default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 40 matches
- 2019
- Anisa Allahdadi, Ricardo Morla:
Anomaly Detection and Modeling in 802.11 Wireless Networks. J. Netw. Syst. Manag. 27(1): 3-38 (2019) - Wen-Pin Chen, Ang-Hsun Tsai, Chung-Hsien Tsai:
Smart Traffic Offloading with Mobile Edge Computing for Disaster-Resilient Communication Networks. J. Netw. Syst. Manag. 27(2): 463-488 (2019) - Mahdi Nazari Cheraghlou, Ahmad Khademzadeh, Majid Haghparast:
New Fuzzy-Based Fault Tolerance Evaluation Framework for Cloud Computing. J. Netw. Syst. Manag. 27(4): 930-948 (2019) - JungYul Choi:
Virtual Machine Placement Algorithm for Energy Saving and Reliability of Servers in Cloud Data Centers. J. Netw. Syst. Manag. 27(1): 149-165 (2019) - Adrián Flores De La Cruz, Pilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja:
OpenFlow Compatible Key-Based Routing Protocol: Adapting SDN Networks to Content/Service-Centric Paradigm. J. Netw. Syst. Manag. 27(3): 730-755 (2019) - Therdpong Daengsi, Pongpisit Wuttidittachotti:
QoE Modeling for Voice over IP: Simplified E-model Enhancement Utilizing the Subjective MOS Prediction Model: A Case of G.729 and Thai Users. J. Netw. Syst. Manag. 27(4): 837-859 (2019) - Priyanka Das, Pratyush Nishantkar, Tanmay De:
SECA on MIA-DTN: Tackling the Energy Issue in Monitor Incorporated Adaptive Delay Tolerant Network Using a Simplistic Energy Conscious Approach. J. Netw. Syst. Manag. 27(1): 121-148 (2019) - Marcelo Frate, Marcelo K. Marczuk, Fábio Luciano Verdi:
OrchFlow: An Architecture for Orchestration of Multiple Controllers in OpenFlow Networks. J. Netw. Syst. Manag. 27(3): 551-572 (2019) - Guoqiang Gao, Ruixuan Li:
Collaborative Caching in P2P Streaming Networks. J. Netw. Syst. Manag. 27(3): 815-836 (2019) - Luciano Paschoal Gaspary:
Message from the New Editor-in-Chief. J. Netw. Syst. Manag. 27(1): 1-2 (2019) - Chirihane Gherbi, Zibouda Aliouat, Mohamed Benmohammed:
A Novel Load Balancing Scheduling Algorithm for Wireless Sensor Networks. J. Netw. Syst. Manag. 27(2): 430-462 (2019) - Michele Girolami, Dimitri Belli, Stefano Chessa:
Collaborative Service Discovery in Mobile Social Networks. J. Netw. Syst. Manag. 27(1): 233-268 (2019) - Rafael Lopes Gomes, Luiz Fernando Bittencourt, Edmundo Roberto Mauro Madeira:
FUZA: An Algorithm for Definition of Reliable Virtual Networks to the Edge as a Service Paradigm. J. Netw. Syst. Manag. 27(2): 388-408 (2019) - Fatma Hachmi, Khadouja Boujenfa, Mohamed Limam:
Enhancing the Accuracy of Intrusion Detection Systems by Reducing the Rates of False Positives and False Negatives Through Multi-objective Optimization. J. Netw. Syst. Manag. 27(1): 93-120 (2019) - Abdel-Rahman Hedar, Rashad Ismail, Gamal A. El-Sayed, Khalid M. Jamil Khayyat:
Two Meta-Heuristics Designed to Solve the Minimum Connected Dominating Set Problem for Wireless Networks Design and Management. J. Netw. Syst. Manag. 27(3): 647-687 (2019) - Zhengbing Hu, Vadym E. Mukhin, Yaroslav Kornaga, Oksana Herasymenko, Yevgenii Mostoviy:
The Analytical Model for Distributed Computer System Parameters Control Based on Multi-factoring Estimations. J. Netw. Syst. Manag. 27(2): 351-365 (2019) - Hojjat Jahani, Saeed Jalili:
Online Tor Privacy Breach Through Website Fingerprinting Attack. J. Netw. Syst. Manag. 27(2): 289-326 (2019) - Christos Katris, Sophia Daskalaki:
Dynamic Bandwidth Allocation for Video Traffic Using FARIMA-Based Forecasting Models. J. Netw. Syst. Manag. 27(1): 39-65 (2019) - Myung-Sup Kim, Haruo Oishi, Jiun-Long Huang, Hongtaek Ju, Kiyohito Yoshihara, Chih-Wei Yi, Taesang Choi:
Managing a World of Things: A Report on APNOMS2017. J. Netw. Syst. Manag. 27(2): 541-549 (2019) - Tomotaka Kimura, Takaya Suzuki, Kouji Hirata, Masahiro Muraguchi:
Residual Capacity-Aware Virtual Machine Assignment for Reducing Network Loads in Multi-tenant Data Center Networks. J. Netw. Syst. Manag. 27(4): 949-971 (2019) - Yonal Kirsal, Glenford Mapp, Fragkiskos Sardis:
Using Advanced Handover and Localization Techniques for Maintaining Quality-of-Service of Mobile Users in Heterogeneous Cloud-Based Environment. J. Netw. Syst. Manag. 27(4): 972-997 (2019) - A. Ranjith Kumar, A. Sivagami:
Security Aware Multipath Routing Protocol for WMSNs for Minimizing Effect of Compromising Attacks. J. Netw. Syst. Manag. 27(3): 573-599 (2019) - Kanwal Mahmud, Muhammad Usman:
Trust Establishment and Estimation in Cloud Services: A Systematic Literature Review. J. Netw. Syst. Manag. 27(2): 489-540 (2019) - Rafael de Jesus Martins, Luis Augusto Dias Knob, Eduardo Germano da Silva, Juliano Araujo Wickboldt, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville:
Specialized CSIRT for Incident Response Management in Smart Grids. J. Netw. Syst. Manag. 27(1): 269-285 (2019) - Meenakshi Munjal, Niraj Pratap Singh:
QoS and Cost-Aware Protocol Selection for Next Generation Wireless Network. J. Netw. Syst. Manag. 27(2): 327-350 (2019) - Sarra Naoui, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane:
Lightweight and Secure Password Based Smart Home Authentication Protocol: LSP-SHAP. J. Netw. Syst. Manag. 27(4): 1020-1042 (2019) - Aida A. Nasr, Nirmeen A. El-Bahnasawy, Gamal Attiya, Ayman El-Sayed:
Using the TSP Solution Strategy for Cloudlet Scheduling in Cloud Computing. J. Netw. Syst. Manag. 27(2): 366-387 (2019) - Elina Pacini, Lucas Iacono, Cristian Mateos, Carlos García Garino:
A Bio-inspired Datacenter Selection Scheduler for Federated Clouds and Its Application to Frost Prediction. J. Netw. Syst. Manag. 27(3): 688-729 (2019) - Shengli Pan, Yingjie Zhou, Zhiyong Zhang, Song Yang, Feng Qian, Guangmin Hu:
Identify Congested Links with Network Tomography Under Multipath Routing. J. Netw. Syst. Manag. 27(2): 409-429 (2019) - Xiuchen Qie, Shunfu Jin, Wuyi Yue:
An Energy-Efficient Strategy for Virtual Machine Allocation over Cloud Data Centers. J. Netw. Syst. Manag. 27(4): 860-882 (2019)
skipping 10 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-04 10:11 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint