default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 21 matches
- 2011
- Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Ariff Abdullah, Mohiuddin Ahmed, Omar Al-Mushayt, Shariq Haseeb:
Performance analysis of a highly available home agent in mobile networks. SpringSim (CNS) 2011: 62-70 - Mohammed A. Abuhelaleh, Khaled M. Elleithy:
Security in wireless sensor networks: key intrusion detection module in SOOAWSN. SpringSim (CNS) 2011: 56-61 - David Bauschlicher, Steven Bauschlicher, Hala ElAarag:
Framework for the integration of body sensor networks and social networks to improve health awareness. SpringSim (CNS) 2011: 19-26 - Fouad Butt, Abdolreza Abhari, Jahan Tavakkoli:
An application of high performance computing to improve linear acoustic simulation. SpringSim (CNS) 2011: 71-78 - Stanley L. Cebula, Aftab Ahmad, Luay A. Wahsheh, Jonathan M. Graham, Sandra J. DeLoatch, Aurelia T. Williams:
How secure is WiFi MAC layer in comparison with IPsec for classified environments? SpringSim (CNS) 2011: 109-116 - Sanjay K. Dhurandher, Mohammad S. Obaidat, Ankit Mahendru, Lakshaya Agnani:
Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation. SpringSim (CNS) 2011: 5-10 - Adel Gaafar A. Elrahim, Hussein A. Elsayed, Salwa H. El-Ramly, Magdy M. Ibrahim:
An energy aware routing protocol for mixed static and mobile nodes in wireless sensor networks. SpringSim (CNS) 2011: 79-86 - Eugene P. Gerety, Khaled M. Elleithy:
Location-based security for ID document and ID card enrollment stations. SpringSim (CNS) 2011: 35-42 - Daniel Günther, Michel Steichen, Nathan Kerr, Paul Müller:
Evaluating network simulators as extensions of real network testbeds. SpringSim (CNS) 2011: 103-108 - Joon-Myung Kang, Sin-Seok Seo, John Strassner, James Won-Ki Hong:
HMNToolSuite: tool support for mobility management of mobile devices in heterogeneous mobile networks. SpringSim (CNS) 2011: 95-102 - Alexey Khoryaev, Andrey Chervyakov, Mikhail Shilov, Sergey Panteleev, Apostolos Papathanassiou, Alexander Maltsev:
Multi standard system level simulation framework for evaluation of mobile broadband networks. SpringSim (CNS) 2011: 117-124 - Shikharesh Majumdar:
Resource management on clouds and grids: challenges and answers. SpringSim (CNS) 2011: 151-152 - Arayeh Norouzi, Abdolreza Abhari, Truman Yang:
Enhancing broadcast authentication in sensor networks. SpringSim (CNS) 2011: 125-132 - Hassan Rajaei, Arwa Aldhalaan:
Advances in virtual learning environments and classrooms. SpringSim (CNS) 2011: 133-142 - Hassan Rajaei, Erick Eid, Divy Kanungo, Jordan Ringenberg:
JSimPlus: a tool for teaching simulation techniques. SpringSim (CNS) 2011: 87-94 - Hassan Rajaei, Jeffrey Wappelhorst:
Clouds & grids: a network and simulation perspective. SpringSim (CNS) 2011: 143-150 - Thomas Rauber, Gudula Rünger:
Modeling the energy consumption for concurrent executions of parallel tasks. SpringSim (CNS) 2011: 11-18 - Syed Sajjad Rizvi, Khaled M. Elleithy:
A generic optimized time management algorithms (OTMA) framework for simulating large-scale overlay networks. SpringSim (CNS) 2011: 27-34 - Yelena Rykalova, Lev B. Levitin:
Latency and saturation in networks with finite buffers. SpringSim (CNS) 2011: 43-50 - Salah Sharieh, Franya Franek, Alexander Ferworn:
Mobile medical application model for heterogeneous networks. SpringSim (CNS) 2011: 51-55 - Abdolreza Abhari:
2011 Spring Simulation Multi-conference, SpringSim '11, Boston, MA, USA, April 03-07, 2011. Volume 3: Proceedings of the 14th Communications and Networking Symposium (CNS). SCS/ACM 2011 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-05 04:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint