default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 135 matches
- 2015
- Ming Li, Yu Cao, B. Prabhakaran:
Loss Aware Sample Packetization Strategy for Improvement of Body Sensor Data Analysis. J. Commun. 10(11): 851-858 (2015) - Ming Li:
A Novel Ultra-Wideband Hybrid Localization Scheme in Coal Mine. J. Commun. 10(11): 889-895 (2015) - Lei Yang, Yu Dai:
Application Scheduling in Cloud Computing Environment with the Consideration of Performance Interference. J. Commun. 10(8): 603-609 (2015) - Ahmed Abu-Khadrah, Zahriladha Zakaria, Mohdazlishah Othman, Mohd Shahril Izuan Mohd Zin:
Markov Chain Model for EDCA Protocol under Saturation and Non-Saturation Conditions. J. Commun. 10(8): 596-602 (2015) - Affoua Therese Aby, Alexandre Guitton, Michel Misson:
Efficient Flooding-Based Routing Protocol with Random Wake-Up for Very Low Duty-Cycle WSNs. J. Commun. 10(6): 385-395 (2015) - Ban Al-Omar, Taha Landolsi, Abdul-Rahman Al-Ali:
Evaluation of WiMAX Technology in Smart Grid Communications. J. Commun. 10(10): 804-811 (2015) - Ahmed Abdalla Ali, Yuan Zhao, Mohammed Ramadan, Bin Tang:
An Improved Radar ECCM Method Based on Orthogonal Pulse Block and Parallel Matching Filter. J. Commun. 10(8): 610-614 (2015) - Jie Cao, Zhiyi Fang, Dan Zhang, Guannan Qu:
Network Traffic Classification Using Feature Selection and Parameter Optimization. J. Commun. 10(10): 828-835 (2015) - Hung-Bin Chang, Izhak Rubin, Ofer Hadar:
Scalable Video Multicast for Multi-Cell Cellular Wireless Networks. J. Commun. 10(9): 715-727 (2015) - Jinyong Chang, Rui Xue:
A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding. J. Commun. 10(1): 43-47 (2015) - Kai Chen, Weifeng Chen, Zhen Xu, Dongdai Lin, Yazhe Wang:
VFA: A Variable-Factor Authentication Framework for Mobile Users. J. Commun. 10(6): 366-379 (2015) - Yin Chen, Zhizhong Ding, Dingliang Wang, Teng Huang:
Design and Implementation of System Under Test for LTE Protocol Conformance Testing. J. Commun. 10(2): 145-153 (2015) - Tan Chen, Guangwu Hu:
Reliable Multipath Transmission in Data Center Network. J. Commun. 10(12): 939-946 (2015) - Wengu Chen, Guoqing Wu:
Blind Recognition of (n-1)/n Rate Punctured Convolutional Encoders in a Noisy Environment. J. Commun. 10(4): 260-267 (2015) - Yonghong Chen, Huijian Wang, Shibing Zhang:
Opportunistic Spectrum Access in Imperfect Spectrum Sensing Cognitive Networks. J. Commun. 10(6): 410-414 (2015) - Yun Chen, Ai Zheng, Shi Jing, Qi Huang:
Optimization of Waiting Time in Complex RIA by Combined Pseudo-Hierarchical-Lazy-Loading Algorithm. J. Commun. 10(11): 859-863 (2015) - Kun Chen, Yingxin Zhao, Hong Wu, Qiqi Wang, Yong Liu, Ran Tang, Bing Liu, Lijun Ge:
Study of High-Accurate Frequency Estimation in 60GHz Wireless Communication System. J. Commun. 10(7): 474-479 (2015) - Yueli Cui, Zhigang Chen, Qiang Zhou, Shiqing Zhang:
A Novel Adaptive Image Hiding Algorithm. J. Commun. 10(5): 360-365 (2015) - Xinchun Cui, Gang Sheng, Fengyin Li, Xiaowu Liu:
An Efficient and Impartial Buyer-Seller Watermarking Protocol. J. Commun. 10(5): 339-344 (2015) - Chuang Deng, Jun Liu, Xuesong Tan, Fuxiang Li:
Research and Application of Self-Organizing Communication Networks in Onsite Power Grid Rescue. J. Commun. 10(8): 615-620 (2015) - Qinghe Dong, Qian He, Huaxin Chai, Yong Wang, Shengtao He:
PM-IUBC: A P2P and MongoDB based Intranet User Behavior Control System. J. Commun. 10(12): 1027-1036 (2015) - Qingwei Du, Huaidong Zhuang:
OpenFlow-Based Dynamic Server Cluster Load Balancing with Measurement Support. J. Commun. 10(8): 572-578 (2015) - Jinhong Fan, Chaowei Yuan:
Outage Performance for Two-Way Relaying with Co-Channel Interference and Channel Estimation Error. J. Commun. 10(12): 963-969 (2015) - Zhiyi Fang, Shuaibing Lu, Guannan Qu, Jianfei Zhang, S. Q. Zheng:
Implementing High Throughput Contention-Tolerant Crossbar Switch. J. Commun. 10(10): 791-796 (2015) - Fei Fang, Wenchun Yu:
Performance Analysis of IEEE 802.11 DCF Based on OFDM. J. Commun. 10(5): 308-319 (2015) - Qiming Fu, Baochen Jiang, Cheng-You Wang, Xiao Zhou:
A Novel Deblocking Quantization Table for Luminance Component in Baseline JPEG. J. Commun. 10(8): 629-637 (2015) - Qiming Fu, Xiao Zhou, Cheng-You Wang, Baochen Jiang:
Windowed All Phase Biorthogonal Transform and Its Application in JPEG-Like Image Compression. J. Commun. 10(4): 284-293 (2015) - Zhenxiang Gao, Yan Shi, Shanzhi Chen:
Identifying Influential Nodes for Efficient Routing in Opportunistic Networks. J. Commun. 10(1): 48-54 (2015) - Wei Guo, Qing Li, Hong-Yi Yu, Jian-Hui Liu:
A Parallel Transmission MAC Protocol in Hybrid VLC-RF Network. J. Commun. 10(1): 80-85 (2015) - Ayman Hajjawi, Mahamod Ismail:
A Scheduling Algorithm Based Self-Learning Technique for Smart Grid Communications over 4G Networks. J. Commun. 10(11): 876-881 (2015)
skipping 105 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-29 06:23 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint