default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 71 matches
- 2015
- Asad Ali, Junaid Qadir, Adeel Baig:
Learning automata based multipath multicasting in cognitive radio networks. J. Commun. Networks 17(4): 406-418 (2015) - Ahmad Naseem Alvi, Safdar Hussain Bouk, Syed Hassan Ahmed, Muhammad Azfar Yaqub, Nadeem Javaid, Dongkyun Kim:
Enhanced TDMA based MAC protocol for adaptive data control in wireless sensor networks. J. Commun. Networks 17(3): 247-255 (2015) - Ahmed Ammar, Daryl Reynolds:
An adaptive scheduling scheme for cooperative energy harvesting networks. J. Commun. Networks 17(3): 256-264 (2015) - Erdal Arikan, Najeeb ul Hassan, Michael Lentmaier, Guido Montorsi, Jossy Sayir:
Challenges and some new directions in channel coding. J. Commun. Networks 17(4): 328-338 (2015) - Erdal Arikan, Michael Lentmaier, Guido Montorsi:
Special issue on advances in channel coding. J. Commun. Networks 17(4): 325-327 (2015) - Ejder Bastug, Mehdi Bennis, Engin Zeydan, Manhal Abdel Kader, Ilyas Alper Karatepe, Ahmet Salih Er, Mérouane Debbah:
Big data meets telcos: A proactive caching perspective. J. Commun. Networks 17(6): 549-557 (2015) - Oliver Bredtmann, Andreas Czylwik:
Linear unequal error protection codes based on terminated convolutional codes. J. Commun. Networks 17(1): 12-20 (2015) - Heejung Byun, Sugook Shon, Soomi Yang:
Biologically inspired node scheduling control for wireless sensor networks. J. Commun. Networks 17(5): 506-516 (2015) - Yu Cao, Steven D. Blostein, Wai-Yip Chan:
Optimization of unequal error protection rateless codes for multimedia multicasting. J. Commun. Networks 17(3): 221-230 (2015) - Jau-Yang Chang, Yun-Wei Chen:
A cluster-based relay station deployment scheme for multi-hop relay networks. J. Commun. Networks 17(1): 84-92 (2015) - Kwang-Cheng Chen, Frank H. P. Fitzek, Victor C. M. Leung:
Special issue on mobile social networks. J. Commun. Networks 17(2): 97-99 (2015) - Haiqiang Chen, Lingshan Luo, Youming Sun, Xiangcheng Li, Haibin Wan, Liping Luo, Tuanfa Qin:
Iterative reliability-based modified majority-logic decoding for structured binary LDPC codes. J. Commun. Networks 17(4): 339-345 (2015) - Zhiyong Chen, Xiaodong Xu:
Minimum distance based precoder design for general MIMO systems using Gram matrix. J. Commun. Networks 17(6): 634-646 (2015) - Hyun-Ho Choi, In-Ho Lee, Howon Lee:
Delay analysis of carrier sense multiple access with collision resolution. J. Commun. Networks 17(3): 275-285 (2015) - Jun Won Choi, Byungju Lee, Byonghyo Shim:
Iterative group detection and decoding for large MIMO systems. J. Commun. Networks 17(6): 609-621 (2015) - Bin Dai, A. J. Han Vinck, Yuan Luo, Zheng Ma:
Capacity-equivocation region of a special case of wiretap channel with noiseless feedback. J. Commun. Networks 17(1): 21-26 (2015) - Na Deng, Ming Zhao, Jinkang Zhu, Wuyang Zhou:
Traffic-aware relay sleep control for joint macro-relay network energy efficiency. J. Commun. Networks 17(1): 47-57 (2015) - Yunquan Dong, Chenshuang Zhang, Pingyi Fan, Pingzhi Fan:
Power-space functions in high speed railway wireless communications. J. Commun. Networks 17(3): 231-240 (2015) - Thuy Van T. Duong, Dinh Que Tran:
A fusion of data mining techniques for predicting movement of mobile users. J. Commun. Networks 17(6): 568-581 (2015) - Zhangjie Fu, Xingming Sun, Jie Xi:
Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication. J. Commun. Networks 17(5): 525-533 (2015) - Wu Guan, Liping Liang:
Construction of block-LDPC codes based on quadratic permutation polynomials. J. Commun. Networks 17(2): 157-161 (2015) - Qiang Guo, Pulong Nan, Xiaoyu Zhang, Yuning Zhao, Jian Wan:
Recognition of radar emitter signals based on SVD and AF main ridge slice. J. Commun. Networks 17(5): 491-498 (2015) - Zhu Han, Mehdi Bennis, Dan Wang, Taekyoung Kwon, Shuguang Cui:
Special issue on big data networking-challenges and applications. J. Commun. Networks 17(6): 545-548 (2015) - Pham Thanh Hiep, Nguyen Huy Hoang, Ryuji Kohno:
Performance analysis of multiple-hop wireless body area network. J. Commun. Networks 17(4): 419-427 (2015) - Khuong Ho-Van:
Effect of mutual interference and channel estimation error on outage performance of reactive relay selection in unlicensed systems. J. Commun. Networks 17(4): 362-369 (2015) - Khuong Ho-Van, Paschalis C. Sofotasios, George C. Alexandropoulos, Steven Freear:
Bit error rate of underlay decode-and-forward cognitive networks with best relay selection. J. Commun. Networks 17(2): 162-171 (2015) - Adnan Huremovic, Mesud Hadzialic:
Novel approach to analytical jitter modeling. J. Commun. Networks 17(5): 534-540 (2015) - Md. Shohidul Islam, Cheol Hong Kim, Jong-Myon Kim:
Computationally efficient implementation of a Hamming code decoder using graphics processing unit. J. Commun. Networks 17(2): 198-202 (2015) - Seung Hyun Jeon, Sanghong An, Changwoo Yoon, Hyun-Woo Lee, Jun Kyun Choi:
User centric content management system for open IPTV over SNS. J. Commun. Networks 17(3): 296-305 (2015) - Halefom Kahsay, Yalew Zelalem Jembre, Young-June Choi:
Game-theoretic analysis of selfish secondary users in cognitive radio networks. J. Commun. Networks 17(4): 440-448 (2015)
skipping 41 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-24 09:52 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint