Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,856 matches
- 2016
- Hamida Qumber Ali, Sayeed Ghani:
A Comparative Analysis of Protocols for Integrating IP and Wireless Sensor Networks. J. Networks 11(01): 1-10 (2016) - Gérard Chalhoub, Eric Perrier de La Bathie, Michel Misson:
Overhead caused by WiFi on ZigBee Networks using Slotted CSMA/CA. J. Networks 11(2): 39-45 (2016) - Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
Intelligent Sampling Using an Optimized Neural Network. J. Networks 11(01): 16-27 (2016) - Rendy Munadi, Doan Perdana, Asep Mulyana:
Adaptive Control Channel Interval in VANET Based on Mobility Model and Queuing Network Analysis. J. Networks 11(2): 62-68 (2016) - Khosrow Ramezani, Elankayer Sithirasenan, Kaile Su:
Functional Analysis of EAP-CRA. J. Networks 11(01): 28-38 (2016) - P. Ranjana, A. George:
Hybrid Edge Capacity Routing in Complex Networks. J. Networks 11(01): 11-15 (2016) - Sinh Cong Lam, Kumbesan Sandrasegaran:
Analytical Coverage Probability of a Typical User In Heterogeneous Cellular Networks. J. Networks 11(2): 56-61 (2016) - Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Jianrong Bao:
Methods for Improving the Rate of Secret Key Generation based on Wireless Channel Characteristics. J. Networks 11(2): 46-55 (2016) - 2015
- Saja Al-Mamoori, Arunita Jaekel, Subir Bandyopadhyay, Sriharsha Varanasi:
Security-Aware Dynamic RWA for Reducing In-band and Out-of-band Jamming Attacks in WDM Optical Networks. J. Networks 10(11): 587-596 (2015) - Mohammed A. Al-Maqri, Mohamed Othman, Borhanuddin Mohd Ali, Zurina Mohd Hanapi:
Providing Dynamic TXOP for QoS Support of Video Transmission in IEEE 802.11e WLANs. J. Networks 10(9): 501-511 (2015) - Muhammad Morshed Alam, Muhammad Yeasir Arafat, Feroz Ahmed:
Study on Auto Detecting Defence Mechanisms against Application Layer Ddos Attacks in SIP Server. J. Networks 10(6): 344-352 (2015) - Tareq Alhmiedat:
A Survey on Environmental Monitoring Systems using Wireless Sensor Networks. J. Networks 10(11): 606-615 (2015) - Bader Alkandari, Kaveh Pahlavan:
A Novel Approach for Performance Analysis of Multi-Rate Relay Networks. J. Networks 10(12): 627-632 (2015) - Mohammad Alshayeji, Desiree Noela Dias, M. D. Samrajesh:
Enhanced Chunk Regulation Algorithm for Superior QoS in Heterogeneous P2P Video on Demand. J. Networks 10(10): 567-578 (2015) - Min Kyung An, Hyuk Cho:
Efficient Data Collection in Interference-Aware Wireless Sensor Networks. J. Networks 10(12): 658-667 (2015) - Khairul Anshar, Nanna Suryana Herman, Zahriah Othman, Safiza Suhana Kamal Baharin:
Different Geospatial Data on Hybrid Map Application. J. Networks 10(7): 413-419 (2015) - Inderdeep Kaur Aulakh, Renu Vig:
Secondary User Aggressiveness Optimization in Sensing-Transmission Scheduling for Cognitive Radio Networks. J. Networks 10(10): 543-550 (2015) - Asmidar Abu Bakar, Elmunzir Hassan El Talib:
Formulating Heterogeneous Access Control model for MANET Emergency Services. J. Networks 10(7): 407-412 (2015) - Adil Benabbou, Abdelali Boushaba, Azeddine Zahi, Rachid Benabbou, Mohammed Oumsis, Saïd El Alaoui Ouatik:
NCA: New Cooperative Algorithm for Reducing Topology Control Packets in OLSR. J. Networks 10(3): 125-133 (2015) - Fouad Benamrane, Mouad Ben Mamoun, Rédouane Benaini:
Performances of OpenFlow-Based Software-Defined Networks: An overview. J. Networks 10(6): 329-337 (2015) - Anchit Bijalwan, Mohammad Wazid, Emmanuel S. Pilli, Ramesh Chandra Joshi:
Forensics of Random-UDP Flooding Attacks. J. Networks 10(5): 287-293 (2015) - Igor Bisio, Alessandro Delfino, Stefano Delucchi, Fabio Lavagetto, Mario Marchese, Giancarlo Portomauro, Sandro Zappatore:
Hybrid Simulated-Emulated Platform for Heterogeneous Access Networks Performance Investigations. J. Networks 10(4): 265-272 (2015) - Igor Bisio, Stefano Delucchi, Fabio Lavagetto, Mario Marchese:
Performance Comparison of Network Selection Algorithms in the Framework of the 802.21 Standard. J. Networks 10(01): 51-59 (2015) - Kamanashis Biswas, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Kalvinder Singh:
An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks. J. Networks 10(11): 616-624 (2015) - Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Verifying Online User Identity using Stylometric Analysis for Short Messages. J. Networks 10(12): 675-683 (2015) - Coskun Cetinkaya:
Asynchronous Multi-Channel MAC Protocol. J. Networks 10(9): 530-542 (2015) - Zenon Chaczko, Shaher Suleman Slehat, Alex Salmon:
Application of Predictive Analytics in Telecommunications Project Management. J. Networks 10(10): 551-566 (2015) - Zhixiang Chen, Jinjie Hu, Feilong Cao:
Learning Algorithm of Neural Networks on Spherical Cap. J. Networks 10(3): 152-158 (2015) - Shiwei Chen, Chenhui Jin:
An Improved Way to Construct the Parity-check Equations in Fast Correlation Attacks. J. Networks 10(8): 443-447 (2015) - Kai-Wayne Chuang, Chien-Nan Lin:
Replenishment Policies for Deteriorating Items with Ramp Type Demand and a Fixed Shelf-Life under Shortage. J. Networks 10(8): 470-476 (2015)
skipping 1,826 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-09 07:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint