Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 177 matches
- 2019
- Xiangyang Li, Huiqi Liu, Lan Zhang, Zhenan Wu, Yaochen Xie, Ge Chen, Chunxiao Wan, Zhongwei Liang:
Finding the Stars in the Fireworks: Deep Understanding of Motion Sensor Fingerprint. IEEE/ACM Trans. Netw. 27(5): 1945-1958 (2019) - Qing He, György Dán, Viktoria Fodor:
Joint Assignment and Scheduling for Minimizing Age of Correlated Information. IEEE/ACM Trans. Netw. 27(5): 1887-1900 (2019) - Pablo Garrido, Douglas J. Leith, Ramón Agüero:
Joint Scheduling and Coding for Low In-Order Delivery Delay Over Lossy Paths With Delayed Feedback. IEEE/ACM Trans. Netw. 27(5): 1987-2000 (2019) - Tong Yang, Haowei Zhang, Jinyang Li, Junzhi Gong, Steve Uhlig, Shigang Chen, Xiaoming Li:
HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows. IEEE/ACM Trans. Netw. 27(5): 1845-1858 (2019) - Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish:
Zero-Day Signature Extraction for High-Volume Attacks. IEEE/ACM Trans. Netw. 27(2): 691-706 (2019) - Satyam Agarwal, Francesco Malandrino, Carla-Fabiana Chiasserini, Swades De:
VNF Placement and Resource Allocation for the Support of Vertical Services in 5G Networks. IEEE/ACM Trans. Netw. 27(1): 433-446 (2019) - Mehmet Fatih Aktas, Emina Soljanin:
Straggler Mitigation at Scale. IEEE/ACM Trans. Netw. 27(6): 2266-2279 (2019) - Abubakr O. Al-Abbasi, Vaneet Aggarwal, Moo-Ryong Ra:
Multi-Tier Caching Analysis in CDN-Based Over-the-Top Video Streaming Systems. IEEE/ACM Trans. Netw. 27(2): 835-847 (2019) - Wahhab Albazrqaoe, Jun Huang, Guoliang Xing:
A Practical Bluetooth Traffic Sniffing System: Design, Implementation, and Countermeasure. IEEE/ACM Trans. Netw. 27(1): 71-84 (2019) - Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud. IEEE/ACM Trans. Netw. 27(2): 560-576 (2019) - Orly Avner, Shie Mannor:
Multi-User Communication Networks: A Coordinated Multi-Armed Bandit Approach. IEEE/ACM Trans. Netw. 27(6): 2192-2207 (2019) - Vaibhav Bajpai, Jürgen Schönwälder:
A Longitudinal View of Dual-Stacked Websites - Failures, Latency and Happy Eyeballs. IEEE/ACM Trans. Netw. 27(2): 577-590 (2019) - Arjun Bakshi, Lu Chen, Kannan Srinivasan, C. Emre Koksal, Atilla Eryilmaz:
EMIT: An Efficient MAC Paradigm for the Internet of Things. IEEE/ACM Trans. Netw. 27(4): 1572-1583 (2019) - Luca Baldesi, Athina Markopoulou, Carter T. Butts:
Spectral Graph Forge: A Framework for Generating Synthetic Graphs With a Target Modularity. IEEE/ACM Trans. Netw. 27(5): 2125-2136 (2019) - Marco Di Bartolomeo, Valentino Di Donato, Maurizio Pizzonia, Claudio Squarcella, Massimo Rimondini:
Extracting Routing Events From Traceroutes: A Matter of Empathy. IEEE/ACM Trans. Netw. 27(3): 1000-1012 (2019) - Ran Ben Basat, Xiaoqi Chen, Gil Einziger, Roy Friedman, Yaron Kassner:
Randomized Admission Policy for Efficient Top-k, Frequency, and Volume Estimation. IEEE/ACM Trans. Netw. 27(4): 1432-1445 (2019) - Cataldo Basile, Fulvio Valenza, Antonio Lioy, Diego R. López, Antonio Pastor Perales:
Adding Support for Automatic Enforcement of Security Policies in NFV Networks. IEEE/ACM Trans. Netw. 27(2): 707-720 (2019) - Ahmed M. Bedewy, Yin Sun, Ness B. Shroff:
The Age of Information in Multihop Networks. IEEE/ACM Trans. Netw. 27(3): 1248-1257 (2019) - Yigal Bejerano, Chandrashekhar Raman, Chun-Nam Yu, Varun Gupta, Craig Gutterman, Tomas Young, Hugo Infante, Yousef Abdelmalek, Gil Zussman:
DyMo: Dynamic Monitoring of Large-Scale LTE-Multicast Systems. IEEE/ACM Trans. Netw. 27(1): 258-271 (2019) - Siddhartha S. Borkotoky, Michael B. Pursley:
Fountain-Coded Broadcast Distribution in Multiple-Hop Packet Radio Networks. IEEE/ACM Trans. Netw. 27(1): 29-41 (2019) - Ahmed Boubrima, Walid Bechkit, Hervé Rivano:
On the Deployment of Wireless Sensor Networks for Air Quality Mapping: Optimization Models and Algorithms. IEEE/ACM Trans. Netw. 27(4): 1629-1642 (2019) - Taha Bouchoucha, Chen-Nee Chuah, Zhi Ding:
Topology Inference of Unknown Networks Based on Robust Virtual Coordinate Systems. IEEE/ACM Trans. Netw. 27(1): 405-418 (2019) - Semih Cayci, Atilla Eryilmaz:
Optimal Learning for Dynamic Coding in Deadline-Constrained Multi-Channel Networks. IEEE/ACM Trans. Netw. 27(3): 1043-1054 (2019) - Cheng-Shang Chang, Duan-Shin Lee, Chun Wang:
Asynchronous Grant-Free Uplink Transmissions in Multichannel Wireless Networks With Heterogeneous QoS Guarantees. IEEE/ACM Trans. Netw. 27(4): 1584-1597 (2019) - Bijoy Chand Chatterjee, Fujun He, Eiji Oki, Andrea Fumagalli, Naoaki Yamanaka:
A Span Power Management Scheme for Rapid Lightpath Provisioning and Releasing in Multi-Core Fiber Networks. IEEE/ACM Trans. Netw. 27(2): 734-747 (2019) - Guo Chen, Yuanwei Lu, Bojie Li, Kun Tan, Yongqiang Xiong, Peng Cheng, Jiansong Zhang, Thomas Moscibroda:
MP-RDMA: Enabling RDMA With Multi-Path Transport in Datacenters. IEEE/ACM Trans. Netw. 27(6): 2308-2323 (2019) - Chen Chen, Lei Liu, Tie Qiu, Dapeng Oliver Wu, Zhiyuan Ren:
Delay-Aware Grid-Based Geographic Routing in Urban VANETs: A Backbone Approach. IEEE/ACM Trans. Netw. 27(6): 2324-2337 (2019) - Qian Chen, Xiaojuan Zhang, Wei Lih Lim, Yuen Sam Kwok, Sumei Sun:
High Reliability, Low Latency and Cost Effective Network Planning for Industrial Wireless Mesh Networks. IEEE/ACM Trans. Netw. 27(6): 2354-2362 (2019) - Linsong Cheng, Jiliang Wang:
Walls Have No Ears: A Non-Intrusive WiFi-Based User Identification System for Mobile Devices. IEEE/ACM Trans. Netw. 27(1): 245-257 (2019) - Zicheng Chi, Yan Li, Hongyu Sun, Yao Yao, Ting Zhu:
Concurrent Cross-Technology Communication Among Heterogeneous IoT Devices. IEEE/ACM Trans. Netw. 27(3): 932-947 (2019)
skipping 147 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-06 13:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint