Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2009
- Mayutan Arumaithurai, Rüdiger Geib, Rene Rex, Xiaoming Fu:
Pre-congestion notification-based flow management in MPLS-based DiffServ networks. IPCCC 2009: 57-64 - Kevin S. Bauer, Dirk Grunwald, Douglas C. Sicker:
Predicting Tor path compromise by exit port. IPCCC 2009: 384-387 - Murat Bolat, Xiaoming Li:
Context-aware code optimization. IPCCC 2009: 256-263 - Yang Cao, Shikharesh Majumdar, Chung-Horng Lung:
Caching techniques for XML message filtering. IPCCC 2009: 315-322 - Xiaolin Chang, Bin Xing, Jiqiang Liu, Jogesh K. Muppala:
LWRM: A lightweight response mechanism for TCG TOCTOU attack. IPCCC 2009: 200-207 - Zesheng Chen, Todor Cooklev, Chao Chen, Carlos A. Pomalaza-Raez:
Modeling primary user emulation attacks and defenses in cognitive radio networks. IPCCC 2009: 208-215 - Lydia Y. Chen, Wolfgang E. Denzel, Ronald P. Luijten:
Optimization of link bandwidth for parallel communication performance. IPCCC 2009: 137-144 - Jing Chen, Wei Tan, Lixiang Liu, Xiaohui Hu, Fanjiang Xu:
Towards zero loss for TCP in wireless networks. IPCCC 2009: 65-70 - Lauro B. Costa, Samer Al-Kiswany, Matei Ripeanu:
GPU support for batch oriented workloads. IPCCC 2009: 231-238 - Thang N. Dinh, Ying Xuan, My T. Thai:
Towards social-aware routing in dynamic communication networks. IPCCC 2009: 161-168 - Mourad Elhadef, Amiya Nayak:
Efficient symmetric comparison-based self-diagnosis using backpropagation artificial neural networks. IPCCC 2009: 264-271 - David Essary, Ahmed Amer:
Avoiding state-space explosion of predictive metadata with SESH. IPCCC 2009: 111-120 - Adam Flizikowski, Rafal Kozik, Mateusz Majewski, Marcin Przybyszewski:
Performance comparison of guard channel admission control schemes for IEEE 802.16 system with various turbo code FEC schemes. IPCCC 2009: 360-365 - Weihuang Fu, Xiaoyuan Wang, Dharma P. Agrawal:
Characterizing deployment and distribution of self-powered mesh routers in wireless mesh networks. IPCCC 2009: 185-192 - Longjiang Guo, Chunyu Ai, Xiaoming Wang, Zhipeng Cai, Yingshu Li:
Real time clustering of sensory data in wireless sensor networks. IPCCC 2009: 33-40 - Ying Guo, Feng Hong, Zhongwen Guo, Zongke Jin, Yuan Feng:
EDA: Event-oriented data aggregation in sensor networks. IPCCC 2009: 25-32 - Wei Hao, Jicheng Fu, I-Ling Yen, Zhonghang Xia:
Achieving high performance web applications by service and database replications at edge servers. IPCCC 2009: 153-160 - Samee Ullah Khan:
A goal programming approach for the joint optimization of energy consumption and response time in computational grids. IPCCC 2009: 410-417 - Bibudh Lahiri, Srikanta Tirthapura:
Finding correlated heavy-hitters over data streams. IPCCC 2009: 307-314 - Lambros Lambrinos, Constantinos Djouvas:
Applying scheduling policies to improve QoE in wireless Voice-over-IP. IPCCC 2009: 366-370 - Felix Leder, Peter Martini, André Wichmann:
Finding and extracting crypto routines from malware. IPCCC 2009: 394-401 - Myounghwan Lee, John A. Copeland:
An adaptive polling algorithm with differentiation strategy in IEEE 802.16 multi-hop networks with IEEE 802.11e WLANs. IPCCC 2009: 354-359 - Taekkyeun Lee, Chunming Qiao, Murat Demirbas, Jinhui Xu:
ABC-MC: A simple multi-channel geographic forwarding scheme for wireless sensor networks. IPCCC 2009: 9-16 - Xiaorong Li, Terence Hung, Sharad Singhal:
A user-centric dynamic cluster partitioning approach for HPC service optimization. IPCCC 2009: 121-128 - Haitao Li, Xu Ke, James Seng, Po Hu:
Towards health of replication in large-scale P2P-VoD systems. IPCCC 2009: 323-330 - Jun Li, Yifeng Zhou, Louise Lamont:
Analysis of the impact of swarm mobility on performance of routing protocols in MANETs. IPCCC 2009: 193-199 - Tobias Limmer, Falko Dressler:
Flow-based TCP connection analysis. IPCCC 2009: 376-383 - Yu Liu, Wei Zhang, Kemal Akkaya:
Static worst-case energy and lifetime estimation of wireless sensor networks. IPCCC 2009: 17-24 - Xukang Lu, Qishi Wu, Nageswara S. V. Rao, Zongmin Wang:
On Performance-Adaptive flow control for large data transfer in high speed networks. IPCCC 2009: 49-56 - Carl Henrik Lunde, Håvard Espeland, Håkon Kvale Stensland, Pål Halvorsen:
Improving file tree traversal performance by scheduling I/O operations in user space. IPCCC 2009: 145-152
skipping 28 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 22:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint