default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2016
- Hamad F. Al-Doseri, Mohab A. Mangoud:
Performance Analysis of Cooperative Spectrum Sensing under Guaranteed Throughput Constraints for Cognitive Radio Networks. J. Comput. Networks Commun. 2016: 9706781:1-9706781:9 (2016) - Bander H. AlQarni, Ahmad S. Al-Mogren:
Reliable and Energy Efficient Protocol for MANET Multicasting. J. Comput. Networks Commun. 2016: 9146168:1-9146168:13 (2016) - Nizar Al Bassam, Oday D. Jerew:
Design and Implementation of a Chaotic Scheme in Additive White Gaussian Noise Channel. J. Comput. Networks Commun. 2016: 5976282:1-5976282:7 (2016) - Pearl Antil, Amita Malik:
Corrigendum to "Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey". J. Comput. Networks Commun. 2016: 1260978:1 (2016) - Taimur Bakhshi, Bogdan V. Ghita:
On Internet Traffic Classification: A Two-Phased Machine Learning Approach. J. Comput. Networks Commun. 2016: 2048302:1-2048302:21 (2016) - Alberto Bartoli, Eric Medvet:
An Architecture for Anonymous Mobile Coupons in a Large Network. J. Comput. Networks Commun. 2016: 2349148:1-2349148:10 (2016) - Othmane Blial, Mouad Ben Mamoun, Rédouane Benaini:
An Overview on SDN Architectures with Multiple Controllers. J. Comput. Networks Commun. 2016: 9396525:1-9396525:8 (2016) - Dinaker Babu Bollini, Mannava Muniratnam Naidu, Mallikharjuna Rao Nuka:
Measurement of Mobile Switching Centres Throughput in GSM Network Integrating Sliding Window Algorithm with a Single Server Finite Queuing Model. J. Comput. Networks Commun. 2016: 2061347:1-2061347:10 (2016) - Imad El Fachtali, Rachid Saadane, Mohammed Elkoutbi:
Vertical Handover Decision Algorithm Using Ants' Colonies for 4G Heterogeneous Wireless Networks. J. Comput. Networks Commun. 2016: 6259802:1-6259802:15 (2016) - Mohammed Aliyu Gadam, Maryam Abdulazeez Ahmed, Chee Kyun Ng, Nor Kamariah Noordin, Aduwati Sali, Fazirulhisyam Hashim:
Review of Adaptive Cell Selection Techniques in LTE-Advanced Heterogeneous Networks. J. Comput. Networks Commun. 2016: 7394136:1-7394136:12 (2016) - Jimmi Grönkvist, Anders Hansson, Arwid Komulainen:
Performance Analysis of Reuse Distance in Cooperative Broadcasting. J. Comput. Networks Commun. 2016: 1210683:1-1210683:10 (2016) - June Seok Hong, Mihui Kim:
Game-Theory-Based Approach for Energy Routing in a Smart Grid Network. J. Comput. Networks Commun. 2016: 4761720:1-4761720:8 (2016) - Ahmad Jalal, Shaharyar Kamal, Daijin Kim:
Human Depth Sensors-Based Activity Recognition Using Spatiotemporal Features and Hidden Markov Model for Smart Environments. J. Comput. Networks Commun. 2016: 8087545:1-8087545:11 (2016) - Yaping P. Jiang, Congcong C. Cao, Xiao Mei, Hao Guo:
A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature. J. Comput. Networks Commun. 2016: 4517019:1-4517019:10 (2016) - Yan Jiao, Inwhee Joe:
Markov Model-Based Energy Efficiency Spectrum Sensing in Cognitive Radio Sensor Networks. J. Comput. Networks Commun. 2016: 7695278:1-7695278:8 (2016) - Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar Saluja:
A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack. J. Comput. Networks Commun. 2016: 5191405:1-5191405:15 (2016) - Shahrukh Khalid, Athar Mahboob, Choudhry Fahad Azim, Aqeel-ur Rehman:
IDHOCNET: A Novel ID Centric Architecture for Ad Hoc Networks. J. Comput. Networks Commun. 2016: 6438584:1-6438584:18 (2016) - Mihui Kim, Mihir Asthana, Siddhartha Bhargava, Kartik Krishnan Iyyer, Rohan Tangadpalliwar, Jerry Gao:
Developing an On-Demand Cloud-Based Sensing-as-a-Service System for Internet of Things. J. Comput. Networks Commun. 2016: 3292783:1-3292783:17 (2016) - Atul Kumar, Maurizio Magarini, Hem Dutt Joshi, Rajiv Saxena:
Exact SER Analysis of DFrFT-Based QPSK OFDM System over Frequency Selective Rayleigh Fading Channel with CFO. J. Comput. Networks Commun. 2016: 2804507:1-2804507:7 (2016) - Athanasios G. Lazaropoulos:
The Impact of Noise Models on Capacity Performance of Distribution Broadband over Power Lines Networks. J. Comput. Networks Commun. 2016: 5680850:1-5680850:14 (2016) - Rakesh Matam, Somanath Tripathy:
Secure Multicast Routing Algorithm for Wireless Mesh Networks. J. Comput. Networks Commun. 2016: 1563464:1-1563464:11 (2016) - Saswati Mukherjee, Matangini Chattopadhyay, Samiran Chattopadhyay, Pragma Kar:
Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network. J. Comput. Networks Commun. 2016: 3405264:1-3405264:15 (2016) - Monire Norouzi, Alireza Souri, Majid Samad SamadZamini:
A Data Mining Classification Approach for Behavioral Malware Detection. J. Comput. Networks Commun. 2016: 8069672:1-8069672:9 (2016) - Bipun Man Pati, Attaphongse Taparugssanagorn:
Performance Analysis of the Effect of Nonlinear Low Noise Amplifier for Wideband Spectrum Sensing in the Poisson Field of Interferers. J. Comput. Networks Commun. 2016: 4368619:1-4368619:12 (2016) - Partha Pratim Ray:
Creating Values out of Internet of Things: An Industrial Perspective. J. Comput. Networks Commun. 2016: 1579460:1-1579460:11 (2016) - Niranjan Kumar Ray, Ashok Kumar Turuk:
A Hybrid Energy Efficient Protocol for Mobile Ad Hoc Networks. J. Comput. Networks Commun. 2016: 2861904:1-2861904:11 (2016) - Ashraf Al Sharah, Taiwo Oyedare, Sachin Shetty:
Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game. J. Comput. Networks Commun. 2016: 4289176:1-4289176:13 (2016) - Hafiz Husnain Raza Sherazi, Razi Iqbal, Sana Ul Hassan, Muhammad Hasanain Chaudary, Syed Asfandyar Gilani:
ZigBee's Received Signal Strength and Latency Evaluation under Varying Environments. J. Comput. Networks Commun. 2016: 9409402:1-9409402:8 (2016) - Michael Short:
Bounds on Worst-Case Deadline Failure Probabilities in Controller Area Networks. J. Comput. Networks Commun. 2016: 5196092:1-5196092:12 (2016) - Eduardo da Silva, Luiz Carlos Pessoa Albini:
SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks. J. Comput. Networks Commun. 2016: 3136853:1-3136853:18 (2016)
skipping 6 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-06 02:11 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint