The SCEAS System
Navigation Menu

Conferences in DBLP

Advanced Information Networking and Applications (aina)
2009 (conf/aina/2009)


  1. Improving QoS through Network Real-Time Measurement and Self-Adaption. [Citation Graph (, )][DBLP]


  2. Wormholes of Communication: Interfacing Virtual Worlds and the Real World. [Citation Graph (, )][DBLP]


  3. Location-Aware Authentication and Access Control. [Citation Graph (, )][DBLP]


  4. Evaluating the Performance of Network Protocol Processing on Multi-core Systems. [Citation Graph (, )][DBLP]


  5. Modeling Web Request and Session Level Arrivals. [Citation Graph (, )][DBLP]


  6. Predictive Simulation of HPC Applications. [Citation Graph (, )][DBLP]


  7. Modelling Network Performance with a Spatial Stochastic Process Algebra. [Citation Graph (, )][DBLP]


  8. An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks. [Citation Graph (, )][DBLP]


  9. Parameterised Gradient Based Routing (PGBR) for Future Internet. [Citation Graph (, )][DBLP]


  10. A New Counting Scheme for Multicast Broadcast Service with WiBro. [Citation Graph (, )][DBLP]


  11. Analyzing the Hold Time Schemes to Limit the Routing Table Calculations in OSPF Protocol. [Citation Graph (, )][DBLP]


  12. Real-Time Task Assignment in Heterogeneous Distributed Systems with Rechargeable Batteries. [Citation Graph (, )][DBLP]


  13. Distributed Secure Virtual File System Using Hysteresis Signatures. [Citation Graph (, )][DBLP]


  14. Quarc: A High-Efficiency Network on-Chip Architecture. [Citation Graph (, )][DBLP]


  15. Fair Scheduling with Multiple Gateways in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  16. Business Compliance Governance in Service-Oriented Architectures. [Citation Graph (, )][DBLP]


  17. DAVO: A Domain-Adaptable, Visual BPEL4WS Orchestrator. [Citation Graph (, )][DBLP]


  18. A Generic Database Web Service for the Venice Service Grid. [Citation Graph (, )][DBLP]


  19. Trust Requirements in Identity Federation Topologies. [Citation Graph (, )][DBLP]


  20. Combined On-line and Off-line Trust Mechanism for Agent Computing. [Citation Graph (, )][DBLP]


  21. A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  22. An Ontology-Based Architecture for Federated Identity Management. [Citation Graph (, )][DBLP]


  23. Trust Management in Emergency Networks. [Citation Graph (, )][DBLP]


  24. An Efficient FEC Allocation Algorithm for Unequal Error Protection of Wireless Video Transmission. [Citation Graph (, )][DBLP]


  25. Adaptive FEC Algorithm Based on Prediction of Video Quality and Bandwidth Utilization Ratio. [Citation Graph (, )][DBLP]


  26. Content-Adaptive Robust H.264/SVC Video Communications over 802.11e Networks. [Citation Graph (, )][DBLP]


  27. Heterogeneous Error Protection of H.264/AVC Video Using Hierarchical 16-QAM. [Citation Graph (, )][DBLP]


  28. Design of q-ary Irregular Repeat-Accumulate Codes. [Citation Graph (, )][DBLP]


  29. Design of Quasi-Cyclic LDPC Codes Based on Euclidean Geometries. [Citation Graph (, )][DBLP]


  30. Multi-user MIMO Broadcast System Grouping Strategy Based on Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  31. ANFIS Based AQM Controller for Congestion Control. [Citation Graph (, )][DBLP]


  32. Probabilistic Network Fault-Diagnosis Using Cross-Layer Observations. [Citation Graph (, )][DBLP]


  33. An Overlay Application-Layer Multicast Infrastructure. [Citation Graph (, )][DBLP]


  34. A Measurement Study on Peer Behaviors for a Pure P2P Network. [Citation Graph (, )][DBLP]


  35. N-nary RAID: 3-resilient RAID Based on an N-nary Number. [Citation Graph (, )][DBLP]


  36. Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling Systems. [Citation Graph (, )][DBLP]


  37. A Pipelined IP Forwarding Engine with Fast Update. [Citation Graph (, )][DBLP]


  38. DINCast: Optimizing Application-Level Shared-Tree Multicast. [Citation Graph (, )][DBLP]


  39. A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-Tree. [Citation Graph (, )][DBLP]


  40. Optimized Broadcast in a Geographical Area of Wireless Ad Hoc and Sensor Networks. [Citation Graph (, )][DBLP]


  41. A Resource Discovery Scheme for Large Scale Ad Hoc Networks Using a Hypercube-Based Backbone. [Citation Graph (, )][DBLP]


  42. Energy Efficiency: Optimal Transmission Range with Topology Management in Rectangular Ad-hoc Wireless Networks. [Citation Graph (, )][DBLP]


  43. Performance Analysis of OLSR and BATMAN Protocols Considering Link Quality Parameter. [Citation Graph (, )][DBLP]


  44. A Communication Model of Broadcast in Wormhole-Routed Networks on-Chip. [Citation Graph (, )][DBLP]


  45. An Experimental Evaluation of Sender-Side TCP Enhancements for Wired-to-Wireless Paths: A Real-World Home WLAN Case Study. [Citation Graph (, )][DBLP]


  46. QoS Enhancements and Performance Analysis for Delay Sensitive Applications. [Citation Graph (, )][DBLP]


  47. An Efficient Admission Control Methodology for Satisfying QoS Requirements in NGN Networks. [Citation Graph (, )][DBLP]


  48. A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming. [Citation Graph (, )][DBLP]


  49. Trustworthiness Assessment of Wireless Sensor Data for Business Applications. [Citation Graph (, )][DBLP]


  50. Key Management in Web of Trust for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  51. Enabling Fast Bootstrap of Reputation in P2P Mobile Networks. [Citation Graph (, )][DBLP]


  52. A Survey and Analysis on Semantics in QoS for Web Services. [Citation Graph (, )][DBLP]


  53. Exploiting Request Characteristics to Improve Performance of Web Services Based Business Applications. [Citation Graph (, )][DBLP]


  54. Massively Scalable Web Service Discovery. [Citation Graph (, )][DBLP]


  55. Towards an Approach to Defining Capacity-Driven Web Service. [Citation Graph (, )][DBLP]


  56. Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA. [Citation Graph (, )][DBLP]


  57. A Highly Available Grid Metadata Catalog. [Citation Graph (, )][DBLP]


  58. Transaction Management for Reliable Grid Applications. [Citation Graph (, )][DBLP]


  59. Brain Image Registration Analysis Workflow for fMRI Studies on Global Grids. [Citation Graph (, )][DBLP]


  60. Name Resolution Middleware Using Relative Positional Relationship to Support Wireless Visible Area Communication. [Citation Graph (, )][DBLP]


  61. Data Dissemination with Drop Boxes. [Citation Graph (, )][DBLP]


  62. A Proposal to Enhance and Control Continuous Communications in Proxy Mobile IPv6. [Citation Graph (, )][DBLP]


  63. Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless Networks. [Citation Graph (, )][DBLP]


  64. JPEG Steganography: A Performance Evaluation of Quantization Tables. [Citation Graph (, )][DBLP]


  65. Serial and Parallel Transmission Models for Multi-source Streaming of Multimedia Objects. [Citation Graph (, )][DBLP]


  66. PHD. [Citation Graph (, )][DBLP]


  67. The Efficiency Method of Sanitizable Signature Scheme for SMF. [Citation Graph (, )][DBLP]


  68. Situation-Aware Adaptive Recommendation to Assist Mobile Users in a Campus Environment. [Citation Graph (, )][DBLP]


  69. Tracking Anonymous Sinks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  70. Sensor Data Fusion Using DSm Theory for Activity Recognition under Uncertainty in Home-Based Care. [Citation Graph (, )][DBLP]


  71. A Distributed Dynamic Adaptation Model for Component-Based Applications. [Citation Graph (, )][DBLP]


  72. Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  73. Fuzzy ESVDF Approach for Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  74. Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. [Citation Graph (, )][DBLP]


  75. Masquerade Detection Using Command Prediction and Association Rules Mining. [Citation Graph (, )][DBLP]


  76. Route Construction Based on Measured Characteristics of Radio Propagation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  77. An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol. [Citation Graph (, )][DBLP]


  78. Information Communication Mechanism for Loosely Coupled Mobile User Groups in Wireless Sensor Fields. [Citation Graph (, )][DBLP]


  79. Lessons Learned: Simulation Vs WSN Deployment. [Citation Graph (, )][DBLP]


  80. Similarity Search over DNS Query Streams for Email Worm Detection. [Citation Graph (, )][DBLP]


  81. ReAlSec: A Relational Language for Advanced Security Engineering. [Citation Graph (, )][DBLP]


  82. A New Video Surveillance Video Tracking System Based on Omni-directional and Network Controlled Cameras. [Citation Graph (, )][DBLP]


  83. Exclusion of Forged Files from Multi-source Downloadable P2P Systems. [Citation Graph (, )][DBLP]


  84. Packet Scheduling Algorithm with QoS Provision in HSDPA. [Citation Graph (, )][DBLP]


  85. A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  86. Privacy-Aware Routing Approach for Mobile Applications. [Citation Graph (, )][DBLP]


  87. A New Space Time Cooperative Diversity Scheme Based on Simple Feedback. [Citation Graph (, )][DBLP]


  88. On the Synchronization of Web Services Interactions. [Citation Graph (, )][DBLP]


  89. Diagnosing Incompatibilities in Web Service Interactions for Automatic Generation of Adapters. [Citation Graph (, )][DBLP]


  90. Building Distributed Index for Semantic Web Data. [Citation Graph (, )][DBLP]


  91. Advantages of User Authentication Using Unclear Images. [Citation Graph (, )][DBLP]


  92. An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks. [Citation Graph (, )][DBLP]


  93. IGMPx: Port Based Service Access Control for IP Multicast. [Citation Graph (, )][DBLP]


  94. A Hierarchical Model for Firewall Policy Extraction. [Citation Graph (, )][DBLP]


  95. Improved 4-ary Query Tree Algorithm for Anti-Collision in RFID System. [Citation Graph (, )][DBLP]


  96. Mitigation of Intercarrier Interference Based on General Precoder Design in OFDM Systems. [Citation Graph (, )][DBLP]


  97. An Analytical Model for MAC Protocol Configuration in WLAN. [Citation Graph (, )][DBLP]


  98. Survivability in Existing ATM-Based Mesh Networks. [Citation Graph (, )][DBLP]


  99. Effects of On-path Buffering on TCP Fairness. [Citation Graph (, )][DBLP]


  100. Scalability Analysis to Optimize a Network on Chip. [Citation Graph (, )][DBLP]


  101. Network Voronoi Diagram Based Range Search. [Citation Graph (, )][DBLP]


  102. Optical Fiber Sensor Network Integrating Communication and Sensing Functions Using Hetero-core Spliced Fiber Optic Sensors. [Citation Graph (, )][DBLP]


  103. Sink Location Service via Inner Rectangular in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  104. How Long is the Lifetime of a Wireless Sensor Network?. [Citation Graph (, )][DBLP]


  105. Medium Access Control in Large Scale Clusters for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  106. Finding Influential eBay Buyers for Viral Marketing. [Citation Graph (, )][DBLP]


  107. Priority Scheduling of Requests to Web Portals. [Citation Graph (, )][DBLP]


  108. GBLT: Load Distribution Method for High Density by User Behavior in MMO Virtual Environment. [Citation Graph (, )][DBLP]


  109. Implementation of an E-learning System Using P2P, Web and Sensor Technologies. [Citation Graph (, )][DBLP]


  110. Recoverable Cuts to Make Agreement among Peers. [Citation Graph (, )][DBLP]


  111. A New Ballooned Wireless Mesh Network System for Disaster Use. [Citation Graph (, )][DBLP]


  112. Determining the Net Financial Risk for Decision Making in Business Interactions. [Citation Graph (, )][DBLP]


  113. Fault-Tolerant Flocking of Mobile Robots with Whole Formation Rotation. [Citation Graph (, )][DBLP]


  114. Testing the Symbian OS Platform Security Architecture. [Citation Graph (, )][DBLP]


  115. A Protocol for Releasing Purpose Marks to Prevent Illegal Information Flow. [Citation Graph (, )][DBLP]


  116. Anomaly Detection for DNS Servers Using Frequent Host Selection. [Citation Graph (, )][DBLP]


  117. A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis. [Citation Graph (, )][DBLP]


  118. Introducing Group Participation Support into P2P Web Caching Systems. [Citation Graph (, )][DBLP]


  119. VirtCloud: Virtualising Network for Grid Environments. [Citation Graph (, )][DBLP]


  120. Spigot: Fragment-Level File Sharing and Consistency on Grids. [Citation Graph (, )][DBLP]


  121. DACA: Dynamic Anti-Cheating Architecture for MMOGs. [Citation Graph (, )][DBLP]


  122. DCM-Arch: An Architecture for Data, Control, and Management in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  123. Effective Sensing Function Allocation Using a Distributed Graph Coloring and a Slot Allocation Algorithm in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  124. A Method for Determining Weight Reset Timing in a Wirelessly Networked Array with Independently Mobile Elements. [Citation Graph (, )][DBLP]


  125. Configuring Beaconless IEEE 802.15.4 Networks Under Different Traffic Loads. [Citation Graph (, )][DBLP]


  126. Classification of Bloggers Using Social Annotations. [Citation Graph (, )][DBLP]


  127. Supporting Complex Scientific Database Schemas in a Grid Middleware. [Citation Graph (, )][DBLP]


  128. Utilising Multimodal Interaction Metaphors in E-learning Applications: An Experimental Study. [Citation Graph (, )][DBLP]


  129. A New Method of Proactive Recovery Mechanism for Large-Scale Network Failures. [Citation Graph (, )][DBLP]


  130. An Approach to Find Maximal Disjoint Paths with Reliability and Delay Constraints. [Citation Graph (, )][DBLP]


  131. Implementation of Lightweight TCP/IP for Small, Wireless Embedded Systems. [Citation Graph (, )][DBLP]


  132. On the False-Positive and False-Negative Behavior of a Soft-State Signaling Protocol. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002