default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 606 matches
- 2024
- Robin Abraham, M. Vadivel:
Ultra-scalable ensemble clustering with simulated annealing based coot bird routing protocol for WSN. Int. J. Commun. Networks Distributed Syst. 30(5): 523-549 (2024) - Midde Adiseshaiah, Sailaja Maruvada:
A network packet classification engine for real-time applications with enhanced performance. Int. J. Commun. Networks Distributed Syst. 30(2): 115-135 (2024) - Deepak Bishla, Brijesh Kumar:
Metaheuristic based segment routing for hybrid software-defined network under heterogeneous environment. Int. J. Commun. Networks Distributed Syst. 30(5): 550-571 (2024) - Mahfuzulhoq Chowdhury:
Searchlight: a novel data delivery cost-aware multi-mode data transmission scheme with best-fit resource allocation for 6G underwater sensor networks applications. Int. J. Commun. Networks Distributed Syst. 30(3): 343-373 (2024) - Maroti Deshmukh, Arjun Singh Rawat:
Secure key exchange protocol using graph and trusted third party. Int. J. Commun. Networks Distributed Syst. 30(4): 393-412 (2024) - Peng Geng, Zixin Ye, Huizhen Hao, Annan Yang, Yan Liu:
Robustness of complex networks considering load and cascading failure under edge-removal attack. Int. J. Commun. Networks Distributed Syst. 30(5): 572-593 (2024) - Sandeep Chand Kumain, Maroti Deshmukh, Maheep Singh:
Extended Diffie-Hellman protocol based on exponential and multiplication operations over modular arithmetic. Int. J. Commun. Networks Distributed Syst. 30(4): 486-499 (2024) - R. Anil Kumar:
A low complexity enhanced squirrel search algorithm for reduction of peak to average power ratio in OFDM systems. Int. J. Commun. Networks Distributed Syst. 30(5): 594-616 (2024) - Jing Li, Mohd Shahizan Othman, Hewan Chen, Lizawati Mi Yusuf:
A critical review of feature selection methods for machine learning in IoT security. Int. J. Commun. Networks Distributed Syst. 30(3): 264-312 (2024) - Yonghua Luo, Qian Ning, Bingcai Chen, Xinzhi Zhou, Linyu Huang:
STAGNN: a spatial-temporal attention graph neural network for network traffic prediction. Int. J. Commun. Networks Distributed Syst. 30(4): 413-432 (2024) - Ranjan Kumar Mahapatra, Yajunath Kaliyath, N. S. V. Shet, Soumya Ranjan Mahapatro, Gnane Swarnadh Satapathi, Sankata Bhanjan Prusty, B. Shivalal Patro:
A survey on wireless sensor network (applications and architecture). Int. J. Commun. Networks Distributed Syst. 30(2): 136-201 (2024) - Sarandis Mitropoulos:
Developing policy hierarchies for an effective distributed systems and network management: a case study in a videoconference service. Int. J. Commun. Networks Distributed Syst. 30(1): 85-113 (2024) - Sarandis Mitropoulos:
Optimisation techniques in policy hierarchies for managing distributed systems and networks. Int. J. Commun. Networks Distributed Syst. 30(4): 467-485 (2024) - Shariq Murtuza, Krishna Asawa:
Detection and mitigation of link flooding-based DDoS attacks on a software defined network using network function virtualisation. Int. J. Commun. Networks Distributed Syst. 30(2): 202-226 (2024) - Yugbhanu Rajwade, Divy Arpit, K. Jairam Naik:
Applications of Bluetooth and Wi-Fi-Direct for local communication and their performance evaluation. Int. J. Commun. Networks Distributed Syst. 30(3): 243-263 (2024) - S. Rakhi, Kanakanahalli Ramanna Shobha:
An enhanced priority-based multi-hop clustering algorithm for vehicular ad hoc networks. Int. J. Commun. Networks Distributed Syst. 30(1): 42-69 (2024) - Sandeep Singh Rana, Gaurav Verma, O. P. Sahu:
Effect of user mobility under Rician fading on power allocation for non-orthogonal multiple access strategy. Int. J. Commun. Networks Distributed Syst. 30(1): 70-84 (2024) - Kalpana Samal, Shanta Kumari Sunanda, Debasish Jena, Srikanta Patnaik:
A secured lightweight authentication protocol for vehicular ad hoc network using blind signature. Int. J. Commun. Networks Distributed Syst. 30(4): 500-521 (2024) - H. K. Sampada, K. R. Shobha:
Cluster-based multiple malicious node detection using honeypot-AODV in MANETs. Int. J. Commun. Networks Distributed Syst. 30(1): 1-29 (2024) - Roma Saxena, Akhtar Husain:
Energy efficient and lifetime aware clustering and routing using improved rabbit optimisation algorithm in WSN. Int. J. Commun. Networks Distributed Syst. 30(5): 617-638 (2024) - Matheus Monteiro Silveira, Maria C. M. M. Ferreira, Rafael L. Gomes:
Elastic demand network slicing based on fuzzy multi-criteria. Int. J. Commun. Networks Distributed Syst. 30(5): 639-655 (2024) - Edward R. Sykes, Alec DiVito:
An objective comparison of two prominent virtual actor frameworks: Proto.Actor and Orleans. Int. J. Commun. Networks Distributed Syst. 30(3): 313-342 (2024) - Haiyan Wang, Xinmin Li, Feiying Luo, Jiahui Li, Xiaoqiang Zhang:
Subcarrier power control for URLLC communication system via multi-agent deep reinforcement learning in IoT network. Int. J. Commun. Networks Distributed Syst. 30(3): 374-392 (2024) - Yilihamu Yaermaimaiti, Tianxing Yan, Tusongjiang Kari:
Asymmetric multi-period deep residual network face age estimation. Int. J. Commun. Networks Distributed Syst. 30(2): 227-242 (2024) - Flavien Donkeng Zemo, Sara Bakkali:
A survey on security threats in cognitive radio networks based on cooperative spectrum sensing. Int. J. Commun. Networks Distributed Syst. 30(4): 433-466 (2024) - Xiuhong Zhou, Wenbing Shi:
Research on the optimisation of whitelisting technology for network firewall in industrial control system using genetic algorithm. Int. J. Commun. Networks Distributed Syst. 30(1): 30-41 (2024) - 2023
- Hazem H. Abdulmajeed, Hesham A. Hefny, Assem Ahmed Alsawy:
A learning-based approach to improving multicast network performance. Int. J. Commun. Networks Distributed Syst. 29(6): 631-652 (2023) - Ahmad Abrar, Ahmad Suki Che Mohamed Arif, Khuzairi Mohd Zaini:
Internet of things producer mobility management in named data networks: a survey, outlook, and open issues. Int. J. Commun. Networks Distributed Syst. 29(5): 493-512 (2023) - Abdulwadood Mohamed Othman Alawadhi, Mohd. Hasbullah Omar, Noradila Nordin:
IEEE 802.15.4 MAC protocol optimisation in body sensor networks: a survey, outlook and open issues. Int. J. Commun. Networks Distributed Syst. 29(3): 315-340 (2023) - Abdul Ali, M. Vadivel:
Energy efficient congestion control in wireless sensor networks using meta-heuristic algorithms. Int. J. Commun. Networks Distributed Syst. 29(4): 448-473 (2023)
skipping 576 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-14 07:22 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint