Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 129 matches
- 2013
- Imeddine Ben Abid, Noureddine Boudriga:
Game theory for misbehaving detection in wireless sensor networks. ICOIN 2013: 60-65 - Nuredin Ali Salem Ahmed, Adel Emhemmed, Khaled Elgaid:
Dual-radios hypermesh network based on CSMA protocol. ICOIN 2013: 198-203 - Saleem Ahmed, Sooyoung Kim:
An efficient iterative detection scheme for coded MIMO systems. ICOIN 2013: 440-443 - Hyochun Ahn, Youn Seo, Jaebeom Kim, Young-Bae Ko, Cheolhyo Lee, Chang-Joo Kim:
Multi-metric geo-routing protocol for tactical ad hoc networks. ICOIN 2013: 89-94 - Camila S. Barbosa, Vinicius C. M. Borges, Sand Correa, Kleber Vieira Cardoso:
An evolution-inspired algorithm for efficient dynamic spectrum selection. ICOIN 2013: 175-180 - Ramzi Bellazreg, Noureddine Boudriga, Sunshin An:
Border surveillance using sensor based thick-lines. ICOIN 2013: 221-226 - Vijayashree Budyal, Sunilkumar S. Manvi, S. G. Hiremath:
Agent driven multi-constrained quality of service anycast routing in mobile ad hoc networks. ICOIN 2013: 391-396 - ByungRae Cha, JongWon Kim:
Security tactics for secured cloud computing resources. ICOIN 2013: 473-475 - Chi-Shih Chao, Szu-Pei Lu:
An adaptive probe selection mechanism for k-link fault diagnosis on all-optical mesh networks. ICOIN 2013: 204-209 - Sheng-Chang Chen, Chung-Ju Chang, Yu-Huang Chu:
A fuzzy cache lifetime determination scheme for LISP mapping systems. ICOIN 2013: 297-302 - Sanon Chimmanee:
PACS metric based on regression for evaluating end-to-end QoS capability over the Internet for telemedicine. ICOIN 2013: 359-364 - Sanon Chimmanee:
An effect of variable distance on IP camera performance implemented on WLAN robot. ICOIN 2013: 572-577 - Sanon Chimmanee, Puttinun Patpituck:
Analysis in the internet traffic pattern based on RTT over ADSL in Thailand. ICOIN 2013: 583-588 - Sanon Chimmanee, Puttinun Patpituck:
Picture archiving and communication system (PACS) characteristic on wired-line and wireless network for traffic simulation. ICOIN 2013: 589-594 - Seungoh Choi, Kwangsoo Kim, Seongmin Kim, Byeong-Hee Roh:
Threat of DoS by interest flooding attack in content-centric networking. ICOIN 2013: 315-319 - Eunhye Choi, Hyunggon Park:
Transformation based low complexity algorithm for Nash bargaining solutions in dynamic networks. ICOIN 2013: 365-370 - Kwang-Soon Choi, Young-Choong Park, Byoung-Ha Park, Sung Hee Hong, KwangMo Jung:
FPGA implementation of human emotion reasoning engine. ICOIN 2013: 157-162 - Hyun-Dong Chu, Hyunjung Kim, Seung-Joon Seok:
Flow based 3G/WLAN vertical handover scheme using MIH model. ICOIN 2013: 658-663 - Yao-Liang Chung:
A green rate-and-power control transmission scheme in multi-carrier base stations. ICOIN 2013: 192-197 - Yao-Liang Chung:
Green dynamic configuration in two-tier LTE femtocell networks. ICOIN 2013: 551-555 - Amit Kumar Das, Tamal Adhikary, Md. Abdur Razzaque, Choong Seon Hong:
An intelligent approach for virtual machine and QoS provisioning in cloud computing. ICOIN 2013: 462-467 - Claudio M. de Farias, Luci Pirmez, Flávia Coimbra Delicato, Wei Li, Albert Y. Zomaya, José Neuman de Souza:
A scheduling algorithm for shared sensor and actuator networks. ICOIN 2013: 648-653 - Adriano Fiorese, Paulo Simões, Fernando Boavida:
Approach for service search and peer selection in P2P service overlays. ICOIN 2013: 303-308 - Tapio Frantti, Hannu Hietalahti, Reijo Savola:
Requirements of secure WSN-MCN edge router. ICOIN 2013: 210-215 - Tapio Frantti, Mikko Majanen:
Real-time traffic control for multihomed devices. ICOIN 2013: 113-118 - Kwang-Chun Go, Jae-Ryong Cha, Seong Keun Oh, Jae-Hyun Kim:
End-to-end performance analysis based on cross-layer retransmission scheme in wireless communication system. ICOIN 2013: 141-144 - Miguel Angel Patino Gonzalez, Takeshi Higashino, Minoru Okada:
Radio access considerations for data offloading with multipath TCP in cellular/WiFi networks. ICOIN 2013: 680-685 - Markus Hager, Maik Debes, Sebastian Schellenberg, Jochen Seitz:
IP-based access to sensor networks enabled by a transparent proxy server. ICOIN 2013: 623-627 - Yang Han, Kei'ichi Koyanagi, Takeshi Tsuchiya, Tadashi Miyosawa, Hiroo Hirose:
A trust-based routing strategy in structured P2P overlay networks. ICOIN 2013: 77-82 - Junguye Hong, Myoungbeom Chung, Hyunseung Choo:
Novel bulletin board system based on document object model and client-side scripting for improved interaction. ICOIN 2013: 511-516
skipping 99 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 09:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint