default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 101 matches
- 2015
- Li Li, H. Vincent Poor, Lajos Hanzo:
Non-Coherent Successive Relaying and Cooperation: Principles, Designs, and Applications. IEEE Commun. Surv. Tutorials 17(3): 1708-1737 (2015) - Eslam G. AbdAllah, Hossam S. Hassanein, Mohammad Zulkernine:
A Survey of Security Attacks in Information-Centric Networking. IEEE Commun. Surv. Tutorials 17(3): 1441-1454 (2015) - Ayaz Ahmad, Sadiq Ahmad, Mubashir Husain Rehmani, Naveed Ul Hassan:
A Survey on Radio Resource Allocation in Cognitive Radio Sensor Networks. IEEE Commun. Surv. Tutorials 17(2): 888-917 (2015) - Ijaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei V. Gurtov:
Security in Software Defined Networks: A Survey. IEEE Commun. Surv. Tutorials 17(4): 2317-2346 (2015) - Ala I. Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, Moussa Ayyash:
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutorials 17(4): 2347-2376 (2015) - Mohammad Abu Alsheikh, Dinh Thai Hoang, Dusit Niyato, Hwee-Pink Tan, Shaowei Lin:
Markov Decision Processes With Applications in Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutorials 17(3): 1239-1267 (2015) - Stefan Aust, R. Venkatesha Prasad, Ignas G. Niemegeers:
Outdoor Long-Range WLANs: A Lesson for IEEE 802.11ah. IEEE Commun. Surv. Tutorials 17(3): 1761-1775 (2015) - Vaibhav Bajpai, Jürgen Schönwälder:
A Survey on Internet Performance Measurement Platforms and Related Standardization Efforts. IEEE Commun. Surv. Tutorials 17(3): 1313-1341 (2015) - Suvadip Batabyal, Parama Bhaumik:
Mobility Models, Traces and Impact of Mobility on Opportunistic Routing Algorithms: A Survey. IEEE Commun. Surv. Tutorials 17(3): 1679-1707 (2015) - Lars Torsten Berger, Andreas Schwager, Pascal Pagani, Daniel M. Schneider:
MIMO Power Line Communications. IEEE Commun. Surv. Tutorials 17(1): 106-124 (2015) - Salim Bitam, Abdelhamid Mellouk, Sherali Zeadally:
Bio-Inspired Routing Algorithms Survey for Vehicular Ad Hoc Networks. IEEE Commun. Surv. Tutorials 17(2): 843-867 (2015) - Nesrine Chakchouk:
A Survey on Opportunistic Routing in Wireless Communication Networks. IEEE Commun. Surv. Tutorials 17(4): 2214-2241 (2015) - Bijoy Chand Chatterjee, Nityananda Sarma, Eiji Oki:
Routing and Spectrum Allocation in Elastic Optical Networks: A Tutorial. IEEE Commun. Surv. Tutorials 17(3): 1776-1800 (2015) - Aleksandra Checko, Henrik Lehrmann Christiansen, Ying Yan, Lara Scolari, Georgios Kardaras, Michael S. Berger, Lars Dittmann:
Cloud RAN for Mobile Networks - A Technology Overview. IEEE Commun. Surv. Tutorials 17(1): 405-426 (2015) - Yanjiao Chen, Kaishun Wu, Qian Zhang:
From QoS to QoE: A Tutorial on Video Quality Assessment. IEEE Commun. Surv. Tutorials 17(2): 1126-1165 (2015) - Madushanka Nishan Dharmaweera, Rajendran Parthiban, Y. Ahmet Sekercioglu:
Toward a Power-Efficient Backbone Network: The State of Research. IEEE Commun. Surv. Tutorials 17(1): 198-227 (2015) - Soufiene Djahel, Ronan Doolan, Gabriel-Miro Muntean, John Murphy:
A Communications-Oriented Perspective on Traffic Management Systems for Smart Cities: Challenges and Innovative Approaches. IEEE Commun. Surv. Tutorials 17(1): 125-151 (2015) - Esra Erdin, Christopher Zachor, Mehmet Hadi Gunes:
How to Find Hidden Users: A Survey of Attacks on Anonymity Networks. IEEE Commun. Surv. Tutorials 17(4): 2296-2316 (2015) - Melike Erol-Kantarci, Hussein T. Mouftah:
Energy-Efficient Information and Communication Infrastructures in the Smart Grid: A Survey on Interactions and Open Issues. IEEE Commun. Surv. Tutorials 17(1): 179-197 (2015) - Christian Esposito, Mario Ciampi:
On Security in Publish/Subscribe Services: A Survey. IEEE Commun. Surv. Tutorials 17(2): 966-997 (2015) - Yi Fang, Guoan Bi, Yong Liang Guan, Francis C. M. Lau:
A Survey on Protograph LDPC Codes and Their Applications. IEEE Commun. Surv. Tutorials 17(4): 1989-2016 (2015) - Chao Fang, F. Richard Yu, Tao Huang, Jiang Liu, Yunjie Liu:
A Survey of Green Information-Centric Networking: Research Issues and Challenges. IEEE Commun. Surv. Tutorials 17(3): 1455-1472 (2015) - Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Commun. Surv. Tutorials 17(2): 998-1022 (2015) - Markus Fidler, Amr Rizk:
A Guide to the Stochastic Network Calculus. IEEE Commun. Surv. Tutorials 17(1): 92-105 (2015) - Sören Finster, Ingmar Baumgart:
Privacy-Aware Smart Metering: A Survey. IEEE Commun. Surv. Tutorials 17(2): 1088-1101 (2015) - Hui Gao, Chi Harold Liu, Wendong Wang, Jianxin Zhao, Zheng Song, Xin Su, Jon Crowcroft, Kin K. Leung:
A Survey of Incentive Mechanisms for Participatory Sensing. IEEE Commun. Surv. Tutorials 17(2): 918-943 (2015) - Fayezeh Ghavimi, Hsiao-Hwa Chen:
M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, Service Requirements, Challenges, and Applications. IEEE Commun. Surv. Tutorials 17(2): 525-549 (2015) - Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva:
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Commun. Surv. Tutorials 17(3): 1294-1312 (2015) - Mohamed Hadded, Paul Mühlethaler, Anis Laouiti, Rachid Zagrouba, Leïla Azouz Saïdane:
TDMA-Based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis, and Open Research Issues. IEEE Commun. Surv. Tutorials 17(4): 2461-2492 (2015) - Evangelos Haleplidis, Jamal Hadi Salim, Joel M. Halpern, Susan Hares, Kostas Pentikousis, Kentaro Ogawa, Weiming Wang, Spyros G. Denazis, Odysseas G. Koufopavlou:
Network Programmability With ForCES. IEEE Commun. Surv. Tutorials 17(3): 1423-1440 (2015)
skipping 71 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-16 11:07 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint