Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 286 matches
- 2009
- Ameer Ahmed Abbasi, Uthman Baroudi, Mohamed F. Younis, Kemal Akkaya:
C2AM: an algorithm for application-aware movement-assisted recovery in wireless sensor and actor networks. IWCMC 2009: 655-659 - Mohamed M. Abdallah:
Cooperative beamforming for multi-hop relaying in wireless sensor networks. IWCMC 2009: 660-664 - Wael Adi, Nizar Kassab:
Hardware architecture for trustable vehicular electronic control units. IWCMC 2009: 437-441 - Irfan Ahmed, Syed Ismail Shah, Jamil Ahmad, Mugen Peng:
Truncated ARQ based MRC over OSTBC cooperative communication for energy constrained wireless networks. IWCMC 2009: 1498-1502 - Mohamed Aissani, Abdelhamid Mellouk, Nadjib Badache, Brahim Saidani:
An efficient real-time routing with presence of concave voids in wireless sensor networks. IWCMC 2009: 186-190 - Faisal A. Al-Nasser, Mansour A. Al-Dajani, Uthman Baroudi, Shokri Z. Selim:
Placement of access points in wireless local area networks. IWCMC 2009: 795-799 - Alex Alvarado, Erik Agrell, Arne Svensson:
On the capacity of BICM with QAM constellations. IWCMC 2009: 573-579 - S. Alves, Boris Koldehofe, Hugo Miranda, François Taïani:
Design of a backup network for catastrophe scenarios. IWCMC 2009: 613-617 - Ebtisam Amar, Selma Boumerdassi:
Enhancing location services with prediction. IWCMC 2009: 1025-1029 - Zohreh Andalibi, Ha H. Nguyen, J. Eric Salt:
Channel estimation and performance of BICM-ID with signal space diversity over time-correlated Rayleigh fading channels. IWCMC 2009: 749-753 - Murat Arabaci, Ivan B. Djordjevic, Ross Saunders, Roberto M. Marcoccia:
Regular non-binary quasi-cyclic LDPC codes for high-rate applications. IWCMC 2009: 764-769 - Georgios Aristomenopoulos, Timotheos Kastrinogiannis, Symeon Papavassiliou:
A unified approach for efficient network selection in multi-service integrated CDMA/WLAN systems. IWCMC 2009: 1263-1268 - Mohammad Abdul Awal, Lila Boukhatem:
Effect of feedback prediction on OFDMA system throughput. IWCMC 2009: 527-531 - Mouna Ayari, Zeinab Movahedi, Guy Pujolle, Farouk Kamoun:
ADMA: autonomous decentralized management architecture for MANETs: a simple self-configuring case study. IWCMC 2009: 132-137 - Zhiquan Bai, Dongfeng Yuan, Xiaotong Li, Rongkai Li, Kyungsup Kwak:
Performance evaluation of multiple access M-ary DS-UWB communication system. IWCMC 2009: 320-323 - Nicola Baldo, Alfred Asterjadhi, Michele Zorzi:
Multi-channel medium access using a virtual network coded control channel. IWCMC 2009: 1000-1005 - Tobias Bandh, Georg Carle, Henning Sanneck:
Graph coloring based physical-cell-ID assignment for LTE networks. IWCMC 2009: 116-120 - Jaume Barceló, Boris Bellalta, Cristina Cano, Anna Sfairopoulou, Miquel Oliver:
Carrier sense multiple access with enhanced collision avoidance: a performance analysis. IWCMC 2009: 733-738 - Ezedin E. Barka, Emad Eldin Mohamed:
Securing hierarchical multicast communications using roles. IWCMC 2009: 101-105 - Amir H. Basirat, Asad I. Khan:
Graph neuron and hierarchical graph neuron, novel approaches toward real time pattern recognition in wireless sensor networks. IWCMC 2009: 404-409 - Yacine Belala, James Wong:
Towards identity-based services in IMS. IWCMC 2009: 979-983 - Elena Veronica Belmega, Samson Lasaulce, Mérouane Debbah, Are Hjørungnes:
A new energy efficiency measure for quasi-static MIMO channels. IWCMC 2009: 483-488 - Stevan M. Berber, Xinghua Zhan:
Reverse CDMA link based on noise-like spreading sequences and fading mitigation. IWCMC 2009: 253-257 - Diego Bernini, Daniele Toscani, Marco Frigerio:
A software architecture for the deployment of executable transformation models. IWCMC 2009: 47-51 - Wafa Berrayana, Guy Pujolle, Habib Youssef:
XLEngine: a cross-layer autonomic architecture with network wide knowledge for QoS support in wireless networks. IWCMC 2009: 170-175 - Rajalakshmi Bhavanishankar, Chandrasekaran Subramaniam, Magesh Kumar, Dipesh Dugar:
A context aware approach to emergency management systems. IWCMC 2009: 1350-1354 - Zeki Bilgin, Bilal Khan:
Balancing power: tradeoffs between connection lifetime and control traffic in MANETS. IWCMC 2009: 883-887 - Alain Bertrand Bomgni, Jean Frédéric Myoupo, Aboubecrine Ould Cheikhna:
Randomized multi-stage clustering-based geocast algorithms in anonymous wireless sensor networks. IWCMC 2009: 286-291 - Ghalem Boudour, Cédric Teyssié, Zoubir Mammeri:
A robust reservation protocol for wireless ad-hoc networks. IWCMC 2009: 687-692 - Azzedine Boukerche, Yonglin Ren, Richard Werner Nelem Pazzi:
An adaptive computational trust model for mobile ad hoc networks. IWCMC 2009: 191-195
skipping 256 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 19:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint