default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 190 matches
- 2019
- Dapeng Wu, Jiaxing Wu, Ruyan Wang:
An Energy-efficient and Trust-based Formation Algorithm for Cooperative Vehicle Platooning. ICNC 2019: 702-707 - Roxana Abolfathi, Hoda Roodaki, Shervin Shirmohammadi:
A Novel Rate Control Method for Free-viewpoint Video in MV-HEVC. ICNC 2019: 582-587 - Nadir H. Adam, Cristiano Tapparello, Wendi B. Heinzelman:
Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance Analysis. ICNC 2019: 735-740 - Paolo Addesso, Michele Cirillo, Mario Di Mauro, Maurizio Longo, Vincenzo Matta:
Adversarial Detection of Concealed VoIP Traffic. ICNC 2019: 437-441 - Amer Al-Baidhani, H. Howard Fan:
Learning for Detection: A Deep Learning Wireless Communication Receiver Over Rayleigh Fading Channels. ICNC 2019: 6-10 - Jaber Al-Khori, Galymzhan Nauryzbayev, Mohamed Abdallah, Mounir Hamdi:
Secrecy Capacity of Hybrid RF/VLC DF Relaying Networks with Jamming. ICNC 2019: 67-72 - Ahmed Alahmadi, Yuan Liang, Run Tian, Jian Ren, Tongtong Li:
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry. ICNC 2019: 509-514 - Abdulazaz Ali Albalawi, J. J. Garcia-Luna-Aceves:
A Delay-Based Congestion-Control Protocol for Information-Centric Networks. ICNC 2019: 809-815 - Sami Alesawi, Sakher Ghanem:
Overcome Heterogeneity Impact in Modeled Fork-Join Queuing Networks for Tail Prediction. ICNC 2019: 270-275 - Sami Alesawi, Minh Nguyen, Hao Che, Akshit Singhal:
Tail Latency Prediction for Datacenter Applications in Consolidated Environments. ICNC 2019: 265-269 - Imad Ali, Ronald Y. Chang, Cheng-Hsin Hsu:
SORT: SOcial HelpeR SelecTion Scheme for Mobile Question Answering Systems. ICNC 2019: 647-652 - Saleh Almutairi, Ramesh K. Karne, Alexander L. Wijesinha:
A Bare PC Text Based Browser. ICNC 2019: 334-338 - Dema Alorini, Danda B. Rawat:
Automatic Spam Detection on Gulf Dialectical Arabic Tweets. ICNC 2019: 448-452 - Anwar Alyatama:
Multi-Resource Continuous Allocation Model for Cloud Services. ICNC 2019: 153-158 - Min Kyung An, Hyuk Cho, Bing Zhou, Lei Chen:
Minimum Latency Aggregation Scheduling in Internet of Things. ICNC 2019: 395-401 - Bogdan Antonescu, Miead Tehrani Moayyed, Stefano Basagni:
Diffuse Scattering Models for mmWave V2X Communications in Urban Scenarios. ICNC 2019: 923-929 - Yuya Aoki, Takeo Fujii:
Construction of Time-Space Radio Environment Database using HMM for Cooperative Sensing. ICNC 2019: 219-223 - Pranavi Appana, Xiaoyan Sun, Yuan Cheng:
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance. ICNC 2019: 567-571 - Michael Berhane Asfaw, Xueqin Jiang, Meixiang Zhang, Jia Hou, Wei Duan:
Performance Analysis of Raptor Code for Reconciliation in Continuous Variable Quantum Key Distribution. ICNC 2019: 463-467 - Constantine Ayimba, Paolo Casari, Vincenzo Mancuso:
Adaptive Resource Provisioning based on Application State. ICNC 2019: 663-668 - Aytac Azgin, Ravishankar Ravindran:
Stateless Forwarding in ICN with Dynamic Non-Bloom Filters. ICNC 2019: 828-834 - Meghana Bande, Venugopal V. Veeravalli:
Multi-User Multi-Armed Bandits for Uncoordinated Spectrum Access. ICNC 2019: 653-657 - Nardine Basta, Amal El-Nahas, Hans Peter Großmann, Slim Abdennadher:
SMAP: A Map Extension Framework for Intelligent Travel Systems. ICNC 2019: 46-50 - Hasan Burhan Beytur, Elif Uysal-Biyikoglu:
Age Minimization of Multiple Flows using Reinforcement Learning. ICNC 2019: 339-343 - Edoardo Biagioni:
Preventing UDP Flooding Amplification Attacks with Weak Authentication. ICNC 2019: 78-82 - Sebastian Birke, Dominik Auras, Tobias Piwczyk, Robin Mahlke, Nikolas Alberti, Rainer Leupers, Gerd Ascheid:
VLSI Architectures for ORVD Trellis based MIMO Detection. ICNC 2019: 983-989 - Raffaele Bolla, Alessandro Carrega, Matteo Repetto:
An abstraction layer for cybersecurity context. ICNC 2019: 214-218 - Jarrett Booz, Wei Yu, Guobin Xu, David W. Griffith, Nada Golmie:
A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis. ICNC 2019: 697-701 - William Brockelsby, Rudra Dutta:
A Graded Approach to Network Forensics with Privacy Concerns. ICNC 2019: 292-297 - Xiaobo Cai, Huihui Wang, Houbing Song, Yue Zhang, Ke Han, Zhiyong Cao:
An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computing. ICNC 2019: 782-786
skipping 160 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-29 16:23 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint