Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 50 matches
- 2005
- Kemal Akkaya, Mohamed F. Younis, Meenakshi Bangad:
Sink repositioning for enhanced performance in wireless sensor networks. Comput. Networks 49(4): 512-534 (2005) - Fahd Alharbi, Nirwan Ansari:
Distributed bandwidth allocation for resilient packet ring networks. Comput. Networks 49(2): 161-171 (2005) - Anwar Alyatama:
Wavelength decomposition approach for computing blocking probabilities in WDM optical networks without wavelength conversions. Comput. Networks 49(6): 727-742 (2005) - Daniel Amyot, Luigi Logrippo, Michael Weiss:
Generation of test purposes from Use Case Maps. Comput. Networks 49(5): 643-660 (2005) - Aline Baggio, Maarten van Steen:
Distributed redirection for the World-Wide Web. Comput. Networks 49(6): 743-765 (2005) - Nigel G. Bean, André Costa:
An analytic modelling approach for network routing algorithms that use "ant-like" mobile agents. Comput. Networks 49(2): 243-268 (2005) - Claudio Casetti, Marco Mellia:
A lightweight marker with partial state information for DiffServ networks. Comput. Networks 49(4): 541-560 (2005) - Xiaolin Chang, Jogesh K. Muppala:
On improving bandwidth assurance in AF-based DiffServ networks using a control theoretic approach. Comput. Networks 49(6): 816-839 (2005) - Tianwei Chen, Michel Sortais, Günter Schäfer, Stefan Adams, Changpeng Fan, Adam Wolisz:
Performance analysis of a Denial of Service protection scheme for optimized and QoS-aware handover. Comput. Networks 49(3): 449-464 (2005) - Tat Wing Chim, Kwan L. Yeung, King-Shan Lui:
Traffic distribution over equal-cost-multi-paths. Comput. Networks 49(4): 465-475 (2005) - Mark Claypool:
The effect of latency on user performance in Real-Time Strategy games. Comput. Networks 49(1): 52-70 (2005) - Özgür Erçetin, Leandros Tassiulas:
Pricing strategies for differentiated services content delivery networks. Comput. Networks 49(6): 840-855 (2005) - Joachim Fischer, Eckhardt Holz, Andreas Prinz, Markus Scheidgen:
Tool-based language development. Comput. Networks 49(5): 676-688 (2005) - Ingmar Fliege, Alexander Geraldy, Reinhard Gotzhein, Thomas Kuhn, Christian Webel:
Developing safety-critical real-time systems with SDL design patterns and components. Comput. Networks 49(5): 689-706 (2005) - Ingo Forkel, Hartmut Klenner, Andreas Kemper:
High Speed Downlink Packet Access (HSDPA) - Enhanced Data Rates for UMTS Evolution. Comput. Networks 49(3): 325-340 (2005) - Vittorio Ghini, Giovanni Pau, Marco Roccetti, Paola Salomoni, Mario Gerla:
For here or to go? Downloading music on the move with an ultra reliable wireless Internet application. Comput. Networks 49(1): 4-26 (2005) - Javier Gozálvez, John Dunlop:
System performance and adaptive configuration of link adaptation techniques in packet-switched cellular radio networks. Comput. Networks 49(3): 404-426 (2005) - Patrick Herhold, Ernesto Zimmermann, Gerhard P. Fettweis:
Cooperative multi-hop transmission in wireless networks. Comput. Networks 49(3): 299-324 (2005) - Ian Herwono, Joachim Sachs, Ralf Keller:
Provisioning and performance of mobility-aware personalized push services in wireless broadband hotspots. Comput. Networks 49(3): 364-384 (2005) - Dieter Hogrefe, Rick Reed:
Telecommunications and UML languages. Comput. Networks 49(5): 622-626 (2005) - Christian Hoymann:
Analysis and performance evaluation of the OFDM-based metropolitan area network IEEE 802.16. Comput. Networks 49(3): 341-363 (2005) - Ioannis Ioannidis, Ananth Grama:
Level compressed DAGs for lookup tables. Comput. Networks 49(2): 147-160 (2005) - Riccardo Lancellotti, Francesca Mazzoni, Michele Colajanni:
Hybrid cooperative schemes for scalable and stable performance of Web content delivery. Comput. Networks 49(4): 492-511 (2005) - Kang-Won Lee, Bong-Jun Ko, Seraphin B. Calo:
Adaptive server selection for large scale interactive online games. Comput. Networks 49(1): 84-102 (2005) - Alexander A. Letichevsky, Julia V. Kapitonova, A. A. Letichevsky Jr., Vladislav A. Volkov, Sergey Baranov, Thomas Weigert:
Basic protocols, message sequence charts, and the verification of requirements specifications. Comput. Networks 49(5): 661-675 (2005) - Marco Liebsch, Bernd Lamparter:
A generic IP paging architecture and protocol. Comput. Networks 49(3): 427-448 (2005) - Fei Long, Gang Feng, Chee Kheong Siew:
Channel states dependent fair service: a new packet scheduling algorithm for CDMA. Comput. Networks 49(2): 201-216 (2005) - Rongxing Lu, Zhenfu Cao:
Efficient remote user authentication scheme using smart card. Comput. Networks 49(4): 535-540 (2005) - Chenghuai Lu, André L. M. dos Santos:
A note on efficient implementation of prime generation algorithms in small portable devices. Comput. Networks 49(4): 476-491 (2005) - Harsha V. Madhyastha, Girish V. Chowdhary, N. Srinivas, C. Siva Ram Murthy:
Grooming of multicast sessions in metropolitan WDM ring networks. Comput. Networks 49(4): 561-579 (2005)
skipping 20 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 12:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint