default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 51 matches
- 2020
- Mertkan Akkoç, Berk Canberk:
Interval Partitioning for Packet Classification in OpenFlow vSwitch. IEEE Netw. Lett. 2(3): 128-131 (2020) - Onur Ayan, H. Murat Gursu, Arled Papa, Wolfgang Kellerer:
Probability Analysis of Age of Information in Multi-Hop Networks. IEEE Netw. Lett. 2(2): 76-80 (2020) - Tadege Mihretu Ayenew, Dionysis Xenakis, Nikos I. Passas, Lazaros F. Merakos:
A Novel Content Placement Strategy for Heterogeneous Cellular Networks With Small Cells. IEEE Netw. Lett. 2(1): 10-13 (2020) - Chris Budny, Jeffrey Liu, Andrew J. Weinert:
Video Testing at the FirstNet Innovation and Test Lab Using a Public Safety Dataset. IEEE Netw. Lett. 2(1): 28-32 (2020) - Xinwei Chen, Ali Taleb Zadeh Kasgari, Walid Saad:
Deep Learning for Content-Based Personalized Viewport Prediction of 360-Degree VR Videos. IEEE Netw. Lett. 2(2): 81-84 (2020) - Elena Cipressi, Maria Luisa Merani:
An Effective Machine Learning (ML) Approach to Quality Assessment of Voice Over IP (VoIP) Calls. IEEE Netw. Lett. 2(2): 90-94 (2020) - Douglas Comer, Adib Rastegarnia, William Jordan Reed:
DCLab: A Reconfigurable SDN Testbed for Datacenter Networks. IEEE Netw. Lett. 2(3): 145-148 (2020) - Lei Cui, Gang Xie, Shui Yu, Xuemeng Zhai, Longxiang Gao:
An Inherent Property-Based Rumor Dissemination Model in Online Social Networks. IEEE Netw. Lett. 2(1): 43-46 (2020) - Mohamed Kadry Elhattab, Walaa Hamouda:
Performance Analysis for H-CRANs Under Constrained Capacity Fronthaul. IEEE Netw. Lett. 2(2): 62-66 (2020) - Wenhao Fan, Desheng Teng, Fan Wu, Yuan'an Liu:
PageRank-Based Multi-Hop Computation Offloading in D2D Networks. IEEE Netw. Lett. 2(4): 195-198 (2020) - Muhammad Omer Farooq:
Clustering-Based Layering Approach for Uplink Multi-Hop Communication in LoRa Networks. IEEE Netw. Lett. 2(3): 132-135 (2020) - Emmanouil Fountoulakis, Georgios S. Paschos, Nikolaos Pappas:
UAV Trajectory Optimization for Time Constrained Applications. IEEE Netw. Lett. 2(3): 136-139 (2020) - Vu Nguyen Ha, Ti Ti Nguyen, Long Bao Le, Jean-François Frigon:
Admission Control and Network Slicing for Multi-Numerology 5G Wireless Networks. IEEE Netw. Lett. 2(1): 5-9 (2020) - Seppo Hätönen, Md Tanvir Ishtaique ul Huque, Ashwin Rao, Guillaume Jourjon, Vincent Gramoli, Sasu Tarkoma:
An SDN Perspective on Multi-Connectivity and Seamless Flow Migration. IEEE Netw. Lett. 2(1): 19-22 (2020) - Giovanni Iacovelli, Pietro Boccadoro, Luigi Alfredo Grieco:
On the Interplay Between Energy and Memory Constraints in Optimized UAV Communications. IEEE Netw. Lett. 2(4): 203-206 (2020) - Saeed Jamshidiha, Vahid Pourahmadi, Abbas Mohammadi, Mehdi Bennis:
Link-Level Throughput Maximization Using Deep Reinforcement Learning. IEEE Netw. Lett. 2(3): 101-105 (2020) - Saadullah Kalwar, Kwan-Wu Chin, Zhenhui Yuan:
Optimizing TDMA Schedule and SIC-Capable UAV Position via Gibbs Sampling. IEEE Netw. Lett. 2(3): 97-100 (2020) - Jihas Khan, Lillykutty Jacob:
Availability Maximization Framework for CoMP Enabled URLLC With Short Packets. IEEE Netw. Lett. 2(1): 1-4 (2020) - Panayiotis Kolios, Georgios Ellinas, Christos G. Panayiotou:
Cyber-Physical Interplay for Data Offloading in Vehicular Networks. IEEE Netw. Lett. 2(2): 54-57 (2020) - Gilsoo Lee, Jihong Park, Walid Saad, Mehdi Bennis:
Performance Analysis of Blockchain Systems With Wireless Mobile Miners. IEEE Netw. Lett. 2(3): 111-115 (2020) - Kai Li, Yousef Emami, Wei Ni, Eduardo Tovar, Zhu Han:
Onboard Deep Deterministic Policy Gradients for Online Flight Resource Allocation of UAVs. IEEE Netw. Lett. 2(3): 106-110 (2020) - Kai Li, Wei Ni, Bo Wei, Eduardo Tovar:
Onboard Double Q-Learning for Airborne Data Capture in Wireless Powered IoT Networks. IEEE Netw. Lett. 2(2): 71-75 (2020) - Yangzhe Liao, Liqing Shou, Quan Yu, Qingsong Ai, Quan Liu:
An Intelligent Computation Demand Response Framework for IIoT-MEC Interactive Networks. IEEE Netw. Lett. 2(3): 154-158 (2020) - Nikita Lyamin, Boris Bellalta, Alexey V. Vinel:
Age-of-Information-Aware Decentralized Congestion Control in VANETs. IEEE Netw. Lett. 2(1): 33-37 (2020) - Miriyala Mahesh, Badarla Sri Pavan, V. P. Harigovindan:
Data Rate-Based Grouping to Resolve Performance Anomaly of Multi-Rate IEEE 802.11ah IoT Networks. IEEE Netw. Lett. 2(4): 166-170 (2020) - Dimitrios Michael Manias, Hassan Hawilo, Manar Jammal, Abdallah Shami:
Depth-Optimized Delay-Aware Tree (DO-DAT) for Virtual Network Function Placement. IEEE Netw. Lett. 2(3): 149-153 (2020) - Abhijit Mondal, Sandip Chakraborty:
Does QUIC Suit Well With Modern Adaptive Bitrate Streaming Techniques? IEEE Netw. Lett. 2(2): 85-89 (2020) - Bushra Mughal, Zubair Md. Fadlullah, Salama Ikki:
Centralized Versus Heuristic-Based Distributed Channel Allocation to Minimize Packet Transmission Delay for Multiband Relay Networks. IEEE Netw. Lett. 2(4): 180-184 (2020) - Josu Murua, Pedro Reviriego:
Faking Elephant Flows on the Count Min Sketch. IEEE Netw. Lett. 2(4): 199-202 (2020) - Milan Patnaik, G. Prabhu, Chester Rebeiro, Vashek Matyas, Kamakoti Veezhinathan:
ProBLeSS: A Proactive Blockchain Based Spectrum Sharing Protocol Against SSDF Attacks in Cognitive Radio IoBT Networks. IEEE Netw. Lett. 2(2): 67-70 (2020)
skipping 21 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-02 14:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint