Conferences in DBLP
(nbis) 2007 (conf/nbis/2007)
Makoto Ikeda , Giuseppe De Marco , Leonard Barolli A Simple Statistical Methodology for Testing Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:1-10 [Conf ] Kiyohiro Morita , Keiji Ozaki , Kenichi Watanabe , Naohiro Hayashibara , Tomoya Enokido , Makoto Takizawa Sensor-Actuator Communication Protocols in Wireless Networks. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:11-19 [Conf ] Consolee Mbarushimana , Alireza Shahrabi , Hadi Larijani The Effect of Routing Protocol Dynamics on TCP Performance in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:20-29 [Conf ] Fumiaki Sato , Sumito Iijima Battery and Power Aware Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:30-39 [Conf ] Yoshitaka Shibata , Yosuke Sato , Kazuya Sakakibara , Kazuo Takahata Wireless Balloon Network for Disaster Information System. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:40-48 [Conf ] Krzysztof Gierlowski , Krzysztof Nowicki Wireless Networks as an Infrastructure for Mission-Critical Business Applications. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:49-58 [Conf ] Iksu Kim , MyungHo Kim The DecoyPort: Redirecting Hackers to Honeypots. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:59-68 [Conf ] Yeu-Pong Lai , Jui-Heng Tai Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:69-78 [Conf ] Sylvia B. Encheva , Sharil Tumin Positive and Negative Authorizations to Access Protected Web Resources. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:79-87 [Conf ] Taeshik Shon , Wook Choi An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:88-97 [Conf ] Jin-Cherng Lin , Jan-Min Chen , Hsing-Kuo Wong An Automatic Meta-revised Mechanism for Anti-malicious Injection. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:98-107 [Conf ] Chizuro Sakamoto , Giuseppe De Marco , Rihito Yaegashi , Masaharu Tadauchi , Leonard Barolli SKEMON: A Simple Certificate-Less Method for Key Exchange by Using Mobile Network. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:108-117 [Conf ] Chin-Ling Chen , Yu-Yi Chen , Jinn-ke Jan A Secure Authentication Scheme for a Public Terminal Before a Transaction. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:118-126 [Conf ] Michitaka Yoshimoto , Takashi Katoh , Bhed Bahadur Bista , Toyoo Takata Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:127-136 [Conf ] Yung-Tsung Hou , Chia-Mei Chen , Bingchiang Jeng A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:137-146 [Conf ] Kuang-Hui Chi , Ji-Han Jiang , Yu-Ching Hsu Multigroup Rekeying for a Wireless Network. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:147-156 [Conf ] Matthias Häsel Rich Internet Architectures for Browser-Based Multiplayer Real-Time Games - Design and Implementation Issues of virtual-kicker.com. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:157-166 [Conf ] Po-Jen Chuang , Chu-Sing Yang , Ming-Chao Chiang Distribution of Lecture Concepts and Relations in Digital Contents. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:167-176 [Conf ] Yuebin Bai , Haixing Ji , Huabin Lu , Chao Li , Qi Zou , Peng Lv Design of the Middleware Enabling Context Awareness and Energy Optimizing for Smart Environment. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:177-186 [Conf ] Walter Colitti , Kris Steenhaut , Ann Nowé , Jan Lemeire Multilayer Quality and Grade of Service Support for High Speed GMPLS IP/DWDM Networks. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:187-196 [Conf ] Nuno Lopes , Carlos Baquero Implementing Range Queries with a Decentralized Balanced Tree over Distributed Hash Tables. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:197-206 [Conf ] Kai Han , Binoy Ravindran , E. Douglas Jensen Byzantine-Tolerant, Information Propagation in Untrustworthy and Unreliable Networks. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:207-216 [Conf ] Ludmila Himmelspach , Mehmet Kolac , Krasimir Kutsarov , Alexander Chernin , Christopher Popfinger , Stefan Conrad COMICS: A Global Constraint Manager for Interactive Component Database Systems. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:217-226 [Conf ] Valbona Barolli , Heihachiro Fukuda , Leonard Barolli , Makoto Takizawa Guidelines for Network Service Pricing: An Extended Model Considering Increase of Network Users. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:227-237 [Conf ] Tomoya Enokido , Valbona Barolli , Makoto Takizawa Role-Based Scheduling and Synchronization Algorithms to Prevent Illegal Information Flow. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:238-247 [Conf ] André Trudel , Elhadi Shakshuki , Yiqing Xu A Probabilistic Multi-agent Scheduler Implemented in JXTA. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:248-257 [Conf ] Kwok-Wa Lam , Sheung-lun Hung Scheduling Real-Time Requests in On-Demand Broadcast Environments. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:258-267 [Conf ] Chih-Ming Wang , Chu-Sing Yang , Ming-Chao Chiang A Fair Replica Placement for Parallel Download on Cluster Grid. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:268-277 [Conf ] Jan Sedmidubský , Stanislav Barton , Vlastislav Dohnal , Pavel Zezula Querying Similarity in Metric Social Networks. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:278-287 [Conf ] Aamir Siddique , Abdalla M. Hanashi , Irfan Awan , Mike Woodward Performance Evaluation of Dynamic Probabilistic Flooding Using Local Density Information in MANETs. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:288-297 [Conf ] Salvador Alcaraz , Katja Gilly , Carlos Juiz , Ramón Puigjaner A Token Bucket Model with Assured Forwarding for Web Traffic. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:298-307 [Conf ] Natalia Kryvinska , Peter Zinterhof , Do Van Thanh An Analytical Approach to the Efficient Real-Time Events/Services Handling in Converged Network Environment. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:308-316 [Conf ] Toshihiko Yamakami Command Transition Probability Analysis on Mobile Internet Command Sequences. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:317-324 [Conf ] Young-Duk Kim , Yeon-Mo Yang , Dong-Ha Lee A Solution for Congestion and Performance Enhancement by Dynamic Packet Bursting in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:325-334 [Conf ] Markus Aleksy , Martin Schader , Christian Seifried , Makoto Takizawa Empirical Study of Design Pattern Usage in Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:335-344 [Conf ] Fatos Xhafa , Raul Fernandez , Thanasis Daradoumis , Leonard Barolli , Santi Caballé Improvement of JXTA Protocols for Supporting Reliable Distributed Applications in P2P Systems. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:345-354 [Conf ] Oliver Haase , Alfred Toth , Jürgen Wäsch A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:355-364 [Conf ] David Faye , Gilles Nachouki , Patrick Valduriez Semantic Query Routing in SenPeer, a P2P Data Management System. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:365-374 [Conf ] Kasame Tritrakan , Pakit Kanchana , Veera Muangsin Jamjuree Cluster: A Peer-to-Peer Cluster Computing System. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:375-384 [Conf ] Nobuyoshi Sato , Minoru Uehara , Koichiro Shimomura , Hirobumi Yamamoto , Ken'ichi Kamijo Evaluations on Classified Selection of Dense Vectors for Vegetable Geographical Origin Identification System Using Trace Elements. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:385-396 [Conf ] Arjan Durresi , Arben Merkoci , Mimoza Durresi , Leonard Barolli Integrated Biomedical System for Ubiquitous Health Monitoring. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:397-405 [Conf ] Tuyet-Tram Dang-Ngoc , Nicolas Travers Tree Graph Views for a Distributed Pervasive Environment. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:406-415 [Conf ] MinHwan Ok , Ja-Won Seo , Myong-Soon Park A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:416-425 [Conf ] Zhefan Jiang , Sangwook Kim Trust Model for Mobile Devices in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:426-434 [Conf ] Enrique Pena , Miguel Rios , Christian Oberli , Vladimir Marianov PoQBA: A New Path Admission Control for Diffserv Networks. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:435-445 [Conf ] Waqas Ahmad , Irfan Awan , Makoto Takizawa An Adaptive Call Admission Control Approach for Multimedia 3G Network. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:446-455 [Conf ] Sangbin Lee , Younghwan Jung , Woojin Park , Sunshin An Spatial Correlation Code Based Data Aggregation Scheme for Maximizing Network Lifetime. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:456-465 [Conf ] Dayin Promkotwong , Ohm Sornil A Mesh-Based QoS Aware Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:466-475 [Conf ] Erianto Chai , Minoru Uehara , Hideki Mori , Nobuyoshi Sato Virtual Large-Scale Disk System for PC-Room. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:476-485 [Conf ] Sylvia B. Encheva , Sharil Tumin Application of Default Logic in an Intelligent Tutoring System. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:486-494 [Conf ] Yong-Ju Lee , SongWoo Sok , Hag-Young Kim , Myung-Joon Kim , Cheolhoon Lee Consolidating with Media Streaming Server and Network Storage Card. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:495-504 [Conf ] Shinya Toji , Minoru Uehara , Hideki Mori Design of the Tile-Based Embedded Multimedia Processor -TEMP-. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:505-512 [Conf ] Leonard Barolli , Arjan Durresi , Fatos Xhafa , Akio Koyama A Fuzzy-Based Speed-Aware Handoff System for Wireless Cellular Networks. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:513-522 [Conf ] Jung-Hyun Kim , Kwang-Seok Hong WPS and Voice-XML-Based Multi-Modal Fusion Agent Using SNNR and Fuzzy Value. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:523-532 [Conf ] Kun-Ming Yu , Zhi-Jie Luo , Chih-Hsun Chou , Cheng-Kwan Chen , Jiayi Zhou A Fuzzy Neural Network Based Scheduling Algorithm for Job Assignment on Computational Grids. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:533-542 [Conf ]