


Остановите войну!
for scientists:
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 227 matches
- 2008
- Habtamu Abie, Ilesh Dattani, Milan Novkovic, John Bigham, Shaun Topham, Reijo Savola:
GEMOM - Significant and Measurable Progress beyond the State of the Art. ICSNC 2008: 191-196 - João Afonso
, Pedro Veiga
:
Protecting the DNS Infrastructure of a Top Level Domain: Dynamic Firewalling with Network Sensors. ICSNC 2008: 173-178 - Hasan Akram, Mario Hoffmann:
Supports for Identity Management in Ambient Environments - The Hydra Approach. ICSNC 2008: 371-377 - Sarfraz Alam, Josef Noll, Dumitru Roman:
Semantic Policies for Service Access in Mobile Supported Sensor Networks. ICSNC 2008: 359-364 - Abdullah Aljohani, Jonathon A. Chambers:
A Joint Coded Two-Step Interference Cancellation Technique for a Multiuser MIMO-SC-FDE System. ICSNC 2008: 64-68 - Ben Arbia Anis, Hédi Hamdi, Youssef Habib:
Wireless Routing Protocol Based on Trust Evaluation. ICSNC 2008: 329-334 - Philipp A. Baer, Thomas Weise, Kurt Geihs:
Geminga: Service Discovery for Mobile Robotics. ICSNC 2008: 167-172 - Eugen Borcoci, Radu Lupu, Serban Georgica Obreja:
Integration of WiMAX Access Management and Control in a Multi-domain System for Multimedia Distribution. ICSNC 2008: 229-234 - Maria-Mihaela Burlacu, Joséphine Kohlenberg:
An Analysis of the Nanosatellites Launches between 2004 and 2007. ICSNC 2008: 292-297 - Jian Chen, Roman Y. Shtykh, Qun Jin:
Gradual Adaption Model for Estimation of User Information Access Behavior. ICSNC 2008: 378-383 - Noélia S. C. Correia
, José Coimbra
, Maria C. R. Medeiros
:
A Minimization Cost Heuristic Approach for Traffic Grooming in IP-over-WDM Networks. ICSNC 2008: 90-97 - Sanjay K. Dhurandher, Sudip Misra, Deepansh Agrawal, Avanish Rayankula:
Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless Networks. ICSNC 2008: 197-201 - Mohamed Djoudi:
Impacts of Transmission Range in Homogeneous Wireless Networks. ICSNC 2008: 6-10 - Sylvia B. Encheva, Sharil Tumin:
A Mechanism for Federated Identification Services for Public Access Portals Using Access-Cards. ICSNC 2008: 185-190 - Sylvia B. Encheva, Sharil Tumin:
Automated Evaluation of Reusable Learning Objects via a Decision Support System. ICSNC 2008: 250-255 - Hassan Farhat:
A Simple Computer Design with Monitor Interface: Integrating Hardware and Software in Early Research in Computer Science. ICSNC 2008: 218-222 - Moez Ferchichi, Monia Najjar, Houria Rezig:
OFFH-CDMA Merged M-Sequence/Hyperbolic Code for Two Weights One Length WDM System. ICSNC 2008: 103-108 - Edmo Lopes Filho, Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa:
A High Availability Firewall Model Based on SCTP Protocol. ICSNC 2008: 202-207 - Marc Gilg
, Pascal Lorenz, Abderrahim Makhlouf:
Fairness in a Static Wireless Network. ICSNC 2008: 17-22 - Abdelaziz Hamdi, Ammar B. Kouki, Abdelaziz Samet:
Modeling and Design of a Novel Backward-Wave Scanning-Beam Antenna Based on Negative Refractive Index Material Structures. ICSNC 2008: 33-37 - Byung-Jin Han, Jae-Min Lee, Jong-Hyouk Lee, Tai-Myoung Chung:
PMIPv6 Route Optimization Mechanism Using the Routing Table of MAG. ICSNC 2008: 274-279 - Manal El Harby, Lamiaa Fattouh Ibrahim
:
Employing of Clustering Algorithm CWN-PAM in Mobile Network Planning. ICSNC 2008: 44-49 - R. Hariprakash, G. Venkat Ramu, T. Rajakumari, S. Ananthi, K. Padmanabhan:
Some Problems & Methods for Remotely Controllable Automatic Home Security Systems. ICSNC 2008: 400-403 - Poul E. Heegaard
, Kishor S. Trivedi:
Survivability Quantification of Real-Sized Networks Including End-to-End Delay Distributions. ICSNC 2008: 50-55 - Jun Heo, Jong Whoi Shin, Wansuk Lee, Yoojae Won
:
Risk Analysis Methodology for New Critical Information Infrastructure. ICSNC 2008: 208-211 - Rafaela Villalpando Hernandez
, César Vargas Rosales
, David Muñoz Rodríguez:
Network Coding for Detection and Defense of Sink Holes in Wireless Reconfigurable Networks. ICSNC 2008: 286-291 - Hsiu-Jy Ho, Wei-Ming Lin:
AURED - Autonomous Random Early Detection for TCP Congestion Control. ICSNC 2008: 79-84 - Lucian Ioan, Grazziela Niculescu, Eugen Borcoci:
Traffic Demand Derivation in IP-Based Multi Service Class Environment. ICSNC 2008: 69-74 - Heinrich Jasper:
Long Term Management of Private Digital Assets. ICSNC 2008: 343-348 - Ioannis Karamitsos, Katerina Vagelatou, Gianna Koliopanou:
Group Tone Spectrum Management Algorithm (GTSM) for VDSL2 Technology. ICSNC 2008: 98-102
skipping 197 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2022-05-25 06:07 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint