default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2008
- Nick Antonopoulos, Georgios Exarchakos, Kan Zhang:
Sharing Supply-Demand Trends for Efficient Resource Discovery in GRID Environments. INC 2008: 125-137 - Christopher Bolan:
A Review of the Electronic Product Code Standards for RFID Technology. INC 2008: 171-178 - Christos Bouras, Apostolos Gkamas, Kostas Stamos:
Monitoring End to End Bandwidth on Demand Circuits over Ethernet Infrastructure. INC 2008: 3-13 - James S. Briggs, Vasilios Katos, Azzri Bhaludin:
On the Security Controls of Portable Computing Devices in Healthcare Environments. INC 2008: 161-170 - John N. Davies, Vic Grout, Rich Picking:
Prediction of Wireless Network Signal Strength Within a Building. INC 2008: 193-207 - Armando Roy Delgado, Alexia Robinet, Vic Grout, Rich Picking, John McGinn:
A Survey of Applying Ad Hoc Wireless Sensor Actuator Networks to Enhance Context-Awareness in Environmental Management Systems. INC 2008: 77-90 - Ying Dong, Victor O. K. Li, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Strongly Anonymous Communications in Mobile Ad Hoc Networks. INC 2008: 181-191 - Mahmoud M. Elmesalawy, Gamal Abd-Elfadeel, Ibrahim I. Ibrahim:
Genetic-Based Subcarrier and Bit Allocation Algorithm for Multiuser OFDM System. INC 2008: 39-52 - Michael P. Evans, Shirley Williams, Patrick Parslow, Robert P. Ashton, Karsten Øster Lundqvist, Edwin Porter-Daniels:
The MeAggregator: Personal Aggregation and the Life-Long Tail of the Web. INC 2008: 235-244 - Georgios Exarchakos, Nick Antonopoulos, Kan Zhang:
Firewalks: Discovery Mechanism for Non-Replicable Reusable Resources. INC 2008: 65-76 - Vic Grout, Stuart Cunningham, Rich Hebblewhite:
An Illustrative Discussion of Different Perspectives in Network Engineering. INC 2008: 91-104 - Vic Grout, John N. Davies, John McGinn:
Traffic Modelling and Simulation Techniques for Evaluating ACL Implementation. INC 2008: 105-123 - Holger D. Hofmann, Martin Hans Knahl:
The Web 2.0 Demystified – Six Theses on a Misinterpreted Concept. INC 2008: 245-259 - Dan Komosny, Kathiravelu Ganeshan, Mojmir Jelinek, Radim Burget:
Scalability Issues with the Hierarchical Feedback Aggregation for Large-Scale IPTV Systems. INC 2008: 15-26 - Oleksiy Mazhelis, Hannakaisa Isomäki:
Security Assessment and Planning in Small Organizations. INC 2008: 149-159 - Mike Morgan, Vic Grout:
Finding Optimal Solutions to Backbone Minimisation Problems using Mixed Integer Programming. INC 2008: 53-63 - Bartlomiej Polakowski, Krzysztof Amborski:
Ontologies for eLearning. INC 2008: 211-221 - Oliver Schneider, Udo Bleimann, Andrew D. Phippen, Bettina Harriehausen-Mühlbauer:
Inside Coherence: Concept for a Non-Linear eLearning Solution. INC 2008: 223-233 - Ingo Stengel, Udo Bleimann, Jeanne Stynes:
Optimisation in Multi-Agent Systems. INC 2008: 271-280 - Martin Swientek, Udo Bleimann, Paul Dowland:
Service-Oriented Architecture: Performance Issues and Approaches. INC 2008: 261-269 - Emran Mohd Tamil, Mohd Yamani Idna Bin Idris, Chiew Ming Thong, Madihah Mohd Saudi, Mohd Zalisham Jali:
Needleman Wunsch Implementation for SPAM/UCE Inline Filter. INC 2008: 141-147 - Frank Weber, Woldemar F. Fuhrmann, Ulrich Trick, Udo Bleimann, Bogdan V. Ghita:
A Framework for Improved QoS Evaluation and Control in SIP-Based NGN. INC 2008: 27-37 - Paul Dowland, Steven Furnell:
Seventh International Network Conference (INC 2008), Plymouth, UK, July 8-10, 2008. Proceedings. University of Plymouth 2008, ISBN 978-1-84102-188-1 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-17 21:30 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint