Movatterモバイル変換


[0]ホーム

URL:


Schloss Dagstuhl - Leibniz Center for Informatics
For some weeks now, the dblp team has been receiving anexceptionally high number of support and error correction requests from the community. While we are grateful and happy to process all incoming emails, please assume thatit will currently take us several weeks to read and address your request. Most importantly,please refrain from sending your request multiple times. This will not advance your issue and will only complicate and extend the time required to address it. Thank you for your understanding.
Joint Declaration:The freedom of science is at the heart of liberal, democratic societies. Without this freedom, it is impossible for scientific efforts to be geared toward gaining knowledge and facts. It is therefore extremely worrying that the scientific freedom is coming under increasing pressure in various regions of the world.(read more)
search dblp
search dblp

default search action

Authors:
  • no matches
  • waiting...
Venues:
  • no matches
  • waiting...
Publications:
  • no matches
  • waiting...
clear
ask others

ask others

GLOBECOM 2007: Washington, DC, USA

SPARQL queries 

run query for this table of contents

or build your own?

Refine list

note

refinements active!

zoomed in on?? of?? records

    view refined list in

    export refined list as

    showing all?? records

    IP Networks Security

    Wireless Security - PHY and MAC

    Overlay Routing and Topology

    Service and Applications

    Power Line Communications / Intelligent Transportation Systems

    Cryptography and Key Management

    Switch and Router Designs

    Streaming and Measurement

    Data Storage

    Wireless Communications and Networking

    Intrusion Detection and Reputation Based Systems

    Wireless Channel and Coding Techniques

    P2P Traffic and Performance

    Routing, Addressing, and Multicasting

    Security Protocols

    Resource Management

    General Symposium (Poster Session)

    Energy Based and Cross-Layer Routing Based Protocols

    MAC Protocols and Performance Evaluation

    Geographic and Cooperative Based Routing Protocols

    Power Control and Collision Avoidance

    Routing Protocols and Performance

    Resource Allocation and QoS Provisioning

    Scheduling and Resource Management

    Coding, Modulation, and Synchronization

    Data Gathering and Data Mining

    Modeling of Ad Hoc Networks

    Data Aggregation and Compression

    Ad Hoc Network Security:Misbehavior, Fault Detection and Secure Algorithms

    Multimedia Protocols and Services

    Sensor Network Security:Cryptography and Attack Detection

    Lifetime Optimization and Energy Management

    Localization and Time Synchronization

    Wireless and Mobile Sensor Networks

    Coverage Control and Network Connectivity

    Clustering and Connectivity Based Protocols

    Mobility and Coordination

    Topology Control and Location Service Management

    Performance Analysis of Ad Hoc and Sensor Networks

    Ad Hoc and Sensor Networks (Poster Session)

    Wireless Ad Hoc, Sensor and Mesh Networks (Poster Session)

    Cognitive and Cooperative Networks

    Communication Theory

    Error Control Coding

    Transmission Technologies

    Fading Channels

    Iterative Coding and Processing Schemes

    MIMO

    Network Information Theory

    Relay Networks

    OFDM

    Space-Time Coding

    Topics in Communication Theory

    Mobility Management

    Advanced Architectures and Protocols - I

    Routing Protocols

    Advanced Architectures and Protocols - II

    Quality of Service

    Network Security and Privacy

    Multicast, Anycast and Wireless

    Transport Protocol and Application Services

    Multimedia Coding and Control

    Multimedia Content Distribution

    Wireless Multimedia

    Multimedia Systems and Applications

    Optical Access Networks

    Free Space Optical Networks and Optical Bust Switching

    Multipoint Optical Communication

    Optical Network Control

    Optical Network Survivability

    Optical Network Dimensioning and Provisioning

    Optical Switching

    Optical Communications

    Topics in Optical Networks and Systems (Poster Session)

    Bandwidth Management

    Cellular Networks and WiMAX

    Modeling and Performance Evaluation of IEEE 802.11

    Network Measurement and Design

    Network Simulation

    Performance Modeling

    Quality of Service

    Routing, Load Balancing and Scheduling

    Traffic and Workload Control

    Topics in Performance Modeling, QoS and Reliability (Poster Session)

    MIMO-I

    OFDM-I I

    Channel Estimation

    OFDM-II

    MIMO-II

    Cooperative Networks-I

    Cooperative Networks-II

    Channel Estimation and Signal Processing

    MIMO-III

    Equalization and Coding

    Signal Processing Algorithms

    Cognitive Radio I

    MIMO Algorithms I

    MIMO Capacity I

    OFDMA

    LDPC Codes

    MIMO Algorithms II

    Wireless Channel Capacity

    Crosslayer I

    Equalization

    Space-Time Coding I

    Cooperative Communications and Coding I

    Crosslayer II

    MIMO Algorithms III

    Space-Time Coding II

    Cognitive Radio II

    Diversity I

    Wireless MAC

    Ad Hoc Networks and Relay

    OFDM I

    Propagation Channels I

    Topics in Wireless Communications

    OFDM II

    Propagation Channels II

    Relaying I

    Coding and Detection

    Cooperative Communications and Coding II

    MIMO Algorithms IV

    Space-Time Coding III

    Channel Estimation and Synchronization I

    Cognitive Radio III

    Diversity II

    UWB

    Channel Estimation and Synchronization II

    Cognitive Radio IV

    Diversity III

    Detection

    OFDM III

    WiMAX and OFDM

    Cooperative Communications and Coding III

    MIMO Algorithms V

    Relaying II

    CDMA

    Wireless Networks (Poster Session)

    Topics in MISO, MIMO and RF Systems (Poster Session)

    RFID, Cellular and Satellite Communications

    Cognitive Radio Networks-I

    Wireless MAC-I

    Modeling and Performance Analysis

    IEEE 802.16 Networks

    Resource Allocation in Wireless Networks

    Wireless Mesh Networks-I

    Cognitive Radio Networks-II

    Resource Management in WLANs

    Routing in Wireless Networks

    Wireless MAC-II

    Mobility and Handoff

    Satellite Networks

    Scheduling and Admission Control in Wireless Networks

    Wireless Mesh Networks-II

    Modeling and Analysis of IEEE 802.11-Based WLANs

    Security Issues in Wireless Networks

    Network Designs and Protocols

    OFDM-Based Wireless Networks

    QoS and Resource Management in Wireless Networks

    Enabling Techniques-I (Poster Session)

    Enabling Techniques-II (Poster Session)

    manage site settings

    To protect your privacy, all features that rely on external API calls from your browser areturned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more informationsee our F.A.Q.

    Unpaywalled article links

    Add open access links fromunpaywall.org to the list of external document links (if available).

    load links from unpaywall.org

    Privacy notice: By enabling the option above, your browser will contact the API ofunpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theUnpaywall privacy policy.

    Archived links via Wayback Machine

    For web page which are no longer available, try to retrieve content from theweb.archive.org of the Internet Archive (if available).

    load content from archive.org

    Privacy notice: By enabling the option above, your browser will contact the API ofarchive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theInternet Archive privacy policy.

    Reference lists

    Add a list of references fromcrossref.org,opencitations.net, andsemanticscholar.org to record detail pages.

    load references from crossref.org and opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the APIs ofcrossref.org,opencitations.net, andsemanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theCrossref privacy policy and theOpenCitations privacy policy, as well as theAI2 Privacy Policy covering Semantic Scholar.

    Citation data

    Add a list of citing articles fromopencitations.net andsemanticscholar.org to record detail pages.

    load citations from opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the API ofopencitations.net andsemanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theOpenCitations privacy policy as well as theAI2 Privacy Policy covering Semantic Scholar.

    OpenAlex data

    Load additional information about publications fromopenalex.org.

    load data from openalex.org

    Privacy notice: By enabling the option above, your browser will contact the API ofopenalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given byOpenAlex.

    w3c valid html last updated on 2025-07-13 19:32 CEST by thedblp team

    cc zero all metadata released asopen data underCC0 1.0 license

    see also:Terms of Use |Privacy Policy |Imprint

    dblp was originally created in 1993 at:

    University of Trier  

    since 2018, dblp has been operated and maintained by:

    Schloss Dagstuhl - Leibniz Center for Informatics  

    the dblp computer science bibliography is funded and supported by:

    BMBF  RLP  SL  Leibniz  DFG  NFDI  

    [8]ページ先頭

    ©2009-2025 Movatter.jp