Conferences in DBLP
DRM Interoperability. [Citation Graph (, )][DBLP ] Modeling Network Security Services in Tactical Networks. [Citation Graph (, )][DBLP ] Mining with Noise Knowledge: Error Aware Data Mining. [Citation Graph (, )][DBLP ] Towards an Understanding of the Brain via Microscopic and Macroscopic Studies. [Citation Graph (, )][DBLP ] Mixing Matrix Recovery of Underdetermined Source Separation Based on Sparse Representation. [Citation Graph (, )][DBLP ] Region Assessment of Soil Erosion Based on Naive Bayes. [Citation Graph (, )][DBLP ] A Bayesian Network Based Approach for Root-Cause-Analysis in Manufacturing Process. [Citation Graph (, )][DBLP ] Step-Size Optimization EASI Algorithm for Blind Source Separation. [Citation Graph (, )][DBLP ] Variable Step-Size Online Algorithm for Blind Separation Based on the Extended Infomax. [Citation Graph (, )][DBLP ] A Novel Learning Method for ANFIS Using EM Algorithm and Emotional Learning. [Citation Graph (, )][DBLP ] A Novel Method for Intelligence of Sensors Modeling. [Citation Graph (, )][DBLP ] An Effective Feature-Weighting Model for Question Classification. [Citation Graph (, )][DBLP ] P2P Traffic Identification Technique. [Citation Graph (, )][DBLP ] Study on PIGA Test Method on Centrifuge. [Citation Graph (, )][DBLP ] Parameters Selection for SVR Based on the SCEM-UA Algorithm and its Application on Monthly Runoff Prediction. [Citation Graph (, )][DBLP ] Estimate and Track the PN Sequence of Weak DS-SS Signals. [Citation Graph (, )][DBLP ] A Smoothing Support Vector Machine Based on Quarter Penalty Function. [Citation Graph (, )][DBLP ] Fast Forecasting with Simplified Kernel Regression Machines. [Citation Graph (, )][DBLP ] An Accelerated SMO-Type Online Learning Algorithm. [Citation Graph (, )][DBLP ] An Improved MRF Based Unsupervised Change Detection Method. [Citation Graph (, )][DBLP ] Intrinsic Dimensionality Estimation with Neighborhood Convex Hull. [Citation Graph (, )][DBLP ] A Novel Evolutionary Algorithm for Function Optimization Using MEC. [Citation Graph (, )][DBLP ] A New Tree Encoding for the Degree-Constrained Spanning Tree Problem. [Citation Graph (, )][DBLP ] A Novel Hybrid Real-Valued Genetic Algorithm for Optimization Problems. [Citation Graph (, )][DBLP ] Global Optimization Method Based on the Statistical Genetic Algorithm for Solving Nonlinear Bilevel Programming Problems. [Citation Graph (, )][DBLP ] Prediction of MHC Class II Binding Peptides Using a Multi-Objective Evolutionary Algorithm. [Citation Graph (, )][DBLP ] A New Evolutionary Algorithm for Constrained Optimization Problems. [Citation Graph (, )][DBLP ] An Improved Genetic Algorithm for Optimal Operation of Cascaded Reservoirs. [Citation Graph (, )][DBLP ] A Decision-Tree-Based Multi-objective Estimation of Distribution Algorithm. [Citation Graph (, )][DBLP ] Performance Scalability of a Cooperative Coevolution Multiobjective Evolutionary Algorithm. [Citation Graph (, )][DBLP ] Comparison between Particle Swarm Optimization, Differential Evolution and Multi-Parents Crossover. [Citation Graph (, )][DBLP ] PSO Algorithm Based Online Self-Tuning of PID Controller. [Citation Graph (, )][DBLP ] A Self-Adaptive Particle Swarm Optimization Algorithm with Individual Coefficients Adjustment. [Citation Graph (, )][DBLP ] A GA Based Combinatorial Auction Algorithm for Multi-Robot Cooperative Hunting. [Citation Graph (, )][DBLP ] An Adaptive Parameter Control Strategy for Ant Colony Optimization. [Citation Graph (, )][DBLP ] A Multi-Focus Image Fusion Algorithm with DT-CWT. [Citation Graph (, )][DBLP ] A Fuzzy Fusion in Multitarget Tracking with Multisensor. [Citation Graph (, )][DBLP ] An Algorithm for Extracting Referential Integrity Relations Using Similarity during RDB-to-XML Translation. [Citation Graph (, )][DBLP ] Research on Algorithm of Web Classification Based on EP and FFSS. [Citation Graph (, )][DBLP ] Discovery of Direct and Indirect Association Patterns in Large Transaction Databases. [Citation Graph (, )][DBLP ] Associative Classification Using SVM-Based Discretization. [Citation Graph (, )][DBLP ] An Efficient Graph-Based Multi-Relational Data Mining Algorithm. [Citation Graph (, )][DBLP ] Analysis on Time-lagged Gene Clusters in Time Series Gene Expression Data. [Citation Graph (, )][DBLP ] A Novel Local Features-Based Approach for Clustering Microarray Data. [Citation Graph (, )][DBLP ] Improved Variable Precision Rough Set Model and its Application to Distance Learning. [Citation Graph (, )][DBLP ] A New Attribute Reduction Algorithm in Continuous Information Systems. [Citation Graph (, )][DBLP ] Realization of a New Association Rule Mining Algorithm. [Citation Graph (, )][DBLP ] A Study on the Method of Attribute Reduction Based on Rough Set under Fuzzy Equivalent Relation. [Citation Graph (, )][DBLP ] Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP ] The Algorithm of Objective Association Rules Mining Based on Binary. [Citation Graph (, )][DBLP ] Fuzzy Factor in Switching Regression Models. [Citation Graph (, )][DBLP ] Personalized Web Search Using User Profile. [Citation Graph (, )][DBLP ] Mining Temporal Web Interesting Patterns. [Citation Graph (, )][DBLP ] Frequent Closed Informative Itemset Mining. [Citation Graph (, )][DBLP ] Data Extraction from Deep Web Pages. [Citation Graph (, )][DBLP ] Web pages Classification Using Domain Ontology and Clustering. [Citation Graph (, )][DBLP ] A Multi-Agent Based Autonomic Management Architecture for Large-Scale Server Clusters. [Citation Graph (, )][DBLP ] Quantum Varying Deficit Round Robin Scheduling Over Priority Queues. [Citation Graph (, )][DBLP ] iRBO: Intelligent Role-Based Object for Object-Based Storage Device. [Citation Graph (, )][DBLP ] L-Chord: Routing Model for Chord Based on Layer-Dividing. [Citation Graph (, )][DBLP ] Implementation and Performance Evaluation of an Adaptable Failure Detector for Distributed System. [Citation Graph (, )][DBLP ] An Adaptive Join Strategy in Distributed Data Stream Management System. [Citation Graph (, )][DBLP ] Topic-Oriented Search Model Based on Multi-Agent. [Citation Graph (, )][DBLP ] A Formal Open Framework Based on Agent for Testing Web Applications. [Citation Graph (, )][DBLP ] A Recognition Approach for Adversarial Planning Based on Complete Goal Graph. [Citation Graph (, )][DBLP ] A Quantifiable Trust Model for Multi-agent System Based on Equal Relations. [Citation Graph (, )][DBLP ] A Multi-Agent and PSO Based Simulation for Human Behavior in Emergency Evacuation. [Citation Graph (, )][DBLP ] Theoretical Investigation on Post-Processed LDA for Face and Palmprint Recognition. [Citation Graph (, )][DBLP ] New Parallel Models for Face Recognition. [Citation Graph (, )][DBLP ] A Multi-Pattern Matching Algorithm on Multi-Language Mixed Texts for Content-Based Network Information Audit. [Citation Graph (, )][DBLP ] Face Detection from Greyscale Images Using Details from Categorized Wavelet Coefficients as Features for a Dynamic Counterpropagation Network. [Citation Graph (, )][DBLP ] An Improved Competitive and Cooperative Learning Approach for Data Clustering. [Citation Graph (, )][DBLP ] Shape Modification of B-Spline Curve with Geometric Constraints. [Citation Graph (, )][DBLP ] A New Anisotropic Diffusion Equation with Adaptive Fidelity Term. [Citation Graph (, )][DBLP ] An Effective Approach towards Contour-Shape Retrieval. [Citation Graph (, )][DBLP ] A Fast and Robust People Counting Method in Video Surveillance. [Citation Graph (, )][DBLP ] A Hard Decision Error Correction Scheme for Corrupted Arithmetic Codes. [Citation Graph (, )][DBLP ] Level Set Method for License Plate Localization Technology. [Citation Graph (, )][DBLP ] A New MRF Framework with Dual Adaptive Contexts for Image Segmentation. [Citation Graph (, )][DBLP ] Human Body Segmentation in the Presence of Occlusion. [Citation Graph (, )][DBLP ] An Effective Approach to Content-Based 3D Model Retrieval and Classification. [Citation Graph (, )][DBLP ] 3D Feature Extraction of Head based on Target Region Matching. [Citation Graph (, )][DBLP ] Extraction of Semantic Keyframes Based on Visual Attention and Affective Models. [Citation Graph (, )][DBLP ] A Color and Texture Feature Based Approach to License Plate Location. [Citation Graph (, )][DBLP ] Salience-Based Evaluation Strategy for Image Annotation. [Citation Graph (, )][DBLP ] Study on Conversion Method of Color Space under a Big Color Gamut. [Citation Graph (, )][DBLP ] Image Restoration Using Gaussian Particle Filters. [Citation Graph (, )][DBLP ] Spectral Correspondence Using Local Similarity Analysis. [Citation Graph (, )][DBLP ] A Combined Feature for Fingerprint Recognition. [Citation Graph (, )][DBLP ] Face Recognition Using Topology Preserving Nonnegative Matrix Factorization. [Citation Graph (, )][DBLP ] 2D-NPP: An Extension of Neighborhood Preserving Projection. [Citation Graph (, )][DBLP ] Laser Printer Fuzzy Identification Based on Correlative Specific Area of Character Image. [Citation Graph (, )][DBLP ] Improved Facial Feature Points Calibration Algorithm Based on ASM. [Citation Graph (, )][DBLP ] A Constrained Genetic Algorithm for Efficient Dimensionality Reduction for Pattern Classification. [Citation Graph (, )][DBLP ] Pruning Neighborhood Graph for Geodesic Distance Based Semi-Supervised Classification. [Citation Graph (, )][DBLP ] Traffic Signs Detection and Recognition by Improved RBFNN. [Citation Graph (, )][DBLP ] Extracting Digital Fingerprints from Chinese Documents. [Citation Graph (, )][DBLP ] A Model for Fitting the Yield Curve Based on a Continuous Penalty Function. [Citation Graph (, )][DBLP ] Case-Based Reasoning Combined with Information Entropy and Principal Component Analysis for Short-Term Load Forecasting. [Citation Graph (, )][DBLP ] MPIDA: A Sensor Network Topology Inference Algorithm. [Citation Graph (, )][DBLP ] Exploring the Relationships between Personal Characteristics, Aims, and Reasons of Learning in Further Education by Associating Rule Mining. [Citation Graph (, )][DBLP ] Image Retrieval with Simple Invariant Features Based Hierarchical Uniform Segmentation. [Citation Graph (, )][DBLP ] A New Topic Influence Model Research in Online Community. [Citation Graph (, )][DBLP ] Study of Immune PID Adaptive Controller and Its Applications in Thermal Control System. [Citation Graph (, )][DBLP ] A Fuzzy Clustering Algorithm Based on Artificial Immune Principles. [Citation Graph (, )][DBLP ] Construct a Real-time Selective Neural Group Network Controller for Internet-Based Teleoperation System. [Citation Graph (, )][DBLP ] Neurodynamic Analysis for Symmetric Schur Decomposition Problems. [Citation Graph (, )][DBLP ] Fuzzy Control System Based on Wavelet Analysis. [Citation Graph (, )][DBLP ] Some Geometric Aggregation Operators Based on Interval-Valued Intuitionistic Fuzzy Sets and their Application to Group Decision Making. [Citation Graph (, )][DBLP ] Fuzzy Distribution Games with Minimum Risk Criteria. [Citation Graph (, )][DBLP ] Bounds on the Value of Fuzzy Solution to Fuzzy Programming Problem. [Citation Graph (, )][DBLP ] On Fuzzy Modulator for the PMSM Step Motion Control. [Citation Graph (, )][DBLP ] Fuzzy Random Portfolio Selection Problem. [Citation Graph (, )][DBLP ] A Fuzzy Model of Interval speed Continuous Petri Nets. [Citation Graph (, )][DBLP ] Selection of Delay Time Window and Delay Time in Phase Space Reconstruction. [Citation Graph (, )][DBLP ] A Novel Architecture for the Computation of the 2D-DWT. [Citation Graph (, )][DBLP ] Order Holon Modeling Method Based on Time Petri-Nets and its Solution with Particle Swarm Optimization. [Citation Graph (, )][DBLP ] Research on Improving Training Speed of LMBP Algorithm and its Simulation in Application. [Citation Graph (, )][DBLP ] A Dish Parallel BP for Traffic Flow Forecasting. [Citation Graph (, )][DBLP ] An Improved Neural Network Model for Graduate Education Evaluation. [Citation Graph (, )][DBLP ] Supervised FCNN Classification for Garment Seams. [Citation Graph (, )][DBLP ] Simulation of T-S Fuzzy Neural Network to UASB Reactor Shocked by Toxic Loading. [Citation Graph (, )][DBLP ] The Off-Line and On-Line Fuzzy Backstepping Controllers for Rotary Inverted Pendulum System. [Citation Graph (, )][DBLP ] Dynamic System Modeling with Multilayer Recurrent Fuzzy Neural Network. [Citation Graph (, )][DBLP ] Study of an Adaptive Immune Detection Algorithm for Anomaly Detection. [Citation Graph (, )][DBLP ] A Method of Fine-Grained Authorization and Access Control for ASP Pages. [Citation Graph (, )][DBLP ] The Research and Application of Resource Dissemination Based on Credibility and UCON. [Citation Graph (, )][DBLP ] A Flexible Subscription Model for Broadcasted Digital Contents. [Citation Graph (, )][DBLP ] A Biometric Verification System Addressing Privacy Concerns. [Citation Graph (, )][DBLP ] A New Forward-Secure Threshold Signature Scheme Based on Schnorr Cryptosystem. [Citation Graph (, )][DBLP ] A Novel Trust Community Based on Direct Certifying for Pervasive Computing Systems. [Citation Graph (, )][DBLP ] Audio-Visual Recognition System with Intra-Modal Fusion. [Citation Graph (, )][DBLP ] An Efficient Credential-Based Scheme for Cross-Domain File Sharing. [Citation Graph (, )][DBLP ] An Effective Genetic Algorithm for Self-Inverse S-Boxes. [Citation Graph (, )][DBLP ] Design of an Instruction for Fast and Efficient S-Box Implementation. [Citation Graph (, )][DBLP ] Pairing-Based Proxy Signature Scheme with Proxy Signer?s Privacy Protection. [Citation Graph (, )][DBLP ] An Improved Key Agreement Protocol Based on Key Association Set for Dynamic Peer Group. [Citation Graph (, )][DBLP ] Efficient Zaps and Signatures of Knowledge. [Citation Graph (, )][DBLP ] Game-Based Analysis of Multi-Party Non-Repudiation Protocols. [Citation Graph (, )][DBLP ] Forward Security for an Efficient Password-Based Authenticated Key Exchange. [Citation Graph (, )][DBLP ] A Note on Shacham and Waters Ring Signatures. [Citation Graph (, )][DBLP ] Generalized Synchronization Theorem for Undirectional Discrete Systems with Application in Encryption Scheme. [Citation Graph (, )][DBLP ] A Provable Secure Key Management Program for Wireless Sensor Network. [Citation Graph (, )][DBLP ] A Single Key MAC Based on Hash127. [Citation Graph (, )][DBLP ] To Solve the High Degree Congruence. [Citation Graph (, )][DBLP ] Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves. [Citation Graph (, )][DBLP ] A Robust Estimator for Evaluating Internet Worm Infection Rate. [Citation Graph (, )][DBLP ] A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data. [Citation Graph (, )][DBLP ] A Context-Based Analysis of Intrusion Detection for Policy Violation. [Citation Graph (, )][DBLP ] DDoS Attack Detection Based on RLT Features. [Citation Graph (, )][DBLP ] Scenario Discovery Using Abstracted Correlation Graph. [Citation Graph (, )][DBLP ] A Parameter Selection Approach for Mixtures of Kernels Using Immune Evolutionary Algorithm and its Application to IDSs. [Citation Graph (, )][DBLP ] A Hybrid Approach for Real-Time Network Intrusion Detection Systems. [Citation Graph (, )][DBLP ] Research on the Resilience of Key Management in Sensor Networks. [Citation Graph (, )][DBLP ] A New Centralized Group Key Distribution and Revocation in Sensor Network. [Citation Graph (, )][DBLP ] An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings. [Citation Graph (, )][DBLP ] A Tight Security Reduction Identity-Based Signature Scheme. [Citation Graph (, )][DBLP ] Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment. [Citation Graph (, )][DBLP ] Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. [Citation Graph (, )][DBLP ] A Security Model for Networked Manufacturing System. [Citation Graph (, )][DBLP ] An Email Geographic Path-Based Technique for Spam Filtering. [Citation Graph (, )][DBLP ] An Improved DAD Check Scheme MLD-Based in FHMIPv6. [Citation Graph (, )][DBLP ] An Efficient Survivability Hierarchy Analysis Model for Networked Information System. [Citation Graph (, )][DBLP ] Testing Approach of Component Security Based on Fault Injection. [Citation Graph (, )][DBLP ] A Novel Approach to Network Security Situation Awareness Based on Multi-Perspective Analysis. [Citation Graph (, )][DBLP ] A Quantitative Evaluation Model for Network Security. [Citation Graph (, )][DBLP ] A Period-Finding Method for Shor?s Algorithm. [Citation Graph (, )][DBLP ] Hidden-ID Authentication Scheme and its SVO-Logic Based Formal Analysis. [Citation Graph (, )][DBLP ] Research of Software Reliability Based on Synthetic Architecture. [Citation Graph (, )][DBLP ] An EMAIL Based Automated Trust Negotiation Model. [Citation Graph (, )][DBLP ] An Artificial Intelligence Based Approach for Risk Management Using Attack Graph. [Citation Graph (, )][DBLP ] Game Theory Based Optimization of Security Configuration. [Citation Graph (, )][DBLP ] Adaptive Trust Management in MANET. [Citation Graph (, )][DBLP ] A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography. [Citation Graph (, )][DBLP ] A Model of Hierarchical Key Assignment Scheme with CRT. [Citation Graph (, )][DBLP ] A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. [Citation Graph (, )][DBLP ] Handling Information Release and Erasure in Multi-Threaded Programs. [Citation Graph (, )][DBLP ] A Quantitative Security Model of IMS System. [Citation Graph (, )][DBLP ] An Efficient Authentication Strategy for Reprogramming of Sensor Networks. [Citation Graph (, )][DBLP ] Protecting XML Databases against Ontology-Based Inference Attack. [Citation Graph (, )][DBLP ] Image Encryption Algorithm of Double Scrambling Based on ASCII Code of Matrix Element. [Citation Graph (, )][DBLP ] SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Multi-Perspective Quantization Model for Cyberspace Security Situation Awareness. [Citation Graph (, )][DBLP ] Reinforcing Business Leaders? Role in Striving for Information Security. [Citation Graph (, )][DBLP ] Secure and Flexible Digital Rights Management in a Pervasive Usage Mode. [Citation Graph (, )][DBLP ] Controlled Secret Leakage. [Citation Graph (, )][DBLP ] A New Method Considering Creditability Degree and Connection of Buyers and Sellers in E-Broker System. [Citation Graph (, )][DBLP ] Modified Original Smart Cards and Smart Card Clone Countermeasures. [Citation Graph (, )][DBLP ] Design of a New Selective Video Encryption Scheme Based on H.264. [Citation Graph (, )][DBLP ] CMS System of DRM Technology Base that Use Web Contents Certification Code. [Citation Graph (, )][DBLP ] A Context-Aware Trust Establishment and Mapping Framework for Web Applications. [Citation Graph (, )][DBLP ] A Digital Fingerprint Coding Based on Turbo Codes. [Citation Graph (, )][DBLP ] A Stream Cipher Engine for Ad-Hoc Security. [Citation Graph (, )][DBLP ] Secure Hop-Count Based Localization in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Control Flow and Time Checking Technology. [Citation Graph (, )][DBLP ] Identity-Based Key Issuing Protocol for Ad Hoc Networks. [Citation Graph (, )][DBLP ] A New Statistical Hitting Set Attack on Anonymity Protocols. [Citation Graph (, )][DBLP ] Research on Video Watermarking Scheme Based on Chaos, DWT and JND Model. [Citation Graph (, )][DBLP ] Robust Watermark Model Based on Subliminal Channel. [Citation Graph (, )][DBLP ] Two-Dimensional Wavelet Filters for Watermarking. [Citation Graph (, )][DBLP ] Analysis on the Sensitivity Attack to Watermarking Schemes with Patchwork Detection Boundaries. [Citation Graph (, )][DBLP ] A Blind Video Watermarking Algorithm Based on 3D Wavelet Transform. [Citation Graph (, )][DBLP ] Adaptive Encrypted Information Hiding Scheme for Images. [Citation Graph (, )][DBLP ] Using Chain Graphical Model to Analyze the Efficacy of a Chinese Medicine. [Citation Graph (, )][DBLP ] Gene Selection Using Neighborhood Rough Set from Gene Expression Profiles. [Citation Graph (, )][DBLP ] An Improved Algorithm for Iris Location. [Citation Graph (, )][DBLP ] Dynamical Behavior of Three-Order Cellular Neural Network with Application in Image Secure Communication. [Citation Graph (, )][DBLP ] Generalized Synchronization Theorem for Non-Autonomous Differential Equation with Application in Encryption Scheme. [Citation Graph (, )][DBLP ] The Representation of Chinese Semantic Knowledge and its Application in the Document Copy Detection. [Citation Graph (, )][DBLP ] Defaults Assessment of Mortgage Loan with Rough Set and SVM. [Citation Graph (, )][DBLP ] Optimistic Design of Jetty Road Height Based on Genetic Algorithms. [Citation Graph (, )][DBLP ] Calculation and Analysis of Double-Fed VSCF Induction Generator Operating Performance. [Citation Graph (, )][DBLP ] Research on Refining Mesh of Ship Hatch Corner Based on Transition Element. [Citation Graph (, )][DBLP ] Speech Tagging Based Improvement of the RSS Polymerization News. [Citation Graph (, )][DBLP ] Low-Complexity Line-Based Motion Estimation Algorithm. [Citation Graph (, )][DBLP ] A Particle Swarm Optimization for Resource-Constrained Multi-Project Scheduling Problem. [Citation Graph (, )][DBLP ] A Data Engine for Controller Area Network. [Citation Graph (, )][DBLP ] A Supply Chain Network Design Model for Deteriorating Items. [Citation Graph (, )][DBLP ] The Study of Compost Quality Evaluation Modeling Method Based on Wavelet Neural Network for Sewage Treatment. [Citation Graph (, )][DBLP ] Structural Analysis of Printed Mathematical Expression. [Citation Graph (, )][DBLP ] System Level Assertion-Based Verification Environment for PCI/PCI-X and PCI-Express. [Citation Graph (, )][DBLP ] Design of Automatic Database Schema Generator Based on XML Schema. [Citation Graph (, )][DBLP ] Application of Least Squares-Support Vector Machine for Measurement of Soluble Solids Content of Rice Vinegars Using Vis/NIR Spectroscopy. [Citation Graph (, )][DBLP ] Test Case Automate Generation from UML Sequence Diagram and OCL Expression. [Citation Graph (, )][DBLP ] A Novel Cluster-Based Routing Algorithm in Ad Hoc Networks. [Citation Graph (, )][DBLP ] Estimation of System Power Consumption on Mobile Computing Devices. [Citation Graph (, )][DBLP ] Cluster-Based System-Level Fault Diagnosis in Hierarchical Ad-Hoc Networks. [Citation Graph (, )][DBLP ] An Energy Efficient Directed Diffusion Routing Protocol. [Citation Graph (, )][DBLP ]