default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 171 matches
- 2019
- Qiushi Gong, John W. Woods, Koushik Kar, Jacob Chakareski:
Multiple-Cache Pairing for Fine-Grained Scalable Video Caching and Networking. CFI 2019: 1:1-1:7 - Xiaoyan Hu, Shaoqi Zheng, Jian Gong, Guang Cheng, Guoqiang Zhang, Ruidong Li:
Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking. CFI 2019: 2:1-2:4 - Hyuga Kobayashi, Zhiqing Zhang, Hideya Ochiai, Hiroshi Esaki:
Probing Firewalls of Malware-Infected Networks with Honeypot. CFI 2019: 3:1-3:4 - Ryo Nakamura, Yohei Kuga, Yuji Sekiya:
An Alternative Fast Packet I/O with Native System Calls. CFI 2019: 6:1-6:7 - Bin Sun:
An Improved PLC-Trie Based Routing Table Design for Variable Length IP Address Lookup. CFI 2019: 7:1-7:8 - Hua Wu, Guang Cheng, Xiaoyan Hu:
Inferring ADU Combinations from Encrypted QUIC Stream. CFI 2019: 4:1-4:6 - Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:
Delayed Packet Forwarding for Information-Centric Networking. CFI 2019: 8:1-8:6 - Wanqian Zhang, Junxiao Wang, Sheng Chen, Heng Qi, Keqiu Li:
A Framework for Resource-aware Online Traffic Classification Using CNN. CFI 2019: 5:1-5:6 - Proceedings of the 14th International Conference on Future Internet Technologies, CFI 2019, Phuket, Thailand, August 7-9, 2019. ACM 2019, ISBN 978-1-4503-7238-1 [contents]
- 2018
- Jeongmin Bae, Song Chong:
Unknown Flow Detection with Imbalanced Traffic Data: Poster Abstract. CFI 2018: 8:1-8:2 - Guang Cheng, Ying Hu:
Encrypted Traffic Identification Based on N-gram Entropy and Cumulative Sum Test. CFI 2018: 9:1-9:6 - Junemuk Choi, Jian Li, James Won-Ki Hong:
Design and Implementation of Fault-Tolerant LISP Mapping System. CFI 2018: 3:1-3:6 - Si Young Jang, Yoonhyung Lee, Byoungheon Shin, Dongman Lee:
Towards Application-Aware Virtualization for Edge IoT Clouds. CFI 2018: 4:1-4:4 - Eunsoo Kim, Kuyju Kim, Dongsoon Shin, Beomjin Jin, Hyoungshick Kim:
CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules. CFI 2018: 7:1-7:5 - DongHoon Lee, Song Chong:
Learning based Utility Maximization for Multi-Resource Management: Poster Abstract. CFI 2018: 5:1-5:2 - Muhammad Ahmad Rathore, Muhammad Usman, JongWon Kim:
Integrating Active Monitoring for Restricted Topology-awareness of SmartX Multi-View Playground Visibility. CFI 2018: 2:1-2:4 - Keyao Zhang, Jun Bi, Yangyang Wang, Yu Zhou, Zhengzheng Liu:
Tunneling over IP Based on Match-Action Table in Software Defined Networks. CFI 2018: 1:1-1:4 - Yaqiu Zhou, Yongmao Ren, Xu Zhou, Zhentao Li, Pengfei Fan:
A Congestion Control Mechanism for Data Center Networks Based on Named Data Networking. CFI 2018: 6:1-6:6 - Proceedings of the 13th International Conference on Future Internet Technologies, CFI 2018, Seoul, Republic of Korea, June 20-22, 2018. ACM 2018 [contents]
- 2017
- Hiroshi Abe, Keiichi Shima, Yuji Sekiya, Daisuke Miyamoto, Tomohiro Ishihara, Kazuya Okada:
Hayabusa: Simple and Fast Full-Text Search Engine for Massive System Log Data. CFI 2017: 2:1-2:7 - Alaa M. Allakany, Koji Okamura:
Latency Monitoring in Software-Defined Networks. CFI 2017: 5:1-5:4 - Guang Cheng, Jun Yu:
Adaptive Sampling for OpenFlow Network Measurement Methods. CFI 2017: 4:1-4:7 - Jung-Su Han, Jongwon Kim:
Design of SaaS OverCloud for 3-tier SaaS Compatibility over Cloud-based Multiple Boxes. CFI 2017: 6:1-6:4 - Boram Jin, Daewoo Kim, Se-Young Yun, Jinwoo Shin, Seongik Hong, Byoung-Joon Lee, Yung Yi:
On the Delay Scaling Laws of Cache Networks. CFI 2017: 3:1-3:6 - Amir Modarresi, James P. G. Sterbenz:
Multilevel IoT Model for Smart Cities Resilience. CFI 2017: 7:1-7:7 - Motomu Utsumi, Hirochika Asai, Hiroshi Esaki:
Spatio-Temporal Modeling of BGP Routing Table Evolution. CFI 2017: 8:1-8:7 - Kazuhiko Yamamoto, Tatsuhiro Tsujikawa, Kazuho Oku:
Exploring HTTP/2 Header Compression. CFI 2017: 1:1-1:5 - Proceedings of the 12th International Conference on Future Internet Technologies, CFI 2017, Fukuoka, Japan, June 14 - 16, 2017. ACM 2017, ISBN 978-1-4503-5332-8 [contents]
- 2016
- Agussalim, Masato Tsuru:
Spray and Hop Distance Routing Protocol in Multiple-island DTN Scenarios. CFI 2016: 49-55 - Mian Dai, Guang Cheng, Yuxiang Wang:
Detecting Network Topology and Packet Trajectory with SDN-enabled FPGA Platform. CFI 2016: 7-13
skipping 141 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-29 11:56 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint