Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 40 matches
- 2010
- Syed Vickar Ahamed, Sevki S. Erdogan:
Knowledge, Opportunities and Information Ethics. WiMo 2010: 266-272 - Salah S. Al-Majeed, Martin Fleury:
Multi-connection TFRC Video Streaming in a Concatenated Network: Latency and Video Quality. WiMo 2010: 34-45 - Aysegul Alaybeyoglu, Aylin Kantarci, Kayhan Erciyes:
A Dynamic Distributed Tree Based Tracking Algorithm for Wireless Sensor Networks. WiMo 2010: 295-303 - Maazen Alsabaan, Kshirasagar Naik, Amiya Nayak:
Applying Vehicular Ad Hoc Networks for Reduced Vehicle Fuel Consumption. WiMo 2010: 217-228 - Zhijiang Chang, Georgi Gaydadjiev:
Mirror Routing for Satellite Networks with Cross-Layer Optimization. WiMo 2010: 177-189 - Mert Civriz, Derya Birant, Alp Kut:
The Efficiency of RSA Encrypted Video Calls on Mobile Internet Devices. WiMo 2010: 13-22 - Mustafa Vahabzadeh Dolama, Akbar Ghaffarpour Rahbar:
Performance Evaluation of the Number of Database Accesses in Cellular Networks. WiMo 2010: 46-58 - Ali Mohamed Eljetlawi, Norafida Ithnin:
Existing Recognition Base Usability Features of the Graphical Password. WiMo 2010: 379-388 - Neda Enami, Reza Askari Moghadam, Abolfazl Haghighat:
A Survey on Application of Neural Networks in Energy Conservation of Wireless Sensor Networks. WiMo 2010: 283-294 - Seda Demirag Ersöz, Suzan Bayhan, Fatih Alagöz:
Secure Spectrum Sensing and Decision in Cognitive Radio Networks. WiMo 2010: 99-111 - Rim Haddad, Ridha Bouallegue:
Exact BER Performance of Antenna Array-Based Receiver using Multi-user Detection in a Multipath Channel. WiMo 2010: 241-253 - Mohamed Hamdy El-Eliemy, Abdelouahid Derhab, Birgitta König-Ries:
A Comparison on MANETs' Service Replication Schemes: Interest versus Topology Prediction. WiMo 2010: 202-216 - Elahe Sadat Hosseini, Mahshid Yassaei, Alireza Ejlali, Hamid R. Rabiee, Vahid Esmaeelzadeh:
Joint Reliable and Power-Efficient CDS-Based Topology Control for Wireless Multi-hop Networks. WiMo 2010: 327-337 - Azza Jedidi, Frédéric Weis:
Efficient Scheduling of Low Cost Popular Services over a DVB-SH/3G Network. WiMo 2010: 148-162 - Hong-Jong Jeong, Hongseok Yoo, Dongkyun Kim, Jungsoo Park:
Multipath Routing Based on Path Bandwidth in Multi-channel Wireless Mesh Networks. WiMo 2010: 1-12 - Péter Kenyeres, Attila Szentgyörgyi, Tamás Mészáros, Gábor Fehér:
BotSpot: Anonymous and Distributed Malware Detection. WiMo 2010: 59-70 - Murat Koyuncu, Mehmet Kazim Gercek, Tuncay Ercan:
Host Based Dynamic Throughput Maximization Model for IEEE 802.11 WLAN. WiMo 2010: 315-326 - Satria Mandala, Md. Asri Ngadi, Abdul Hanan Abdullah, Abdul Samad bin Haji Ismail:
A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol. WiMo 2010: 87-98 - Natarajan Meghanathan:
On the Time between Successive Multi-path Discoveries and Hop Count Per Multi-path for Zone-Disjoint Routing in Mobile Ad Hoc Networks. WiMo 2010: 254-265 - Rakesh Kumar Mishra, Sankhayan Choudhury, Nabendu Chaki:
E2IRP: A New Energy Efficient Integrated Routing Protocol for MANET. WiMo 2010: 23-33 - Michael R. Peterson, Syed Vickar Ahamed, Sevki S. Erdogan:
Structure and Communication of Knowledge. WiMo 2010: 367-378 - Barbaros Preveze, Aysel Safak:
Throughput Maximisation of Different Signal Shapes Working on 802.16e Mobile Multihop Network Using Novel Cognitive Methods. WiMo 2010: 71-86 - Shawon S. M. Rahman, Syed Vickar Ahamed:
Intelligent Network Applications for Medical Systems. WiMo 2010: 409-416 - Shawon S. M. Rahman, Syed Vickar Ahamed, Sevki S. Erdogan:
IT Security Assessment for Interdisciplinary Research. WiMo 2010: 356-366 - Mohamed Rasslan, Amr M. Youssef:
A Bilinear Pairing Based Hidden-Signature Scheme. WiMo 2010: 389-397 - Samia Saidi, Yahya Slimani:
Enhancing Web Caching Using Web Usage Mining Techniques. WiMo 2010: 425-435 - John Strassner, Sung-Su Kim, James Won-Ki Hong:
Semantic Routing for Improved Network Management in the Future Internet. WiMo 2010: 163-176 - Anas Abu Taleb, Jimson Mathew, Dhiraj K. Pradhan:
Clustered De Bruijn Based Multi Layered Architectures for Sensor Networks. WiMo 2010: 123-136 - Fatma Tansu, Muhammed Salamah:
Vertical Handoff Decision Schemes for Heteregeneous Wireless Networks: An Overview. WiMo 2010: 338-348 - Rafael Augusto Teixeira, Marcos Antônio Cavenaghi, Renata Spolon Lobato, Roberta Spolon Ulson:
Proposal of an On-demand Software Deployment System Based on Application Streaming, Virtualization Techniques and P2P Transport. WiMo 2010: 417-424
skipping 10 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-17 22:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint