Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 425 matches
- 2005
- Min Ding, Dechang Chen, Andrew Thaeler, Xiuzhen Cheng:
Fault-tolerant target detection in sensor networks. WCNC 2005: 2362-2368 - Peng Chen, Weiling Wu:
Impacts of imperfect channel estimation and multipath fading on forward-link performance in CDMA distributed antenna systems. WCNC 2005: 201-205 - Wei Li, Christos G. Cassandras:
A minimum-power wireless sensor network self-deployment scheme. WCNC 2005: 1897-1902 - Wei Zhang, Claude D'Amours, Abbas Yongaçoglu:
Adaptive soft-input soft-output multiuser detection for asynchronous coded DS-CDMA systems. WCNC 2005: 227-232 - David Abusch-Magder:
Novel algorithms for reducing cell sites during a technology upgrade and network overlay. WCNC 2005: 1726-1732 - Abdulkareem Adinoyi, Halim Yanikomeroglu:
On the performance of hybrid macro/microdiversity in the reverse-link microcellular networks. WCNC 2005: 973-977 - Yosuke Akimoto, Yushi Shirato, Kazuji Watanabe:
A high-precision AFC circuit applied to 64QAM point-to-multipoint burst communications. WCNC 2005: 562-567 - Robert Akl, Mort Naraghi-Pour, Manju V. Hegde:
Throughput optimization in multi-cell CDMA networks. WCNC 2005: 1292-1297 - Naofal Al-Dhahir, Hlaing Minn:
A new multicarrier transceiver based on the discrete cosine transform. WCNC 2005: 45-50 - Syed Hussain Ali, Victor C. M. Leung:
Mobility assisted opportunistic scheduling for downlink transmissions in cellular data networks. WCNC 2005: 1213-1218 - M. Josephine Ammer, Jan M. Rabaey:
Low power synchronization for wireless sensor network modems. WCNC 2005: 670-675 - Hazar Aouad, Samir Tohmé:
Using network tomography for dynamic path adaptation. WCNC 2005: 1743-1748 - Tetsuya Aoyama, Koichi Ishibashi, Masaki Bandai, Masahiro Kuroda, Takashi Watanabe:
Handover latency analysis on mobile Ethernet. WCNC 2005: 1389-1394 - Neelima Arora, R. K. Shyamasundar:
PGSP: a protocol for secure communication in peer-to-peer system. WCNC 2005: 2094-2099 - Levent Aydin, Samir Ginde, Walid Hamdy:
cdma2000 packet data throughput improvements provided by handset dual antenna diversity. WCNC 2005: 359-363 - Arun Avudainayagam, John M. Shea:
Performance analysis of reliability filling on quasi-static fading channels. WCNC 2005: 1024-1029 - Leonardo Badia, Michele Zorzi:
A technical and micro-economic analysis of wireless LANs. WCNC 2005: 1632-1637 - Kashyap Balakrishnan, Jing Deng, Pramod K. Varshney:
TWOACK: preventing selfishness in mobile ad hoc networks. WCNC 2005: 2137-2142 - Sanjeevi Balasubramanian, Sudharman K. Jayaweera, Kameswara Rao Namuduri:
Energy-aware, collaborative tracking with ad-hoc wireless sensor networks. WCNC 2005: 1878-1883 - Aruna Balasubramanian, Sumita Mishra, Ramalingam Sridhar:
Analysis of a hybrid key management solution for ad hoc networks. WCNC 2005: 2082-2087 - Matteo Bandinelli, Francesco Chiti, Romano Fantacci, Daniele Tarchi, Gianluca Vannuccini:
A link adaptation strategy for QoS support in IEEE 802.11e-based WLANs. WCNC 2005: 120-125 - Farooq Bari, Jean-Luc Bouthemy:
An AAA based service customization framework for public WLANs. WCNC 2005: 2430-2435 - Yawen Dai Barowski, Saad Biaz, Prathima Agrawal:
Towards the performance analysis of IEEE 802.11 in multi-hop ad-hoc networks. WCNC 2005: 100-106 - Ahmet Bastug, Dirk T. M. Slock:
A macroanalysis of HSDPA receiver models. WCNC 2005: 380-385 - Sara Bavarian, James K. Cavers:
Symbol by symbol soft-input soft-output multiuser detection for frequency selective MIMO channels. WCNC 2005: 515-520 - Arash Behzad, Izhak Rubin, Ju-Lan Hsu:
On the performance of randomized power control algorithms in multiple access wireless networks. WCNC 2005: 707-711 - Fredrik Berggren:
Spectral-efficiency analysis in noncooperative interference environments. WCNC 2005: 741-745 - Lars Berlemann, Bernhard Walke:
Spectrum load smoothing for optimized spectrum utilization - rationale and algorithm. WCNC 2005: 735-740 - Chatschik Bisdikian:
A methodology for the energy efficiency performance evaluation of tree-search contention resolution algorithms. WCNC 2005: 1614-1619 - Holger Boche, Marcin Wiczanowski, Slawomir Stanczak:
Unifying view on min-max fairness and utility optimization in cellular networks. WCNC 2005: 1280-1285
skipping 395 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 17:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint