default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 72 matches
- 2014
- Tabouche Abdeldjalil, Fan Li, Ruiling Li, Xin Li:
Table-Driven Bus-Based Routing Protocol for Urban Vehicular Ad Hoc Networks. WASA 2014: 90-101 - Chunyu Ai, Frank Haizhon Li:
Isolate Safe Area Detection for Rescue in Wireless Sensor Networks. WASA 2014: 718-728 - Abdulrahman Alhothaily, Arwa Alrawais, Xiuzhen Cheng, Rongfang Bie:
Towards More Secure Cardholder Verification in Payment Systems. WASA 2014: 356-367 - Arwa Alrawais, Abdulrahman Alhothaily, Xiuzhen Cheng:
Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments. WASA 2014: 554-563 - Ran Bi, Hong Gao, Quan Chen:
Maximizing Probability of Data Packet Delivery within Deadline. WASA 2014: 215-224 - Ran Bi, Hong Gao, Yingshu Li:
Probabilistic Threshold Based Monitoring Using Sensor Networks. WASA 2014: 246-255 - Nicholas Capurso, Liran Ma, Tianyi Song, Xiuzhen Cheng:
A Transparent Correlation-Based Scheme for Energy Efficient Context Sensing and Fusion under Android Systems. WASA 2014: 648-659 - Quan Chen, Hong Gao:
Towards Reliable and Real-Time Routing with Active Slot Augmentation in Low-Duty-Cycle WSNs. WASA 2014: 672-681 - Chuanqing Chen, Xin Gu, Jiguo Yu, Dongxiao Yu:
IDUC: An Improved Distributed Unequal Clustering Protocol for Wireless Sensor Networks. WASA 2014: 682-693 - Yingwen Chen, Ming Xu, Pei Li, Bin Zhang:
Empirical Study on Spatial and Temporal Features for Vehicular Wireless Communications. WASA 2014: 114-125 - Haosheng Fan, Victor C. S. Lee, Minming Li, Xiao Zhang, Yingchao Zhao:
Barrier Coverage Using Sensors with Offsets. WASA 2014: 389-400 - Hai Fu, Wanrong Yu, Chunqing Wu, Baokang Zhao, Zhenqian Feng:
NC-STP: A High Performance Network Coding Based Space Transport Protocol. WASA 2014: 34-43 - Jing Gao, Jianzhong Li:
Model-Based Approximate Event Detection in Heterogeneous Wireless Sensor Networks. WASA 2014: 225-235 - Chao Guo, Changle Li, Huiying Liu:
Design and Analysis of a Downlink Multi-User MIMO MAC Protocol in WLANs. WASA 2014: 183-193 - Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Kyungtae Kang, Junbeom Hur:
A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure. WASA 2014: 624-635 - Zhenhua Han, Haisheng Tan, Yongcai Wang, Jipeng Zhou:
Channel Selection for Rendezvous with High Link Stability in Cognitive Radio Network. WASA 2014: 494-506 - Qilong Han, Hongbin Zhao, Zhiqiang Ma, Kejia Zhang, Haiwei Pan:
Protecting Location Privacy Based on Historical Users over Road Networks. WASA 2014: 347-355 - Liang Hao, Gang Cui, Wende Ke, Bindi You:
An Energy Optimization Algorithm of Date Centers Base on Price Volatility. WASA 2014: 750-759 - Jun Huang, Zi Xiong, Jibi Li, Qianbin Chen, Qiang Duan, Yanxiao Zhao:
A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus. WASA 2014: 613-623 - Mahammad Humayoo, Yanlong Zhai, Yan He, Bingqing Xu, Chen Wang:
Operator Scale Out Using Time Utility Function in Big Data Stream Processing. WASA 2014: 54-65 - David S. Jackson, Wanyu Zang, Qijun Gu, Wei Cheng:
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing. WASA 2014: 660-671 - Lili Jia, Jiguo Yu, Dongxiao Yu, Qingbo Zhang:
2-m-Domatic Partition in Homogeneous Wireless Sensor Networks. WASA 2014: 378-388 - Tao Jing, Xuewei Cui, Wei Cheng, Shixiang Zhu, Yan Huo:
Enabling Smartphone Based HD Video Chats by Cooperative Transmissions in CRNs. WASA 2014: 636-647 - Tao Jing, Fan Zhang, Wei Cheng, Yan Huo, Xiuzhen Cheng:
Online Auction Based Relay Selection for Cooperative Communications in CR Networks. WASA 2014: 482-493 - Xiaohui Kuang, Bowen Li, Li Liu:
On Effectiveness of Clustering Principles in Maximizing Wireless Sensor Network Lifespan. WASA 2014: 412-423 - Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Kyungtae Kang, Junbeom Hur:
Secure Device-to-Device Authentication in Mobile Multi-hop Networks. WASA 2014: 267-278 - Kyu-Hwan Lee, Jae-Hyun Kim, Sunghyun Cho:
RLNC in Practical Wireless Networks. WASA 2014: 194-204 - Guilin Li, Xing Gao, Longjiang Guo, Juncong Lin, Ying Gao:
A Multi-model Based Range Query Processing Algorithm for the WSN. WASA 2014: 542-553 - Zhuorong Li, Junqi Guo, Wenshuang Liang, Xiaobo Xie, Guangzhi Zhang, Shenling Wang:
Structural Health Monitoring Based on RealAdaBoost Algorithm in Wireless Sensor Networks. WASA 2014: 236-245 - Zhen Li, Tao Jing, Yan Huo, Lili Pan, Wei Zhou:
Channel Allocation in Sociability-Assisted Cognitive Radio Networks Using Semi-definite Programming. WASA 2014: 519-530
skipping 42 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-24 23:27 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint