The SCEAS System
Navigation Menu

Conferences in DBLP

Advanced Information Networking and Applications (aina)
2010 (conf/aina/2010w)

  1. A Middleware for Mobile and Ubiquitous Learning Ecosystems Based on a Reconfigurable Plug-and-Play Architecture: Application to Mashups. [Citation Graph (, )][DBLP]

  2. Towards Adaptive Mobile Mashups: Opportunities for Designing Effective Persuasive Technology on the Road. [Citation Graph (, )][DBLP]

  3. Mashup Patterns from Service Component Taxonomy. [Citation Graph (, )][DBLP]

  4. Evaluation of Error Control Mechanisms Based on System Throughput and Video Playable Frame Rate on Wireless Channel. [Citation Graph (, )][DBLP]

  5. An Analytical Model of k-Ary n-Cube under Spatial Communication Locality. [Citation Graph (, )][DBLP]

  6. DTCC: A Distributed Congestion Control Scheme for Connectionless Networks. [Citation Graph (, )][DBLP]

  7. Performance Evaluation of an Optimized Load Allocation Approach for Web Server Clusters. [Citation Graph (, )][DBLP]

  8. Applying Bloom Filter Addressing in Metro Ethernet Network. [Citation Graph (, )][DBLP]

  9. A Selective Minimum Delay Value (SMDV) Algorithm for Packet Contention Resolution in Optical Packet Switching. [Citation Graph (, )][DBLP]

  10. Development of SCRIS: A Knowledge Based System Tool for Assisting Organizations in Managing Supply Chain Risks. [Citation Graph (, )][DBLP]

  11. Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote Collaboration. [Citation Graph (, )][DBLP]

  12. Analytical Temporal Specification Issues for Industrial Control Systems. [Citation Graph (, )][DBLP]

  13. Routing Analysis and Flexibility of ROADMs in All Optical Networks. [Citation Graph (, )][DBLP]

  14. A Workflow Fragmentation Framework for Enterprise Grid Workflow Systems. [Citation Graph (, )][DBLP]

  15. Deadline Aware Virtual Machine Scheduler for Grid and Cloud Computing. [Citation Graph (, )][DBLP]

  16. Effect of Virtual Techniques in Data Storage Access. [Citation Graph (, )][DBLP]

  17. Generating Optimum Number of Clusters Using Median Search and Projection Algorithms. [Citation Graph (, )][DBLP]

  18. A Framework for Tag-Based Research Paper Recommender System: An IR Approach. [Citation Graph (, )][DBLP]

  19. User Interface Development for a Computer-Based User Study: The Universal Model Approach. [Citation Graph (, )][DBLP]

  20. NLAR: A New Approach to AQM. [Citation Graph (, )][DBLP]

  21. Data Filtering Utilizing Window Indexing. [Citation Graph (, )][DBLP]

  22. Proposal of Transmission Control Methods with Multihopped Environments in Cognitive Wireless Networks. [Citation Graph (, )][DBLP]

  23. A Shared-Memory Design for Crosspoint Buffered Switches under Mixed Uni- and Multicast Traffic. [Citation Graph (, )][DBLP]

  24. JXTA Security in Mobile Constrained Devices. [Citation Graph (, )][DBLP]

  25. Distribution of Machine Information Using Blackboard Designed Component for Remote Monitoring of Reconfigurable Manufacturing Systems. [Citation Graph (, )][DBLP]

  26. Isolated Forwarding Strategy in Ethernet Networks. [Citation Graph (, )][DBLP]

  27. Program Learning Using Static Information and Dynamic Program Execution Slices. [Citation Graph (, )][DBLP]

  28. Enhanced Fair Joint Multiple Resource Allocation Method in All-IP Networks. [Citation Graph (, )][DBLP]

  29. A Joint Antenna Selection and Power Allocation Algorithm for CoMP Systems. [Citation Graph (, )][DBLP]

  30. An Evaluation Technique Using Network Voronoi Diagram for Balanced Optical Network Design. [Citation Graph (, )][DBLP]

  31. Storage Access Optimization with Virtual Machine Migration During Execution of Parallel Data Processing on a Virtual Machine PC Cluster. [Citation Graph (, )][DBLP]

  32. Implementing and Testing a Semantic-Driven Approach Towards a Better Comprehension Between Service Consumers and Providers. [Citation Graph (, )][DBLP]

  33. Routing Based on Message Attraction. [Citation Graph (, )][DBLP]

  34. Improving Software Dependability Using System-Level Virtualization: A Survey. [Citation Graph (, )][DBLP]

  35. Adaptive Channel Coding and Modulation Scheme Selection for Achieving High Throughput in Wireless Networks. [Citation Graph (, )][DBLP]

  36. Information Security Threats Classification Pyramid. [Citation Graph (, )][DBLP]

  37. Virtual Database Technology for Distributed Database. [Citation Graph (, )][DBLP]

  38. Requirements for Distributed Event-Based Awareness in P2P Groupware Systems. [Citation Graph (, )][DBLP]

  39. Security Verification for Authentication and Key Exchange Protocols, Revisited. [Citation Graph (, )][DBLP]

  40. Concurrent Error Detection in Shifted Dual Basis Multiplier over GF(2m) Using Cyclic Code Approach. [Citation Graph (, )][DBLP]

  41. Some Thoughts on the Legal Background of the Continuously Increasing Privacy Risk in Information Systems and on How to Deal with It. [Citation Graph (, )][DBLP]

  42. Performance Evaluation of Wireless Sensor Networks for Mobile Sink Considering Consumed Energy Metric. [Citation Graph (, )][DBLP]

  43. Design and Implementation of an IEEE 802.15.4 Protocol Stack in Embedded Linux Kernel. [Citation Graph (, )][DBLP]

  44. Evaluating Product Line Architecture for Grid Computing Middleware Systems: Uba Experience. [Citation Graph (, )][DBLP]

  45. Ubiquitous Public Transportation Route Guide for a Developing Country. [Citation Graph (, )][DBLP]

  46. Development of Hi-Speed X.509 Certification Path Validation System. [Citation Graph (, )][DBLP]

  47. Practical Threshold One-Time Proxy Signature Scheme. [Citation Graph (, )][DBLP]

  48. Supporting Home Security System in OSGi Platform. [Citation Graph (, )][DBLP]

  49. SMART CAMP: Environmental Sustainability Through Intelligent Automation Technologies. [Citation Graph (, )][DBLP]

  50. Effects of Diffracted Waves for Perfectly Conducting Wedges in Propagation Path of Wireless Communication. [Citation Graph (, )][DBLP]

  51. Multi-set Architecture for Multi-applications Running on Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  52. Requirement of Handover Modeling in the Downlink 3GPP Long Term Evolution System. [Citation Graph (, )][DBLP]

  53. SP2MS: A MANet-Based P2P Service. [Citation Graph (, )][DBLP]

  54. A Graph Weighting Method for Reducing Consensus Time in Random Geographical Networks. [Citation Graph (, )][DBLP]

  55. Street Broadcast with Smart Relay for Emergency Messages in VANET. [Citation Graph (, )][DBLP]

  56. Cross-Layer Subchannel Assignment with Multicast over WiMAX Networks. [Citation Graph (, )][DBLP]

  57. An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification. [Citation Graph (, )][DBLP]

  58. On the Impact of Wi-Fi Multmedia Power Save Mode on the VoIP Capacity of WLANs. [Citation Graph (, )][DBLP]

  59. Design and Construction of a Prototype Secure Wireless Mesh Network Testbed. [Citation Graph (, )][DBLP]

  60. Trust Formalization in Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]

  61. Secure Mobile IP Communication in Residential Networks. [Citation Graph (, )][DBLP]

  62. Efficient Mobile IP Registration in Certificateless Signature. [Citation Graph (, )][DBLP]

  63. Service Selection Based on Fuzzy TOPSIS Method. [Citation Graph (, )][DBLP]

  64. A Semantic-Based Web Service Registry Filtering Mechanism. [Citation Graph (, )][DBLP]

  65. How do Goals Drive the Engineering of Capacity-Driven Web Services?. [Citation Graph (, )][DBLP]

  66. Web Service Provisioning to Nomadic Users Using a Light Weight Multi Agent System. [Citation Graph (, )][DBLP]

  67. Pros and Cons of Utilizing Mobile Navigation Systems in Pedestrian Way Finding. [Citation Graph (, )][DBLP]

  68. Effectively Generating and Delivering Personalized Product Information: Adopting the Web 2.0 Approach. [Citation Graph (, )][DBLP]

  69. A Web-Feed Based Service for Enhancing Asynchronous Learning on Personal Computers and Mobile Devices. [Citation Graph (, )][DBLP]

  70. An Adaptive Content Sharing Protocol for P2P Mobile Social Networks. [Citation Graph (, )][DBLP]

  71. Securing Queries to Outsourced XML Databases. [Citation Graph (, )][DBLP]

  72. iAuth: HTTP Authentication Framework Integrated into HTML Forms. [Citation Graph (, )][DBLP]

  73. Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model. [Citation Graph (, )][DBLP]

  74. Self-Proxy Mobile Signature: A New Client-Based Mobile Signature Model. [Citation Graph (, )][DBLP]

  75. Query Visualization for Query Trimming in Semantic Caching. [Citation Graph (, )][DBLP]

  76. Dynamic Data Allocation Scheme for Multi-server Web-Based MORPG System. [Citation Graph (, )][DBLP]

  77. Managing Schema Evolution in Hybrid XML-Relational Database Systems. [Citation Graph (, )][DBLP]

  78. Managing the Dynamics of E/mCommerce with a Hierarchical Overlapping Business-Value-Framework. [Citation Graph (, )][DBLP]

  79. Detection of Unusually Crowded Places through Micro-Blogging Sites. [Citation Graph (, )][DBLP]

  80. Kernel Mechanisms for Supporting Differentiated Services and Content-Aware Request Distribution in Web Clusters Providing Multiple Services. [Citation Graph (, )][DBLP]

  81. Density Control-Based Algorithms for Dynamic Maintenance in Sensor Networks with Limited Mobility. [Citation Graph (, )][DBLP]

  82. Enhanced Performance of Packet Transmission over VoIP Network. [Citation Graph (, )][DBLP]

  83. Performance Evaluation on Common Radio Resource Management Algorithms. [Citation Graph (, )][DBLP]

  84. Implementation and Evaluation of Emulator for Testing Service Programs in MANET. [Citation Graph (, )][DBLP]

  85. Service Migration Scenarios for Embedded Networks. [Citation Graph (, )][DBLP]

  86. Efficient and Flexible XML-Based Data-Exchange in Microcontroller-Based Sensor Actor Networks. [Citation Graph (, )][DBLP]

  87. Encoding and Compression for the Devices Profile for Web Services. [Citation Graph (, )][DBLP]

  88. An Evaluation of the Performance of DPWS on Embedded Devices in a Body Area Network. [Citation Graph (, )][DBLP]

  89. Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems. [Citation Graph (, )][DBLP]

  90. Towards a Platform for User-Generated Mobile Services. [Citation Graph (, )][DBLP]

  91. SAGE: An Approach to Evaluate the Impact of SOA Governance Policies. [Citation Graph (, )][DBLP]

  92. SOA Interoperability for Large-Scale Pervasive Environments. [Citation Graph (, )][DBLP]

  93. A Comparative Study into Distributed Load Balancing Algorithms for Cloud Computing. [Citation Graph (, )][DBLP]

  94. Exploring Development of Service-Oriented Architecture for Next Generation Emergency Management System. [Citation Graph (, )][DBLP]

  95. A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems. [Citation Graph (, )][DBLP]

  96. The Performance Analysis Using Multiple Beams for RFID Warehouse Management System. [Citation Graph (, )][DBLP]

  97. Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network. [Citation Graph (, )][DBLP]

  98. Torpid Mode: Hybrid of Sleep and Idle Mode as Power Saving Mechanism for IEEE 802.16j. [Citation Graph (, )][DBLP]

  99. Priority Enabled Transport Layer Protocol for Wireless Sensor Network. [Citation Graph (, )][DBLP]

  100. Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. [Citation Graph (, )][DBLP]

  101. Developing Distributed Reasoning-Based Applications for the Semantic Web. [Citation Graph (, )][DBLP]

  102. A New Over-Sampling Method Based on Cluster Ensembles. [Citation Graph (, )][DBLP]

  103. Eye-like Algorithm to produce voice web pages. [Citation Graph (, )][DBLP]

  104. Image Extraction from Online Text Streams: A Straightforward Template Independent Approach without Training. [Citation Graph (, )][DBLP]

  105. Multimedia Data Analysis on a Massively Distributed Parallelization Network of Anonymous Web Clients. [Citation Graph (, )][DBLP]

  106. CASIT: Content Based Identification of Textual Information in a Large Database. [Citation Graph (, )][DBLP]

  107. Web Tracking Site Detection Based on Temporal Link Analysis. [Citation Graph (, )][DBLP]

  108. User Studies in Web Information Retrieval: User-Centered Measures in Web IR Evaluation. [Citation Graph (, )][DBLP]

  109. An MIU [Most Influential Users]-Based Model for Recommender Systems. [Citation Graph (, )][DBLP]

  110. Identifying Key Users for Targeted Marketing by Mining Online Social Network. [Citation Graph (, )][DBLP]

  111. A Function Alternation Algorithm for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  112. A Collision Avoidance Multi-channel MAC Protocol with Physical Carrier Sensing for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  113. Self-Organizing Data Collection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  114. A Hierarchy Energy Driven Architecture for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  115. A New Quorum-Based Power Saving Protocol to Maintain QoS for MANETs with Burst Traffics. [Citation Graph (, )][DBLP]

  116. Tree-Based Clustering(TBC) for Energy Efficient Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  117. T-SNIPER: Trust-Aware Sensor Network Information Protocol for Efficient Routing. [Citation Graph (, )][DBLP]

  118. Optimizing Duty-Cycle for Delay and Energy Bound WSN Applications. [Citation Graph (, )][DBLP]

  119. SAGe: Sensor Advanced Gateway for Integrating Wireless Sensor Networks and Internet. [Citation Graph (, )][DBLP]

  120. Tsunami Early Alert and Evacuation Support System for Fishery Workers by Mobile Phones. [Citation Graph (, )][DBLP]

  121. Performance Evaluation of Disaster Information System Based on P2Pnetwork. [Citation Graph (, )][DBLP]

  122. Improvement of the Survivor Information System for University. [Citation Graph (, )][DBLP]

  123. Self Power Supplied Wireless Disaster Information Network. [Citation Graph (, )][DBLP]

  124. Construction of Wireless Network for Information Communication for a Disaster-Affected Island. [Citation Graph (, )][DBLP]

  125. Dynamic Network Configuration Method Based Cognitive Radio LANs for Disaster Information System. [Citation Graph (, )][DBLP]

  126. Disaster Communication Method Using Electromagnetic Wave Leaking from Wireless LAN System to Outdoors. [Citation Graph (, )][DBLP]

  127. Mnesic Evocation: An Isochron-Based Analysis. [Citation Graph (, )][DBLP]

  128. Demographic and Spatial Factors as Causes of an Epidemic Spread, the Copule Approach: Application to the Retro-prediction of the Black Death Epidemy of 1346. [Citation Graph (, )][DBLP]

  129. Behavioral Telemonitoring of the Elderly at Home: Detection of Nycthemeral Rhythms Drifts from Location Data. [Citation Graph (, )][DBLP]

  130. Evolution of the Genetic Regulatory Networks: The Example of the Cell Cycle Control Network. [Citation Graph (, )][DBLP]

  131. Methodological Proposal to Estimate a Tailored to the Problem Specificity Mathematical Transformation: Use of Computer Intelligence to Optimize Algorithm Complexity and Application to Auditory Brainstem Responses Modeling. [Citation Graph (, )][DBLP]

  132. On the Number of Attractors of Positive and Negative Boolean Automata Circuits. [Citation Graph (, )][DBLP]

  133. Feature Selection for Medical Diagnosis Using Fuzzy Artmap Classification and Intersection Conflict. [Citation Graph (, )][DBLP]

  134. Main Pathway Discovery in Metabolic Pathways. [Citation Graph (, )][DBLP]

  135. Global Strategy of Active Machine Learning for Complex Systems: Embryogenesis Application on Cell Division Detection. [Citation Graph (, )][DBLP]

  136. Multipath Transmission with Forward Error Correction Mechanism for Delay-Sensitive Video Communications. [Citation Graph (, )][DBLP]

  137. Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database. [Citation Graph (, )][DBLP]

  138. An Authentication and Authorization Protocol Using Ticket in Pervasive Environment. [Citation Graph (, )][DBLP]

  139. Quality Metrics for Software Process Certification Based on K-model. [Citation Graph (, )][DBLP]

  140. Towards a Unified Trust Model in Pervasive Systems. [Citation Graph (, )][DBLP]

  141. Improved Gait Recognition Performance Using Cycle Matching. [Citation Graph (, )][DBLP]

  142. A Context Conflict Resolution with Optimized Mediation. [Citation Graph (, )][DBLP]

  143. An Instructional Strategy Selection Model Based on Agent and Ontology for an Intelligent Tutoring System. [Citation Graph (, )][DBLP]

  144. HiTrust: A Hybrid Tree Based Trust Negotiation Service. [Citation Graph (, )][DBLP]

  145. Analysis of Anonymity in P2P Anonymous Communication Systems. [Citation Graph (, )][DBLP]

  146. Body Area Networks for Movement Analysis in Physiotherapy Treatments. [Citation Graph (, )][DBLP]

  147. A Novel Geographic Routing Strategy over VANET. [Citation Graph (, )][DBLP]

  148. Peer-to-Peer Overlay Gateway Services for Home Automation and Management. [Citation Graph (, )][DBLP]

  149. A Proposal for Method to Manage License Based on Log. [Citation Graph (, )][DBLP]

  150. Implementation of Alarm Correlation System for Hybrid Networks Based upon the perfSONAR Framework. [Citation Graph (, )][DBLP]

  151. Improvement and its Evaluation of Worker's Motion Monitor System in Automobile Assembly Factory. [Citation Graph (, )][DBLP]

  152. Storage Access Optimization with Virtual Machine Migration and Basic Performance Analysis of Amazon EC2. [Citation Graph (, )][DBLP]

  153. SLA-Based Online Charging Model in Mobile Environment. [Citation Graph (, )][DBLP]

  154. Performance Analysis of Two Packet Scheduling Algorithms in Downlink 3GPP LTE System. [Citation Graph (, )][DBLP]

  155. Android, Java ME and Windows Mobile Interplay: The Case of a Context-Aware Meeting Room. [Citation Graph (, )][DBLP]

  156. A Seamless Playback Mechanism for Mobile Multicast Streaming Video in IEEE 802.11-Based Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  157. EDQD: An Energy-Distance Aware Query-Based Data Aggregation Technique for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  158. Incorporating Imprecise Computations in Scheduling of Aggregated Data within Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  159. A Top-k Query Method by Estimating Score Distribution in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  160. A P2P Network Construction Method Based on Cycle of Sensing in Ubiquitous Sensor Environment. [Citation Graph (, )][DBLP]

  161. A Focus Control Method Based on City Blocks for the Focus+Glue+Context Map. [Citation Graph (, )][DBLP]

  162. mTracker: A Mobile Tracking Application for Pervasive Environment. [Citation Graph (, )][DBLP]

  163. A Framework of Better Deployment for WLAN Access Point Using Virtualization Technique. [Citation Graph (, )][DBLP]

  164. The Use of Public Health Grid Technology in the United States Centers for Disease Control and Prevention H1N1 Pandemic Response. [Citation Graph (, )][DBLP]

  165. Data Security and Information Privacy for PDA Accessible Clinical-Log for Medical Education in Problem-Based Learning (PBL) Approach. [Citation Graph (, )][DBLP]

  166. Intelligent Agents for Fault Tolerance: From Multi-agent Simulation to Cluster-Based Implementation. [Citation Graph (, )][DBLP]

  167. Detecting Suspicious Motion with Nonimaging Sensors. [Citation Graph (, )][DBLP]

  168. A Feasibility of Incorporating PDAs into Problem-Based Learning Approach to Medical Education: An Overview. [Citation Graph (, )][DBLP]

  169. Energy Saving of Air Condition Using Fuzzy Control System over Zigbee Temperature Sensor. [Citation Graph (, )][DBLP]

  170. A Wheel Graph Structured Associative Memory for Single-Cycle Pattern Recognition within P2P Networks. [Citation Graph (, )][DBLP]

  171. Choosing Text Description Language Features for Training and Testing Adaptive Resonance Theory: A Case Study for Botanical Classification. [Citation Graph (, )][DBLP]

  172. Is the Strategic Role of Large-Scale Information Systems an Essential Part of Quantitative Evaluation Process? [Citation Graph (, )][DBLP]

  173. HPC Benchmarks on Amazon EC2. [Citation Graph (, )][DBLP]

  174. Performance Evaluation of TPC-H Queries on MySQL Cluster. [Citation Graph (, )][DBLP]

  175. A Framework for Performing Statistical Testing of Distributed Systems. [Citation Graph (, )][DBLP]

  176. Contributions of Sensor Networks to Improve Gaming Experience. [Citation Graph (, )][DBLP]

  177. Testing Cross-Platform Streaming of Video Games over Wired and Wireless LANs. [Citation Graph (, )][DBLP]

  178. Database and State Replication in Multiplayer Online Games. [Citation Graph (, )][DBLP]

  179. IPTV Service with Automatic Channels Personalization. [Citation Graph (, )][DBLP]

  180. GEPETO: A GEoPrivacy-Enhancing TOolkit. [Citation Graph (, )][DBLP]

  181. A New Trust Chain Model. [Citation Graph (, )][DBLP]

  182. Towards a Pervasive Formal Privacy Language. [Citation Graph (, )][DBLP]

  183. Implementing Trust-to-Trust with Customer Edge Switching. [Citation Graph (, )][DBLP]

  184. Privacy Preservation Through Process Views. [Citation Graph (, )][DBLP]

  185. Subjective and Objective Types of Trustworthiness in Peer-to-Peer(P2P) Overlay Networks. [Citation Graph (, )][DBLP]

  186. A High-Level Semiotic Trust Agent Scoring Model for Collaborative Virtual Organsations. [Citation Graph (, )][DBLP]

  187. Dynamic Role-Based Access Control with Trust-Satisfaction and Reputation for Multi-agent System. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002