Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 80 matches
- 2012
- Satyam Agarwal, Rajeev Kumar Shakya, Yatindra Nath Singh, Amitabha Roy:
DSAT-MAC: Dynamic slot allocation based TDMA MAC protocol for Cognitive Radio Networks. WOCN 2012: 1-6 - Jayashree Agrakhed, G. S. Biradar, V. D. Mytri:
Cluster based path constraint adaptive multipath routing protocol in WMSN. WOCN 2012: 1-5 - Rohit Agrawal, Saumitra Mohan:
Complete industrial solution for automation in temperature and humidity monitoring using labview. WOCN 2012: 1-5 - H. M. Vijay Anand, G. Varaprasad:
Dynamic key management method for wireless sensor networks. WOCN 2012: 1-5 - M. Balamurugan, J. Bhuvana, S. Chenthur Pandian:
Shared and secured data partitioning for privacy preserving of collaborative file transfer in multi path computational mining. WOCN 2012: 1-7 - Urmila Bhanja, Debajyoti Mishra:
Comparison of metaheuristic approaches for impairment aware transparent optical networks. WOCN 2012: 1-6 - Archana Bhise, Prakash D. Vyavahare:
Modified turbo codes for next generation wireless networks. WOCN 2012: 1-6 - Suman Sankar Bhunia, Dilip Kanti Sikder, Sarbani Roy, Nandini Mukherjee:
A comparative study on routing schemes of IP based wireless sensor network. WOCN 2012: 1-5 - Anand Bora, Abrar Chapalgaonkar, Nikhil Dalshania, Aditya Bhongle:
2D and 3D air mouse. WOCN 2012: 1-4 - Amrita Brahmachari, Roy P. Paily:
Low power 2.4 GHz RF transmitter for satellite subsystem using CORDIC based frequency translator. WOCN 2012: 1-5 - Kamal Bunkar, Singh Umesh Kumar, Pandya Bhupendra K., Rajesh Bunkar:
Data mining: Prediction for performance improvement of graduate students using classification. WOCN 2012: 1-5 - N. S. Chandolikar, V. D. Nandavadekar:
Efficient algorithm for intrusion attack classification by analyzing KDD Cup 99. WOCN 2012: 1-5 - Shubhajeet Chatterjee, Soumyanil Banerjee, Arijit Mondal, Joydeep Saha:
A novel connectivity control scheme for next generation wireless system by using Short Coverage Antennas. WOCN 2012: 1-6 - Shubhajeet Chatterjee, Soumyanil Banerjee, Arijit Mondal, Joydeep Saha:
A region based channel allocation scheme for LEO satellite communication. WOCN 2012: 1-6 - Archana Chaudhary, Savita Kolhe, Raj Kamal:
Machine learning techniques for Mobile Intelligent Systems: A study. WOCN 2012: 1-5 - Lokesh Chouhan, Aditya Trivedi:
Priority based MAC scheme for cognitive radio network: A queuing theory modelling. WOCN 2012: 1-5 - Dharmendra Choukse, Umesh Kumar Singh, Lokesh Laddhani, Rekha Shahapurkar:
Designing secure email infrastructure. WOCN 2012: 1-9 - Manoranjan Das, Banoj Kumar Panda, Benudhar Sahu:
Performance analysis of effect of transmission power in mobile ad hoc network. WOCN 2012: 1-5 - Alok K. Das, Biplab K. Ray:
A simple card to backplane polymeric optical high speed interconnect coupler for computer motherboards. WOCN 2012: 1-6 - Vivek S. Deshpande, Jagdish B. Helonde, Vijay Wadhai:
Dependency analysis of energy in wireless sensor networks. WOCN 2012: 1-6 - Rajni Dubey, Sanjeev Sharma, Lokesh Chouhan:
Secure and trusted algorithm for cognitive radio network. WOCN 2012: 1-7 - Jigyasu Dubey, Vrinda Tokekar:
A framework for pure Peer-to-Peer computing system. WOCN 2012: 1-5 - Ashish Goel, Ankit Nagpal, Jasmeet Kaur:
Optimized data allocation & combining scheme for ICI self cancellation in OFDM systems. WOCN 2012: 1-4 - Ratna Gour, Raksha Upadhyay:
Time and frequency synchronization techniques for OFDM systems. WOCN 2012: 1-6 - Sanjeev Kumar Gupta, Neeraj Jain, Poonam Sinha:
A density control energy balanced clustering technique for randomly deployed wireless sensor network. WOCN 2012: 1-5 - Shobhita Gupta, Shashikala Tapaswi:
Spectrum sharing in Multi-hop cognitive radio networks with optimal power control. WOCN 2012: 1-5 - Thanveer Jahan, Gugulothu Narsimha, C. V. Guru Rao:
Data perturbation and feature selection in preserving privacy. WOCN 2012: 1-6 - Abhishek Jain, Santosh Easo:
An enhance approach for Web Services Discovery with QoS. WOCN 2012: 1-3 - Dheryta Jaisinghani:
Swift - A low complexity protocol for event & location tracking in Wireless Sensor Networks. WOCN 2012: 1-5 - Shubham Joshi, Durgesh Kumar Mishra:
A survey on threats in routing security in manet for trust management using SMC protocols. WOCN 2012: 1-6
skipping 50 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 12:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint