The SCEAS System
Navigation Menu

Conferences in DBLP

2007 (conf/nbis/2007)

  1. Makoto Ikeda, Giuseppe De Marco, Leonard Barolli
    A Simple Statistical Methodology for Testing Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:1-10 [Conf]
  2. Kiyohiro Morita, Keiji Ozaki, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa
    Sensor-Actuator Communication Protocols in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:11-19 [Conf]
  3. Consolee Mbarushimana, Alireza Shahrabi, Hadi Larijani
    The Effect of Routing Protocol Dynamics on TCP Performance in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:20-29 [Conf]
  4. Fumiaki Sato, Sumito Iijima
    Battery and Power Aware Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:30-39 [Conf]
  5. Yoshitaka Shibata, Yosuke Sato, Kazuya Sakakibara, Kazuo Takahata
    Wireless Balloon Network for Disaster Information System. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:40-48 [Conf]
  6. Krzysztof Gierlowski, Krzysztof Nowicki
    Wireless Networks as an Infrastructure for Mission-Critical Business Applications. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:49-58 [Conf]
  7. Iksu Kim, MyungHo Kim
    The DecoyPort: Redirecting Hackers to Honeypots. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:59-68 [Conf]
  8. Yeu-Pong Lai, Jui-Heng Tai
    Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:69-78 [Conf]
  9. Sylvia B. Encheva, Sharil Tumin
    Positive and Negative Authorizations to Access Protected Web Resources. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:79-87 [Conf]
  10. Taeshik Shon, Wook Choi
    An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:88-97 [Conf]
  11. Jin-Cherng Lin, Jan-Min Chen, Hsing-Kuo Wong
    An Automatic Meta-revised Mechanism for Anti-malicious Injection. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:98-107 [Conf]
  12. Chizuro Sakamoto, Giuseppe De Marco, Rihito Yaegashi, Masaharu Tadauchi, Leonard Barolli
    SKEMON: A Simple Certificate-Less Method for Key Exchange by Using Mobile Network. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:108-117 [Conf]
  13. Chin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan
    A Secure Authentication Scheme for a Public Terminal Before a Transaction. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:118-126 [Conf]
  14. Michitaka Yoshimoto, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata
    Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:127-136 [Conf]
  15. Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng
    A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:137-146 [Conf]
  16. Kuang-Hui Chi, Ji-Han Jiang, Yu-Ching Hsu
    Multigroup Rekeying for a Wireless Network. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:147-156 [Conf]
  17. Matthias Häsel
    Rich Internet Architectures for Browser-Based Multiplayer Real-Time Games - Design and Implementation Issues of [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:157-166 [Conf]
  18. Po-Jen Chuang, Chu-Sing Yang, Ming-Chao Chiang
    Distribution of Lecture Concepts and Relations in Digital Contents. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:167-176 [Conf]
  19. Yuebin Bai, Haixing Ji, Huabin Lu, Chao Li, Qi Zou, Peng Lv
    Design of the Middleware Enabling Context Awareness and Energy Optimizing for Smart Environment. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:177-186 [Conf]
  20. Walter Colitti, Kris Steenhaut, Ann Nowé, Jan Lemeire
    Multilayer Quality and Grade of Service Support for High Speed GMPLS IP/DWDM Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:187-196 [Conf]
  21. Nuno Lopes, Carlos Baquero
    Implementing Range Queries with a Decentralized Balanced Tree over Distributed Hash Tables. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:197-206 [Conf]
  22. Kai Han, Binoy Ravindran, E. Douglas Jensen
    Byzantine-Tolerant, Information Propagation in Untrustworthy and Unreliable Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:207-216 [Conf]
  23. Ludmila Himmelspach, Mehmet Kolac, Krasimir Kutsarov, Alexander Chernin, Christopher Popfinger, Stefan Conrad
    COMICS: A Global Constraint Manager for Interactive Component Database Systems. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:217-226 [Conf]
  24. Valbona Barolli, Heihachiro Fukuda, Leonard Barolli, Makoto Takizawa
    Guidelines for Network Service Pricing: An Extended Model Considering Increase of Network Users. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:227-237 [Conf]
  25. Tomoya Enokido, Valbona Barolli, Makoto Takizawa
    Role-Based Scheduling and Synchronization Algorithms to Prevent Illegal Information Flow. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:238-247 [Conf]
  26. André Trudel, Elhadi Shakshuki, Yiqing Xu
    A Probabilistic Multi-agent Scheduler Implemented in JXTA. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:248-257 [Conf]
  27. Kwok-Wa Lam, Sheung-lun Hung
    Scheduling Real-Time Requests in On-Demand Broadcast Environments. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:258-267 [Conf]
  28. Chih-Ming Wang, Chu-Sing Yang, Ming-Chao Chiang
    A Fair Replica Placement for Parallel Download on Cluster Grid. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:268-277 [Conf]
  29. Jan Sedmidubský, Stanislav Barton, Vlastislav Dohnal, Pavel Zezula
    Querying Similarity in Metric Social Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:278-287 [Conf]
  30. Aamir Siddique, Abdalla M. Hanashi, Irfan Awan, Mike Woodward
    Performance Evaluation of Dynamic Probabilistic Flooding Using Local Density Information in MANETs. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:288-297 [Conf]
  31. Salvador Alcaraz, Katja Gilly, Carlos Juiz, Ramón Puigjaner
    A Token Bucket Model with Assured Forwarding for Web Traffic. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:298-307 [Conf]
  32. Natalia Kryvinska, Peter Zinterhof, Do Van Thanh
    An Analytical Approach to the Efficient Real-Time Events/Services Handling in Converged Network Environment. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:308-316 [Conf]
  33. Toshihiko Yamakami
    Command Transition Probability Analysis on Mobile Internet Command Sequences. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:317-324 [Conf]
  34. Young-Duk Kim, Yeon-Mo Yang, Dong-Ha Lee
    A Solution for Congestion and Performance Enhancement by Dynamic Packet Bursting in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:325-334 [Conf]
  35. Markus Aleksy, Martin Schader, Christian Seifried, Makoto Takizawa
    Empirical Study of Design Pattern Usage in Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:335-344 [Conf]
  36. Fatos Xhafa, Raul Fernandez, Thanasis Daradoumis, Leonard Barolli, Santi Caballé
    Improvement of JXTA Protocols for Supporting Reliable Distributed Applications in P2P Systems. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:345-354 [Conf]
  37. Oliver Haase, Alfred Toth, Jürgen Wäsch
    A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:355-364 [Conf]
  38. David Faye, Gilles Nachouki, Patrick Valduriez
    Semantic Query Routing in SenPeer, a P2P Data Management System. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:365-374 [Conf]
  39. Kasame Tritrakan, Pakit Kanchana, Veera Muangsin
    Jamjuree Cluster: A Peer-to-Peer Cluster Computing System. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:375-384 [Conf]
  40. Nobuyoshi Sato, Minoru Uehara, Koichiro Shimomura, Hirobumi Yamamoto, Ken'ichi Kamijo
    Evaluations on Classified Selection of Dense Vectors for Vegetable Geographical Origin Identification System Using Trace Elements. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:385-396 [Conf]
  41. Arjan Durresi, Arben Merkoci, Mimoza Durresi, Leonard Barolli
    Integrated Biomedical System for Ubiquitous Health Monitoring. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:397-405 [Conf]
  42. Tuyet-Tram Dang-Ngoc, Nicolas Travers
    Tree Graph Views for a Distributed Pervasive Environment. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:406-415 [Conf]
  43. MinHwan Ok, Ja-Won Seo, Myong-Soon Park
    A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:416-425 [Conf]
  44. Zhefan Jiang, Sangwook Kim
    Trust Model for Mobile Devices in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:426-434 [Conf]
  45. Enrique Pena, Miguel Rios, Christian Oberli, Vladimir Marianov
    PoQBA: A New Path Admission Control for Diffserv Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:435-445 [Conf]
  46. Waqas Ahmad, Irfan Awan, Makoto Takizawa
    An Adaptive Call Admission Control Approach for Multimedia 3G Network. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:446-455 [Conf]
  47. Sangbin Lee, Younghwan Jung, Woojin Park, Sunshin An
    Spatial Correlation Code Based Data Aggregation Scheme for Maximizing Network Lifetime. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:456-465 [Conf]
  48. Dayin Promkotwong, Ohm Sornil
    A Mesh-Based QoS Aware Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:466-475 [Conf]
  49. Erianto Chai, Minoru Uehara, Hideki Mori, Nobuyoshi Sato
    Virtual Large-Scale Disk System for PC-Room. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:476-485 [Conf]
  50. Sylvia B. Encheva, Sharil Tumin
    Application of Default Logic in an Intelligent Tutoring System. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:486-494 [Conf]
  51. Yong-Ju Lee, SongWoo Sok, Hag-Young Kim, Myung-Joon Kim, Cheolhoon Lee
    Consolidating with Media Streaming Server and Network Storage Card. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:495-504 [Conf]
  52. Shinya Toji, Minoru Uehara, Hideki Mori
    Design of the Tile-Based Embedded Multimedia Processor -TEMP-. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:505-512 [Conf]
  53. Leonard Barolli, Arjan Durresi, Fatos Xhafa, Akio Koyama
    A Fuzzy-Based Speed-Aware Handoff System for Wireless Cellular Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:513-522 [Conf]
  54. Jung-Hyun Kim, Kwang-Seok Hong
    WPS and Voice-XML-Based Multi-Modal Fusion Agent Using SNNR and Fuzzy Value. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:523-532 [Conf]
  55. Kun-Ming Yu, Zhi-Jie Luo, Chih-Hsun Chou, Cheng-Kwan Chen, Jiayi Zhou
    A Fuzzy Neural Network Based Scheduling Algorithm for Job Assignment on Computational Grids. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:533-542 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002