default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 149 matches
- 2013
- Yang Wu, Yongmei Sun, Yuefeng Ji, Jie Mao, Yingting Liu:
A joint channel allocation and power control scheme for interference mitigation in high-density WLANs. ICCT 2013: 98-103 - Jiang Xue, Zhiyan Wang:
Text code recognition and its definition. ICCT 2013: 444-448 - Jian Kuang, Bo Yuan, Jiali Bian:
Research of Ad Hoc network routing protocol mix-based on topology and location for mobile intelligent terminal. ICCT 2013: 519-522 - Jianjun Zhang, Mingke Dong, Ye Jin:
A QC-LDPC construction algorithm for increasing the throughput of layered decoders. ICCT 2013: 604-608 - Rehan Ahmad, Shoab Ahmad Khan:
Performance analysis of OFCDM in SUI channels. ICCT 2013: 104-109 - Ni An, Peikang Wang, Chenfu Yi, Ye Li:
Performance analysis of CSMA/CA based on the IEEE 802.15.6 MAC protocol. ICCT 2013: 539-544 - Limei An, Xinning Zhu, Gan Guo, Leijia Wu:
PAPR reduction for carrier aggregated uplink in LTE-A system. ICCT 2013: 271-275 - Xiaoyan Bai, David C. White, David Sundaram:
Context adaptive visualization for effective business intelligence. ICCT 2013: 786-790 - Jinye Cai, Pingping Xu, Huiyu Tang, Lin Sun:
An improved selective ensemble method for spam filtering. ICCT 2013: 743-747 - Huayang Cao, Kan Chen, Peidong Zhu:
Secure process control system of industrial networks. ICCT 2013: 15-19 - Rong Chai, Huili Zhang, Jintao Li, Lifan Li, Qianbin Chen:
An energy-efficient resource allocation scheme for macro-femto heterogeneous network. ICCT 2013: 223-228 - Shih-Ying Chang, Hsin-Ta Chiao:
Adaptive streaming schemes for MPEG-DASH overWiFi multicast. ICCT 2013: 168-173 - Niran Chawla:
Online information monitoring for utilize hotel occupancy rate. ICCT 2013: 754-758 - Jian Chen, Mingzhi Mao, Qianwu Zhang, Yingxiong Song, Yingchun Li, Yating Wu, Min Wang:
An upgradable broadcasting service enabled all-optical OFDM-PON architecture based on centralized comb source. ICCT 2013: 324-328 - Xiang Chen, Mingxiang Xie, Huanbing Liu:
An RC-LDPC coded adaptive cooperative communication scheme based on the Mutual Information model. ICCT 2013: 615-619 - Lu Chen, Rui Yan, Zhixian Ma:
TinyOS-based localization system design using accelerometer. ICCT 2013: 511-518 - Meijuan Chen, Xiaorong Zhu, Hongbo Zhu:
Ubiquitous service network with automatic service provision. ICCT 2013: 589-592 - Thomas H. Clausen, Axel Colin de Verdiere, Jiazi Yi:
Performance analysis of Trickle as a flooding mechanism. ICCT 2013: 565-572 - Rong Cui, Zhaowei Qu, Sixing Yin:
Energy-efficient routing protocol for energy harvesting wireless sensor network. ICCT 2013: 500-504 - Tao Deng, Xian Wang, Wei Jiang:
A random access scheme based on device-to-device communications for machine-type communications. ICCT 2013: 573-577 - Deqiang Ding, Balin Tian, Wei Li, Ying Liu, Peian Ren:
Performance of concealed optical wireless communication link based on modulated retro-reflector. ICCT 2013: 315-318 - Yangwei Dong, Chuang Lin, Peng Zhang, Lin Zhu:
Stochastic delay evaluation for DTN based space networks. ICCT 2013: 686-690 - Xiaoyu Du, Lijuan Sun, Fu Xiao, Jian Guo:
Iterative location algorithm based on adaptive grid. ICCT 2013: 549-554 - Zhengfeng Du, Hailiang Xiong, Deqiang Wang, Jian Sun, Hongji Xu:
Signaling scheme design based on HDR Alamouti code for RFID tags using two antennas. ICCT 2013: 249-253 - Xinhua E, Jing Han, Yasong Wang, Lianru Liu:
Big Data-as-a-Service: Definition and architecture. ICCT 2013: 738-742 - Nianfei Fan, Yu Liu, Lin Zhang:
Combination of analog network coding and compressed sensing in clustered chain-type topology. ICCT 2013: 797-801 - Guangyu Fan, Jianwei Zhu, Qiang Sun:
Transmission scheduling between users in power line Communication networks. ICCT 2013: 702-706 - Dongxiang Fang, PeiFeng Zeng:
An architecture of virtual NIC driver based on WinPcap and a method to test it. ICCT 2013: 555-559 - Chong Fu, Jiaqi Tang, Wei Zhou, Wenqi Liu, Dongliang Wang:
A symmetric color image encryption scheme based on chaotic maps. ICCT 2013: 712-716 - Chao Gao, Songfeng Lu, Qing Zhou, Zhigang Zhang:
Beacon-based routing optimization in data-gathering wireless sensor networks. ICCT 2013: 488-493
skipping 119 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-09 02:58 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint