default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 449 matches
- 2019
- Omar Alfandi, Musaab Hasan, Zayed Balbahaith:
Assessment and Hardening of IoT Development Boards. WWIC 2019: 27-39 - Dhulfiqar A. Alwahab, Sándor Laki:
ECN-Enhanced CoDel AQM. WWIC 2019: 157-169 - Abdelmadjid Benarfa, Muhammad Hassan, Alberto Compagno, Eleonora Losiouk, Mohamed Bachir Yagoubi, Mauro Conti:
ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN. WWIC 2019: 53-65 - Patrick Bosch, Steven Latré, Chris Blondia:
IEEE 802.11 Latency Modeling with Non-IEEE 802.11 Interfering Source. WWIC 2019: 40-50 - Chiara Caiazza, Enrico Gregori, Valerio Luconi, Francesco Mione, Alessio Vecchio:
Application-Level Traceroute: Adopting Mimetic Mechanisms to Increase Discovery Capabilities. WWIC 2019: 66-77 - Domenico Capriglione, Gianni Cerro, Luigi Ferrigno, Gianfranco Miele:
The Effect of Hardware/Software Features on the Performance of an Open-Source Network Emulator. WWIC 2019: 233-245 - Baldomero Coll-Perales, Loreto Pescosolido, Andrea Passarella, Javier Gozálvez, Marco Conti:
Opportunistic D2D-Aided Uplink Communications in 5G and Beyond Networks. WWIC 2019: 141-153 - Andrey Garnaev, Jing Zhong, Wuyang Zhang, Roy D. Yates, Wade Trappe:
Proportional Fair Information Freshness Under Jamming. WWIC 2019: 91-102 - Roman Kovalchukov, Dmitri Moltchanov, Alexander Pyattaev, Aleksandr Ometov:
Evaluating Multi-connectivity in 5G NR Systems with Mixture of Unicast and Multicast Traffic. WWIC 2019: 118-128 - Paul J. Kuehn, Imran Nawab:
Analysis of Distributed Real-Time Control Systems with Shared Network Infrastructures. WWIC 2019: 222-232 - Irian Leyva-Pupo, Cristina Cervelló-Pastor, Alejandro Llorens-Carrodeguas:
Optimal Placement of User Plane Functions in 5G Networks. WWIC 2019: 105-117 - Alexandros Mavromatis, Georgios Z. Papadopoulos, Atis Elsts, Nicolas Montavont, Robert J. Piechocki, Theo Tryfonas, George Oikonomou, Xenofon Fafoutis:
Adaptive Guard Time for Energy-Efficient IEEE 802.15.4 TSCH Networks. WWIC 2019: 15-26 - Salim Mohamed, Saptarshi Das, Subir Biswas, Osama Mohammed:
On the Significance of Layer-3 Traffic Forwarding. WWIC 2019: 170-181 - Rustam Pirmagomedov, Dmitri Moltchanov, Viktor Ustinov, Md Nazmus Saqib, Sergey Andreev:
Performance of mmWave-Based Mesh Networks in Indoor Environments with Dynamic Blockage. WWIC 2019: 129-140 - Eryk Schiller, Remo Röthlisberger, Torsten Braun, Mostafa Karimzadeh:
Improving Video Delivery with Fourier Analysis of Traffic in Multi-Access Edge Computing. WWIC 2019: 209-221 - Luca Sciullo, Angelo Trotta, Lorenzo Gigli, Marco Di Felice:
Deploying W3C Web of Things-Based Interoperable Mash-up Applications for Industry 4.0: A Testbed. WWIC 2019: 3-14 - Arkadeep Sen, Krishna M. Sivalingam:
A NAT Based Seamless Handover for Software Defined Enterprise WLANs. WWIC 2019: 78-90 - Chiara Suraci, Sara Pizzi, Antonio Iera, Antonella Molinaro, Giuseppe Araniti:
Delivering Multicast Content Through Secure D2D Communications in the Internet of Things. WWIC 2019: 182-193 - Chengkai Yan, Quang Ngoc Nguyen, Ilias Benkacem, Daisuke Okabe, Akihiro Nakao, Toshitaka Tsuda, Cutifa Safitri, Tarik Taleb, Takuro Sato:
Design and Implementation of Integrated ICN and CDN as a Video Streaming Service. WWIC 2019: 194-206 - Hend Zouaoui, Simone Faricelli, Francesca Cuomo, Stefania Colonnese, Luca Chiaraviglio:
Energy and Quality Aware Multi-UAV Flight Path Design Through Q-Learning Algorithms. WWIC 2019: 246-257 - Marco Di Felice, Enrico Natalizio, Raffaele Bruno, Andreas Kassler:
Wired/Wireless Internet Communications - 17th IFIP WG 6.2 International Conference, WWIC 2019, Bologna, Italy, June 17-18, 2019, Proceedings. Lecture Notes in Computer Science 11618, Springer 2019, ISBN 978-3-030-30522-2 [contents] - 2018
- Emilio Ancillotti, Simone Bolettieri, Raffaele Bruno:
RTT-Based Congestion Control for the Internet of Things. WWIC 2018: 3-15 - Tugçe Bilen, Dinçer Salih Kurnaz, Serkan Sevim, Berk Canberk:
Parametric-Decomposition Based Request Routing in Content Delivery Networks. WWIC 2018: 323-335 - Marcin Brzozowski, Max Frohberg, Peter Langendörfer:
Real-World Deployments of Sensor Networks: Practical Lessons for Researchers. WWIC 2018: 42-53 - Domenico Capriglione, Gianni Cerro, Luigi Ferrigno, Gianfranco Miele:
How to Quantify Trust in Your Network Emulator? WWIC 2018: 171-182 - Riham S. Elhabyan, Wei Shi, Marc St-Hilaire:
An Obstacle-Aware Clustering Protocol for Wireless Sensor Networks with Irregular Terrain. WWIC 2018: 54-66 - Riham S. Elhabyan, Wei Shi, Marc St-Hilaire:
Evolutionary-Based Coverage Control Mechanism for Clustered Wireless Sensor Networks. WWIC 2018: 67-80 - Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
An Anti-jamming Strategy When it Is Unknown Which Receivers Will Face with Smart Interference. WWIC 2018: 195-206 - Haymanot Gebre-Amlak, Md Tajul Islam, Daniel Cummins, Mohammed K. Al-Mansoori, Baek-Young Choi:
Protocol Heterogeneity Issues of Incremental High-Density Wi-Fi Deployment. WWIC 2018: 159-170 - Ioanna Karantaidou, Spyros T. Halkidis, Sophia G. Petridou, Lefteris Mamatas, George Stephanides:
Pairing-Based Cryptography on the Internet of Things: A Feasibility Study. WWIC 2018: 219-230
skipping 419 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-04 13:44 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint