default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 942 matches
- 2013
- Li Ming Chen, Meng Chang Chen, Yeali S. Sun, Wanjiun Liao:
Spectrum analysis for detecting slow-paced persistent activities in network security. ICC 2013: 1985-1989 - Ahmad Awada, Bernhard Wegmann, Ingo Viering, Anja Klein:
A location-based self-optimizing algorithm for the inter-RAT handover parameters. ICC 2013: 6168-6173 - Yu Gu, Yusheng Ji, Fuji Ren, Jie Li:
Network lifetime optimization in wireless healthcare systems: Understanding the gap between online and offline scenarios. ICC 2013: 1774-1778 - Liping Wang, Viktoria Fodor:
Cooperate or not: The secondary user's dilemma in hierarchical spectrum sharing networks. ICC 2013: 2650-2655 - Yong Li, Depeng Jin, Lieguang Zeng, Sheng Chen:
Revealing patterns of opportunistic contact durations and intervals for large scale urban vehicular mobility. ICC 2013: 1646-1650 - Ping Zhang, Arjan Durresi, Raj Jain:
Cloud aided Internet mobility. ICC 2013: 3688-3693 - Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Architecture design of mobile access coordinated wireless sensor networks. ICC 2013: 1720-1724 - Amr Abdelnasser, Ekram Hossain:
Joint subchannel and power allocation in two-tier OFDMA HetNets with clustered femtocells. ICC 2013: 6002-6007 - Reza Abdolee, Benoît Champagne, Ali H. Sayed:
Diffusion LMS strategies for parameter estimation over fading wireless channels. ICC 2013: 1926-1930 - Walid Abediseid, Mohamed-Slim Alouini:
Performance-complexity tradeoff in sequential decoding for the unconstrained AWGN channel. ICC 2013: 3090-3094 - Luca Abeni, Csaba Király, Nanfang Li, Andrea Bianco:
Tuning KVM to enhance virtual routing performance. ICC 2013: 3803-3808 - Mohamed Amine Abid, Omar Chakroun, Soumaya Cherkaoui:
Pedestrian collision avoidance in vehicular networks. ICC 2013: 2928-2932 - Neda Aboutorab, Wibowo Hardjawana, Branka Vucetic:
Application of compressive sensing to channel estimation of high mobility OFDM systems. ICC 2013: 4946-4950 - Davide Adami, Stefano Giordano, Michele Pagano, Simone Roma:
Virtual machines migration in a cloud data center scenario: An experimental analysis. ICC 2013: 2578-2582 - Manishika Agaskar, Vincent W. S. Chan:
Nulling strategies for preventing interference and interception of free space optical communication. ICC 2013: 3927-3932 - Farshad Ahdi, Suresh Subramaniam:
Optimal placement of FSO relays for network disaster recovery. ICC 2013: 3921-3926 - Hamed Ahmadi, Irene Macaluso, Luiz A. DaSilva:
The effect of the spectrum opportunities diversity on opportunistic access. ICC 2013: 2829-2834 - Mohammed F. A. Ahmed, Tareq Y. Al-Naffouri, Mohamed-Slim Alouini:
On the effect of correlated measurements on the performance of distributed estimation. ICC 2013: 4740-4744 - Imtiaz Ahmed, Aïssa Ikhlef, Derrick Wing Kwan Ng, Robert Schober:
Optimal power allocation for a hybrid energy harvesting transmitter. ICC 2013: 4185-4190 - Qasim Zeeshan Ahmed, Ki-Hong Park, Mohamed-Slim Alouini, Sonia Aïssa:
Optimal linear detectors for nonorthogonal amplify-and-forward protocol. ICC 2013: 4829-4833 - Adnan Aijaz, A. Hamid Aghvami:
A PRMA based MAC protocol for cognitive machine-to-machine communications. ICC 2013: 2753-2758 - Yohei Aikawa, Yuichiro Hei, Tomohiko Ogishi, Sumaru Niida, Toru Hasegawa:
Topology-aware clustering to achieve latency comparable to one-frame in multiplayer online games. ICC 2013: 2288-2292 - Mustafa Ilhan Akbas, Raghu Nandan Avula, Mostafa A. Bassiouni, Damla Turgut:
Social network generation and friend ranking based on mobile phone data. ICC 2013: 1444-1448 - Auon Muhammad Akhtar, Mohammad Reza Nakhai, A. Hamid Aghvami:
CPLNC based energy efficient routing in Rayleigh fading networks. ICC 2013: 3666-3671 - Auon Muhammad Akhtar, Luca De Nardis, Mohammad Reza Nakhai, Oliver Holland, Maria-Gabriella Di Benedetto, A. Hamid Aghvami:
Multi-hop cognitive radio networking through beamformed underlay secondary access. ICC 2013: 2863-2868 - Irfan S. Al-Anbagi, Mounib Khanafer, Hussein T. Mouftah:
MAC finite buffer impact on the performance of cluster-tree based WSNs. ICC 2013: 1485-1490 - Ashraf E. Al-Fagih, Fadi M. Al-Turjman, Hossam S. Hassanein:
Online heuristics for monetary-based courier relaying in RFID-Sensor Networks. ICC 2013: 1700-1704 - Waleed Alasmary, Hamed Sadeghi, Shahrokh Valaee:
Crowdsensing in vehicular sensor networks with limited channel capacity. ICC 2013: 1833-1838 - Mohammad Aghababaie Alavijeh, Behrouz Maham, Zhu Han, Said Nader-Esfahani:
Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks. ICC 2013: 2812-2816 - George C. Alexandropoulos, Constantinos B. Papadias:
A reconfigurable distributed algorithm for K-user MIMO interference networks. ICC 2013: 3063-3067
skipping 912 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-27 05:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint