![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 53 matches
- 2005
- Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu:
XPref: a preference language for P3P. Comput. Networks 48(5): 809-827 (2005) - Eitan Altman, Konstantin Avrachenkov
, Chadi Barakat
, Arzad Alam Kherani, B. J. Prabhu:
Analysis of MIMD congestion control algorithm for high speed networks. Comput. Networks 48(6): 972-989 (2005) - Eitan Altman, Chadi Barakat, Víctor M. Ramos R.:
Analysis of AIMD protocols over paths with variable delay. Comput. Networks 48(6): 960-971 (2005) - Fabrice Arnal, Laurent Dairaine, Jérôme Lacan, Gérard Maral:
Cross-layer reliability management for multicast over satellite. Comput. Networks 48(1): 29-43 (2005) - Abderraouf Bahri, Steven Chamberland:
On the wireless local area network design problem with performance guarantees. Comput. Networks 48(6): 856-866 (2005) - Pantelis Balaouras, Ioannis Stavrakakis
:
A self-adjusting rate adaptation scheme with good fairness and smoothness properties. Comput. Networks 48(6): 829-855 (2005) - Feng Bao, Robert H. Deng
:
Protocols that hide user's preferences in electronic transactions. Comput. Networks 48(4): 503-515 (2005) - Emmanuel Bayse, Ana R. Cavalli, Manuel Núñez
, Fatiha Zaïdi:
A passive testing approach based on invariants: application to the WAP. Comput. Networks 48(2): 235-245 (2005) - David Brumley, Dan Boneh:
Remote timing attacks are practical. Comput. Networks 48(5): 701-716 (2005) - Shyam S. Chakraborty, Markku Liinaharja, Petri Lindroos:
Analysis of adaptive GBN schemes in a Gilbert-Elliott channel and optimisation of system parameters. Comput. Networks 48(4): 683-695 (2005) - Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen:
A fair and secure mobile billing system. Comput. Networks 48(4): 517-524 (2005) - Swati Sinha Deb, Michael E. Woodward:
A new distributed QoS routing algorithm based on Fano's method. Comput. Networks 48(2): 155-174 (2005) - Michael Devetsikiotis, Nelson L. S. da Fonseca
:
Modeling network traffic with long range dependence: characterization, visualization and tools. Comput. Networks 48(3): 289-291 (2005) - Johannes Ebert, Michael Schmidt:
A low overhead encapsulation method for MF-TDMA. Comput. Networks 48(1): 21-27 (2005) - Gorry Fairhurst
, Marie-José Montpetit:
Internet over MPEG-2 transmission networks. Comput. Networks 48(1): 1-3 (2005) - Dimitris Gavrilis, Evangelos Dermatas:
Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Comput. Networks 48(2): 235-245 (2005) - Weibo Gong, Yong Liu, Vishal Misra, Donald F. Towsley
:
Self-similarity and long range dependence on the internet: a second look at the evidence, origins and implications . Comput. Networks 48(3): 377-399 (2005) - Eren Gürses, Gozde Bozdagi Akar
, Nail Akar
:
A simple and effective mechanism for stored video streaming with TCP transport and server-side adaptive frame discard. Comput. Networks 48(4): 489-501 (2005) - Jun He, Hung Keng Pung:
Fairness of medium access control protocols for multi-hop ad hoc wireless networks. Comput. Networks 48(6): 867-890 (2005) - Helmut Hlavacs, Michael Haddad, Christophe Lafouge, Delphine Kaplan, Jean Ribeiro:
The CODIS Content Delivery Network. Comput. Networks 48(1): 75-89 (2005) - Vasil Hnatyshin
, Adarshpal S. Sethi:
Estimating aggregate resource reservation for dynamic, scalable, and fair distribution of bandwidth. Comput. Networks 48(4): 525-547 (2005) - Yao-Wen Huang, Chung-Hung Tsai, Tsung-Po Lin, Shih-Kun Huang
, D. T. Lee, Sy-Yen Kuo
:
A testing framework for Web application security assessment. Comput. Networks 48(5): 739-761 (2005) - Han S. Kim, Ness B. Shroff:
The notion of end-to-end capacity and its application to the estimation of end-to-end network delays. Comput. Networks 48(3): 475-488 (2005) - Dimitris Kouis
, Dimitrios Loukatos
, Kimon P. Kontovasilis, George Kormentzas, Charalabos Skianis:
On the effectiveness of DVB-T for the support of IP-based services in heterogeneous wireless networks. Comput. Networks 48(1): 57-73 (2005) - Christopher Krügel, Giovanni Vigna, William K. Robertson:
A multi-model approach to the detection of web-based attacks. Comput. Networks 48(5): 717-738 (2005) - Chris Lesniewski-Laas, M. Frans Kaashoek:
SSL splitting: Securely serving data from untrusted caches. Comput. Networks 48(5): 763-779 (2005) - Wei Liang, Wenye Wang
:
On performance analysis of challenge/response based authentication in wireless networks. Comput. Networks 48(2): 267-288 (2005) - Anirban Mahanti, Derek L. Eager, Mary K. Vernon:
Improving multirate congestion control using a TCP Vegas throughput model. Comput. Networks 48(2): 113-136 (2005) - Patrick D. McDaniel, Aviel D. Rubin:
Web security. Comput. Networks 48(5): 697-699 (2005) - Cesar A. V. Melo, Nelson L. S. da Fonseca
:
Envelope process and computation of the equivalent bandwidth of multifractal flows. Comput. Networks 48(3): 351-375 (2005)
skipping 23 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-01 08:51 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint