Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 51 matches
- 2015
- Nazrul Muhaimin Ahmad, Anang Hudaya Muhamad Amin, Mohd Faizal Abdollah, Robiah Yusof:
An empirical investigation of RSSI-based distance estimation for wireless indoor positioning system. Int. J. Wirel. Mob. Comput. 8(2): 206-212 (2015) - Sylvester Ajah, Ali Al-Sherbaz, Scott J. Turner, Phil D. Picton:
Machine-to-machine communications energy efficiencies: the implications of different M2M communications specifications. Int. J. Wirel. Mob. Comput. 8(1): 15-26 (2015) - Xingjuan Cai, Lei Wang, Qi Kang, Qidi Wu:
Adaptive bat algorithm for coverage of wireless sensor network. Int. J. Wirel. Mob. Comput. 8(3): 271-276 (2015) - Chong Chen, Guowen Hu, Lanhong Zhang:
Neuron adaptive control of induction motor drive system. Int. J. Wirel. Mob. Comput. 8(1): 95-102 (2015) - Anyu Cheng, Heng Shen, Xiaoyu Lin:
Implementation of vehicle logistics information transmission based on HTTP communication protocol. Int. J. Wirel. Mob. Comput. 8(2): 122-129 (2015) - Zina Chkirbene, Noureddine Hamdi:
A survey on spectrum management in cognitive radio networks. Int. J. Wirel. Mob. Comput. 8(2): 153-165 (2015) - Changshou Deng, Yucheng Tan, Bingyan Zhao, Yanlin Yang, Yan Liu, Hu Peng:
Dual of DE: a new scheme of differential evolution algorithm. Int. J. Wirel. Mob. Comput. 8(4): 406-413 (2015) - Jian Hua Gao, Yuan Xiang Li, Hua Jiang, Wen Yong Dong:
Evolutionary algorithm for self-exciting threshold autoregressive model. Int. J. Wirel. Mob. Comput. 8(3): 229-235 (2015) - Zhitao Guan, Nan Sun, Yue Xu, Tingting Yang:
A comprehensive survey of false data injection in smart grid. Int. J. Wirel. Mob. Comput. 8(1): 27-33 (2015) - Ruichun He, Changxi Ma, Yinzhen Li:
Site selection of public parking lot in the new district. Int. J. Wirel. Mob. Comput. 8(2): 147-152 (2015) - Huan He, Guangxue Wang, Yanfeng Han, Fangzhi Gen:
Numerical simulations of bistatic sea echo spectrum in high frequency band. Int. J. Wirel. Mob. Comput. 8(2): 175-182 (2015) - Jalaa Hoblos, Hassan Peyravi:
End-to-end throughput capacity in multi-hop wireless networks. Int. J. Wirel. Mob. Comput. 8(3): 213-220 (2015) - Minsu Jang, Jaehong Kim, Yong-Ho Seo, Hyun-Seung Yang:
Adaptive gesture tracking and recognition using acceleration sensors for a mobile device. Int. J. Wirel. Mob. Comput. 8(2): 183-193 (2015) - Dazhi Jiang, Liyu Li, Jian Gong, Zhun Fan:
Optimal trajectory searching based differential evolution. Int. J. Wirel. Mob. Comput. 8(4): 384-393 (2015) - M. M. Kamruzzaman, Wenqi He, Xiang Peng:
Performance of capacity-based adaptive STBC-VBLAST MIMO wireless communication. Int. J. Wirel. Mob. Comput. 8(4): 339-345 (2015) - Salman A. Khan:
Reduced-complexity mobile velocity estimation in correlated MIMO channels. Int. J. Wirel. Mob. Comput. 8(1): 1-8 (2015) - Imene Lahyani, Mohamed Jmaiel, Khalil Drira, Christophe Chassot:
Latency-aware publish/subscribe systems on MANET. Int. J. Wirel. Mob. Comput. 8(3): 236-248 (2015) - Pei-Wu Li, Wen-Feng Wang:
A novel group-centric secure information sharing model with trust level considered. Int. J. Wirel. Mob. Comput. 8(2): 194-199 (2015) - Jin-Fu Lin, Peng Bai, Jian-Xun Wang, Ying Wang, Tao Wang:
Topology algorithm based on link maintenance time for mobile ad hoc using directional antennas. Int. J. Wirel. Mob. Comput. 8(3): 221-228 (2015) - Chunxiao Liu, Changsheng Miao:
A hybrid routing algorithm based on load balancing for LEO satellite networks. Int. J. Wirel. Mob. Comput. 8(4): 359-366 (2015) - Richard K. Lomotey, Ralph Deters:
Mobile services provisioning and sensor data sharing. Int. J. Wirel. Mob. Comput. 8(4): 309-322 (2015) - Liyong Ma, Yong Zhang:
Bacterial foraging-based SIFT for full moon image direction estimation. Int. J. Wirel. Mob. Comput. 8(2): 200-205 (2015) - Ye Miao, Yuping Wang, Wei Jing-Xuan:
Hybrid particle swarm algorithm for minimum exposure path problem in heterogeneous wireless sensor network. Int. J. Wirel. Mob. Comput. 8(1): 74-81 (2015) - Xiuqin Pan, Ruixiang Li:
An improved differential evolution for parameter optimisation. Int. J. Wirel. Mob. Comput. 8(4): 394-400 (2015) - Gajanan R. Patil, Vishwanath K. Kokate:
An investigation into performance of MIMO wireless communication system under semi-blind channel estimation. Int. J. Wirel. Mob. Comput. 8(1): 51-58 (2015) - Charalampos N. Pitas, Athanasios D. Panagopoulos, Philip Constantinou:
Quality of consumer experience data mining for mobile multimedia communication networks: learning from measurements campaign. Int. J. Wirel. Mob. Comput. 8(1): 34-44 (2015) - V. Venkata Ramana, A. Rama Mohan Reddy:
Secure routing in MANETs: a bio-inspired approach with honey bees. Int. J. Wirel. Mob. Comput. 8(1): 82-89 (2015) - Ren Ren, Xianxiang Chen, Xinyu Hu, Yu Wang, Shanhong Xia:
Compressed sensing-based method for electrocardiogram monitoring on wireless body sensor using binary matrix. Int. J. Wirel. Mob. Comput. 8(2): 114-121 (2015) - Shensheng Tang, Brenten Davis:
Analysis and control of quality of information (QoI) for wireless sensor networks. Int. J. Wirel. Mob. Comput. 8(2): 103-113 (2015) - Kezong Tang, Xuan Xiao, Zuoyong Li:
Exploit more information of the sample for representation based face recognition. Int. J. Wirel. Mob. Comput. 8(4): 401-405 (2015)
skipping 21 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-25 15:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint