Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 188 matches
- 2024
- Jianhang Liu, Xinyao Wang, Haibin Zhai, Shibao Li, Xuerong Cui, Qian Zhang:
A method of vehicle networking environment information sharing based on distributed fountain code. Int. J. Intell. Networks 5: 19-29 (2024) - Ziyang Zhang, Lin Guan, Qinggang Meng:
A Hybrid Deep Reinforcement Learning Routing Method Under Dynamic and Complex Traffic with Software Defined Networking. AINA (6) 2024: 183-192 - Jin Li, Min Wei, Chengjie Huo, Keecheon Kim:
A Time-Sensitive Networking Traffic Scheduling Method Based on Q-Learning Routing Optimization. IMCOM 2024: 1-6 - 2023
- Diego Mauricio Freire Bastidas:
A methodological approach to routing protocol design and evaluation in opportunistic networking. Autonomous University of Barcelona, Spain, 2023 - Huimin Gao, Bo Jiang, Hong Xu, Siji Chen:
The low latency networking method for task-driven MEC-enabled UAV swarm. Comput. Commun. 211: 104-118 (2023) - Junhui Jiang, Yuting Li, Xiongfeng Zhang, Mengmeng Yu, Changdae Lee, Seung Ho Hong:
Assessing the traffic scheduling method for time-sensitive networking (TSN) by practical implementation. J. Ind. Inf. Integr. 33: 100464 (2023) - Ridha Muldina Negara, Nana Rachmana Syambas, Eueung Mulyana:
C3CPS: CRITIC-CoCoSo-based caching placement strategy using multi-criteria decision method for efficient content distribution in Named Data Networking. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101714 (2023) - S. Chanti, T. Chithralekha:
RGF-Bot: A Novel Feature Selection Method to Identify Malicious Bot Accounts on Social Networking Sites Using Machine Learning. SN Comput. Sci. 4(6): 843 (2023) - Mohammad Soltani, Behrang Barekatain, Faramarz Hendesi, Zahra Beheshti:
FSCN: a novel forwarding method based on Shannon entropy and COPRAS decision process in named data networking. J. Supercomput. 79(14): 15324-15357 (2023) - Ágata Salvador, Gabriela Fonseca, Leonor Pereira da Costa, Shivani Atul Mansuklal:
"Feed" or "Unfeed"?: The Role of Social Networking Sites Use in the Link Between Identity Commitment Development and Psychological Functioning in Emerging Adulthood. J. Media Psychol. Theor. Methods Appl. 35(5): 303-315 (2023) - Fengchen Gong, Divya Raghunathan, Aarti Gupta, Maria Apostolaki:
Towards Integrating Formal Methods into ML-Based Systems for Networking. HotNets 2023: 48-55 - Heng Wang, Jianxiu Wang, Wen Qi, Chengli Mei, Xu Xia:
Survey on Dynamic Routing Networking Methods in Integrated Satellite-Terrestrial Network. ICCC Workshops 2023: 1-5 - Hangjia Dong, Tuanjie Li:
Extenics Networking Method of Generalized Deployable Units. ICIRA (3) 2023: 468-483 - Dipesh Panchal, Chandni Patel, Bhavesh Soni:
IR Drop Mitigation Methodologies in 90nm Technology Node for Networking Chip. iSES 2023: 43-46 - Allen Hong, Yahui Li, Han Zhang, Ming Wang, Changqing An, Jilong Wang:
A cheap and accurate delay-based IP Geolocation method using Machine Learning and Looking Glass. IFIP Networking 2023: 1-9 - Yijing Zhang, Hui Xue, Jianjun Lin, Xiaoyu Liu, Weilin Gai, Xiaodu Yang, Anqi Wang, Yinliang Yue, Bo Sun:
ER-ERT:A Method of Ensemble Representation Learning of Encrypted RAT Traffic. IFIP Networking 2023: 1-10 - 2022
- Durkadevi Kannan, Revathi Thiyagarajan:
Entropy based TOPSIS method for controller selection in software defined networking. Concurr. Comput. Pract. Exp. 34(1) (2022) - Jintao Chen, Binruo Zhu, Fang Zhao, Ruili Huang:
Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking. Int. J. Inf. Secur. Priv. 16(2): 1-20 (2022) - Yun Gao:
New energy vehicle engine speed control method based on vehicle networking technology. J. Comput. Methods Sci. Eng. 22(6): 2201-2215 (2022) - Ruilin Wang, Xin Wang, Ping Xie, Muhua Liu, Xuhui Zhao, Mingchuan Zhang:
DSEA: A Traffic Control Method of Information Center Networking Based on Multi-objective Genetic Algorithms. J. Netw. Syst. Manag. 30(4): 1-27 (2022) - Libing Deng, Xiongren Xiao, Hong Liu, Renfa Li, Guoqi Xie:
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking. J. Syst. Archit. 129: 102586 (2022) - Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Rosilah Hassan, Norhisham Mansor:
Comparison of Named Data Networking Mobility Methodology in a Merged Cloud Internet of Things and Artificial Intelligence Environment. Sensors 22(17): 6668 (2022) - Yanzhou Zhang, Qimin Xu, Lei Xu, Cailian Chen, Xinping Guan:
Efficient Flow Scheduling for Industrial Time-Sensitive Networking: A Divisibility Theory-Based Method. IEEE Trans. Ind. Informatics 18(12): 9312-9323 (2022) - Babak Nikmard, Naser Movahhedinia, Mohammad Reza Khayyambashi:
Congestion avoidance by dynamically cache placement method in named data networking. J. Supercomput. 78(4): 5779-5805 (2022) - Zishen Zhu, Chengyu Zhang, Luhan Wang, Wei Zheng, Xiangming Wen:
Research on Orbital Angular Momentum Different Modes Networking Method in Wireless Communication. IEEE Wirel. Commun. Lett. 11(5): 1007-1011 (2022) - Hyun Kyung Roh, Sung Hoon Kim, Yeon Yong Shin:
Efficient initial wake-up methods when using Partial Networking In-Vehicle network. APCC 2022: 590-594 - Mohit Chandra Saxena, Preeti Bajaj:
A Novel method of End-to-End data security using symmetric key based data encryption and SDWAN networking. IC3I 2022: 1981-1986 - Natsuko Fukuda, Hidenori Nakazato:
Hash-Collecting System : Applying Freenet Routing Method to Named Data Networking. ICIN 2022: 91-95 - Hideki Kondo, Sayaka Tohyama, Ayano Ohsaki, Masayuki Yamada:
Proposing a Mitigating Stagnation Method to Expand Involvement in Discussions on Social Networking Services. IIAI-AAI 2022: 214-219 - Ziyi Zhao, Yingya Guo, Jessie Hui Wang, Haibo Wang, Chengyuan Zhang, Changqing An:
CL-ETC: A Contrastive Learning Method for Encrypted Traffic Classification. IFIP Networking 2022: 1-9
skipping 158 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-23 18:01 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint