The SCEAS System
Navigation Menu

Conferences in DBLP

(icsnc)
2006 (conf/icsnc/2006)


  1. ICSNS Committees. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:- [Conf]

  2. Preface. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:- [Conf]
  3. T. Shivaprakash, G. S. Badrinath, K. R. Venugopal, Lalit M. Patnaik
    Energy Aware Topology Management in Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:1- [Conf]
  4. T. Srinivasan, V. Mahadevan, A. Meyyappan, A. Manikandan, M. Nivedita, N. Pavithra
    Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:2- [Conf]
  5. Hyun-Duk Choi, Ho-Hyun Park, Miae Woo
    An Enhanced Gnutella for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:3- [Conf]
  6. Chenchen Zhao, Zhen Yang
    A New EAAODV Routing Protocol based on Mobile Agent. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:4- [Conf]
  7. Panayotis Antoniadis, Costas Courcoubetis
    The Case of Multi-hop Peer-to-Peer Implementation of Mobile Social Applications. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:5- [Conf]
  8. Mâamoun Bernich, Fabrice Mourlin
    Mobile agent communication scheme. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:6- [Conf]
  9. Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, Chin-Laung Lei
    Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:7- [Conf]
  10. Scott Fowler, Sherali Zeadally
    Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:8- [Conf]
  11. Homayoun Yousefi'zadeh
    A Neuro-ForecastWater-Filling Scheme of Server Scheduling. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:9- [Conf]
  12. N. Sreenath, Balaji Palanisamy
    A Two - Phase Distributed Reconfiguration Algorithm for Node Failures in IP-Over-WDM Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:10- [Conf]
  13. N. Sreenath, Balaji Palanisamy, S. R. Nadarajan
    Grooming of Multicast Sessions in Sparse Splitting WDM Mesh Networks using Virtual Source Based Trees. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:11- [Conf]
  14. Andre Soares, Jose Maranhao Neto, William Giozza, Paulo Cunha
    Cost Benefit Study of Sparse-Partial Wavelength Conversion Architectures. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:12- [Conf]
  15. Deng Lixin
    A new approach of data hiding within speech based on Hash and Hilbert Transform. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:13- [Conf]
  16. Markus Sihvonen, Mikko Nieminen, Johannes Oikarinen, Tomi Raty
    Active Service Quality Management in ASEMA system. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:14- [Conf]
  17. Yong Li, Fang Su, Yinglei Fan, Huimin Xu
    End-to-End Differentiation of Congestion and Wireless Losses using a Fuzzy Arithmetic based on Relative Entropy. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:15- [Conf]
  18. Peter Quax, Bjorn Geuns, Tom Jehaes, Wim Lamotte, Gert Vansichem
    On the Applicability of Remote Rendering of Networked Virtual Environments on Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:16- [Conf]
  19. Moon Ho Lee, Xiao-Dong Zhang
    Fast Block Center Weighted Hadamard Transform. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:17- [Conf]
  20. Gerald Kunzmann, Andreas Binzenhöfer
    Autonomically Improving the Security and Robustness of Structured P2P Overlays. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:18- [Conf]
  21. Mehrez Essafi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala
    ASASI: An Environment for Addressing Software Application Security Issues. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:19- [Conf]
  22. Reijo Savola
    Towards Requirement and Modeling Driven Security Evaluation. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:20- [Conf]
  23. Martin Boldt, Bengt Carlsson
    Privacy-Invasive Software and Preventive Mechanisms. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:21- [Conf]
  24. Zongyuan Deng, Zhen Yang, Lixin Deng
    A Real-time Secure Voice Communication System Based on Speech Recognition. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:22- [Conf]
  25. Zhao-Li Zhang, Fan Hong, Hai-Jun Xiao
    Verification of Strict Integrity Policy via Petri Nets. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:23- [Conf]
  26. Mucahit Mutlugun, Ibrahim Sogukpinar
    Security Architecture for Web-based Health Insurance Systems. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:24- [Conf]
  27. Yu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, Chun-Ying Huang
    Confessible Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:25- [Conf]
  28. Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski
    Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:26- [Conf]
  29. Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter
    Usage Control Requirements in Mobile and Ubiquitous Computing Applications. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:27- [Conf]
  30. Frank Oldewurtel, Petri Mähönen
    Neural Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:28- [Conf]
  31. Hui Li, Kefei Chen, Yanfei Zheng, Mi Wen
    A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:29- [Conf]
  32. Stephan Hengstler, Hamid K. Aghajan
    Application Development in Vision-Enabled Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:30- [Conf]
  33. Kun Bi, Kun Tu, Naijie Gu, Wan Lin Dong, Xiaohu Liu
    Topological Hole Detection in Sensor Networks with Cooperative Neighbors. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:31- [Conf]
  34. Na Wang, Chorng Hwa Chang
    Probabilistic-Based Energy Aware Routing for Network Lifetime and Source Level Fairness in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:32- [Conf]
  35. Freimut Bodendorf
    E-Services for an Electronic Education Market. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:33- [Conf]
  36. Jan Moons, Carlos De Backer, Herwig Mannaert
    Components for a pervasive information dissemination architecture. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:34- [Conf]
  37. Shann-Chiuen Wu, Shih-Jen Chu, Tzao-Lin Lee
    Remote Screen Recording and Playback. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:35- [Conf]
  38. Dimitrios Tzimeas, Eleni E. Mangina
    Jazz Sebastian Bach: A GA System for Music Style Modification. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:36- [Conf]
  39. Javier Baliosian, Ann Devitt
    Forecasting Unstable Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:37- [Conf]
  40. Ritu Chadha
    Beyond the Hype: Policies for Military Network Operations. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:38- [Conf]
  41. Jihen Malek, Mona Laroussi, Alain Derycke
    A Multi-Layer Ubiquitous Middleware for Bijective Adaptation between Context and Activity in a Mobile and Collaborative learning. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:39- [Conf]
  42. Tanveer Zia, Albert Y. Zomaya
    Security Issues in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:40- [Conf]
  43. Kun Tu, Kun Bi, Naijie Gu, Wan Li Dong, Xiaohu Liu
    Mac Address Assignment In Wireless Sensor Networks: A Mixed Strategy Game Approach. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:41- [Conf]
  44. Pang-Chieh Wang, Ting-Wei Hou, Ruei-Hong Yan
    Maintaining Coverage by Progressive Crystal-Lattice Permutation in Mobile Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:42- [Conf]
  45. Fernando Martincic, Loren Schwiebert
    Distributed Event Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:43- [Conf]
  46. Ronny Fehling
    Tracing and Managing hazardous material in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:44- [Conf]
  47. Dan Sui, Lindong Ge
    A Novel Blind SNR Estimator Based on the Modified PASTd Algorithm for IF Signals. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:45- [Conf]
  48. Li Zimu, Jianping Wu, ShaoHua Qin
    Accelerating VOD Streaming with Adaptive Proxy- Assisted Scheduling, Caching and Patching. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:46- [Conf]
  49. Wen-Hwa Liao, Yu-Chee Lee
    Localization with Power Control in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:47- [Conf]
  50. Yoon Ju Lee, Sung Cheol Chang, Young Il Kim, Song In Choi, Jee Hwan Ahn
    Wireless Broadband Internet Access in Korea. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:48- [Conf]
  51. Karol Molnar, Martin Kyselak
    Application Programming Interface offering classification services to end-user applications. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:49- [Conf]
  52. Zouhair El-Bazzal, Michel Kadoch, Basile L. Agba, François Gagnon, Maria Bennani
    A Flexible Weight Based Clustering Algorithm in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:50- [Conf]
  53. Haibin Liu
    A New Communication Architecture Based on the Spatial Information Field Model. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:51- [Conf]
  54. Sathiamoorthy Manoharan
    XHTML encoding and compression. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:52- [Conf]
  55. M. Farahmand, A. Azarfar, A. Jafari, V. Zargari
    A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:53- [Conf]
  56. Miao Pan, Shuo Liang, Haozhi Xiong, Jie Chen, Guangyi Li
    A Novel Bargaining Based Dynamic Spectrum Management Scheme in Reconfigurable Systems. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:54- [Conf]
  57. Idil Candan, Muhammed Salamah
    Performance Analysis of a Time-Threshold Based Bandwidth Allocation Scheme for Data Calls in Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:55- [Conf]
  58. Katsuhiro Naito, Kazuo Mori, Hideo Kobayashi
    TCP Based Resource Allocation Method for Base Station Diversity System. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:56- [Conf]
  59. Jong-Hyouk Lee, Tai-Myoung Chung
    Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:57- [Conf]
  60. Jong-Hyouk Lee, Tai-Myoung Chung
    Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:58- [Conf]
  61. Su Fang, Fan Yinglei, Li Yong, Xu Huimin
    A ROD based Fuzzy packet loss differentiating algorithm for TCP in the hybrid wired/wireless network. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:59- [Conf]
  62. Changhoi Koo, Yong Woo Chung
    Dynamic Cell Coverage Control for Power Saving in IEEE802.16 Mobile MultihopRelay Systems. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:60- [Conf]
  63. Jae Sung Roh
    Performance Analysis and Evaluation of Bluetooth Networks in Wireless Channel Environment. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:61- [Conf]
  64. Neeraj Gupta, Vishal Srivastav, M. P. S. Bhatia
    Middleware - An Effort towards Making Mobile Applications Platform Independent. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:62- [Conf]
  65. Zhang zhenjiang, Liu yun
    An Energy-Efficient Redundant Nodes Tree Mechanism for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:63- [Conf]
  66. Ashkan Bayati, Pedram Ghodsnia, Maseud Rahgozar, Reza Basseda
    A Novel Way of Determining the Optimal Location of a Fragment in a DDBS: BGBR. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:64- [Conf]
  67. MoonHo Lee, Xueqin Jiang, GiYeon Hwang, Subash Shree Pokhrel
    Error Correcting Codes from Modified Butson-Hadamard Matrices. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:65- [Conf]
  68. Xueqin Jiang, MoonHo Lee, Sergey A. Stepanov, KwangJe Lee, KimSung Hun
    Ternary Codes From Modified Hadamard Matrices. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:66- [Conf]
  69. Xueqin Jiang, MoonHo Lee, Ram Prasad Paudel, TaeChol Shin
    Codes From Generalized Hadamard Matrices. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:67- [Conf]
  70. Ali Sarrafi, Mohammad Hamed Firooz, Hassan Barjini
    A Cluster Based Topology Control Algorithm for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:68- [Conf]
  71. Victor A. Clincy, Ajay Sitaram, David Odaibo, Garima Sogarwal
    A Real-Time Study of 802.11b and 802.11g. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:69- [Conf]
  72. Chadi Tarhini, Tijani Chahed
    System capacity in OFDMA-based WiMAX. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:70- [Conf]
  73. Yin-Jun Chen, Ching-Chung Chen, Shou-Nian Wang, Han-En Lin, Roy C. Hsu
    GPSenseCar - A Collision Avoidance Support System Using Real-Time GPS Data in a Mobile Vehicular Network. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:71- [Conf]
  74. Abderrezak Rachedi, Abderrahim Benslimane
    Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:72- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002