Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 75 matches
- 2011
- Wei Wang, Baochun Li, Ben Liang:
District: Embracing local markets in truthful spectrum double auctions. SECON 2011: 521-529 - Asaad Ahmed, Keiichi Yasumoto, Yukiko Yamauchi, Minoru Ito:
Distance and time based node selection for probabilistic coverage in People-Centric Sensing. SECON 2011: 134-142 - Ashwin Ashok, Marco Gruteser, Narayan B. Mandayam, Taekyoung Kwon, Wenjia Yuan, Michael Varga, Kristin J. Dana:
Rate adaptation in visual MIMO. SECON 2011: 583-591 - Farhana Ashraf, Yih-Chun Hu, Robin Kravets:
Bankrupting the jammer. SECON 2011: 149-151 - Farhana Ashraf, Nitin H. Vaidya, Robin Kravets:
Any-MAC: Extending any asynchronous MAC with anycast to improve delay in WSN. SECON 2011: 19-27 - Alfred Asterjadhi, Raju Kumar, Thomas La Porta, Michele Zorzi:
Broadcasting in multi channel wireless networks in the presence of adversaries. SECON 2011: 377-385 - Arjun P. Athreya, Patrick Tague:
Towards secure multi-path routing for wireless mobile ad-hoc networks: A cross-layer strategy. SECON 2011: 146-148 - Rahul Balani, Mohamed Nabil Hajj Chehade, Supriyo Chakraborty, Mani B. Srivastava:
Distributed coordination for fast iterative optimization in wireless sensor/actuator networks. SECON 2011: 485-493 - Donato Battaglino, Lorenzo Bracciale, Andrea Detti, Francesca Lo Piccolo, Andrea Bragagnini, Maura Santina Turolla, Nicola Blefari-Melazzi:
Campus++: A publish-subscribe architecture for intermittently connected 802.15.4 networks. SECON 2011: 164-166 - Alireza Shahan Behbahani, Ahmed M. Eltawil, Hamid Jafarkhani:
Linear decentralized estimation of correlated data for wireless sensor networks. SECON 2011: 73-79 - Douglas M. Blough, Giovanni Resta, Paolo Santi, Ramya Srinivasan, Luis Miguel Cortés-Peña:
Optimal one-shot scheduling for MIMO networks. SECON 2011: 404-412 - Kai Bu, Bin Xiao, Qingjun Xiao, Shigang Chen:
Efficient pinpointing of misplaced tags in large RFID systems. SECON 2011: 287-295 - Alexandru Caracas, Clemens Lombriser, Yvonne-Anne Pignolet, Thorsten Kramp, Thomas Eirich, Rolf Adelsberger, Urs Hunkeler:
Energy-efficiency through micro-managing communication and optimizing sleep. SECON 2011: 55-63 - Greggory P. Carpenter, Lei Chen, Jeff Frolik:
Demonstrating distributed consensus building by locating the spatial centroid of a WSN. SECON 2011: 143-145 - Zesheng Chen, Chao Chen:
Adaptive energy-efficient spectrum probing in cognitive radio networks. SECON 2011: 206-214 - Baozhi Chen, Dario Pompili:
QUO VADIS: QoS-aware underwater optimization framework for inter-vehicle communication using acoustic directional transducers. SECON 2011: 341-349 - Eunjoon Cho, Kevin Wong, Omprakash Gnawali, Martin Wicke, Leonidas J. Guibas:
Inferring mobile trajectories using a network of binary proximity sensors. SECON 2011: 188-196 - Reuven Cohen, Boris Kapchits:
Energy-delay optimization in an asynchronous sensor network with multiple gateways. SECON 2011: 98-106 - Dulanjalie C. Dhanapala, Anura P. Jayasumana:
Geo-logical routing in wireless sensor networks. SECON 2011: 305-313 - Zi Feng, Jianxia Ning, Ioannis Broustis, Konstantinos Pelechrinis, Srikanth V. Krishnamurthy, Michalis Faloutsos:
Coping with packet replay attacks in wireless networks. SECON 2011: 368-376 - Lin Gao, Xinbing Wang, Gaofei Sun, Youyun Xu:
A game approach for cell selection and resource allocation in heterogeneous wireless networks. SECON 2011: 530-538 - J. J. Garcia-Luna-Aceves, Ashok N. Masilamani:
NOMAD: Deterministic collision-free channel access with channel reuse in wireless networks. SECON 2011: 1-9 - Zhangyu Guan, Tommaso Melodia, Dongfeng Yuan:
Optimizing cooperative video streaming in wireless networks. SECON 2011: 503-511 - Vikram Gupta, Junsung Kim, Aditi Pandya, Karthik Lakshmanan, Ragunathan Rajkumar, Eduardo Tovar:
Nano-CF: A coordination framework for macro-programming in Wireless Sensor Networks. SECON 2011: 467-475 - Nicholas Hubbell, Qi Han:
Detection and tracking of dynamic amorphous events in wireless sensor networks. SECON 2011: 170-178 - Qiong Huo, Subir Biswas, Anthony Plummer Jr.:
Ultra wide band impulse switching protocols for event and target tracking applications. SECON 2011: 197-205 - Muzammil Hussain, Niki Trigoni:
Dynamic node placement for multi-hop localization in cluttered environments. SECON 2011: 167-169 - Venkat Iyer, Matthias Woehrle, Koen Langendoen:
Chrysso - A multi-channel approach to mitigate external interference. SECON 2011: 449-457 - Josep Miquel Jornet, Ian F. Akyildiz:
Information capacity of pulse-based Wireless Nanosensor Networks. SECON 2011: 80-88 - Vibhav Kapnadak, Edward J. Coyle:
Optimal non-uniform deployment of sensors for detection in single-hop Wireless Sensor Networks. SECON 2011: 89-97
skipping 45 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 00:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint