![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 22 matches
- 2018
- Azzedine Boukerche, Robson E. De Grande
:
Vehicular cloud computing: Architectures, applications, and mobility. Comput. Networks 135: 171-189 (2018) - Alexandra Cetto, Mathias Klier, Alexander Richter
, Jan-Felix Zolitschka:
"Thanks for sharing" - Identifying users' roles based on knowledge contribution in Enterprise Social Networks. Comput. Networks 135: 275-288 (2018) - Saptarshi Chaudhuri, Irfan Baig, Debabrata Das
:
A novel QoS aware medium access control scheduler for LTE-advanced network. Comput. Networks 135: 1-14 (2018) - Gloria Ciavarrini, Maria S. Greco, Alessio Vecchio:
Geolocation of Internet hosts: Accuracy limits through Cramér-Rao lower bound. Comput. Networks 135: 70-80 (2018) - Marcos Falcao
, Andson Marreiros Balieiro
, Kelvin Lopes Dias
:
A flexible-bandwidth model with channel reservation and channel aggregation for three-layered Cognitive Radio Networks. Comput. Networks 135: 213-225 (2018) - Geraldo P. R. Filho
, Leandro A. Villas
, Heitor Freitas, Alan Valejo
, Daniel L. Guidoni, Jó Ueyama
:
ResiDI: Towards a smarter smart home system for decision-making using wireless sensors and actuators. Comput. Networks 135: 54-69 (2018) - Sven Hager, Patrik John, Stefan Dietzel, Björn Scheuermann:
RuleBender: Tree-based policy transformations for practical packet classification systems. Comput. Networks 135: 253-265 (2018) - Murat Karakus
, Arjan Durresi
:
Economic Viability of Software Defined Networking (SDN). Comput. Networks 135: 81-95 (2018) - Walid Khallef, Sylvain Durand, Miklós Molnár
:
ILP formulation of the exact solution of multi-constrained minimum cost multicast. Comput. Networks 135: 160-170 (2018) - Charalampos Konstantopoulos
, Nikolaos Vathis, Grammati E. Pantziou
, Damianos Gavalas
:
Employing mobile elements for delay-constrained data gathering in WSNs. Comput. Networks 135: 108-131 (2018) - Kushan Sudheera Kalupahana Liyanage
, Maode Ma, Peter Han Joo Chong
:
Controller placement optimization in hierarchical distributed software defined vehicular networks. Comput. Networks 135: 226-239 (2018) - Arvind Merwaday, Murat Yuksel
, Thomas Quint, Ismail Güvenç
, Walid Saad, Naim Kapucu:
Incentivizing spectrum sharing via subsidy regulations for future wireless networks. Comput. Networks 135: 132-146 (2018) - Mira Morcos, Tijani Chahed, Lin Chen, Jocelyne Elias, Fabio Martignon:
A two-level auction for resource allocation in multi-tenant C-RAN. Comput. Networks 135: 240-252 (2018) - Mohiyeddin Mozaffari
, Behrouz Safarinejadian, Mokhtar Shasadeghi:
Probability density estimation in sensor networks based on distributed mixture of factor analyzers, mobile agents and stochastic sensor selection. Comput. Networks 135: 44-53 (2018) - Andrés Felipe Murillo-Piedrahita, Vikram Gaur, Jairo Giraldo, Alvaro A. Cárdenas, Sandra Julieta Rueda:
Virtual incident response functions in control systems. Comput. Networks 135: 147-159 (2018) - Sana Rekik, Nouha Baccour
, Mohamed Jmaiel, Khalil Drira, Luigi Alfredo Grieco:
Autonomous and traffic-aware scheduling for TSCH networks. Comput. Networks 135: 201-212 (2018) - Eryk Schiller
, Navid Nikaein, Eirini Kalogeiton, Mikael Gasparyan, Torsten Braun
:
CDS-MEC: NFV/SDN-based Application Management for MEC in 5G Systems. Comput. Networks 135: 96-107 (2018) - José Suárez-Varela
, Pere Barlet-Ros
:
Flow monitoring in Software-Defined Networks: Finding the accuracy/performance tradeoffs. Comput. Networks 135: 289-301 (2018) - Yingjie Wang
, Zhipeng Cai
, Xiangrong Tong, Yang Gao, Guisheng Yin:
Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems. Comput. Networks 135: 32-43 (2018) - Hui Xia, Bin Fang, Matthew Roughan, Kenjiro Cho
, Paul Tune:
A BasisEvolution framework for network traffic anomaly detection. Comput. Networks 135: 15-31 (2018) - Heng Zhang
, Wei Xing Zheng:
Optimum transmission policy for remote state estimation with opportunistic energy harvesting. Comput. Networks 135: 266-274 (2018) - Haitao Zhao, Lingchu Mao, Jibo Wei:
Coverage on demand: A simple motion control algorithm for autonomous robotic sensor networks. Comput. Networks 135: 190-200 (2018)
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-18 14:21 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint