The SCEAS System
Navigation Menu

Conferences in DBLP

Advanced Information Networking and Applications (aina)
2010 (conf/aina/2010)

  1. The Crucial Role of Information Communication Technology in Western Australia. [Citation Graph (, )][DBLP]

  2. Data Integration at Scale: From Relational Data Integration to Information Ecosystems. [Citation Graph (, )][DBLP]

  3. Design of Network Based Software. [Citation Graph (, )][DBLP]

  4. A Photonics Based Intelligent Airport Surveillance and Tracking System. [Citation Graph (, )][DBLP]

  5. Next Decade of Social, Economical and Ethical Challenges. [Citation Graph (, )][DBLP]

  6. Socio-Natural Thought Semantic Link Network: A Method of Semantic Networking in the Cyber Physical Society. [Citation Graph (, )][DBLP]

  7. Cloud Computing: Issues and Challenges. [Citation Graph (, )][DBLP]

  8. Accountability Computing for E-society. [Citation Graph (, )][DBLP]

  9. Performance Evaluation of Database Designs. [Citation Graph (, )][DBLP]

  10. Performance of Weighted Fair Queuing System with Multi-class Jobs. [Citation Graph (, )][DBLP]

  11. Enhanced DR-Tree for Low Latency Filtering in Publish/Subscribe Systems. [Citation Graph (, )][DBLP]

  12. RED and WRED Performance Analysis Based on Superposition of N MMBP Arrival Proccess. [Citation Graph (, )][DBLP]

  13. Performance Analysis of VCP Controller on DCCP Traffic. [Citation Graph (, )][DBLP]

  14. Comparative Analysis and Evaluation of Botnet Command and Control Models. [Citation Graph (, )][DBLP]

  15. Simulation-Based Performance Evaluation of the SNDP Protocol for Infrastructure WMNs. [Citation Graph (, )][DBLP]

  16. An Adaptive Routing Protocol for Bus Networks. [Citation Graph (, )][DBLP]

  17. Adaptive Clustering Protocol for Wireless Networks. [Citation Graph (, )][DBLP]

  18. PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network. [Citation Graph (, )][DBLP]

  19. Multicast QoS Routing Using Collaborative Path Exploration. [Citation Graph (, )][DBLP]

  20. High Performance Computing on Demand: Sharing and Mutualization of Clusters. [Citation Graph (, )][DBLP]

  21. An Implementation of NaryRAID. [Citation Graph (, )][DBLP]

  22. Algorithms for Reducing the Total Power Consumption in Data Communication-Based Applications. [Citation Graph (, )][DBLP]

  23. A Comparative Study on the Performance of the Parallel and Distributing Computing Operation in MatLab. [Citation Graph (, )][DBLP]

  24. Pitcher: Enabling Distributed Parallel Computing with Automatic Thread and Data Assignments. [Citation Graph (, )][DBLP]

  25. Distributed Orchestration of Pervasive Services. [Citation Graph (, )][DBLP]

  26. Integrating Load Balancing into Channelization Strategy in Publish/Subscribe. [Citation Graph (, )][DBLP]

  27. A Specialized Tool for Simulating Lock-Keeper Data Transfer. [Citation Graph (, )][DBLP]

  28. Transmit Power Allocation for Precoded Distributed MIMO OFDM Systems. [Citation Graph (, )][DBLP]

  29. Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. [Citation Graph (, )][DBLP]

  30. Consensus in Anonymous Distributed Systems: Is There a Weakest Failure Detector?. [Citation Graph (, )][DBLP]

  31. Recommender Systems for Human Resources Task Assignment. [Citation Graph (, )][DBLP]

  32. Minimizing Execution Costs when Using Globally Distributed Cloud Services. [Citation Graph (, )][DBLP]

  33. Schedule Distributed Virtual Machines in a Service Oriented Environment. [Citation Graph (, )][DBLP]

  34. Software-as-a-Service and Versionology: Towards Innovative Service Differentiation. [Citation Graph (, )][DBLP]

  35. A Visual Semantic Service Browser Supporting User-Centric Service Composition. [Citation Graph (, )][DBLP]

  36. An Identifier-Based Architecture for Native Vertical Handover Support. [Citation Graph (, )][DBLP]

  37. DACS System's Implementation Method to Realize the Next Generation Policy-Based Network Management Scheme. [Citation Graph (, )][DBLP]

  38. A Scalable Peer-to-Peer Group Communication Protocol. [Citation Graph (, )][DBLP]

  39. TCP Testing: How Well Does ns2 Match Reality?. [Citation Graph (, )][DBLP]

  40. Network Integrated Transparent TCP Accelerator. [Citation Graph (, )][DBLP]

  41. Integrated Modeling, Generation and Optimization for Packet based NoC Topology. [Citation Graph (, )][DBLP]

  42. Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission. [Citation Graph (, )][DBLP]

  43. Maximizing Bandwidth Using Disjoint Paths. [Citation Graph (, )][DBLP]

  44. Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer. [Citation Graph (, )][DBLP]

  45. Exploiting Spectrum Usage Patterns for Efficient Spectrum Management in Cognitive Radio Networks. [Citation Graph (, )][DBLP]

  46. Improving Reliability Calculation with Augmented Binary Decision Diagrams. [Citation Graph (, )][DBLP]

  47. Community-Aware Scheduling Protocol for Grids. [Citation Graph (, )][DBLP]

  48. Flow Vector Prediction in Large IP Networks. [Citation Graph (, )][DBLP]

  49. Utilizing WiMAX as a Public Safety Network in Jordan. [Citation Graph (, )][DBLP]

  50. Hybrid Communication Reconfigurable Network on Chip for MPSoC. [Citation Graph (, )][DBLP]

  51. An Overlay Multicast that Supports a Distinguished QoS Based on Service Levels and User Environments in the Next Generation Network. [Citation Graph (, )][DBLP]

  52. The Power of Orientation in Symmetry-Breaking. [Citation Graph (, )][DBLP]

  53. A PCA Analysis of Daily Unwanted Traffic. [Citation Graph (, )][DBLP]

  54. The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS. [Citation Graph (, )][DBLP]

  55. Iterative Route Discovery in AODV. [Citation Graph (, )][DBLP]

  56. A Particle Swarm Optimization-Based Heuristic for Scheduling Workflow Applications in Cloud Computing Environments. [Citation Graph (, )][DBLP]

  57. Whois Based Geolocation: A Strategy to Geolocate Internet Hosts. [Citation Graph (, )][DBLP]

  58. A DSL-Based Approach to Software Development and Deployment on Cloud. [Citation Graph (, )][DBLP]

  59. Internet Host Geolocation Using Maximum Likelihood Estimation Technique. [Citation Graph (, )][DBLP]

  60. CAPTCHA Using Strangeness in Machine Translation. [Citation Graph (, )][DBLP]

  61. A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System. [Citation Graph (, )][DBLP]

  62. CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications. [Citation Graph (, )][DBLP]

  63. Mapping the Blogosphere with RSS-Feeds. [Citation Graph (, )][DBLP]

  64. A Modified QRD-M Algorithm Based on Layer Branch Pruning for MIMO Systems. [Citation Graph (, )][DBLP]

  65. Genetic Algorithms for Efficient Placement of Router Nodes in Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  66. A Condition Monitoring Platform Using COTS Wireless Sensor Networks: Lessons and Experience. [Citation Graph (, )][DBLP]

  67. A Novel Spatial TDMA Scheduler for Concurrent Transmit/Receive Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  68. Probabilistic Proactive Routing with Active Route Trace-Back for Highly Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  69. Mobility Effects of Wireless Multi-hop Networks in Indoor Scenarios. [Citation Graph (, )][DBLP]

  70. Service Invocation over Content-Based Communication in Disconnected Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  71. A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc Networks. [Citation Graph (, )][DBLP]

  72. A Study on Sensor Multiplicity in Optical Fiber Sensor Networks. [Citation Graph (, )][DBLP]

  73. RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  74. Active Data Selection for Sensor Networks with Faults and Changepoints. [Citation Graph (, )][DBLP]

  75. Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks. [Citation Graph (, )][DBLP]

  76. Investigating Impact of Quorum Construction on Data Processing in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  77. New Approach to Quantification of Privacy on Social Network Sites. [Citation Graph (, )][DBLP]

  78. Trustworthiness among Peer Processes in Distributed Agreement Protocol. [Citation Graph (, )][DBLP]

  79. Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items. [Citation Graph (, )][DBLP]

  80. Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks. [Citation Graph (, )][DBLP]

  81. A Tree Graph Model Based on Mobile Environment. [Citation Graph (, )][DBLP]

  82. BPE Acceleration Technique for S/W Update for Mobile Phones. [Citation Graph (, )][DBLP]

  83. An Efficient Scalable Trajectory Based Forwarding Scheme for VANETs. [Citation Graph (, )][DBLP]

  84. An Efficient Telematics Service Discovery Scheme over the Centralized Vehicular Peer-to-Peer (C-VP2P) Telematics Service Platform. [Citation Graph (, )][DBLP]

  85. A Novel Cache Management Using Geographically Partial Matching for Location-Based Services. [Citation Graph (, )][DBLP]

  86. CoMiHoC: A Middleware Framework for Context Management in MANET Environment. [Citation Graph (, )][DBLP]

  87. RF-Based Indoor Locating System for NLOS Environment. [Citation Graph (, )][DBLP]

  88. AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. [Citation Graph (, )][DBLP]

  89. A Cross-Layer Decision for Mobile IP Handover. [Citation Graph (, )][DBLP]

  90. A Novel Cross Layer Intrusion Detection System in MANET. [Citation Graph (, )][DBLP]

  91. A Secure Key Management Model for Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  92. Bright Pupil Detection in an Embedded, Real-Time Drowsiness Monitoring System. [Citation Graph (, )][DBLP]

  93. A Transport Protocol for Multimedia Transmission in Overlay Networks. [Citation Graph (, )][DBLP]

  94. A Survey on Multimedia Communicating Technology Based on Spatial Audio Coding. [Citation Graph (, )][DBLP]

  95. User-Excentric Service Composition in Pervasive Environments. [Citation Graph (, )][DBLP]

  96. Modeling and Measuring Quality of Context Information in Pervasive Environments. [Citation Graph (, )][DBLP]

  97. Interactive Home Supervision Application. [Citation Graph (, )][DBLP]

  98. Context-Aware Mobile Services Transactions. [Citation Graph (, )][DBLP]

  99. Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility Study. [Citation Graph (, )][DBLP]

  100. A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost. [Citation Graph (, )][DBLP]

  101. Modbus/DNP3 State-Based Intrusion Detection System. [Citation Graph (, )][DBLP]

  102. Efficient Algorithms for Dynamic Detection and Resolution of IPSec/VPN Security Policy Conflicts. [Citation Graph (, )][DBLP]

  103. Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes. [Citation Graph (, )][DBLP]

  104. MARS: Multi-stage Attack Recognition System. [Citation Graph (, )][DBLP]

  105. Against Spyware Using CAPTCHA in Graphical Password Scheme. [Citation Graph (, )][DBLP]

  106. Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach. [Citation Graph (, )][DBLP]

  107. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network. [Citation Graph (, )][DBLP]

  108. Empirical Analysis of Attackers Activity on Multi-tier Web Systems. [Citation Graph (, )][DBLP]

  109. Key Parameters in Identifying Cost of Spam 2.0. [Citation Graph (, )][DBLP]

  110. Web Spambot Detection Based on Web Navigation Behaviour. [Citation Graph (, )][DBLP]

  111. A Dynamic Normalized Weighting Based Context Reasoning in Home-Based Care. [Citation Graph (, )][DBLP]

  112. Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  113. Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-Oriented Middleware. [Citation Graph (, )][DBLP]

  114. Modeling and Evaluating the Reliability of Cluster-Based Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  115. Prioritizing Information for Achieving QoS Control in WSN. [Citation Graph (, )][DBLP]

  116. Mobile Element Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  117. Symbolic Routing for Location-Based Services in Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  118. Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. [Citation Graph (, )][DBLP]

  119. Communication Scheme to Support Sink Mobility in Multi-hop Clustered Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  120. On Barrier Coverage in Wireless Camera Sensor Networks. [Citation Graph (, )][DBLP]

  121. A Hybrid Technique for Efficient Medium Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  122. Routing Loops in DAG-Based Low Power and Lossy Networks. [Citation Graph (, )][DBLP]

  123. Energy-Aware, Self-Deploying Approaches for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  124. Employing IEEE 802.15.4 for Quality of Service Provisioning in Wireless Body Area Sensor Networks. [Citation Graph (, )][DBLP]

  125. Sink-Initiated Geographic Multicasting Protocol in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  126. Tradeoffs among Delay, Energy and Accuracy of Partial Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  127. Real-Time Data Dissemination Based on Reactive and Restricted Zone Search in Sensor Networks. [Citation Graph (, )][DBLP]

  128. An Energy Aware Routing Protocol with Sleep Scheduling for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  129. Applications of Wireless Sensor Networks in the Oil, Gas and Resources Industries. [Citation Graph (, )][DBLP]

  130. Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries. [Citation Graph (, )][DBLP]

  131. From Communities of Web Services to Marts of Composite Web Services. [Citation Graph (, )][DBLP]

  132. YASA-M: A Semantic Web Service Matchmaker. [Citation Graph (, )][DBLP]

  133. Using Recommendation to Limit Search Space in Web Services Discovery. [Citation Graph (, )][DBLP]

  134. Environmental Sustainability and Improved Quality of Life Through Service Convergence Technologies. [Citation Graph (, )][DBLP]

  135. Adaptive and Distributed Access Control in Cognitive Radio Networks. [Citation Graph (, )][DBLP]

  136. An Authentication Model for Wireless Network Services. [Citation Graph (, )][DBLP]

  137. Controlling File Distribution in the Share Network Through Content Poisoning. [Citation Graph (, )][DBLP]

  138. HealthPass: Fine-Grained Access Control to Portable Personal Health Records. [Citation Graph (, )][DBLP]

  139. Towards More Trustable Log Files for Digital Forensics by Means of . [Citation Graph (, )][DBLP]

  140. InnoDB Database Forensics. [Citation Graph (, )][DBLP]

  141. A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs. [Citation Graph (, )][DBLP]

  142. Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance. [Citation Graph (, )][DBLP]

  143. Non-interactive Information Reconciliation for Quantum Key Distribution. [Citation Graph (, )][DBLP]

  144. Enabling Scalable RFID Traceability Networks. [Citation Graph (, )][DBLP]

  145. Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber. [Citation Graph (, )][DBLP]

  146. Admission Control and System Capacity Assessment of WiMAX with ACM and nb-LDPC Codes. [Citation Graph (, )][DBLP]

  147. Secure Communication for Internet Payment in Heterogeneous Networks. [Citation Graph (, )][DBLP]

  148. IDSec: An Identification Layer Security Model. [Citation Graph (, )][DBLP]

  149. Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. [Citation Graph (, )][DBLP]

  150. Deployment of a Secure Wireless Infrastructure Oriented to Vehicular Networks. [Citation Graph (, )][DBLP]

  151. Automatic Application Signature Construction from Unknown Traffic. [Citation Graph (, )][DBLP]

  152. Simulation Analysis of Moving Peer Influence on Location-Aware P2P Network. [Citation Graph (, )][DBLP]

  153. Propagation Modeling of Peer-to-Peer Worms. [Citation Graph (, )][DBLP]

  154. MeTree: A Contribution and Locality-Aware P2P Live Streaming Architecture. [Citation Graph (, )][DBLP]

  155. Grid of Segment Trees for Packet Classification. [Citation Graph (, )][DBLP]

  156. Towards Near Real-Time Data Warehousing. [Citation Graph (, )][DBLP]

  157. Data Mapping, Matching and Loading Using Grid Services. [Citation Graph (, )][DBLP]

  158. Exploiting Rateless Coding in Structured Overlays to Achieve Data Persistence. [Citation Graph (, )][DBLP]

  159. An Enhanced Global Index for Location-Based Mobile Broadcast Services. [Citation Graph (, )][DBLP]

  160. Outsourced XML Database: Query Assurance Optimization. [Citation Graph (, )][DBLP]

  161. Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic Questions. [Citation Graph (, )][DBLP]

  162. Metaverses as a Platform for Game Based Learning. [Citation Graph (, )][DBLP]

  163. Neural Network Trainer through Computer Networks. [Citation Graph (, )][DBLP]

  164. Compensation of Sensors Nonlinearity with Neural Networks. [Citation Graph (, )][DBLP]

  165. Delta-equalities of Complex Fuzzy Relations. [Citation Graph (, )][DBLP]

  166. A Japanese Calligraphy Trainer Based on Skill Acquisition Through Haptization. [Citation Graph (, )][DBLP]

  167. MagicNET: Security System for Protection of Mobile Agents. [Citation Graph (, )][DBLP]

  168. An Ant-Colony-Optimization Based Approach for Determination of Parameter Significance of Scientific Workflows. [Citation Graph (, )][DBLP]

  169. Knowledge Sharing Effectiveness Measurement. [Citation Graph (, )][DBLP]

  170. Using Ontology for Personalized Mobile Message Computation. [Citation Graph (, )][DBLP]

  171. Automatic Method for Author Name Disambiguation Using Social Networks. [Citation Graph (, )][DBLP]

  172. An Information Platform for Low-Literate Villagers. [Citation Graph (, )][DBLP]

  173. A Two-Phase Approach to Subscription Subsumption Checking for Content-Based Publish/Subscribe Systems. [Citation Graph (, )][DBLP]

  174. Integrating Recreational Fishing Behaviour within a Reef Ecosystem as a Platform for Evaluating Management Strategies. [Citation Graph (, )][DBLP]

  175. Semantic Driven Self-Adaptation of Communications Applied to ERCMS. [Citation Graph (, )][DBLP]

  176. Extracting Named Entities and Synonyms from Wikipedia. [Citation Graph (, )][DBLP]

  177. Aletheia--Improving Industrial Service Lifecycle Management by Semantic Data Federations. [Citation Graph (, )][DBLP]

  178. Improving Graduate Employability by Using Social Networking Systems. [Citation Graph (, )][DBLP]

  179. Human-Computer Interaction Experiments. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002