Movatterモバイル変換


[0]ホーム

URL:


Schloss Dagstuhl - Leibniz Center for Informatics
Joint Declaration:The freedom of science is at the heart of liberal, democratic societies. Without this freedom, it is impossible for scientific efforts to be geared toward gaining knowledge and facts. It is therefore extremely worrying that the scientific freedom is coming under increasing pressure in various regions of the world.(read more)
We've just launched a new service: our brand newdblp SPARQL query service. Read more about it inour latest blog post or try out some of the SPARQL queries linked on the dblp web pages below.
search dblp
search dblp

default search action

Authors:
  • no matches
  • waiting...
Venues:
  • no matches
  • waiting...
Publications:
  • no matches
  • waiting...
clear
ask others

ask others

ICC 2007: Glasgow, Scotland, UK

SPARQL queries 

run query for this table of contents

or build your own?

Refine list

note

refinements active!

zoomed in on?? of?? records

    view refined list in

    export refined list as

    showing all?? records

    Communications QoS, Reliability and Performance Modelling Symposium

    QoS in Satellite and Broadcasting Networks

    Performance Analysis and Evaluation

    QoS in Wireless Mesh, Ad Hoc and Cellular Networks

    Network Routing

    Communications QoS, Reliability and Performance Modelling Symposium Poster Session

    Network Congestion Control

    QoS Control in Mobile Networks

    Network Control

    QoS in Wireless Local Area Networks

    Network Recovery and Protection

    QoS in Emerging Wireless Networks

    Network Resource Management

    Network Traffic Engineering

    Traffic Control Mechanisms

    QoS Techniques for Video and Voice

    Communication Theory Symposium

    LDPC I

    Cooperative Networks I

    MIMO III

    OFDM I

    Communications Theory Symposium Poster Session

    LDPC II

    Cooperative Networks II

    Turbo coding and iterative decoding

    MIMO X

    OFDM II and UWB

    Performance Analysis

    Computer and Communications Network Security Symposium

    Ad Hoc and Peer-to-Peer Network Security

    Authentication and Biometric Security

    Distributed Security and Denial-of-Service Attacks

    Ensuring Trust in Ad Hoc Networks

    Firewalls

    Computer and Communications Network Security Symposium Poster Session

    Intrusion Detection and Avoidance

    Network Security Analysis and Simulation

    Secure Communication Protocols for Ad Hoc Networks

    Web Security I

    Web Security II

    Multimedia Communications and Home Services Symposium

    Multimedia Communications and Home Services Symposium Poster Session

    Multicast/Broadcast

    Peer-to-Peer Streaming

    Overlay Networks

    Wireless Multimedia

    Error Control and Recovery

    Network Services and Operation Symposium

    Mobile Networks

    Peer-to-Peer Networking

    Network Services and Operations Symposium Poster Session

    Voice over IP

    Next Generation Internet Architecture

    Service-aware Networks

    Context and Revenue Management

    Optical Networks and Systems Symposium

    OCDMA

    Passive Optical Networks

    Protection and Restoration I

    Protection and Restoration II

    Optical Switching

    Optical Networks and Systems Symposium Poster Session

    OPS/OBS

    WDM Networks I

    WDM Networks II

    Optical Wireless

    Signal Processing for Communications Symposium

    Signal Processing for Wireless Systems I

    MIMO II

    Signal Processing for Wireless Systems II

    MIMO IV

    Advanced Topics in Signal Processing

    MIMO VI

    CDMA III

    Synchronization I

    Synchronization II

    OFDM III

    Detection Techniques

    Channel Estimation and Equalization I

    Channel Estimation und Equalization II

    Wireless Adhoc and Sensor Networks Symposium

    Localization

    Routing I

    Wireless Adhoc and Sensor Networks Symmposium Poster Session

    Routing II

    Mobile Ad Hoc Networks (MANET)

    Security

    Cross-layer Design I

    Clustering

    Coverage

    Medium Access Control (MAC) I

    Multicast and Data Gathering

    Medium Access Control (MAC) II

    Power Control

    Scheduling

    Mesh Networks I

    Performance Evaluation I

    Mesh Networks II

    Performance Evaluation II

    Modelling

    Performance Evaluation III

    Emerging Technologies

    Wireless Communications Symposium

    Modulation, Coding, and Diversity Techniques I

    Cooperative Communications I

    CDMA I

    Ultra-wideband (UWB) Communications I

    MIMO I

    Modulation, Coding, and Diversity Techniques II

    Cooperative Communications II

    CDMA II

    Ultra-wideband (UWB) Communications II

    OFDM Systems I

    MIMO V

    Space-Time Coding I

    Satellite Communications

    Detection and Estimation I

    Transport Protocols and Techniques for Wireless Networks

    Wireless LANs I

    Resource Allocation and Management I

    MIMO VII

    Cross-layer Design II

    Localization Techniques

    Wireless LANs II

    Wireless Ad Hoc and Sensor Networks I

    Wireless Network Protocols

    Resource Allocation and Management II

    OFDM Systems II

    Propagation and Channel Characterization I

    Wireless Ad Hoc and Sensor Networks II

    Wireless Mesh Networks

    MIMO VIII

    Propagation and Channel Characterization II

    Resource Allocation and Management III

    MIMO IX

    OFDM Systems III

    Software Defined and Cognitive Radio

    Wireless Communications Symposium Poster Session I

    Smart Antenna Technologies

    Information Theory Applications in Wireless Communications

    OFDM Systems IV

    MIMO XI

    Wireless Communications Symposium Poster Session

    Mobility, Location, and Handoff Management

    Cross-layer Design III

    OFDM Systems V

    UWB

    Wireless Communications Symposium Poster Session III

    Wireless Medium Access Control Techniques

    Detection and Estimation II

    Mobile Internet and IP Technologies

    Cooperative Communications III

    General Symposium Program (incorporating Signal Processing and Coding for Data Storage)

    Wireless Cellular Networks and Network Coding

    Internet Traffic Control and Security

    General Symposium Poster Session

    Signal Processing and Coding for Data Storage Poster Session

    Signal Processing and Coding for Data Storage

    Physical Layer Performance Issues

    Packet Scheduling Algorithms

    Router Design and Digital Subscriber Loop Systems

    Routing Algorithms

    CogNets Workshop

    CogNets Workshop:Oral Presentations

    CogNets Workshop:Poster Presentations

    manage site settings

    To protect your privacy, all features that rely on external API calls from your browser areturned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more informationsee our F.A.Q.

    Unpaywalled article links

    Add open access links fromunpaywall.org to the list of external document links (if available).

    load links from unpaywall.org

    Privacy notice: By enabling the option above, your browser will contact the API ofunpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theUnpaywall privacy policy.

    Archived links via Wayback Machine

    For web page which are no longer available, try to retrieve content from theweb.archive.org of the Internet Archive (if available).

    load content from archive.org

    Privacy notice: By enabling the option above, your browser will contact the API ofarchive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theInternet Archive privacy policy.

    Reference lists

    Add a list of references fromcrossref.org,opencitations.net, andsemanticscholar.org to record detail pages.

    load references from crossref.org and opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the APIs ofcrossref.org,opencitations.net, andsemanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theCrossref privacy policy and theOpenCitations privacy policy, as well as theAI2 Privacy Policy covering Semantic Scholar.

    Citation data

    Add a list of citing articles fromopencitations.net andsemanticscholar.org to record detail pages.

    load citations from opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the API ofopencitations.net andsemanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theOpenCitations privacy policy as well as theAI2 Privacy Policy covering Semantic Scholar.

    OpenAlex data

    Load additional information about publications fromopenalex.org.

    load data from openalex.org

    Privacy notice: By enabling the option above, your browser will contact the API ofopenalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given byOpenAlex.

    w3c valid html last updated on 2025-05-15 21:10 CEST by thedblp team

    cc zero all metadata released asopen data underCC0 1.0 license

    see also:Terms of Use |Privacy Policy |Imprint

    dblp was originally created in 1993 at:

    University of Trier  

    since 2018, dblp has been operated and maintained by:

    Schloss Dagstuhl - Leibniz Center for Informatics  

    the dblp computer science bibliography is funded and supported by:

    BMBF  RLP  SL  Leibniz  DFG  NFDI  

    [8]ページ先頭

    ©2009-2025 Movatter.jp