default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2009
- Yuebin Bai, Haixing Ji, Qingmian Han, Jun Huang, Zhiyuan Zhang:
Towards a service-oriented Middleware Enabling Context Awareness for Smart Environment. Int. J. Ad Hoc Ubiquitous Comput. 4(1): 24-35 (2009) - Farooq Bari, Victor C. M. Leung:
Architectural aspects of automated network selection in heterogeneous wireless systems. Int. J. Ad Hoc Ubiquitous Comput. 4(5): 282-291 (2009) - Jiannong Cao, Lin Liao, Guojun Wang, Hao Ma, Bin Xiao:
A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 183-190 (2009) - Han-Bin Chang, Hsuan-Pu Chang, Hui-Huang Hsu, Louis R. Chao, Timothy K. Shih:
An intelligent travel book management system. Int. J. Ad Hoc Ubiquitous Comput. 4(6): 354-362 (2009) - Shiping Chen, Surya Nepal, Jonathan Chan, David Moreland, John Zic:
A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context. Int. J. Ad Hoc Ubiquitous Comput. 4(2): 95-107 (2009) - Mooi Choo Chuah, Peng Yang:
Context-aware multicast routing scheme for Disruption Tolerant Networks. Int. J. Ad Hoc Ubiquitous Comput. 4(5): 269-281 (2009) - Nikolaos Dimakis, Georgios Gkekas, Ghassan Karame, Theofilos Karachristos, Stamatis Tsolakidis, John Soldatos, Lazaros Polymenakos:
Facilitating human-centric service delivery using a pluggable service development framework. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 223-236 (2009) - Wenfeng Du, Weijia Jia, Guojun Wang, Wenyan Lu:
Analysis of channel allocation scheme for wireless cellular networks. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 201-209 (2009) - Chun-I Fan, Ming-Te Chen, Wei-Zhe Sun:
Buyer-seller watermarking protocols with off-line trusted third parties. Int. J. Ad Hoc Ubiquitous Comput. 4(1): 36-43 (2009) - Hai-gang Gong, Jiannong Cao, Ming Liu, Lijun Chen, Li Xie:
A traffic aware, energy-efficient MAC protocol for Wireless Sensor Networks. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 148-156 (2009) - Md. Enamul Haque, Noriko Matsumoto, Norihiko Yoshida:
Context-aware cluster-based hierarchical protocol for Wireless Sensor Networks. Int. J. Ad Hoc Ubiquitous Comput. 4(6): 379-386 (2009) - Ching-Hsien Hsu, Shih-Chang Chen, Chia-Hao Yu:
A Priority Based Transaction mechanism towards high reliable RFID services. Int. J. Ad Hoc Ubiquitous Comput. 4(6): 323-333 (2009) - Jason C. Hung, Han-Bin Chang, Hsuan-Pu Chang, Yu-Hsin Cheng, Kuo-Yen Lo:
Evolution of ubiquitous autonomous agents. Int. J. Ad Hoc Ubiquitous Comput. 4(6): 334-343 (2009) - Imad Jawhar, Jie Wu:
Resource allocation for real-time and multimedia communications in TDMA-based wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 4(5): 304-319 (2009) - Abraham Jibi, K. S. Ramanatha:
Energy-efficient relaxed rekeying policies for distributed key management in sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 4(1): 3-12 (2009) - K. Kathiravan, V. Divya, S. Thamarai Selvi:
A hybrid probabilistic counter-based broadcast approach protocol for Mobile Ad hoc Networks. Int. J. Ad Hoc Ubiquitous Comput. 4(2): 108-114 (2009) - Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim:
Security policy specification for home network. Int. J. Ad Hoc Ubiquitous Comput. 4(6): 372-378 (2009) - Yunfa Li, Hai Jin, Zongfen Han, Sanmin Liu:
A secure mechanism of group communication for pervasive grid. Int. J. Ad Hoc Ubiquitous Comput. 4(6): 344-353 (2009) - Fang Liu, Xiuzhen Cheng, Dong Hua, Dechang Chen:
Location discovery for sensor networks with short range beacons. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 125-136 (2009) - Ming Liu, Ming T. Liu:
A Power-Saving algorithm combing power management and power control for multihop IEEE 802.11 ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 168-173 (2009) - Mingming Lu, Jie Wu, Mihaela Cardei, Minglu Li:
Energy-efficient connected coverage of discrete targets in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 137-147 (2009) - Samira Moussaoui, Mohamed Guerroumi, Nadjib Badache:
Two phase replication approach for MANETs. Int. J. Ad Hoc Ubiquitous Comput. 4(5): 292-303 (2009) - Lionel M. Ni, Yanmin Zhu, Jian Ma, Qiong Luo, Yunhao Liu, Shing-Chi Cheung, Qiang Yang, Minglu Li, Min-You Wu:
Semantic Sensor Net: an extensible framework. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 157-167 (2009) - Hayoung Oh, Kibaek Yoo, Jongkeun Na, Chongkwon Kim:
A seamless handover scheme in IPv6-based mobile networks. Int. J. Ad Hoc Ubiquitous Comput. 4(1): 54-60 (2009) - Hung-Ta Pai, Jing-Tian Sung:
Equal-Gain Combination for adaptive distributed classification in Wireless Sensor Networks. Int. J. Ad Hoc Ubiquitous Comput. 4(2): 115-121 (2009) - Haïdar Safa, Hassan Artail, Rami Shibli:
An interoperability model for supporting reliability and power-efficient routing in MANETs. Int. J. Ad Hoc Ubiquitous Comput. 4(2): 71-83 (2009) - Xuanhua Shi, Jean-Louis Pazat:
An adaptive and safe ubicomp for HPC applications. Int. J. Ad Hoc Ubiquitous Comput. 4(6): 363-371 (2009) - Wen-Zhan Song, Yu Wang, Chao Ren, Changhua Wu, Xiang-Yang Li:
Multi-hop scatternet formation and routing for large scale Bluetooth networks. Int. J. Ad Hoc Ubiquitous Comput. 4(5): 251-268 (2009) - Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan, Dong Xuan:
Sensor network configuration under physical attacks. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 174-182 (2009) - Shiuh-Jeng Wang, Jian-Yi Lin, Hung-Jui Ke, Shu-Wen Lin:
Visual-based embedding systems with targeted secret disclosures and applications. Int. J. Ad Hoc Ubiquitous Comput. 4(1): 44-53 (2009)
skipping 6 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-31 16:24 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint