![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2017
- Shireesh Bhat, Robinson Udechukwu, Rudra Dutta
, George N. Rouskas
:
Network service orchestration in heterogeneous 5G networks using an open marketplace. IET Networks 6(6): 149-156 (2017) - Dhanaraj Cheelu, M. Rajasekhara Babu, Chi-Yuan Chen, P. Venkata Krishna
, Sumanth Yenduri:
Intelligent vertical handoff decision strategy based on network performance prediction and consumer surplus value for next generation wireless networks. IET Networks 6(4): 69-74 (2017) - Sang-Il Choi, Seok Joo Koh
, Sang-Kyu Lim
, Tae Gyu Kang:
Reliable transmission of visible light communication data in lighting control networks. IET Networks 6(3): 62-68 (2017) - Luca Costantini, Elena Mammi, Marco Teodori, Vincenzo Attanasio:
Polynomial regression models to explain the relationship between network and service key performance indicators. IET Networks 6(5): 125-132 (2017) - Deepa Das, Susmita Das
:
Adaptive resource allocation scheme for cognitive radio vehicular ad-hoc network in the presence of primary user emulation attack. IET Networks 6(1): 5-13 (2017) - Niladri Das, Brijesh Kumar Rai
:
On achievability of an ( r , l ) fractional linear network code. IET Networks 6(3): 54-61 (2017) - Ahmed Fakhrudeen
, Omar Y. K. Alani
:
Identification as a deterrent for security enhancement in cognitive radio networks. IET Networks 6(6): 193-202 (2017) - Ya Gao, Weitao Pan
, Ling Zheng:
Improved analytical model for performance evaluation of crosspoint-queued switch under uniform traffic. IET Networks 6(4): 81-86 (2017) - Rolando Herrero, Claude St-Pierre:
Analytical model of stream transported media. IET Networks 6(1): 14-21 (2017) - Rolando Herrero, Claude St-Pierre:
Dynamic forward error correction in wireless real-time Internet of Things networks. IET Networks 6(6): 218-223 (2017) - A. Meena Kowshalya
, M. L. Valarmathi
:
Trust management for reliable decision making among social objects in the Social Internet of Things. IET Networks 6(4): 75-80 (2017) - Murat Kuzlu
, Md. Moshiur Rahman, Manisa Pipattanasomporn, Saifur Rahman:
Internet-based communication platform for residential DR programmes. IET Networks 6(2): 25-31 (2017) - Hossein Lolaee, Mohammad Ali Akhaee:
Analytic model for network resource management between ISPs and users. IET Networks 6(2): 32-38 (2017) - Nikolaos Mantas
, Malamati D. Louta
, Eirini D. Karapistoli, George T. Karetsos, Stylianos Kraounakis, Mohammad S. Obaidat
:
Towards an incentive-compatible, reputation-based framework for stimulating cooperation in opportunistic networks: a survey. IET Networks 6(6): 169-178 (2017) - Pitchai MohanaPriya, S. Mercy Shalinie
:
Restricted Boltzmann machine-based cognitive protocol for secure routing in software defined wireless networks. IET Networks 6(6): 162-168 (2017) - Devarajan Jinil Persis
, T. Paul Robert
:
Review of ad-hoc on-demand distance vector protocol and its swarm intelligent variants for Mobile Ad-hoc NETwork. IET Networks 6(5): 87-93 (2017) - Brijesh Kumar Rai
, Niladri Das:
On characteristics dependent linear coding capacity of sum-networks. IET Networks 6(5): 133-137 (2017) - Yusuf Sani, Musab Isah
, Christopher Edwards, Andreas Mauthe
:
Experimental evaluation of the impact of mobility management protocols on HTTP adaptive streaming. IET Networks 6(6): 186-192 (2017) - Panagiotis G. Sarigiannidis
, Thomas Lagkas
, Stamatia Bibi, Apostolos Ampatzoglou, Paolo Bellavista
:
Hybrid 5G optical-wireless SDN-based networks, challenges and open issues. IET Networks 6(6): 141-148 (2017) - Roaa Shubbar, Mahmood Ahmadi
:
Fast 2D filter with low false positive for network packet inspection. IET Networks 6(6): 224-231 (2017) - Edward A. Smith, John A. Schormans:
Holistic assessment of call centre performance. IET Networks 6(6): 179-185 (2017) - George Tarnaras, Fanouria Athanasiou, Spyros G. Denazis:
Efficient topology discovery algorithm for software-defined networks. IET Networks 6(6): 157-161 (2017) - Fan-Hsun Tseng
, Kai-Di Chang, Shang-Chuan Liao, Han-Chieh Chao, Victor C. M. Leung:
sPing: a user-centred debugging mechanism for software defined networks. IET Networks 6(2): 39-46 (2017) - Labisha R. V., E. Baburaj
:
Efficient approach to maximise WSN lifetime using weighted optimum storage-node placement, efficient and energetic wireless recharging, efficient rule-based node rotation and critical-state-data-passing methods. IET Networks 6(6): 203-217 (2017) - Dharani Kumari Nooji Venkatramana, Shylaja Banagiri Srikantaiah, Jayalakshmi Moodabidri:
SCGRP: SDN-enabled connectivity-aware geographical routing protocol of VANETs for urban environment. IET Networks 6(5): 102-111 (2017) - Lifang Wei, Changcai Yang, Riqing Chen:
RFID-based stent-graft dynamic assessment for health cares. IET Networks 6(1): 1-4 (2017) - Hangxing Wu, Hongbin Wang, Yadong Wan, Ming Zhang:
Improving the convergence time of DCTCP to reduce the completion time of short flows: a congestion window-based method. IET Networks 6(5): 112-115 (2017) - Wenliang Wu, Naixue Xiong, Chunxue Wu:
Improved clustering algorithm based on energy consumption in wireless sensor networks. IET Networks 6(3): 47-53 (2017) - Peican Zhu
, Yangming Guo, Fabrizio Lombardi, Jie Han:
Approximate reliability of multi-state two-terminal networks by stochastic analysis. IET Networks 6(5): 116-124 (2017) - Ming Zhu, Lei Wang, Zhenquan Qin, Nan Ding, Jian Fang, Tao Liu, Qi Cui:
BELIA: bandwidth estimate-based link increase algorithm for MPTCP. IET Networks 6(5): 94-101 (2017)
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-18 00:35 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint