Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 56 matches
- 2007
- Waqas Ahmad, Irfan Awan, Makoto Takizawa:
An Adaptive Call Admission Control Approach for Multimedia 3G Network. NBiS 2007: 446-455 - Salvador Alcaraz, Katja Gilly, Carlos Juiz, Ramón Puigjaner:
A Token Bucket Model with Assured Forwarding for Web Traffic. NBiS 2007: 298-307 - Markus Aleksy, Martin Schader, Christian Seifried, Makoto Takizawa:
Empirical Study of Design Pattern Usage in Peer-to-Peer Systems. NBiS 2007: 335-344 - Yuebin Bai, Haixing Ji, Huabin Lu, Chao Li, Qi Zou, Peng Lv:
Design of the Middleware Enabling Context Awareness and Energy Optimizing for Smart Environment. NBiS 2007: 177-186 - Leonard Barolli, Arjan Durresi, Fatos Xhafa, Akio Koyama:
A Fuzzy-Based Speed-Aware Handoff System for Wireless Cellular Networks. NBiS 2007: 513-522 - Valbona Barolli, Heihachiro Fukuda, Leonard Barolli, Makoto Takizawa:
Guidelines for Network Service Pricing: An Extended Model Considering Increase of Network Users. NBiS 2007: 227-237 - Erianto Chai, Minoru Uehara, Hideki Mori, Nobuyoshi Sato:
Virtual Large-Scale Disk System for PC-Room. NBiS 2007: 476-485 - Chin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan:
A Secure Authentication Scheme for a Public Terminal Before a Transaction. NBiS 2007: 118-126 - Kuang-Hui Chi, Ji-Han Jiang, Yu-Ching Hsu:
Multigroup Rekeying for a Wireless Network. NBiS 2007: 147-156 - Po-Jen Chuang, Chu-Sing Yang, Ming-Chao Chiang:
Distribution of Lecture Concepts and Relations in Digital Contents. NBiS 2007: 167-176 - Walter Colitti, Kris Steenhaut, Ann Nowé, Jan Lemeire:
Multilayer Quality and Grade of Service Support for High Speed GMPLS IP/DWDM Networks. NBiS 2007: 187-196 - Tuyet-Tram Dang-Ngoc, Nicolas Travers:
Tree Graph Views for a Distributed Pervasive Environment. NBiS 2007: 406-415 - Arjan Durresi, Arben Merkoci, Mimoza Durresi, Leonard Barolli:
Integrated Biomedical System for Ubiquitous Health Monitoring. NBiS 2007: 397-405 - Sylvia B. Encheva, Sharil Tumin:
Positive and Negative Authorizations to Access Protected Web Resources. NBiS 2007: 79-87 - Sylvia B. Encheva, Sharil Tumin:
Application of Default Logic in an Intelligent Tutoring System. NBiS 2007: 486-494 - Tomoya Enokido, Valbona Barolli, Makoto Takizawa:
Role-Based Scheduling and Synchronization Algorithms to Prevent Illegal Information Flow. NBiS 2007: 238-247 - David C. Faye, Gilles Nachouki, Patrick Valduriez:
Semantic Query Routing in SenPeer, a P2P Data Management System. NBiS 2007: 365-374 - Krzysztof Gierlowski, Krzysztof Nowicki:
Wireless Networks as an Infrastructure for Mission-Critical Business Applications. NBiS 2007: 49-58 - Oliver Haase, Alfred Toth, Jürgen Wäsch:
A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications. NBiS 2007: 355-364 - Kai Han, Binoy Ravindran, E. Douglas Jensen:
Byzantine-Tolerant, Information Propagation in Untrustworthy and Unreliable Networks. NBiS 2007: 207-216 - Matthias Häsel:
Rich Internet Architectures for Browser-Based Multiplayer Real-Time Games - Design and Implementation Issues of virtual-kicker.com. NBiS 2007: 157-166 - Ludmila Himmelspach, Mehmet Kolac, Krasimir Kutsarov, Alexander Chernin, Christopher Popfinger, Stefan Conrad:
COMICS: A Global Constraint Manager for Interactive Component Database Systems. NBiS 2007: 217-226 - Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng:
A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept. NBiS 2007: 137-146 - Makoto Ikeda, Giuseppe De Marco, Leonard Barolli:
A Simple Statistical Methodology for Testing Ad Hoc Networks. NBiS 2007: 1-10 - Zhefan Jiang, Sangwook Kim:
Trust Model for Mobile Devices in Ubiquitous Environment. NBiS 2007: 426-434 - Jung-Hyun Kim, Kwang-Seok Hong:
WPS and Voice-XML-Based Multi-Modal Fusion Agent Using SNNR and Fuzzy Value. NBiS 2007: 523-532 - Iksu Kim, Myungho Kim:
The DecoyPort: Redirecting Hackers to Honeypots. NBiS 2007: 59-68 - Young-Duk Kim, Yeon-Mo Yang, Dong-Ha Lee:
A Solution for Congestion and Performance Enhancement by Dynamic Packet Bursting in Mobile Ad Hoc Networks. NBiS 2007: 325-334 - Natalia Kryvinska, Peter Zinterhof, Do Van Thanh:
An Analytical Approach to the Efficient Real-Time Events/Services Handling in Converged Network Environment. NBiS 2007: 308-316 - Yeu-Pong Lai, Jui-Heng Tai:
Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard. NBiS 2007: 69-78
skipping 26 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-07 06:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint