Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 81 matches
- 2007
- Robert P. Adler, Jonathan Huang, Raymond Kong, Philip Muse, Lama Nachman, Rahul C. Shah, Chieh-Yih Wan, Mark D. Yarvis:
Edge Processing and Enterprise Integration: Closing the Gap on Deployable Industrial Sensor Networks. SECON 2007: 620-630 - N. Ahmed, K. Jamshaid, O. Z. Khan:
SAFIRE: A Self-Organizing Architecture for Information Exchange between First Responders. SECON 2007: 655-661 - Xin Ai, Vikram Srinivasan, Chen-Khong Tham:
DRACo: Distributed, Robust an Asynchronous Coverage in Wireless Sensor Networks. SECON 2007: 530-539 - Ortal Arazi, Hairong Qi, Derek Rose:
A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks. SECON 2007: 51-59 - Mahesh Arumugam, Sandeep S. Kulkarni:
ProSe - A Programming Tool for Rapid Prototyping of Sensor Networks. SECON 2007: 685-686 - Erman Ayday, Farshid Delgosha, Faramarz Fekri:
Efficient Broadcast Authentication for Wireless Sensor Networks. SECON 2007: 691-692 - Fan Bai, Ahmed Helmy:
Impact of Mobility on Last Encounter Routing Protocols. SECON 2007: 461-470 - Fang Bian, Sumit Rangwala, Ramesh Govindan:
Quasi-static Centralized Rate Allocation for Sensor Networks. SECON 2007: 361-370 - Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pearce, Venu Vasudevan:
Query privacy in wireless sensor networks. SECON 2007: 203-212 - Hoon Chang, Vishal Misra, Dan Rubenstein:
Fairness and Physical Layer Capture in Random Access Networks. SECON 2007: 381-390 - Yingying Chen, Wade Trappe, Richard P. Martin:
Detecting and Localizing Wireless Spoofing Attacks. SECON 2007: 193-202 - Sukwon Choi, Hojung Cha, SungChil Cho:
A SoC-based Sensor Node: Evaluation of RETOS-enabled CC2430. SECON 2007: 132-141 - Heesook Choi, Patrick D. McDaniel, Thomas F. La Porta:
Privacy Preserving Communication in MANETs. SECON 2007: 233-242 - Romit Roy Choudhury, Nitin H. Vaidya:
MAC-Layer Capture: A Problem in Wireless Mesh Networks using Beamforming Antennas. SECON 2007: 401-410 - H. A. Cunningham:
Sensor Localization with Lateral Inhibition & Statistical Inference. SECON 2007: 700-702 - Reza Curtmola, Cristina Nita-Rotaru:
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. SECON 2007: 263-272 - Mischa Dohler, Dominique Barthel, Florence Maraninchi, Laurent Mounier, Stephane Aubert, Christophe Dugas, Aurélien Buhrig, Franck Paugnat, Marc Renaudin, Andrzej Duda, Martin Heusse, Fabrice Valois:
The ARESA Project: Facilitating Research, Development and Commercialization of WSNs. SECON 2007: 590-599 - Olivier Dousse:
Revising buffering in multihop CSMA/CA wireless networks. SECON 2007: 580-589 - Ovidiu Valentin Drugan, Thomas Plagemann, Ellen Munthe-Kaas:
Non-intrusive Neighbor Prediction in Sparse MANETs. SECON 2007: 172-182 - Patrik Floréen, Petteri Kaski, Jukka Suomela:
A distributed approximation scheme for sleep sceduling in sensor networks. SECON 2007: 152-161 - Chittabrata Ghosh, Dharma P. Agrawal:
Cross Layer Performance Evaluation of a Software Defined Radio UWB Receiver using Turbo Decoding. SECON 2007: 639-646 - Amitabha Amitava Ghosh, Yi Wang, Bhaskar Krishnamachari:
Efficient Distributed Topology Control in 3-Dimensional Wireless Networks. SECON 2007: 91-100 - Song Guo, Oliver W. W. Yang, Victor C. M. Leung:
Improving Scalability for Longest-lived Multicast Using Localized Operations in WANETs. SECON 2007: 243-252 - Ashima Gupta, Prasant Mohapatra:
Energy Consumption and Conservation in WiFi Based Phones: A Measurement-Based Study. SECON 2007: 122-131 - Albert F. Harris III, Michele Zorzi:
On the Design of Energy-efficient Routing Protocols in Underwater Networks. SECON 2007: 80-90 - Hazer Inaltekin, Stephen B. Wicker:
The Behavior of Unbounded Path-loss Models and the Effect of Singularity on Computed Network Interference. SECON 2007: 431-440 - Hazer Inaltekin, Tom Wexler, Stephen B. Wicker:
A Duopoly Pricing Game for Wireless IP Services. SECON 2007: 600-609 - Özlem Durmaz Incel, Sape J. Mullender, Pierre G. Jansen, Stefan Dulman:
Measurements on the Efficiency of Overlapping Channels. SECON 2007: 689-690 - Jangeun Jun, Mihail L. Sichitiu, Hector D. Flores, Stephan J. Eidenbenz:
The Optimum Number of OSPF Areas for MANETs. SECON 2007: 451-460 - Marcin Karpinski, Vinny Cahill:
High-Level Application Development is Realistic for Wireless Sensor Networks. SECON 2007: 610-619
skipping 51 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-27 07:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint