default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2007
- Filipe Abrantes, Manuel Ricardo:
A simulation study of xcp-b performance in wireless multi-hop networks. Q2SWinet 2007: 23-30 - Asmaa Adnane, Rafael T. de Sousa Jr., Christophe Bidan, Ludovic Mé:
Integrating trust reasonings into node behavior in olsr. Q2SWinet 2007: 152-155 - Ghada Alnifie, Robert Simon:
A multi-channel defense against jamming attacks in wireless sensor networks. Q2SWinet 2007: 95-104 - Alessandro Andreadis, Riccardo Zambon:
Qos enhancement for multimedia traffics with dynamic txoplimit in ieee 802.11e. Q2SWinet 2007: 16-22 - Gennaro Boggia, Pietro Camarda, Luigi Alfredo Grieco, Giuseppe Tomasicchio:
A dynamic bandwidth allocation algorithm for supporting real-time applications in 802.15.3 wpans. Q2SWinet 2007: 8-15 - Azzedine Boukerche, Yonglin Ren:
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks. Q2SWinet 2007: 86-94 - Yan Cheng, J. William Atwood:
Performance evaluation of qos-agent assisted mipv6 handoff scheme. Q2SWinet 2007: 55-62 - Gerardo Gómez, Javier Poncela-González, M. Carmen Aguayo-Torres, José F. Paris, José T. Entrambasaguas:
Qos modeling for performance evaluation over evolved 3g networks. Q2SWinet 2007: 148-151 - Lei Huang, Li Lei, Lixiang Liu, Haibin Zhang, Linsha Tang:
Stimulating cooperation in route discovery of ad hoc networks. Q2SWinet 2007: 39-46 - Junbeom Hur, Young-joo Shin, Hyunsoo Yoon:
Decentralized group key management for dynamic networks using proxy cryptography. Q2SWinet 2007: 123-129 - Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:
Methodologies and frameworks for testing ids in adhoc networks. Q2SWinet 2007: 113-122 - Vitor Jesus, Susana Sargento, Miguel Almeida, Daniel Corujo, Rui L. Aguiar, Janusz Gozdecki, Gustavo Carneiro, Albert Banchs, Pablo Yáñez-Mingot:
Integration of mobility and qos in 4g scenarios. Q2SWinet 2007: 47-54 - Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Two privacy enhanced context transfer schemes. Q2SWinet 2007: 172-175 - Vasileios Karyotis, Symeon Papavassiliou:
On the malware spreading over non-propagative wireless ad hoc networks: the attacker's perspective. Q2SWinet 2007: 156-159 - Maryna Komarova, Michel Riguidel:
Optimized ticket distribution scheme for fast re-authentication protocol (fap). Q2SWinet 2007: 71-77 - Spyros Kopsidas, Dimitris Zisiadis, Leandros Tassiulas:
A secure voip conference system: architecture analysis and design issues. Q2SWinet 2007: 180-183 - Jérôme Lebegue, Christophe Bidan, Thierry Plesse:
Security of predefined groups in manets. Q2SWinet 2007: 164-167 - Andrey I. Lyakhov, Vladimir M. Vishnevsky, Mikhail Yakimov:
Multicast qos support in ieee 802.16. Q2SWinet 2007: 63-70 - Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt:
Regional-based authentication against dos attacks in wireless networks. Q2SWinet 2007: 176-179 - Luminita Moraru, Pierre Leone, Sotiris E. Nikoletseas, José D. P. Rolim:
Near optimal geographic routing with obstacle avoidance in wireless sensor networks by fast-converging trust-based algorithms. Q2SWinet 2007: 31-38 - Alireza A. Nezhad, Dimitris Makrakis, Ali Miri:
Anonymous topology discovery for multihop wireless sensor networks. Q2SWinet 2007: 78-85 - Ingrid Juliana Niño, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni:
Assessing the effectiveness of longest-in-system (lis) schedulingin ad hoc networks. Q2SWinet 2007: 1-7 - Sewook Oh, Seong Rae Park:
Providing qos for streaming traffic in mobile network with mobile router. Q2SWinet 2007: 144-147 - Swapnil Pathare, Sukumar Nandi:
Sahnet: a secure system for ad-hoc networking using ecc. Q2SWinet 2007: 130-135 - Kostas E. Psannis, Yutaka Ishibashi, Marios G. Hadjinicolaou:
Qos for wireless interactive multimedia streaming. Q2SWinet 2007: 168-171 - David Sanchez:
Secure, accurate and precise time synchronization for wireless sensor networks. Q2SWinet 2007: 105-112 - Joseph Chee Ming Teo, Chik How Tan:
Denial-of-service resilience password-based group key agreement for wireless networks. Q2SWinet 2007: 136-143 - Anis Zouari, Karine Guillouard, Jean-Marie Bonnin:
A performance analysis of distributed qos negotiation during session establishment. Q2SWinet 2007: 160-163 - Hsiao-Hwa Chen, Luciano Bononi:
Q2SWinet'07 - Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007. ACM 2007, ISBN 978-1-59593-806-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-03 01:27 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint