Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 44 matches
- 2005
- Kemal Akkaya, Mohamed F. Younis:
A survey on routing protocols for wireless sensor networks. Ad Hoc Networks 3(3): 325-349 (2005) - Ian F. Akyildiz, Dario Pompili, Tommaso Melodia:
Underwater acoustic sensor networks: research challenges. Ad Hoc Networks 3(3): 257-279 (2005) - Julien Cartigny, François Ingelrest, David Simplot-Ryl, Ivan Stojmenovic:
Localized LMST and RNG based minimum-energy broadcast protocols in ad hoc networks. Ad Hoc Networks 3(1): 1-16 (2005) - Ana R. Cavalli, Jean-Marie Orset:
Secure hosts auto-configuration in mobile ad hoc networks. Ad Hoc Networks 3(5): 656-667 (2005) - King Sun Chan, Kwan Lawrence Yeung, Wenjian Shao:
Contention-based MAC protocols with erasure coding for wireless data networks. Ad Hoc Networks 3(4): 495-506 (2005) - Yuanzhu Peter Chen, Arthur L. Liestman:
Maintaining weakly-connected dominating sets for clustering ad hoc networks. Ad Hoc Networks 3(5): 629-642 (2005) - Romit Roy Choudhury, Nitin H. Vaidya:
Performance of ad hoc routing using directional antennas. Ad Hoc Networks 3(2): 157-173 (2005) - Marco Conti, Enrico Gregori:
Ad hoc networking for pervasive systems. Ad Hoc Networks 3(2): 115-117 (2005) - Carlos de M. Cordeiro, Sachin Abhyankar, Dharma P. Agrawal:
An enhanced and energy efficient communication architecture for Bluetooth wireless PANs. Ad Hoc Networks 3(2): 119-140 (2005) - Fei Dai, Qing Dai, Jie Wu:
Power efficient routing trees for ad hoc wireless networks using directional antenna. Ad Hoc Networks 3(5): 621-628 (2005) - Mohamed Eltoweissy, Ashraf Wadaa, Stephan Olariu, Larry Wilson:
Group key management scheme for large-scale sensor networks. Ad Hoc Networks 3(5): 668-688 (2005) - Hannes Frey, Daniel Görgen:
Planar graph routing on geographical clusters. Ad Hoc Networks 3(5): 560-574 (2005) - Takahiro Fujiwara, Takashi Watanabe:
An ad hoc networking scheme in hybrid networks for emergency communications. Ad Hoc Networks 3(5): 607-620 (2005) - Hossam S. Hassanein, Tiantong You, Hussein T. Mouftah:
Infrastructure-based MAC in wireless mobile ad-hoc networks. Ad Hoc Networks 3(6): 717-743 (2005) - Chunyu Hu, Jennifer C. Hou:
A link-indexed statistical traffic prediction approach to improving IEEE 802.11 PSM. Ad Hoc Networks 3(5): 529-545 (2005) - Fei Hu, Neeraj K. Sharma:
Security considerations in ad hoc sensor networks. Ad Hoc Networks 3(1): 69-89 (2005) - Brent Ishibashi, Raouf Boutaba:
Topology and mobility considerations in mobile ad hoc networks. Ad Hoc Networks 3(6): 762-776 (2005) - I. Karthigeyan, B. S. Manoj, C. Siva Ram Murthy:
A distributed laxity-based priority scheduling scheme for time-sensitive traffic in mobile ad hoc networks. Ad Hoc Networks 3(1): 27-50 (2005) - Fabius Klemm, Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K. Tripathi:
Improving TCP performance in ad hoc networks using signal strength based link management. Ad Hoc Networks 3(2): 175-191 (2005) - Bernd Lamparter, Marc Plaggemeier, Dirk Westhoff:
Estimating the value of co-operation approaches for multi-hop ad hoc networks. Ad Hoc Networks 3(1): 17-26 (2005) - Justin Lipman, Mehran Abolhasan, Paul Boustead, Joe F. Chicharo:
An optimised resource aware approach to information collection in ad hoc networks. Ad Hoc Networks 3(5): 643-655 (2005) - Hai Liu, Xiaohua Jia, Deying Li, Chan-Hee Lee:
Bandwidth guaranteed call admission in TDMA/CDMA ad hoc wireless networks. Ad Hoc Networks 3(6): 689-701 (2005) - Jain-Shing Liu, Chun-Hung Richard Lin:
Energy-efficiency clustering protocol in wireless sensor networks. Ad Hoc Networks 3(3): 371-388 (2005) - Raquel A. F. Mini, Max do Val Machado, Antonio Alfredo Ferreira Loureiro, Badri Nath:
Prediction-based energy map for wireless sensor networks. Ad Hoc Networks 3(2): 235-253 (2005) - Daniele Miorandi, Stefano Vitturi:
A wireless extension of Profibus DP based on the Bluetooth radio system. Ad Hoc Networks 3(4): 479-494 (2005) - Jelena V. Misic, Vojislav B. Misic, Ka Lok Chan:
Talk and let talk: performance of Bluetooth piconets with synchronous traffic. Ad Hoc Networks 3(4): 451-477 (2005) - Jelena V. Misic, Shairmina Shafi, Vojislav B. Misic:
The impact of MAC parameters on the performance of 802.15.4 PAN. Ad Hoc Networks 3(5): 509-528 (2005) - Kousha Moaveninejad, Wen-Zhan Song, Xiang-Yang Li:
Robust position-based routing for wireless ad hoc networks. Ad Hoc Networks 3(5): 546-559 (2005) - Pietro Michiardi, Refik Molva:
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks. Ad Hoc Networks 3(2): 193-219 (2005) - Peng Ning, Kun Sun:
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6): 795-819 (2005)
skipping 14 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 06:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint