Conferences in DBLP
The Crucial Role of Information Communication Technology in Western Australia. [Citation Graph (, )][DBLP ] Data Integration at Scale: From Relational Data Integration to Information Ecosystems. [Citation Graph (, )][DBLP ] Design of Network Based Software. [Citation Graph (, )][DBLP ] A Photonics Based Intelligent Airport Surveillance and Tracking System. [Citation Graph (, )][DBLP ] Next Decade of Social, Economical and Ethical Challenges. [Citation Graph (, )][DBLP ] Socio-Natural Thought Semantic Link Network: A Method of Semantic Networking in the Cyber Physical Society. [Citation Graph (, )][DBLP ] Cloud Computing: Issues and Challenges. [Citation Graph (, )][DBLP ] Accountability Computing for E-society. [Citation Graph (, )][DBLP ] Performance Evaluation of Database Designs. [Citation Graph (, )][DBLP ] Performance of Weighted Fair Queuing System with Multi-class Jobs. [Citation Graph (, )][DBLP ] Enhanced DR-Tree for Low Latency Filtering in Publish/Subscribe Systems. [Citation Graph (, )][DBLP ] RED and WRED Performance Analysis Based on Superposition of N MMBP Arrival Proccess. [Citation Graph (, )][DBLP ] Performance Analysis of VCP Controller on DCCP Traffic. [Citation Graph (, )][DBLP ] Comparative Analysis and Evaluation of Botnet Command and Control Models. [Citation Graph (, )][DBLP ] Simulation-Based Performance Evaluation of the SNDP Protocol for Infrastructure WMNs. [Citation Graph (, )][DBLP ] An Adaptive Routing Protocol for Bus Networks. [Citation Graph (, )][DBLP ] Adaptive Clustering Protocol for Wireless Networks. [Citation Graph (, )][DBLP ] PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network. [Citation Graph (, )][DBLP ] Multicast QoS Routing Using Collaborative Path Exploration. [Citation Graph (, )][DBLP ] High Performance Computing on Demand: Sharing and Mutualization of Clusters. [Citation Graph (, )][DBLP ] An Implementation of NaryRAID. [Citation Graph (, )][DBLP ] Algorithms for Reducing the Total Power Consumption in Data Communication-Based Applications. [Citation Graph (, )][DBLP ] A Comparative Study on the Performance of the Parallel and Distributing Computing Operation in MatLab. [Citation Graph (, )][DBLP ] Pitcher: Enabling Distributed Parallel Computing with Automatic Thread and Data Assignments. [Citation Graph (, )][DBLP ] Distributed Orchestration of Pervasive Services. [Citation Graph (, )][DBLP ] Integrating Load Balancing into Channelization Strategy in Publish/Subscribe. [Citation Graph (, )][DBLP ] A Specialized Tool for Simulating Lock-Keeper Data Transfer. [Citation Graph (, )][DBLP ] Transmit Power Allocation for Precoded Distributed MIMO OFDM Systems. [Citation Graph (, )][DBLP ] Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. [Citation Graph (, )][DBLP ] Consensus in Anonymous Distributed Systems: Is There a Weakest Failure Detector?. [Citation Graph (, )][DBLP ] Recommender Systems for Human Resources Task Assignment. [Citation Graph (, )][DBLP ] Minimizing Execution Costs when Using Globally Distributed Cloud Services. [Citation Graph (, )][DBLP ] Schedule Distributed Virtual Machines in a Service Oriented Environment. [Citation Graph (, )][DBLP ] Software-as-a-Service and Versionology: Towards Innovative Service Differentiation. [Citation Graph (, )][DBLP ] A Visual Semantic Service Browser Supporting User-Centric Service Composition. [Citation Graph (, )][DBLP ] An Identifier-Based Architecture for Native Vertical Handover Support. [Citation Graph (, )][DBLP ] DACS System's Implementation Method to Realize the Next Generation Policy-Based Network Management Scheme. [Citation Graph (, )][DBLP ] A Scalable Peer-to-Peer Group Communication Protocol. [Citation Graph (, )][DBLP ] TCP Testing: How Well Does ns2 Match Reality?. [Citation Graph (, )][DBLP ] Network Integrated Transparent TCP Accelerator. [Citation Graph (, )][DBLP ] Integrated Modeling, Generation and Optimization for Packet based NoC Topology. [Citation Graph (, )][DBLP ] Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission. [Citation Graph (, )][DBLP ] Maximizing Bandwidth Using Disjoint Paths. [Citation Graph (, )][DBLP ] Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer. [Citation Graph (, )][DBLP ] Exploiting Spectrum Usage Patterns for Efficient Spectrum Management in Cognitive Radio Networks. [Citation Graph (, )][DBLP ] Improving Reliability Calculation with Augmented Binary Decision Diagrams. [Citation Graph (, )][DBLP ] Community-Aware Scheduling Protocol for Grids. [Citation Graph (, )][DBLP ] Flow Vector Prediction in Large IP Networks. [Citation Graph (, )][DBLP ] Utilizing WiMAX as a Public Safety Network in Jordan. [Citation Graph (, )][DBLP ] Hybrid Communication Reconfigurable Network on Chip for MPSoC. [Citation Graph (, )][DBLP ] An Overlay Multicast that Supports a Distinguished QoS Based on Service Levels and User Environments in the Next Generation Network. [Citation Graph (, )][DBLP ] The Power of Orientation in Symmetry-Breaking. [Citation Graph (, )][DBLP ] A PCA Analysis of Daily Unwanted Traffic. [Citation Graph (, )][DBLP ] The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS. [Citation Graph (, )][DBLP ] Iterative Route Discovery in AODV. [Citation Graph (, )][DBLP ] A Particle Swarm Optimization-Based Heuristic for Scheduling Workflow Applications in Cloud Computing Environments. [Citation Graph (, )][DBLP ] Whois Based Geolocation: A Strategy to Geolocate Internet Hosts. [Citation Graph (, )][DBLP ] A DSL-Based Approach to Software Development and Deployment on Cloud. [Citation Graph (, )][DBLP ] Internet Host Geolocation Using Maximum Likelihood Estimation Technique. [Citation Graph (, )][DBLP ] CAPTCHA Using Strangeness in Machine Translation. [Citation Graph (, )][DBLP ] A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System. [Citation Graph (, )][DBLP ] CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications. [Citation Graph (, )][DBLP ] Mapping the Blogosphere with RSS-Feeds. [Citation Graph (, )][DBLP ] A Modified QRD-M Algorithm Based on Layer Branch Pruning for MIMO Systems. [Citation Graph (, )][DBLP ] Genetic Algorithms for Efficient Placement of Router Nodes in Wireless Mesh Networks. [Citation Graph (, )][DBLP ] A Condition Monitoring Platform Using COTS Wireless Sensor Networks: Lessons and Experience. [Citation Graph (, )][DBLP ] A Novel Spatial TDMA Scheduler for Concurrent Transmit/Receive Wireless Mesh Networks. [Citation Graph (, )][DBLP ] Probabilistic Proactive Routing with Active Route Trace-Back for Highly Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Mobility Effects of Wireless Multi-hop Networks in Indoor Scenarios. [Citation Graph (, )][DBLP ] Service Invocation over Content-Based Communication in Disconnected Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc Networks. [Citation Graph (, )][DBLP ] A Study on Sensor Multiplicity in Optical Fiber Sensor Networks. [Citation Graph (, )][DBLP ] RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Active Data Selection for Sensor Networks with Faults and Changepoints. [Citation Graph (, )][DBLP ] Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks. [Citation Graph (, )][DBLP ] Investigating Impact of Quorum Construction on Data Processing in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] New Approach to Quantification of Privacy on Social Network Sites. [Citation Graph (, )][DBLP ] Trustworthiness among Peer Processes in Distributed Agreement Protocol. [Citation Graph (, )][DBLP ] Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items. [Citation Graph (, )][DBLP ] Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks. [Citation Graph (, )][DBLP ] A Tree Graph Model Based on Mobile Environment. [Citation Graph (, )][DBLP ] BPE Acceleration Technique for S/W Update for Mobile Phones. [Citation Graph (, )][DBLP ] An Efficient Scalable Trajectory Based Forwarding Scheme for VANETs. [Citation Graph (, )][DBLP ] An Efficient Telematics Service Discovery Scheme over the Centralized Vehicular Peer-to-Peer (C-VP2P) Telematics Service Platform. [Citation Graph (, )][DBLP ] A Novel Cache Management Using Geographically Partial Matching for Location-Based Services. [Citation Graph (, )][DBLP ] CoMiHoC: A Middleware Framework for Context Management in MANET Environment. [Citation Graph (, )][DBLP ] RF-Based Indoor Locating System for NLOS Environment. [Citation Graph (, )][DBLP ] AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. [Citation Graph (, )][DBLP ] A Cross-Layer Decision for Mobile IP Handover. [Citation Graph (, )][DBLP ] A Novel Cross Layer Intrusion Detection System in MANET. [Citation Graph (, )][DBLP ] A Secure Key Management Model for Wireless Mesh Networks. [Citation Graph (, )][DBLP ] Bright Pupil Detection in an Embedded, Real-Time Drowsiness Monitoring System. [Citation Graph (, )][DBLP ] A Transport Protocol for Multimedia Transmission in Overlay Networks. [Citation Graph (, )][DBLP ] A Survey on Multimedia Communicating Technology Based on Spatial Audio Coding. [Citation Graph (, )][DBLP ] User-Excentric Service Composition in Pervasive Environments. [Citation Graph (, )][DBLP ] Modeling and Measuring Quality of Context Information in Pervasive Environments. [Citation Graph (, )][DBLP ] Interactive Home Supervision Application. [Citation Graph (, )][DBLP ] Context-Aware Mobile Services Transactions. [Citation Graph (, )][DBLP ] Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility Study. [Citation Graph (, )][DBLP ] A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost. [Citation Graph (, )][DBLP ] Modbus/DNP3 State-Based Intrusion Detection System. [Citation Graph (, )][DBLP ] Efficient Algorithms for Dynamic Detection and Resolution of IPSec/VPN Security Policy Conflicts. [Citation Graph (, )][DBLP ] Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes. [Citation Graph (, )][DBLP ] MARS: Multi-stage Attack Recognition System. [Citation Graph (, )][DBLP ] Against Spyware Using CAPTCHA in Graphical Password Scheme. [Citation Graph (, )][DBLP ] Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach. [Citation Graph (, )][DBLP ] An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network. [Citation Graph (, )][DBLP ] Empirical Analysis of Attackers Activity on Multi-tier Web Systems. [Citation Graph (, )][DBLP ] Key Parameters in Identifying Cost of Spam 2.0. [Citation Graph (, )][DBLP ] Web Spambot Detection Based on Web Navigation Behaviour. [Citation Graph (, )][DBLP ] A Dynamic Normalized Weighting Based Context Reasoning in Home-Based Care. [Citation Graph (, )][DBLP ] Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-Oriented Middleware. [Citation Graph (, )][DBLP ] Modeling and Evaluating the Reliability of Cluster-Based Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Prioritizing Information for Achieving QoS Control in WSN. [Citation Graph (, )][DBLP ] Mobile Element Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Symbolic Routing for Location-Based Services in Wireless Mesh Networks. [Citation Graph (, )][DBLP ] Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. [Citation Graph (, )][DBLP ] Communication Scheme to Support Sink Mobility in Multi-hop Clustered Wireless Sensor Networks. [Citation Graph (, )][DBLP ] On Barrier Coverage in Wireless Camera Sensor Networks. [Citation Graph (, )][DBLP ] A Hybrid Technique for Efficient Medium Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Routing Loops in DAG-Based Low Power and Lossy Networks. [Citation Graph (, )][DBLP ] Energy-Aware, Self-Deploying Approaches for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Employing IEEE 802.15.4 for Quality of Service Provisioning in Wireless Body Area Sensor Networks. [Citation Graph (, )][DBLP ] Sink-Initiated Geographic Multicasting Protocol in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Tradeoffs among Delay, Energy and Accuracy of Partial Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Real-Time Data Dissemination Based on Reactive and Restricted Zone Search in Sensor Networks. [Citation Graph (, )][DBLP ] An Energy Aware Routing Protocol with Sleep Scheduling for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Applications of Wireless Sensor Networks in the Oil, Gas and Resources Industries. [Citation Graph (, )][DBLP ] Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries. [Citation Graph (, )][DBLP ] From Communities of Web Services to Marts of Composite Web Services. [Citation Graph (, )][DBLP ] YASA-M: A Semantic Web Service Matchmaker. [Citation Graph (, )][DBLP ] Using Recommendation to Limit Search Space in Web Services Discovery. [Citation Graph (, )][DBLP ] Environmental Sustainability and Improved Quality of Life Through Service Convergence Technologies. [Citation Graph (, )][DBLP ] Adaptive and Distributed Access Control in Cognitive Radio Networks. [Citation Graph (, )][DBLP ] An Authentication Model for Wireless Network Services. [Citation Graph (, )][DBLP ] Controlling File Distribution in the Share Network Through Content Poisoning. [Citation Graph (, )][DBLP ] HealthPass: Fine-Grained Access Control to Portable Personal Health Records. [Citation Graph (, )][DBLP ] Towards More Trustable Log Files for Digital Forensics by Means of . [Citation Graph (, )][DBLP ] InnoDB Database Forensics. [Citation Graph (, )][DBLP ] A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs. [Citation Graph (, )][DBLP ] Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance. [Citation Graph (, )][DBLP ] Non-interactive Information Reconciliation for Quantum Key Distribution. [Citation Graph (, )][DBLP ] Enabling Scalable RFID Traceability Networks. [Citation Graph (, )][DBLP ] Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber. [Citation Graph (, )][DBLP ] Admission Control and System Capacity Assessment of WiMAX with ACM and nb-LDPC Codes. [Citation Graph (, )][DBLP ] Secure Communication for Internet Payment in Heterogeneous Networks. [Citation Graph (, )][DBLP ] IDSec: An Identification Layer Security Model. [Citation Graph (, )][DBLP ] Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. [Citation Graph (, )][DBLP ] Deployment of a Secure Wireless Infrastructure Oriented to Vehicular Networks. [Citation Graph (, )][DBLP ] Automatic Application Signature Construction from Unknown Traffic. [Citation Graph (, )][DBLP ] Simulation Analysis of Moving Peer Influence on Location-Aware P2P Network. [Citation Graph (, )][DBLP ] Propagation Modeling of Peer-to-Peer Worms. [Citation Graph (, )][DBLP ] MeTree: A Contribution and Locality-Aware P2P Live Streaming Architecture. [Citation Graph (, )][DBLP ] Grid of Segment Trees for Packet Classification. [Citation Graph (, )][DBLP ] Towards Near Real-Time Data Warehousing. [Citation Graph (, )][DBLP ] Data Mapping, Matching and Loading Using Grid Services. [Citation Graph (, )][DBLP ] Exploiting Rateless Coding in Structured Overlays to Achieve Data Persistence. [Citation Graph (, )][DBLP ] An Enhanced Global Index for Location-Based Mobile Broadcast Services. [Citation Graph (, )][DBLP ] Outsourced XML Database: Query Assurance Optimization. [Citation Graph (, )][DBLP ] Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic Questions. [Citation Graph (, )][DBLP ] Metaverses as a Platform for Game Based Learning. [Citation Graph (, )][DBLP ] Neural Network Trainer through Computer Networks. [Citation Graph (, )][DBLP ] Compensation of Sensors Nonlinearity with Neural Networks. [Citation Graph (, )][DBLP ] Delta-equalities of Complex Fuzzy Relations. [Citation Graph (, )][DBLP ] A Japanese Calligraphy Trainer Based on Skill Acquisition Through Haptization. [Citation Graph (, )][DBLP ] MagicNET: Security System for Protection of Mobile Agents. [Citation Graph (, )][DBLP ] An Ant-Colony-Optimization Based Approach for Determination of Parameter Significance of Scientific Workflows. [Citation Graph (, )][DBLP ] Knowledge Sharing Effectiveness Measurement. [Citation Graph (, )][DBLP ] Using Ontology for Personalized Mobile Message Computation. [Citation Graph (, )][DBLP ] Automatic Method for Author Name Disambiguation Using Social Networks. [Citation Graph (, )][DBLP ] An Information Platform for Low-Literate Villagers. [Citation Graph (, )][DBLP ] A Two-Phase Approach to Subscription Subsumption Checking for Content-Based Publish/Subscribe Systems. [Citation Graph (, )][DBLP ] Integrating Recreational Fishing Behaviour within a Reef Ecosystem as a Platform for Evaluating Management Strategies. [Citation Graph (, )][DBLP ] Semantic Driven Self-Adaptation of Communications Applied to ERCMS. [Citation Graph (, )][DBLP ] Extracting Named Entities and Synonyms from Wikipedia. [Citation Graph (, )][DBLP ] Aletheia--Improving Industrial Service Lifecycle Management by Semantic Data Federations. [Citation Graph (, )][DBLP ] Improving Graduate Employability by Using Social Networking Systems. [Citation Graph (, )][DBLP ] Human-Computer Interaction Experiments. [Citation Graph (, )][DBLP ]