Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 312 matches
- 2008
- William Acosta, Surendar Chandra:
Exploiting the Properties of Query Workload and File Name Distributions to Improve P2P Synopsis-Based Searches. INFOCOM 2008: 2467-2475 - Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan:
A Novel Quantitative Approach For Measuring Network Security. INFOCOM 2008: 1957-1965 - Satyajeet Ahuja, Srinivasan Ramasubramanian, Marwan Krunz:
SRLG Failure Localization in All-Optical Networks Using Monitoring Cycles and Paths. INFOCOM 2008: 700-708 - Umut Akyol, Matthew Andrews, Piyush Gupta, John D. Hobby, Iraj Saniee, Alexander L. Stolyar:
Joint Scheduling and Congestion Control in Mobile Ad-Hoc Networks. INFOCOM 2008: 619-627 - Haithem Al-Mefleh, J. Morris Chang:
A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices. INFOCOM 2008: 2056-2064 - Richard Alimi, Li (Erran) Li, Ramachandran Ramjee, Harish Viswanathan, Yang Richard Yang:
iPack: in-Network Packet Mixing for High Throughput Wireless Mesh Networks. INFOCOM 2008: 66-70 - Eitan Altaian, Yezekael Hayel:
A Stochastic Evolutionary Game of Energy Management in a Distributed Aloha Network. INFOCOM 2008: 1759-1767 - Eitan Altman, Konstantin Avrachenkov, Andrey Garnaev:
Closed Form Solutions for Symmetric Water Filling Games. INFOCOM 2008: 673-681 - David Amzallag, Reuven Bar-Yehuda, Danny Raz, Gabriel Scalosub:
Cell Selection in 4G Cellular Networks. INFOCOM 2008: 700-708 - Animashree Anandkumar, Lang Tong, Ananthram Swami, Anthony Ephremides:
Minimum Cost Data Aggregation with Localized Processing for Statistical Inference. INFOCOM 2008: 780-788 - Matthew Andrews, Lisa Zhang:
Satisfying Arbitrary Delay Requirements in Multihop Networks. INFOCOM 2008: 116-120 - Matthew Andrews, Lisa Zhang:
Creating Templates to Achieve Low Delay in Multi-Carrier Frame-Based Wireless Data Systems. INFOCOM 2008: 861-869 - Vijay Arya, Nick G. Duffield, Darryl Veitch:
Temporal Delay Tomography. INFOCOM 2008: 276-280 - Ehsan Aryafar, Omer Gurewitz, Edward W. Knightly:
Distance-1 Constrained Channel Assignment in Single Radio Wireless Mesh Networks. INFOCOM 2008: 762-770 - François Baccelli, Giovanna Carofiglio, Serguei Foss:
Proxy Caching in Split TCP: Dynamics, Stability and Tail Asymptotics. INFOCOM 2008: 131-135 - Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten-Hwang Lai, Weijia Jia:
Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks. INFOCOM 2008: 296-300 - Anirban Banerjee, Dhiman Barman, Michalis Faloutsos, Laxmi N. Bhuyan:
Cyber-Fraud is One Typo Away. INFOCOM 2008: 1939-1947 - Ron Banner, Ariel Orda:
Multi-Objective Topology Control in Wireless Networks. INFOCOM 2008: 448-456 - Nikhil Bansal, Ranjita Bhagwan, Navendu Jain, Yoonho Park, Deepak S. Turaga, Chitra Venkatramani:
Towards Optimal Resource Allocation in Partial-Fault Tolerant Applications. INFOCOM 2008: 1319-1327 - Emrah Bayraktaroglu, Christopher King, Xin Liu, Guevara Noubir, Rajmohan Rajaraman, Bishal Thapa:
On the Performance of IEEE 802.11 under Jamming. INFOCOM 2008: 1265-1273 - Yigal Bejerano:
Simple and Efficient k-Coverage Verification without Location Information. INFOCOM 2008: 291-295 - Yigal Bejerano, Dongwook Lee, Prasun Sinha, Lisa Zhang:
Approximation Algorithms for Scheduling Real-Time Multicast Flows in Wireless LANs. INFOCOM 2008: 2092-2100 - Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. INFOCOM 2008: 2297-2305 - Jun Bi, Jianping Wu, Wenmao Zhang:
A Trust and Reputation based Anti-SPIM Method. INFOCOM 2008: 2485-2493 - Bartlomiej Blaszczyszyn, Bozidar Radunovic:
Using Transmit-Only Sensors to Reduce Deployment Cost of Wireless Sensor Networks. INFOCOM 2008: 1202-1210 - Jean-Chrysostome Bolot, Marc Lelarge:
A New Perspective on Internet Security using Insurance. INFOCOM 2008: 1948-1956 - Dario Bonfiglio, Marco Mellia, Michela Meo, Nicolo Ritacca, Dario Rossi:
Tracking Down Skype Traffic. INFOCOM 2008: 261-265 - Ioannis Broustis, Angelos Vlavianos, Prashant Krishnamurthy, Srikanth V. Krishnamurthy:
CTU: Capturing Throughput Dependencies in UWB Networks. INFOCOM 2008: 412-420 - Willem de Bruijn, Herbert Bos:
Beltway Buffers: Avoiding the OS Traffic Jam. INFOCOM 2008: 136-140 - Lin X. Cai, Lin Cai, Xuemin Shen, Jon W. Mark:
Optimizing Distributed MAC Protocol for Multi-Hop Ultra-Wideband Wireless Networks. INFOCOM 2008: 1912-1920
skipping 282 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 23:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint