Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 102 matches
- 1999
- Abdelhafid Abouaissa, Abderrahim Benslimane:
A grouping model for distributed real time causal ordering. ICCCN 1999: 174-179 - Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
Managing traffic in CDMA ATM networks. ICCCN 1999: 486-493 - Mohammad F. Alam, Mohammed Atiquzzaman, Mohammad A. Karim:
Effects of source traffic shaping on MPEG video transmission over next generation IP networks. ICCCN 1999: 514-519 - Maher Ali, Byrav Ramamurthy, Jitender S. Deogun:
Routing algorithms for all-optical networks with power considerations: the unicast case. ICCCN 1999: 237-241 - Alia Atlas, Azer Bestavros:
Multiplexing VBR traffic flows with guaranteed application-level QoS using statistical rate monotonic scheduling. ICCCN 1999: 282-287 - Sangman Bak, Jorge Arturo Cobb, Ernst L. Leiss:
Hierarchical load-balanced routing via bounded randomization. ICCCN 1999: 589-594 - Young-Cheol Bang, Sridhar Radhakrishnan, Nageswara S. V. Rao, Stephen Gordon Batsell:
On multicasting with minimum end-to-end delay. ICCCN 1999: 604-609 - Lichun Bao, J. J. Garcia-Luna-Aceves:
Link-state routing in networks with unidirectional links. ICCCN 1999: 358-363 - Prithwish Basu, Ashok Narayanan, Wang Ke, Thomas D. C. Little:
Optimal scheduling of secondary content for aggregation in video-on-demand systems. ICCCN 1999: 104-109 - Kabekode V. Bhat:
Performance model directed call assignment algorithm in a distributed system of dissimilar processors. ICCCN 1999: 474-478 - Andrea Calvagna, Antonio Puliafito, Lorenzo Vita:
A low-cost/high-performance server for video on demand. ICCCN 1999: 180-185 - Guohong Cao, Wu-chi Feng, Mukesh Singhal:
Online VBR video traffic smoothing. ICCCN 1999: 502-507 - Maurizio Casoni:
Analysis of a threshold dropping scheme for different service classes in the Internet. ICCCN 1999: 649-654 - Samuel T. Chanson, Albert K. T. Hui, Eddy Siu, Ines Beier, Hartmut König, Mario Zühlke:
OCTOPUS-a scalable global multiparty video conferencing system. ICCCN 1999: 97-102 - Feng Chen, Bo Li:
Replicated servers allocation for multiple information sources in a distributed environment. ICCCN 1999: 168-173 - Xiangping Chen, Prasant Mohapatra:
Providing differentiated service from an Internet server. ICCCN 1999: 214-217 - Feihong Chen, Necdet Uzun, Ali N. Akansu:
A scalable multicast ATM switch using link sharing and prioritized link reservation. ICCCN 1999: 218-222 - Kwan-Wu Chin, Mohan Kumar:
AMTree: an active approach to multicasting in mobile networks. ICCCN 1999: 615-620 - Pei-hung Chuang, Hsiao-Kuang Wu, Ming-kuang Liao:
Dynamic QoS allocation for multimedia ad hoc wireless networks. ICCCN 1999: 480-485 - Rolf Clauberg, Andreas Herkersdorf, Wolfram W. Lemppenau, Hans R. Schindler:
A scalable modular architecture for SDH/SONET technology. ICCCN 1999: 442-446 - Lenitra M. Clay, Mostafa H. Ammar:
Design and evaluation of router-supported and end-to-end multicast receiver-based scoping protocols. ICCCN 1999: 384-389 - Adrian E. Conway, Catherine Rosenberg:
A simple balanced fair blocking mechanism for discrete-time multiplexing of bursty traffic sources. ICCCN 1999: 36-41 - Igor D. D. Curcio, Ari Hourunranta:
QoS of mobile videophones in HSCSD networks. ICCCN 1999: 447-451 - Abel Dasylva, R. Srikant:
Competitive admission control and routing of multi-class traffic with statistical QoS guarantees. ICCCN 1999: 290-297 - Viet L. Do, Kenneth Y. Yun:
A scalable priority queue manager architecture for output-buffered ATM switches. ICCCN 1999: 154-160 - Fan Du, Lionel M. Ni, Abdol-Hossein Esfahanian:
Towards solving multicast key management problem. ICCCN 1999: 232-236 - Arjan Durresi, Raj Jain, Gojko Babic, Bruce S. Northcote:
Methodology for implementing scalable test configurations in ATM switches. ICCCN 1999: 628-633 - Eylem Ekici, Cem Ersoy:
Optimal two-tier cellular network design. ICCCN 1999: 312-317 - Antonio Fernández:
On the isolation of several work-conserving scheduling policies. ICCCN 1999: 188-192 - Andrea Fumagalli, Marco Tacca, Isabella Cerutti:
Minimizing the number of optical crossconnect ports in mesh networks based on bidirectional line-switched WDM self-healing ring protection. ICCCN 1999: 398-403
skipping 72 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 10:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint