The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Information Technology (IEEEcit)
2009 (conf/IEEEcit/2009-2)


  1. User-Perceived Reliability of Shared Protection Systems with a Finite Number of Repairers. [Citation Graph (, )][DBLP]


  2. A New Approach for Energy-Balanced Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  3. A Novel Top-k Query Scheme in Unstructured P2P Networks. [Citation Graph (, )][DBLP]


  4. Comparison of End-to-End Loss Differentiation Algorithms in Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]


  5. Calculating Minimum Buffer Requirement of Constant Rate Transmission Scheme Based on SVM. [Citation Graph (, )][DBLP]


  6. An Efficient Tag Collision Detection Method for Active RFID Systems. [Citation Graph (, )][DBLP]


  7. A Partition-Based LEACH Algorithm for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  8. TACS: A Transparent Application Bandwidth Management System. [Citation Graph (, )][DBLP]


  9. Iterative Wireless Sensor Network Positioning Based on Time Synchronization. [Citation Graph (, )][DBLP]


  10. Performance Modelling of IEEE 802.15.4 MAC in LR-WPAN with Bursty ON-OFF Traffic. [Citation Graph (, )][DBLP]


  11. QoS-Aware Channel Sensing Scheduling in Cognitive Radio Networks. [Citation Graph (, )][DBLP]


  12. Group Node Contention Algorithm for Avoiding Continuous Collisions in LR-WPAN. [Citation Graph (, )][DBLP]


  13. A Distributed File Storage with Replica Management in Peer-to-Peer Environments. [Citation Graph (, )][DBLP]


  14. The Area Coverage Algorithm to Maintain Connectivity for WSN. [Citation Graph (, )][DBLP]


  15. Efficient Distributed Positioning Algorithms for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  16. Object Oriented Property Attestation for Trusted Storage. [Citation Graph (, )][DBLP]


  17. Reputation Mechanism for Inter-domain Routing Security Management. [Citation Graph (, )][DBLP]


  18. AutoSig-Automatically Generating Signatures for Applications. [Citation Graph (, )][DBLP]


  19. Distance Based Pre-cluster Head Selection Scheme for a Chain-Based Protocol. [Citation Graph (, )][DBLP]


  20. Track-Sector Clustering for Energy Efficient Routing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  21. Medium Reservation Based MAC for Delay-Sensitive Wireless Sensor Network. [Citation Graph (, )][DBLP]


  22. Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices. [Citation Graph (, )][DBLP]


  23. Modeling and Transforming Abstract Constraints for Automatic Service Composition. [Citation Graph (, )][DBLP]


  24. Describing Web Topics Meticulously through Word Graph Analysis. [Citation Graph (, )][DBLP]


  25. Web Forum Sentiment Analysis Based on Topics. [Citation Graph (, )][DBLP]


  26. Constructing a Facet-Based and Personalized Just-in-Time Web Information Recommendation Application in a Multi-agent Environment. [Citation Graph (, )][DBLP]


  27. A Personalized Visualizing and Filtering System for a Large Set of Responding Messages on Internet Discussion Forums. [Citation Graph (, )][DBLP]


  28. Collective Intelligence-Based Web Page Search: Combining Folksonomy and Link-Based Ranking Strategy. [Citation Graph (, )][DBLP]


  29. A Web Recommender System Based on Dynamic Sampling of User Information Access Behaviors. [Citation Graph (, )][DBLP]


  30. Applying Collective Intelligence for Search Improvement on Thai Herbal Information. [Citation Graph (, )][DBLP]


  31. An Ontology-Driven Paradigm for Component Representation and Retrieval. [Citation Graph (, )][DBLP]


  32. Dynamic Software Product Lines for Service-Based Systems. [Citation Graph (, )][DBLP]


  33. A Feature-Oriented Framework Model for Object-Oriented Framework: An MDA Approach. [Citation Graph (, )][DBLP]


  34. An Automated Approach to Componentization of Java Source Code. [Citation Graph (, )][DBLP]


  35. On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature. [Citation Graph (, )][DBLP]


  36. A Hash-Based Path Identification Scheme for DDoS Attacks Defense. [Citation Graph (, )][DBLP]


  37. A Kind of Fuzzy Constraint Correlation Algorithm Based on Prerequisites and Consequences of Security Event. [Citation Graph (, )][DBLP]


  38. Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance. [Citation Graph (, )][DBLP]


  39. A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree. [Citation Graph (, )][DBLP]


  40. A Trusted Start-Up Based on Embedded System. [Citation Graph (, )][DBLP]


  41. Loop Selection to Boost Thread Level Speculation Parallelism in Chip Multiprocessor Systems. [Citation Graph (, )][DBLP]


  42. GPU Acceleration of High-Speed Collision Molecular Dynamics Simulation. [Citation Graph (, )][DBLP]


  43. A New Metric for Automatic Program Partitioning. [Citation Graph (, )][DBLP]


  44. Case Study on Modeling Approaches and Framework of Scientific Data Cleaning. [Citation Graph (, )][DBLP]


  45. Case Study on Multi-classifications Based Scientific Data Management and Analysis System. [Citation Graph (, )][DBLP]


  46. The Data Scales in Multi-valued Context Based on Formal Concept Analysis. [Citation Graph (, )][DBLP]


  47. Segmentation-Free Object Recognition Using Full Pixel Matching. [Citation Graph (, )][DBLP]


  48. Cross-Media Data Mining Using Associated Keyword Space. [Citation Graph (, )][DBLP]


  49. Research on Unified Network Access Control Architecture. [Citation Graph (, )][DBLP]


  50. Extracting Motion Features of Objects Based on Full Pixel Matching. [Citation Graph (, )][DBLP]


  51. Web Video Data Clustering and Recognition Using Histograms of Phoneme Symbols. [Citation Graph (, )][DBLP]


  52. Visualizing Vortex Shedding of an Elastic Plate Interacting with a 3D Viscous Flow. [Citation Graph (, )][DBLP]


  53. A Secure Multi-party Computing Model Based on Trusted Computing Platform. [Citation Graph (, )][DBLP]


  54. Performance Analysis of Different Routing Algorithms for Load Distribution in Multipath Packet Switched Network. [Citation Graph (, )][DBLP]


  55. A Prioritized Multi-queue Method for H.264/AVC Live Streaming in Wireless Networks. [Citation Graph (, )][DBLP]


  56. DCADH: A Generating Algorithm of Delay-Constrained Multicast Routing Tree. [Citation Graph (, )][DBLP]


  57. Route Optimization in PMIPv6 Environment. [Citation Graph (, )][DBLP]


  58. A New Design for Improving BER Performance for CI/MC-CDMA. [Citation Graph (, )][DBLP]


  59. A Method for Privacy Protection in Location Based Services. [Citation Graph (, )][DBLP]


  60. Internal Antenna Handset with Ni/Ag/Ni Hetero Structure. [Citation Graph (, )][DBLP]


  61. Operative Factors Contributing to the Selection of Fiber-Optic Techniques for Remote Measurement of Strain/Stress. [Citation Graph (, )][DBLP]


  62. Single DSP Hardware Design in Real-Time Multi-constellation Satellite Navigation Receiver. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002