Ventre:
An approach to the identification of network elements composing heterogeneous end-to-end paths. Comput. Networks 52(15): 2975-2987 (2008)
skipping 190 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-25 11:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint