Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 103 matches
- 2018
- Shakeel Ahmad, Christos Bouras, Eliya Buyukkaya, Muneeb Dawood, Raouf Hamzaoui, Vaggelis Kapoulas, Andreas Papazois, Gwendal Simon:
Peer-to-peer live video streaming with rateless codes for massively multiplayer online games. Peer-to-Peer Netw. Appl. 11(1): 44-62 (2018) - Mohammad Alishahi, Mohammad Hossein Yaghmaee Moghaddam, Hamid Reza Pourreza:
Multi-class routing protocol using virtualization and SDN-enabled architecture for smart grid. Peer-to-Peer Netw. Appl. 11(3): 380-396 (2018) - Nahid Amirazodi, Ali Mohammad Saghiri, Mohammad Reza Meybodi:
An adaptive algorithm for super-peer selection considering peer's capacity in mobile peer-to-peer networks based on learning automata. Peer-to-Peer Netw. Appl. 11(1): 74-89 (2018) - Michele Amoretti, Francesco Zanichelli:
P2P-PL: A pattern language to design efficient and robust peer-to-peer systems. Peer-to-Peer Netw. Appl. 11(3): 518-547 (2018) - Basil AsSadhan, Abdulmuneem Bashaiwth, Jalal Al-Muhtadi, Saleh AlShebeili:
Analysis of P2P, IRC and HTTP traffic for botnets detection. Peer-to-Peer Netw. Appl. 11(5): 848-861 (2018) - Maede Ashouri-Talouki:
An efficient privacy-preserving P2P protocol for computing maximum value in the presence of active adversaries. Peer-to-Peer Netw. Appl. 11(1): 34-43 (2018) - B. Firdaus Begam, J. Satheeshkumar, Gyoo-Soo Chae:
Optimized peer to peer QSPR prediction of enthalpy of formation using outlier detection and subset selection. Peer-to-Peer Netw. Appl. 11(6): 1156-1165 (2018) - Yuanguo Bi:
Neighboring vehicle-assisted fast handoff for vehicular fog communications. Peer-to-Peer Netw. Appl. 11(4): 738-748 (2018) - Jiannong Cao, Jingde Cheng, Jianhua Ma, Ju Ren:
Guest editorial: special issue on transparent computing. Peer-to-Peer Netw. Appl. 11(4): 665-667 (2018) - Cheol-Joo Chae, Han-Jin Cho:
Enhanced secure device authentication algorithm in P2P-based smart farm system. Peer-to-Peer Netw. Appl. 11(6): 1230-1239 (2018) - Fei Chen, Haitao Li, Jiangchuan Liu, Bo Li, Ke Xu, Yuemin Hu:
Migrating big video data to cloud: a peer-assisted approach for VoD. Peer-to-Peer Netw. Appl. 11(5): 1060-1074 (2018) - Fei Chen, Detian Zhang, Jian Zhang, Xiaofeng Wang, Lifang Chen, Yuan Liu, Jiangchuan Liu:
Distribution-aware cache replication for cooperative road side units in VANETs. Peer-to-Peer Netw. Appl. 11(5): 1075-1084 (2018) - Nabila Chergui, M. Tahar Kechadi, Salim Chikhi:
Scalability-aware mechanism based on workload prediction in ultra-peer networks. Peer-to-Peer Netw. Appl. 11(3): 431-449 (2018) - Jie Cui, Lili Shao, Hong Zhong, Yan Xu, Lu Liu:
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Netw. Appl. 11(5): 1022-1037 (2018) - Weichao Ding, Chunhua Gu, Fei Luo, Yaohui Chang, Ulysse Rugwiro, Xiaoke Li, Geng Wen:
DFA-VMP: An efficient and secure virtual machine placement strategy under cloud environment. Peer-to-Peer Netw. Appl. 11(2): 318-333 (2018) - Kai Fan, Shuyang Lou, Ruidan Su, Hui Li, Yintang Yang:
Secure and private key management scheme in big data networking. Peer-to-Peer Netw. Appl. 11(5): 992-999 (2018) - Kai Fan, Wei Wang, Wei Jiang, Hui Li, Yintang Yang:
Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Netw. Appl. 11(4): 723-734 (2018) - Kai Fan, Junxiong Wang, Xin Wang, Hui Li, Yintang Yang:
Secure, efficient and revocable data sharing scheme for vehicular fogs. Peer-to-Peer Netw. Appl. 11(4): 766-777 (2018) - Shanshan Ge, Peng Zeng, Rongxing Lu, Kim-Kwang Raymond Choo:
FGDA: Fine-grained data analysis in privacy-preserving smart grid communications. Peer-to-Peer Netw. Appl. 11(5): 966-978 (2018) - Jingjing Guo, Jianfeng Ma, Xinxin Guo, Xinghua Li, Junwei Zhang, Tao Zhang:
Trust-based service composition and selection in service oriented architecture. Peer-to-Peer Netw. Appl. 11(5): 862-880 (2018) - Amit Kumar Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya, Tamal Mondal, Sourav Sanu Shaw:
CTMR-collaborative time-stamp based multicast routing for delay tolerant networks in post disaster scenario. Peer-to-Peer Netw. Appl. 11(1): 162-180 (2018) - Andrei V. Gurtov, Joakim Koskela, Dmitry G. Korzun:
Cyclic ranking in single-resource peer-to-peer exchange. Peer-to-Peer Netw. Appl. 11(3): 632-643 (2018) - Lidong Han, Xiao Tan, Shengbao Wang, Xikun Liang:
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. Peer-to-Peer Netw. Appl. 11(1): 63-73 (2018) - Qiyi Han, Hong Wen, Fang Miao:
Rumor spreading in interdependent social networks. Peer-to-Peer Netw. Appl. 11(5): 955-965 (2018) - Hermine Hovhannisyan, Wen Qi, Kejie Lu, Rongwei Yang, Jianping Wang:
Whispers in the cloud storage: A novel cross-user deduplication-based covert channel design. Peer-to-Peer Netw. Appl. 11(2): 277-286 (2018) - YunJae Jang, JaMee Kim, WonGyu Lee:
Development and application of internet of things educational tool based on peer to peer network. Peer-to-Peer Netw. Appl. 11(6): 1217-1229 (2018) - Yoon-Su Jeong, Seung-Soo Shin:
Fast Fourier transform based efficient data processing technique for big data processing speed enhancement in P2P computing environment. Peer-to-Peer Netw. Appl. 11(6): 1186-1196 (2018) - Sun-Moon Jo, Jungsoo Han:
Convergence P2P cloud computing. Peer-to-Peer Netw. Appl. 11(6): 1153-1155 (2018) - Joo-Chang Kim, Kyungyong Chung:
Mining health-risk factors using PHR similarity in a hybrid P2P network. Peer-to-Peer Netw. Appl. 11(6): 1278-1287 (2018) - Jaeho Kim, Sung-Chan Choi, Jaeseok Yun, Jang-Won Lee:
Towards the oneM2M standards for building IoT ecosystem: Analysis, implementation and lessons. Peer-to-Peer Netw. Appl. 11(1): 139-151 (2018)
skipping 73 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-03 04:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint