default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 114 matches
- 2016
- Ahmed A. Alabdel Abass, Mohammad Hajimirsadeghi, Narayan B. Mandayam, Zoran Gajic:
Evolutionary game theoretic analysis of distributed denial of service attacks in a wireless network. CISS 2016: 36-41 - Osamah Ali Abdullah, Ikhlas Abdel-Qader, Bradley J. Bazuin:
A probability neural network-Jensen-Shannon divergence for a fingerprint based localization. CISS 2016: 286-291 - Rahul Agarwal, Zhe Chen, Fabian Kloosterman, Matthew A. Wilson, Sridevi V. Sarma:
Neuronal encoding models of complex receptive fields: A comparison of nonparametric and parametric approaches. CISS 2016: 562-567 - Ali Najdi Al-Shuwaili, Alireza Bagheri, Osvaldo Simeone:
Joint uplink/downlink and offloading optimization for mobile cloud computing with limited backhaul. CISS 2016: 424-429 - Selma Belhadj Amor, Samir Medina Perlaza:
Decentralized simultaneous energy and information transmission in multiple access channels. CISS 2016: 240-245 - Seifemichael B. Amsalu, Wondimu K. Zegeye, Dereje Hailemariam, Yacob Astatke:
Design and performance evaluation of an energy efficient routing protocol for Wireless Sensor Networks. CISS 2016: 48-53 - Ni An, Steven Weber:
On the performance overhead tradeoff of distributed principal component analysis via data partitioning. CISS 2016: 578-583 - Matthew Andrews, Lisa Zhang:
Tracking mobile users via standard routing engines. CISS 2016: 258-261 - Seyyed Mohammadreza Azimi, Osvaldo Simeone, Onur Sahin, Petar Popovski:
Ultra-reliable cloud mobile computing with service composition and superposition coding. CISS 2016: 442-447 - Marc Bauduin, Serge Massar, François Horlin:
Non-linear satellite channel equalization based on a low complexity Echo State Network. CISS 2016: 99-104 - Irineo Cabreros, Emmanuel Abbe, Aristotelis Tsirigos:
Detecting community structures in Hi-C genomic data. CISS 2016: 584-589 - Sebastian Cammerer, Vahid Aref, Laurent Schmalen, Stephan ten Brink:
Triggering wave-like convergence of tail-biting spatially coupled LDPC codes. CISS 2016: 93-98 - Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
Portfolio theory based sensor selection in Wireless Sensor Networks with unreliable observations. CISS 2016: 454-459 - Cheng Chen, Randall A. Berry, Michael L. Honig, Vijay G. Subramanian:
The impact of investment on small-cell resource allocation. CISS 2016: 529-534 - Zhuo Chen, Roy D. Yates, Dipankar Raychaudhuri:
Dynamic node-disjoint multipath routing for millimeter wave networks using directional antennas. CISS 2016: 430-435 - Hongxiang Chu, Tetsuya Shimamura:
A new PTS method for OFDM signals without side information based on constellation reshaping. CISS 2016: 216-221 - Zamiyad Dar, Koushik Kar, Joe H. Chow:
Store or sell? A threshold price policy for revenue maximization in windfarms with on-site storage. CISS 2016: 139-144 - Weiqiang Dong, Moshe Kam:
Integration of multiple adaptive algorithms for parallel decision fusion. CISS 2016: 355-359 - Kyle Doty, Sandip Roy, Thomas R. Fischer:
State estimation for flag Hidden Markov Models with imperfect sensors. CISS 2016: 360-365 - Chris Duerden, Lik-Kwan Shark, Geoff Hall, Joe Howe:
Prediction of granular time-series energy consumption for manufacturing jobs from analysis and learning of historical data. CISS 2016: 625-630 - Raghed El-Bardan, Walid Saad, Swastik Brahma, Pramod K. Varshney:
Matching theory for cognitive spectrum allocation in wireless networks. CISS 2016: 466-471 - James Falt, Steven D. Blostein:
Two-sided change detection under unknown initial state. CISS 2016: 418-423 - Giulia Fanti, Pramod Viswanath:
Algorithmic advances in anonymous communication over networks. CISS 2016: 133-138 - Lin Gao, Ming Tang, Haitian Pang, Jianwei Huang, Lifeng Sun:
Performance bound analysis for crowdsourced mobile video streaming. CISS 2016: 366-371 - Marco Giordani, Marco Mezzavilla, C. Nicolas Barati, Sundeep Rangan, Michele Zorzi:
Comparative analysis of initial access techniques in 5G mmWave cellular networks. CISS 2016: 268-273 - Abhishek Gupta:
Privacy-aware stochastic control with a "snoopy" adversary: A game-theoretic approach. CISS 2016: 187-191 - Mohammad Hajimirsadeghi, Gokul Sridharan, Walid Saad, Narayan B. Mandayam:
Inter-network dynamic spectrum allocation via a Colonel Blotto game. CISS 2016: 252-257 - Karla Hernandez:
Cyclic stochastic optimization via arbitrary selection procedures for updating parameters. CISS 2016: 349-354 - Ahmed Al Hilli, Laleh Najafizadeh, Athina P. Petropulu:
Generalized range space property for group sparsity of linear underdetermined systems. CISS 2016: 568-571 - John Hogan, Akbar M. Sayeed:
Beam selection for performance-complexity optimization in high-dimensional MIMO systems. CISS 2016: 337-342
skipping 84 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-28 16:46 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint