default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 109 matches
- 2018
- Mouna Rekik, Christophe Gransart
, Marion Berbineau:
Cyber-physical Threats and Vulnerabilities Analysis for Train Control and Monitoring Systems. ISNCC 2018: 1-6 - Mostafa M. Abdelhakam
, Mahmoud M. Elmesalawy
:
Joint Beamforming Design and BBU Computational Resources Allocation in Heterogeneous C-RAN with QoS Guarantee. ISNCC 2018: 1-6 - A. Abdel Salam, Cesare Roseti, Francesco Zampognaro
:
TCP performance for Satellite M2M applications over Random Access links. ISNCC 2018: 1-5 - A. Abdel Salam, Cesare Roseti, Francesco Zampognaro
:
Satellite telecommunication networks Simulation and Emulation requirements. ISNCC 2018: 1-7 - A. Abdel Salam, Cesare Roseti, Francesco Zampognaro
, Natale Patriciello
:
TCP Wave estimation of the optimal operating point using ACK trains. ISNCC 2018: 1-6 - Razan Abdulhammed
, Miad Faezipour
, Abdelshakour A. Abuzneid, Ali Alessa
:
Effective Features Selection and Machine Learning Classifiers for Improved Wireless Intrusion Detection. ISNCC 2018: 1-6 - Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos
:
Modelling Botnet Propagation in Networks with Layered Defences. ISNCC 2018: 1-6 - Mansoor Ahmed
, Abid Khan
, Osama Saleem, Muhammad Haris:
A Fault Tolerant Approach for Malicious URL Filtering. ISNCC 2018: 1-6 - Raed Al-Aaridhi, Iakov Dlikman, Newton Masinde
, Kalman Graffi
:
Search Algorithms for Distributed Data Structures in P2P Networks. ISNCC 2018: 1-8 - Ahmed Al-Jawad, Purav Shah
, Orhan Gemikonakli
, Ramona Trestian:
Policy-based QoS Management Framework for Software-Defined Networks. ISNCC 2018: 1-6 - Faiza Al-Salti
, Khaled Day
, Nasser Alzeidi, Abderezak Touzene
:
Multiple Sink Placement Strategy for Underwater Wireless Sensor Networks. ISNCC 2018: 1-6 - Ahmed Alabish
, Ali Kara, Yaser Dalveren
:
An Experimental Study towards Examining Human Body Movements in Indoor Wave Propagation at 18-22 GHz. ISNCC 2018: 1-4 - Ghalib H. Alshammri
, Walid K. M. Ahmed, Victor B. Lawrence:
Generalized Memory-Assisted Adaptive-Threshold Detection Scheme for On-OFF-Keying Diffusion-Based Molecular Communications. ISNCC 2018: 1-7 - Abdulrahman S. Alturki:
Traffic Sign Detection and Recognition Using Adaptive Threshold Segmentation with Fuzzy Neural Network Classification. ISNCC 2018: 1-7 - Salman Behboudi Amlashi:
A Synthesis Technique for Concentric Rings Array Using Sectional Excitation. ISNCC 2018: 1-5 - Salman Behboudi Amlashi, Ali Araghi, Gholamreza Dadashzadeh:
Design of a Photoconductive Antenna for Pulsed-Terahertz Spectroscopy with Polarization Diversity. ISNCC 2018: 1-5 - Ali Araghi, Mohsen Khalily, Pei Xiao, Arash Kosari
, Houman Zarrabi, Rahim Tafazolli
:
Millimeter-Wave MIMO Balanced Antipodal Vivaldi Antenna Design for Autonomous Cars. ISNCC 2018: 1-4 - Amir Atashbar-Tehrani, Saeed Ghazi-Maghrebi
:
A New Efficient Adaptive Normalized Min-Sum Decoder for Irregular LDPC Codes in OFDM. ISNCC 2018: 1-4 - Mohamed Salah Azzaz, Noureddine Aissaoui
, Camel Tanougast
:
A Novel Fingerprint Protection Approach based on SoPC Chaotic Encryption. ISNCC 2018: 1-6 - Christopher S. Baidal, David S. Salazar, Vladimir Sanchez Padilla
, Rebeca L. Estrada
, Nestor X. Arreaga
:
Design of a Wireless Sensor Network to Detect Car Accidents on Highways. ISNCC 2018: 1-6 - Imran Baig
, Umer Farooq, Najam Ul Hasan, Manaf Zghaibeh
, U. Mukhtar Rana, Muhammad Imran, Muhammad Ayaz
:
A Joint Filtering and Precoding Based Uplink MC-NOMA. ISNCC 2018: 1-4 - Debraj Basu
, Gourab Sen Gupta
, Yi Zhang, Avishek Nag
, Linda Doyle
:
Experimental evaluation of SAPC-R: an adaptive power control protocol for mobile sensors. ISNCC 2018: 1-6 - Parisa Bayan, Saeed Ghazi-Maghrebi
, Ali Rahmanian:
A New Radio Wave Propagation Model Optimization Approach for Tehran City Based on Standard Model Tuning. ISNCC 2018: 1-5 - Taha Belkhouja, Amr Mohamed
, Abdulla K. Al-Ali
, Xiaojiang Du, Mohsen Guizani:
Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices. ISNCC 2018: 1-6 - Amira Bendjeddou, Houria Laoufi, Saadi Boudjit:
LEACH-S: Low Energy Adaptive Clustering Hierarchy for Sensor Network. ISNCC 2018: 1-6 - Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche:
A Secure RFID Authentication Scheme for Healthcare Environments Based on Digital Signature Algorithm. ISNCC 2018: 1-6 - Ran Bi, Mingchuan Yang, Gang Wang:
Interference and Link Budget Analysis in Integrated Satellite and Terrestrial Mobile System. ISNCC 2018: 1-6 - Juanita Blue, Eoghan Furey
:
A Novel Approach for Protecting Legacy Authentication Databases in Consideration of GDPR. ISNCC 2018: 1-6 - Bouziane Brik
, Moez Esseghir, Leïla Merghem-Boulahia, Hichem Snoussi:
Indoor Thermal Comfort Collection of People with Physical Disabilities. ISNCC 2018: 1-6 - John Paul F. Cajanding, Miguel Alberto C. Mercado, Nestor Michael C. Tiglao:
High Frequency Dynamic Voltage Forecasting Under Reduced Wireless Sensor Network Observability. ISNCC 2018: 1-6
skipping 79 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-08-15 06:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint