Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2017
- Fadi Al-Turjman:
Price-based data delivery framework for dynamic and pervasive IoT. Pervasive Mob. Comput. 42: 299-316 (2017) - Gianluca Aloi, Orazio Briante, Marco Di Felice, Giuseppe Ruggeri, Stefano Savazzi:
The SENSE-ME platform: Infrastructure-less smartphone connectivity and decentralized sensing for emergency management. Pervasive Mob. Comput. 42: 187-208 (2017) - Pouria Amirian, Francois van Loggerenberg, Trudie Lang, Arthur Thomas, Rosanna Peeling, Anahid Basiri, Steven N. Goodman:
Using big data analytics to extract disease surveillance information from point of care diagnostic machines. Pervasive Mob. Comput. 42: 470-486 (2017) - Eugenio Cesario, Carmela Comito, Domenico Talia:
An approach for the discovery and validation of urban mobility patterns. Pervasive Mob. Comput. 42: 77-92 (2017) - Carmela Comito, Domenico Talia:
Energy consumption of data mining algorithms on mobile phones: Evaluation and prediction. Pervasive Mob. Comput. 42: 248-264 (2017) - Maria Efthymiopoulou, Nikolaos Efthymiopoulos, Konstantinos Deltouzos, Athanasios Christakidis:
Robust control in cloud assisted peer to peer live streaming systems. Pervasive Mob. Comput. 42: 426-443 (2017) - Mai ElSherief, Babak Alipour, Mimonah Al Qathrady, Tamer A. ElBatt, Ahmed H. Zahran, Ahmed Helmy:
A Novel Mathematical Framework for Similarity-based Opportunistic Social Networks. Pervasive Mob. Comput. 42: 134-150 (2017) - Ketema Adere Gemeda, Gabriele Gianini, Mulugeta Libsie:
An evolutionary cluster-game approach for Wireless Sensor Networks in non-collaborative settings. Pervasive Mob. Comput. 42: 209-225 (2017) - Fei Gu, Jianwei Niu, Sajal K. Das, Zhenxue He, Xin Jin:
Detecting breathing frequency and maintaining a proper running rhythm. Pervasive Mob. Comput. 42: 498-512 (2017) - Itay Hazan, Asaf Shabtai:
Dynamic radius and confidence prediction in grid-based location prediction algorithms. Pervasive Mob. Comput. 42: 265-284 (2017) - Hsiang-Jen Hong, Ge-Ming Chiu, Wan-Yu Tsai:
A single quadtree-based algorithm for top-k spatial keyword query. Pervasive Mob. Comput. 42: 93-107 (2017) - Daisuke Kasamatsu, Peizhao Hu, Mohan Kumar:
Effective opportunistic dissemination of spatio-temporal contents in mobile environments. Pervasive Mob. Comput. 42: 27-44 (2017) - Ioannis Katsidimas, Sotiris E. Nikoletseas, Theofanis P. Raptis, Christoforos L. Raptopoulos:
An algorithmic study in the vector model for Wireless Power Transfer maximization. Pervasive Mob. Comput. 42: 108-123 (2017) - Igor Lazov:
An Uncertainty Quantification methodology for Broadband Wireless Access systems. Pervasive Mob. Comput. 42: 151-165 (2017) - QianQian Li, Sarada Prasad Gochhayat, Mauro Conti, Fangai Liu:
EnergIoT: A solution to improve network lifetime of IoT devices. Pervasive Mob. Comput. 42: 124-133 (2017) - Zhijian Lin, Lianfen Huang, Yifeng Zhao, Xiaojiang Du, Mohsen Guizani:
P2P-based resource allocation with coalitional game for D2D networks. Pervasive Mob. Comput. 42: 487-497 (2017) - Leonardo Maccari, Nicolò Facchi, Luca Baldesi, Renato Lo Cigno:
Optimized P2P streaming for wireless distributed networks. Pervasive Mob. Comput. 42: 335-350 (2017) - Mohamed Ayoub Messous, Hichem Sedjelmaci, Sidi-Mohammed Senouci:
Implementing an emerging mobility model for a fleet of UAVs based on a fuzzy logic inference system. Pervasive Mob. Comput. 42: 393-410 (2017) - Matteo Mordacchini, Andrea Passarella, Marco Conti:
A social cognitive heuristic for adaptive data dissemination in mobile Opportunistic Networks. Pervasive Mob. Comput. 42: 371-392 (2017) - Jan Pennekamp, Martin Henze, Klaus Wehrle:
A survey on the evolution of privacy enforcement on smartphones and the road ahead. Pervasive Mob. Comput. 42: 58-76 (2017) - Sarah Masud Preum, Md. Abu Sayeed Mondol, Meiyi Ma, Hongning Wang, John A. Stankovic:
Preclude2 : Personalized conflict detection in heterogeneous health applications. Pervasive Mob. Comput. 42: 226-247 (2017) - Silvia Elena Restrepo, Jorge E. Pezoa, Mahshid Rahnamay-Naeini:
A model for optimal service allocation in a smart environment. Pervasive Mob. Comput. 42: 45-57 (2017) - João Rufino, Muhammad Alam, João Almeida, Joaquim Ferreira:
Software defined P2P architecture for reliable vehicular communications. Pervasive Mob. Comput. 42: 411-425 (2017) - Saifur Rahman Sabuj, Masanori Hamamura:
Outage and energy-efficiency analysis of cognitive radio networks: A stochastic approach to transmit antenna selection. Pervasive Mob. Comput. 42: 444-469 (2017) - José Santa, Pedro J. Fernández:
Seamless IPv6 connectivity for two-wheelers. Pervasive Mob. Comput. 42: 526-541 (2017) - Kun-Lin Tsai, Fang-Yie Leu:
Secure data-sharing using distributed environmental matching keys. Pervasive Mob. Comput. 42: 513-525 (2017) - Lipeng Wan, Qing Cao, Wenjun Zhou:
Optimizing the performance of sensor network programs through estimation-based code profiling. Pervasive Mob. Comput. 42: 285-298 (2017) - King-Hang Wang, Chien-Ming Chen, Weicheng Fang, Tsu-Yang Wu:
A secure authentication scheme for Internet of Things. Pervasive Mob. Comput. 42: 15-26 (2017) - Nawel Yessad, Siham Bouchelaghem, Farah-Sarah Ouada, Mawloud Omar:
Secure and reliable patient body motion based authentication approach for medical body area networks. Pervasive Mob. Comput. 42: 351-370 (2017) - Zhenning Zhang, Baokang Zhao, Wanrong Yu, Chunqing Wu:
Supporting location/identity separation in mobility-enhanced satellite networks by virtual attachment point. Pervasive Mob. Comput. 42: 1-14 (2017)
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-09 06:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint