Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2007
- Marcelo Bagnulo, Alberto García-Martínez, Arturo Azcorra:
Fault Tolerant Scalable Support for Network Portability and Traffic Engineering. WWIC 2007: 129-140 - Irene de Bruin, Frank Brouwer, Neill Whillans, Yusun Fu, Youqian Xiao:
Performance Analysis of VoIP over HSDPA in a Multi-cell Environment. WWIC 2007: 177-188 - Eduardo Cerqueira, Luis Veloso, Paulo Mendes, Edmundo Monteiro:
Seamless Handover for Multi-user Sessions with QoS and Connectivity Support. WWIC 2007: 79-90 - Wei Koong Chai, Merkourios Karaliopoulos, George Pavlou:
Providing Relative Service Differentiation to TCP Flows over Split-TCP Geostationary Bandwidth on Demand Satellite Networks. WWIC 2007: 17-29 - Sangho Choe:
CDMA Power Control Using Channel Prediction in Mobile Fading Channels. WWIC 2007: 370-379 - Luca De Cicco, Saverio Mascolo, Vittorio Palmisano:
An Experimental Investigation of the Congestion Control Used by Skype VoIP. WWIC 2007: 153-164 - Tran Thanh Dai, Choong Seon Hong:
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks. WWIC 2007: 235-246 - Roman Dunaytsev, Konstantin Avrachenkov, Yevgeni Koucheryavy, Jarmo Harju:
An Analytical Comparison of the Slow-but-Steady and Impatient Variants of TCP New Reno. WWIC 2007: 30-42 - Esteban Egea-López, Javier Vales-Alonso, Alejandro S. Martínez-Sala, M. Victoria Bueno-Delgado, Joan García-Haro:
Performance Evaluation of Non-persistent CSMA as Anti-collision Protocol for Active RFID Tags. WWIC 2007: 279-289 - Laura Marie Feeney, Bilge Cetin, Daniel Hollos, Martin Kubisch, Seble Mengesha, Holger Karl:
Multi-rate Relaying for Performance Improvement in IEEE 802.11 WLANs. WWIC 2007: 201-212 - Stylianos Georgoulas, George Pavlou, Panos Trimintzios, Kin-Hon Ho:
Admission Control for Inter-domain Real-Time Traffic Originating from Differentiated Services Stub Domains. WWIC 2007: 115-128 - Oscar F. Gonzalez, Michael P. Howarth, George Pavlou:
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks. WWIC 2007: 302-314 - Ehsan Hamadani, Veselin Rakocevic:
TCP Contention Control: A Cross Layer Approach to Improve TCP Performance in Multihop Ad Hoc Networks. WWIC 2007: 1-16 - Hooman Javaheri, Guevara Noubir, Yin Wang:
Cross-Layer Distributed Diversity for Heterogeneous Wireless Networks. WWIC 2007: 259-270 - Jinoo Joung:
Feasibility of Supporting Real-Time Traffic in DiffServ Architecture. WWIC 2007: 189-200 - Maria Kihl, Mihail L. Sichitiu, Ted Ekeroth, Michael Rozenberg:
Reliable Geographical Multicast Routing in Vehicular Ad-Hoc Networks. WWIC 2007: 315-325 - Nak-Myeong Kim, Hee-Jeong Chung, Mee-Ran Kim, Hye-In Yu:
An Efficient Heterogeneous Wireless Access Based on Region and Time Partitioning in D-TDD OFDM Systems. WWIC 2007: 346-357 - Mee-Ran Kim, Eun-Ju Kim, Yeon-Joo Kang, Nak-Myeong Kim:
Cognitive Radio Based Bandwidth Sharing Among Heterogeneous OFDM Access Systems. WWIC 2007: 358-369 - Hyun-Ki Kim, Tae-Jin Lee:
A Flexible Tree-Based Routing Protocol with a Mesh Relaying Node in Multi-hop Wireless Mesh Networks. WWIC 2007: 326-337 - Ki-Chang Lee, Tae-Hyun Moon:
An Interference-Robust Transmission Method for OFDMA Uplink. WWIC 2007: 338-345 - Sun-Hee Lim, Ki-Seok Bang, Okyeon Yi, Jongin Lim:
A Secure Handover Protocol Design in Wireless Networks with Formal Verification. WWIC 2007: 67-78 - Yi Liu, Mingxiu Li, Bo Yang, Depei Qian, Weiguo Wu:
Handover for Seamless Stream Media in Mobile IPv6 Network. WWIC 2007: 55-66 - Panagiotis Papadimitriou, Vassilis Tsaoussidis:
A Quality Adaptation Scheme for Internet Video Streams. WWIC 2007: 165-176 - Yuansong Qiao, Enda Fallon, Liam Murphy, John Murphy, Austin Hanley, Xiaosong Zhu, Adrian Matthews, Eoghan Conway, Gregory Hayes:
SCTP Performance Issue on Path Delay Differential. WWIC 2007: 43-54 - Georgios Rodolakis, Amina Meraihi Naimi, Anis Laouiti:
Multicast Overlay Spanning Tree Protocol for Ad Hoc Networks. WWIC 2007: 290-301 - Sunghoon Seo, SuKyoung Lee, JooSeok Song:
Location-Aware Signaling Protocol for WWAN and WLAN Interworking. WWIC 2007: 271-278 - Pedro Nuno Miranda de Sousa, Miguel Rocha, Miguel Rio, Paulo Cortez:
Class-Based OSPF Traffic Engineering Inspired on Evolutionary Computation. WWIC 2007: 141-152 - Emrah Tomur, Y. Murat Erten:
Security and Service Quality Analysis for Cluster-Based Wireless Sensor Networks. WWIC 2007: 103-114 - Francesco Vacirca, Andrea Baiocchi:
Characterization of Service Times Burstiness of IEEE 802.11 DCF. WWIC 2007: 223-234 - Iván Vidal, Francisco Valera, Jaime García-Reinoso, Arturo Azcorra, Vitor Pinto, Vítor Ribeiro:
QoS and Authentication Experiences in a Residential Environment Within a Broadband Access Framework. WWIC 2007: 91-102
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 06:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint