Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2009
- Dinesh Kumar, Tijani Chahed, Eitan Altman:
Analysis of a fountain codes based transport in an 802.11 WLAN cell. ITC 2009: 1-8 - Eitan Altman, Konstantin Avrachenkov, Laura Cottatellucci, Mérouane Debbah, Gaoning He, Alberto Suárez:
Operating point selection in multiple access rate regions. ITC 2009: 1-8 - Andrea Baiocchi:
Variability of service times and throughput efficiency trade-off in IEEE 802.11 DCF. ITC 2009: 1-8 - Anteneh Beshir, Fernando A. Kuipers, Piet Van Mieghem, Ariel Orda:
On-line survivable routing in WDM networks. ITC 2009: 1-8 - Giuseppe Bianchi, Nicola Blefari-Melazzi, Lorenzo Bracciale, Francesca Lo Piccolo, Stefano Salsano:
Fundamental delay bounds in peer-to-peer chunk-based real-time streaming systems. ITC 2009: 1-8 - Thomas Bonald, Sara Oueslati, James W. Roberts, Charlotte Roger:
Swing: Traffic capacity of a simple WDM ring network. ITC 2009: 1-8 - Sem C. Borst, Iraj Saniee, Anwar Walid:
An analytical model for provisioning of emerging personalized content distribution services. ITC 2009: 1-8 - Guillaume Vu Brugier:
Analysis of the impact of early fiber access deployment on residential Internet traffic. ITC 2009: 1-8 - Olivier Brun, Ahmad Al Sheikh, Jean-Marie Garcia:
Flow-level modelling of TCP traffic using GPS queueing networks. ITC 2009: 1-8 - Pedro Casas, Sandrine Vaton, Lionel Fillatre, Thierry Chonavel:
Efficient methods for traffic matrix modeling and on-line estimation in large-scale IP networks. ITC 2009: 1-8 - Yousra Chabchoub, Christine Fricker, Hanene Mohamed:
Analysis of a Bloom Filter algorithm via the supermarket model. ITC 2009: 1-8 - Yiping Chen, Bing Han, Jimmy Leblet, Gwendal Simon, Gilles Straub:
Network-friendly box-powered video delivery system. ITC 2009: 1-8 - Luca Chiaraviglio, Delia Ciullo, Michela Meo, Marco Ajmone Marsan:
Energy-efficient management of UMTS access networks. ITC 2009: 1-8 - Florin Ciucu, Oliver Hohlfeld:
Scaling of buffer and capacity requirements of voice traffic in packet networks. ITC 2009: 1-8 - Costas Courcoubetis, Antonis Dimakis:
Congestion control and pricing of volume intensive applications. ITC 2009: 1-8 - Costas Courcoubetis, Costas Kalogiros, Richard R. Weber:
Optimal call routing in VoIP. ITC 2009: 1-8 - Abdulhalim Dandoush, Sara Alouf, Philippe Nain:
Simulation analysis of download and recovery processes in P2P storage systems. ITC 2009: 1-8 - Mauro Femminella, Roberto Francescangeli, Francesco Giacinti, Emanuele Maccherani, Alessandro Parisi, Gianluca Reali:
Scalability and performance evaluation of a JAIN SLEE-based platform for VoIP services. ITC 2009: 1-8 - Cedric Fortuny, Olivier Brun, Mohamed Zied Ben Hamouda, Jean-Marie Garcia:
Integration of equipment constraints in the capacity-planning process. ITC 2009: 1-8 - Santiago García-Jiménez, Eduardo Magaña, Daniel Morató, Mikel Izal:
Improving efficiency of IP alias resolution based on offsets between IP addresses. ITC 2009: 1-8 - Nasir Ghani, Qing Liu, Rui Wang, Yan Qiao, Chongyang Xie, Srikanth Seethamraju, Ashwin Gumaste:
Dynamic topology overlays for multipoint Ethernet-over-SONET/SDH. ITC 2009: 1-7 - Catherine Gloaguen, Florian Voss, Volker Schmidt:
Parametric distance distributions for fixed access network analysis and planning. ITC 2009: 1-8 - Hamed Haddadi, Damien Fay, Almerima Jamakovic, Olaf Maennel, Andrew W. Moore, Richard Mortier, Steve Uhlig:
On the importance of local connectivity for Internet topology models. ITC 2009: 1-8 - Ali Hamidian, Ulf Körner:
Distributed reservation-based QoS in ad hoc networks with Internet access connectivity. ITC 2009: 1-8 - Martin Heusse, Guillaume Urvoy-Keller, Andrzej Duda:
Layer 2 vs. layer 3 mechanisms for improving TCP performance in 802.11 wireless LANs. ITC 2009: 1-8 - Ivan Wang Hei Ho, Kin K. Leung, John W. Polak:
Connectivity dynamics for vehicular ad-hoc networks in signalized road systems. ITC 2009: 1-8 - Ali Ibrahim, James Roberts:
A traffic-oriented approach for channel assignment in WLAN. ITC 2009: 1-8 - Noriaki Kamiyama:
Efficiently adding link facilities to improve quality stability at failures. ITC 2009: 1-8 - Veeraruna Kavitha, Eitan Altman:
Queuing in space: Design of message ferry routes in static ad hoc networks. ITC 2009: 1-8 - Jung Hwan Kim, Baek-Young Choi, Cory C. Beard:
QoS and channel aware packet bundling for VoIP traffic in cellular networks. ITC 2009: 1-8
skipping 28 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-21 08:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint