default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 45 matches
- 2003
- Ian F. Akyildiz, Özgür B. Akan, Chao Chen, Jian Fang, Weilian Su:
InterPlaNetary Internet: state-of-the-art and research challenges. Comput. Networks 43(2): 75-112 (2003) - Eitan Altman, Rachid El Azouzi, Odile Pourtallier:
Avoiding paradoxes in multi-agent competitive routing. Comput. Networks 43(2): 133-146 (2003) - Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi, John Pinkston:
Secure sensor networks for perimeter protection. Comput. Networks 43(4): 421-435 (2003) - Abdullah Balamash, Marwan Krunz:
Modeling web requests: a multifractal approach. Comput. Networks 43(2): 211-226 (2003) - Ana M. Barbancho, Alberto Peinado:
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. Comput. Networks 43(6): 777-785 (2003) - Kemal Bicakci, Gene Tsudik, Brian Tung:
How to construct optimal one-time signatures. Comput. Networks 43(3): 339-349 (2003) - Marcus Brunner, Alberto Gonzalez Prieto, Paloma Martínez:
From dynamic IP transport service ordering to DiffServ network configuration. Comput. Networks 43(1): 25-41 (2003) - Catherine M. Burns, Johnson Kuo, Sylvia Ng:
Ecological interface design: a new approach for visualizing network management. Comput. Networks 43(3): 369-388 (2003) - Erdal Cayirci, Ramesh Govindan, Taieb Znati, Mani B. Srivastava:
Wireless sensor networks. Comput. Networks 43(4): 417-419 (2003) - Chao-Hsu Chang, Eric Hsiao-Kuang Wu:
AMRST: adaptive multicast routing protocol for satellite-terrestrial networks. Comput. Networks 43(6): 713-734 (2003) - Alexander Clemm, Fong Shen, Victor Lee:
Generic provisioning of heterogeneous services--a close encounter with service profiles. Comput. Networks 43(1): 43-57 (2003) - Tom Coffey, Reiner Dojen, Tomas Flanagan:
Formal verification: an imperative step in the design of security protocols . Comput. Networks 43(5): 601-618 (2003) - Tamer Dag, Ioannis Stavrakakis:
Proactive congestion control for high speed networks. Comput. Networks 43(6): 761-775 (2003) - Swades De, Chunming Qiao, Hongyi Wu:
Meshed multipath routing with selective forwarding: an efficient strategy in wireless sensor networks. Comput. Networks 43(4): 481-497 (2003) - Enrique J. Duarte-Melo, Mingyan Liu:
Data-gathering wireless sensor networks: organization and capacity. Comput. Networks 43(4): 519-537 (2003) - Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
NSDF: a computer network system description framework and its application to network security. Comput. Networks 43(5): 573-600 (2003) - Metin Feridun, Gabi Dreo Rodosek:
Management of IT services. Comput. Networks 43(1): 1-2 (2003) - Ran Giladi, Ephraim Korach, Rony Ohayon:
Placement of network resources in communication networks. Comput. Networks 43(2): 195-209 (2003) - Ahmed Helmy:
Mobility-assisted resolution of queries in large-scale mobile sensor networks (MARQ) . Comput. Networks 43(4): 437-458 (2003) - Fei Hu, Neeraj K. Sharma:
Multimedia call admission control in mobile networks: a dynamical reservation-pool approach. Comput. Networks 43(3): 263-288 (2003) - Yuming Jiang:
Relationship between guaranteed rate server and latency rate server. Comput. Networks 43(3): 307-315 (2003) - Kyungsup Kim, Chong-Ho Choi:
Queue delay estimation and its application to TCP Vegas. Comput. Networks 43(5): 619-631 (2003) - Timo Koskela, Jukka Heikkonen, Kimmo Kaski:
Web cache optimization with nonlinear model using object features. Comput. Networks 43(6): 805-817 (2003) - Adrian Lahanas, Vassilios Tsaoussidis:
Exploiting the efficiency and fairness potential of AIMD-based congestion avoidance and control. Comput. Networks 43(2): 227-245 (2003) - Koen Langendoen, Niels Reijers:
Distributed localization in wireless sensor networks: a quantitative compariso. Comput. Networks 43(4): 499-518 (2003) - Steven H. Low, Fernando Paganini, Jiantao Wang, John C. Doyle:
Linear stability of TCP/RED and a scalable control. Comput. Networks 43(5): 633-647 (2003) - Mihael Mohorcic, Ales Svigelj, Gorazd Kandus, Yim-Fun Hu, Ray E. Sheriff:
Demographically weighted traffic flow models for adaptive routing in packet-switched non-geostationary satellite meshed networks. Comput. Networks 43(2): 113-131 (2003) - Dániel Orincsay, Balázs Szviatovszki, Géza Böhm:
Prompt partial path optimization in MPLS networks. Comput. Networks 43(5): 557-572 (2003) - Jianping Pan, Yiwei Thomas Hou, Bo Li:
An overview of DNS-based server selections in content distribution networks. Comput. Networks 43(6): 695-711 (2003) - Dhananjay S. Phatak, Tom Goff, Jim Plusquellic:
IP-in-IP tunneling to enable the simultaneous use of multiple IP interfaces for network level connection striping. Comput. Networks 43(6): 787-804 (2003)
skipping 15 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-24 18:04 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint