Movatterモバイル変換


[0]ホーム

URL:


Schloss Dagstuhl - Leibniz Center for Informatics
The dblp team is currently receiving anexceptionally high number of support and error correction requests from the community. While we are grateful and happy to process all incoming emails, please assume thatit will currently take us several weeks to read and address your request. Most importantly,please refrain from sending your request multiple times. This will not advance your issue and will only complicate and extend the time required to address it. Thank you for your understanding.
Joint Declaration:The freedom of science is at the heart of liberal, democratic societies. Without this freedom, it is impossible for scientific efforts to be geared toward gaining knowledge and facts. It is therefore extremely worrying that the scientific freedom is coming under increasing pressure in various regions of the world.(read more)
We've just launched a new service: our brand newdblp SPARQL query service. Read more about it inour latest blog post or try out some of the SPARQL queries linked on the dblp web pages below.
search dblp
search dblp

default search action

Authors:
  • no matches
  • waiting...
Venues:
  • no matches
  • waiting...
Publications:
  • no matches
  • waiting...
clear
ask others

ask others

ICC 2009: Dresden, Germany

SPARQL queries 

run query for this table of contents

or build your own?

Refine list

note

refinements active!

zoomed in on?? of?? records

    view refined list in

    export refined list as

    showing all?? records

    Mobility in Sensor Networks

    Localization and Synchronization

    Optimization through Selective Engagement

    AHSN Poster Session 1

    Cross Layer Optimization in Wireless Sensor Networks

    Cross Layer Optimization

    AHSN Poster Session 2

    Quality of Service

    Cognitive and Mesh Networks

    Topology Management

    Medium Access Control

    Routing Protocols

    Deployment Strategies

    Link Layer

    Reliable Data Delivery

    In-network Data Storage and Query Optimization

    Network Longevity

    Modeling

    Wireless Network Security

    Sensor Network Security

    Information Systems Security I

    Intrusion Detection and Denial of Service

    Authentication

    Information Hiding and Watermarking

    Deployment and Management of Security Policies

    Information Systems Security II

    Application Layer Security

    Cryptography and Cryptographic Procedures

    IP Security

    Special Topics on Information Security

    Privacy and Peer to Peer Security

    Distributed Systems Security

    Metrics and Performance Evaluation

    Vulnerabilities and Malicious Behavior

    Relaying

    Two-way Relaying

    Network Information Theory

    Ad Hoc Network Capacity

    Poster Session I

    Wireless Networks

    Network Coding

    Cognitive Radio

    Poster Session II

    MIMO Systems

    Capacity

    Multiuser or Network MIMO

    Modulation and Coding

    OFDM/OFDMA

    Channel Coding

    Fading Channels

    LDPC Codes

    Software and Protocol Technologies

    Multimedia Applications and Services

    Peer-to-Peer Services

    Peer-to-Peer Media Delivery

    Fixed and Mobile Service Platforms

    Network and Service Management

    Poster

    Routing

    Architecture

    Security

    Peer-to-peer networks

    Peformance-1

    Peformance-2

    Network Survivability

    Protection and Restoration

    Network Architecture

    Poster Session

    Optical Switching

    Routing and Wavelength Assignment

    Resource Allocation

    Traffic Grooming and Resource Management

    Traffic Control Mechanisms

    Resource Allocation and Scheduling

    Traffic Engineering

    QoS in Emerging Wireless Networks

    QoS Analysis and Control

    Network Design and Control

    QoS for Emerging Video Services

    Communications QoS, Reliability, and Performance Modeling

    Network Survivability

    Network Modeling and Simulation Tools

    Blind and semi-blind algorithms

    FPGA-based implementations

    Synchronisation algorithms

    Performance analysis

    Beamforming

    OFDM and MIMO

    Implementation and platforms

    Precoding-related algorithms

    Theoretical and implementation topics

    Iterative receivers and sequential methods

    Equalisation

    Channel Estimation

    Detection and decoding

    Optimisation

    Situation Management

    Data Storage

    Networked Services

    Vehicular Communications and Networks

    Cognitive Networks 1:Spectrum Sensing

    Cognitive Networks 2:Modeling and Security in Dynamic Spectrum Access

    Cognitive Networks 3:Spectrum Management and Policy Issues

    Poster Session:Selected Topics in Communications

    MIMO I

    Cooperative Networks I

    Capacity and Performance Analysis

    Topics in Transmission Technologies

    Cooperative Networks II

    Wireless Channels

    OFDM

    Topics in Resource Allocation Management

    Synchronization

    MIMO Cooperative Networks

    Channel Measurement and Modeling

    Cognitive Radio I

    OFDMA I

    Precoding

    UWB Communications I

    MIMO-OFDM

    Cooperative Networks III

    Estimation and Detection

    MIMO Beamforming

    Transmission Technologies, Power and Bandwidth Efficiencies

    Topics in Cooperative Communications

    CDMA

    Cooperative Communication in OFDM Systems

    MIMO II

    Coding I

    MIMO Estimation and Detection

    Coding II

    Performance Analysis

    Resource Allocation

    Scheduling

    Cooperative Networks IV

    OFDMA II

    Cellular Communication Systems

    Cooperative Networks V

    UWB Communications II

    Distributed Space-Time Coding

    Topics in Multicarrier Communications

    OFDM Estimation and Synchronization

    Cognitive Radio II

    Wireless Ad Hoc Networks

    Topics in MIMO

    Cognitive Radio Networks

    Cooperative Communications and Networking I

    Wireless Mesh Networks I

    Wireless Network Performance, Resource Allocation, and QoS I

    Mobility Management

    Broadband Wireless, WiMax, and LTE I

    Cooperative Communications and Networking II

    Routing, Scheduling, and Medium Access Control I

    Cross-Layer Design and Optimization I

    Wireless Network Security and Reliable Access

    Broadband Wireless, WiMax, and LTE II

    Wireless Network Performance, Resource Allocation, and QoS II

    WLAN and Home/Personal Wireless Networks

    Wireless Ad Hoc Networks

    Wireless Mesh Networks II

    Relays, Gateways, and Satellite Systems

    Cross-Layer Design and Optimization II

    Next Generation Wireless Networks

    Wireless Network Performance, Resource Allocation, and QoS III

    Wireless Sensor Networks

    Topics in Wireless Networks I

    Routing, Scheduling, and Medium Access Control II

    Inter-networking of Heterogeneous Networks

    Topics in Wireless Networks II

    manage site settings

    To protect your privacy, all features that rely on external API calls from your browser areturned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more informationsee our F.A.Q.

    Unpaywalled article links

    Add open access links fromunpaywall.org to the list of external document links (if available).

    load links from unpaywall.org

    Privacy notice: By enabling the option above, your browser will contact the API ofunpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theUnpaywall privacy policy.

    Archived links via Wayback Machine

    For web page which are no longer available, try to retrieve content from theweb.archive.org of the Internet Archive (if available).

    load content from archive.org

    Privacy notice: By enabling the option above, your browser will contact the API ofarchive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theInternet Archive privacy policy.

    Reference lists

    Add a list of references fromcrossref.org,opencitations.net, andsemanticscholar.org to record detail pages.

    load references from crossref.org and opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the APIs ofcrossref.org,opencitations.net, andsemanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theCrossref privacy policy and theOpenCitations privacy policy, as well as theAI2 Privacy Policy covering Semantic Scholar.

    Citation data

    Add a list of citing articles fromopencitations.net andsemanticscholar.org to record detail pages.

    load citations from opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the API ofopencitations.net andsemanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theOpenCitations privacy policy as well as theAI2 Privacy Policy covering Semantic Scholar.

    OpenAlex data

    Load additional information about publications fromopenalex.org.

    load data from openalex.org

    Privacy notice: By enabling the option above, your browser will contact the API ofopenalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given byOpenAlex.

    w3c valid html last updated on 2025-05-23 00:22 CEST by thedblp team

    cc zero all metadata released asopen data underCC0 1.0 license

    see also:Terms of Use |Privacy Policy |Imprint

    dblp was originally created in 1993 at:

    University of Trier  

    since 2018, dblp has been operated and maintained by:

    Schloss Dagstuhl - Leibniz Center for Informatics  

    the dblp computer science bibliography is funded and supported by:

    BMBF  RLP  SL  Leibniz  DFG  NFDI  

    [8]ページ先頭

    ©2009-2025 Movatter.jp