Conferences in DBLP
(icsnc) 2006 (conf/icsnc/2006)
ICSNS Committees. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:- [Conf ] Preface. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:- [Conf ] T. Shivaprakash , G. S. Badrinath , K. R. Venugopal , Lalit M. Patnaik Energy Aware Topology Management in Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:1- [Conf ] T. Srinivasan , V. Mahadevan , A. Meyyappan , A. Manikandan , M. Nivedita , N. Pavithra Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:2- [Conf ] Hyun-Duk Choi , Ho-Hyun Park , Miae Woo An Enhanced Gnutella for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:3- [Conf ] Chenchen Zhao , Zhen Yang A New EAAODV Routing Protocol based on Mobile Agent. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:4- [Conf ] Panayotis Antoniadis , Costas Courcoubetis The Case of Multi-hop Peer-to-Peer Implementation of Mobile Social Applications. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:5- [Conf ] Mâamoun Bernich , Fabrice Mourlin Mobile agent communication scheme. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:6- [Conf ] Chien-Hua Chiu , Chin-Yen Lee , Pan-Lung Tsai , Chun-Ying Huang , Chin-Laung Lei Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:7- [Conf ] Scott Fowler , Sherali Zeadally Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:8- [Conf ] Homayoun Yousefi'zadeh A Neuro-ForecastWater-Filling Scheme of Server Scheduling. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:9- [Conf ] N. Sreenath , Balaji Palanisamy A Two - Phase Distributed Reconfiguration Algorithm for Node Failures in IP-Over-WDM Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:10- [Conf ] N. Sreenath , Balaji Palanisamy , S. R. Nadarajan Grooming of Multicast Sessions in Sparse Splitting WDM Mesh Networks using Virtual Source Based Trees. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:11- [Conf ] Andre Soares , Jose Maranhao Neto , William Giozza , Paulo Cunha Cost Benefit Study of Sparse-Partial Wavelength Conversion Architectures. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:12- [Conf ] Deng Lixin A new approach of data hiding within speech based on Hash and Hilbert Transform. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:13- [Conf ] Markus Sihvonen , Mikko Nieminen , Johannes Oikarinen , Tomi Raty Active Service Quality Management in ASEMA system. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:14- [Conf ] Yong Li , Fang Su , Yinglei Fan , Huimin Xu End-to-End Differentiation of Congestion and Wireless Losses using a Fuzzy Arithmetic based on Relative Entropy. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:15- [Conf ] Peter Quax , Bjorn Geuns , Tom Jehaes , Wim Lamotte , Gert Vansichem On the Applicability of Remote Rendering of Networked Virtual Environments on Mobile Devices. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:16- [Conf ] Moon Ho Lee , Xiao-Dong Zhang Fast Block Center Weighted Hadamard Transform. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:17- [Conf ] Gerald Kunzmann , Andreas Binzenhöfer Autonomically Improving the Security and Robustness of Structured P2P Overlays. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:18- [Conf ] Mehrez Essafi , Lamia Labed Jilani , Henda Hajjami Ben Ghézala ASASI: An Environment for Addressing Software Application Security Issues. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:19- [Conf ] Reijo Savola Towards Requirement and Modeling Driven Security Evaluation. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:20- [Conf ] Martin Boldt , Bengt Carlsson Privacy-Invasive Software and Preventive Mechanisms. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:21- [Conf ] Zongyuan Deng , Zhen Yang , Lixin Deng A Real-time Secure Voice Communication System Based on Speech Recognition. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:22- [Conf ] Zhao-Li Zhang , Fan Hong , Hai-Jun Xiao Verification of Strict Integrity Policy via Petri Nets. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:23- [Conf ] Mucahit Mutlugun , Ibrahim Sogukpinar Security Architecture for Web-based Health Insurance Systems. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:24- [Conf ] Yu-Shian Chen , Chin-Laung Lei , Yun-Peng Chiu , Chun-Ying Huang Confessible Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:25- [Conf ] Piotr Borzecki , Jedrzej Kabarowski , Przemyslaw Kubiak , Miroslaw Kutylowski , Filip Zagórski Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:26- [Conf ] Manuel Hilty , Alexander Pretschner , Christian Schaefer , Thomas Walter Usage Control Requirements in Mobile and Ubiquitous Computing Applications. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:27- [Conf ] Frank Oldewurtel , Petri Mähönen Neural Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:28- [Conf ] Hui Li , Kefei Chen , Yanfei Zheng , Mi Wen A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:29- [Conf ] Stephan Hengstler , Hamid K. Aghajan Application Development in Vision-Enabled Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:30- [Conf ] Kun Bi , Kun Tu , Naijie Gu , Wan Lin Dong , Xiaohu Liu Topological Hole Detection in Sensor Networks with Cooperative Neighbors. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:31- [Conf ] Na Wang , Chorng Hwa Chang Probabilistic-Based Energy Aware Routing for Network Lifetime and Source Level Fairness in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:32- [Conf ] Freimut Bodendorf E-Services for an Electronic Education Market. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:33- [Conf ] Jan Moons , Carlos De Backer , Herwig Mannaert Components for a pervasive information dissemination architecture. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:34- [Conf ] Shann-Chiuen Wu , Shih-Jen Chu , Tzao-Lin Lee Remote Screen Recording and Playback. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:35- [Conf ] Dimitrios Tzimeas , Eleni E. Mangina Jazz Sebastian Bach: A GA System for Music Style Modification. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:36- [Conf ] Javier Baliosian , Ann Devitt Forecasting Unstable Policy Enforcement. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:37- [Conf ] Ritu Chadha Beyond the Hype: Policies for Military Network Operations. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:38- [Conf ] Jihen Malek , Mona Laroussi , Alain Derycke A Multi-Layer Ubiquitous Middleware for Bijective Adaptation between Context and Activity in a Mobile and Collaborative learning. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:39- [Conf ] Tanveer Zia , Albert Y. Zomaya Security Issues in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:40- [Conf ] Kun Tu , Kun Bi , Naijie Gu , Wan Li Dong , Xiaohu Liu Mac Address Assignment In Wireless Sensor Networks: A Mixed Strategy Game Approach. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:41- [Conf ] Pang-Chieh Wang , Ting-Wei Hou , Ruei-Hong Yan Maintaining Coverage by Progressive Crystal-Lattice Permutation in Mobile Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:42- [Conf ] Fernando Martincic , Loren Schwiebert Distributed Event Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:43- [Conf ] Ronny Fehling Tracing and Managing hazardous material in Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:44- [Conf ] Dan Sui , Lindong Ge A Novel Blind SNR Estimator Based on the Modified PASTd Algorithm for IF Signals. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:45- [Conf ] Li Zimu , Jianping Wu , ShaoHua Qin Accelerating VOD Streaming with Adaptive Proxy- Assisted Scheduling, Caching and Patching. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:46- [Conf ] Wen-Hwa Liao , Yu-Chee Lee Localization with Power Control in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:47- [Conf ] Yoon Ju Lee , Sung Cheol Chang , Young Il Kim , Song In Choi , Jee Hwan Ahn Wireless Broadband Internet Access in Korea. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:48- [Conf ] Karol Molnar , Martin Kyselak Application Programming Interface offering classification services to end-user applications. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:49- [Conf ] Zouhair El-Bazzal , Michel Kadoch , Basile L. Agba , François Gagnon , Maria Bennani A Flexible Weight Based Clustering Algorithm in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:50- [Conf ] Haibin Liu A New Communication Architecture Based on the Spatial Information Field Model. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:51- [Conf ] Sathiamoorthy Manoharan XHTML encoding and compression. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:52- [Conf ] M. Farahmand , A. Azarfar , A. Jafari , V. Zargari A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:53- [Conf ] Miao Pan , Shuo Liang , Haozhi Xiong , Jie Chen , Guangyi Li A Novel Bargaining Based Dynamic Spectrum Management Scheme in Reconfigurable Systems. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:54- [Conf ] Idil Candan , Muhammed Salamah Performance Analysis of a Time-Threshold Based Bandwidth Allocation Scheme for Data Calls in Cellular Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:55- [Conf ] Katsuhiro Naito , Kazuo Mori , Hideo Kobayashi TCP Based Resource Allocation Method for Base Station Diversity System. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:56- [Conf ] Jong-Hyouk Lee , Tai-Myoung Chung Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:57- [Conf ] Jong-Hyouk Lee , Tai-Myoung Chung Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:58- [Conf ] Su Fang , Fan Yinglei , Li Yong , Xu Huimin A ROD based Fuzzy packet loss differentiating algorithm for TCP in the hybrid wired/wireless network. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:59- [Conf ] Changhoi Koo , Yong Woo Chung Dynamic Cell Coverage Control for Power Saving in IEEE802.16 Mobile MultihopRelay Systems. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:60- [Conf ] Jae Sung Roh Performance Analysis and Evaluation of Bluetooth Networks in Wireless Channel Environment. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:61- [Conf ] Neeraj Gupta , Vishal Srivastav , M. P. S. Bhatia Middleware - An Effort towards Making Mobile Applications Platform Independent. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:62- [Conf ] Zhang zhenjiang , Liu yun An Energy-Efficient Redundant Nodes Tree Mechanism for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:63- [Conf ] Ashkan Bayati , Pedram Ghodsnia , Maseud Rahgozar , Reza Basseda A Novel Way of Determining the Optimal Location of a Fragment in a DDBS: BGBR. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:64- [Conf ] MoonHo Lee , Xueqin Jiang , GiYeon Hwang , Subash Shree Pokhrel Error Correcting Codes from Modified Butson-Hadamard Matrices. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:65- [Conf ] Xueqin Jiang , MoonHo Lee , Sergey A. Stepanov , KwangJe Lee , KimSung Hun Ternary Codes From Modified Hadamard Matrices. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:66- [Conf ] Xueqin Jiang , MoonHo Lee , Ram Prasad Paudel , TaeChol Shin Codes From Generalized Hadamard Matrices. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:67- [Conf ] Ali Sarrafi , Mohammad Hamed Firooz , Hassan Barjini A Cluster Based Topology Control Algorithm for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:68- [Conf ] Victor A. Clincy , Ajay Sitaram , David Odaibo , Garima Sogarwal A Real-Time Study of 802.11b and 802.11g. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:69- [Conf ] Chadi Tarhini , Tijani Chahed System capacity in OFDMA-based WiMAX. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:70- [Conf ] Yin-Jun Chen , Ching-Chung Chen , Shou-Nian Wang , Han-En Lin , Roy C. Hsu GPSenseCar - A Collision Avoidance Support System Using Real-Time GPS Data in a Mobile Vehicular Network. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:71- [Conf ] Abderrezak Rachedi , Abderrahim Benslimane Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:72- [Conf ]