The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Distributed Computing Systems (ICDCS) (icdcs)
2008 (conf/icdcs/2008)


  1. Computer Science as a Lens on the Sciences. [Citation Graph (, )][DBLP]


  2. Real-Time Detection of Clone Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  3. Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control. [Citation Graph (, )][DBLP]


  4. Securing Wireless Data Networks against Eavesdropping using Smart Antennas. [Citation Graph (, )][DBLP]


  5. On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs. [Citation Graph (, )][DBLP]


  6. Identifying Frequent Items in P2P Systems. [Citation Graph (, )][DBLP]


  7. On the Impact of Mobile Hosts in Peer-to-Peer Data Networks. [Citation Graph (, )][DBLP]


  8. Is Random Scheduling Sufficient in P2P Video Streaming? [Citation Graph (, )][DBLP]


  9. Circumventing Server Bottlenecks: Indirect Large-Scale P2P Data Collection. [Citation Graph (, )][DBLP]


  10. Strong WORM. [Citation Graph (, )][DBLP]


  11. Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks. [Citation Graph (, )][DBLP]


  12. Exploring Anti-Spam Models in Large Scale VoIP Systems. [Citation Graph (, )][DBLP]


  13. Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses. [Citation Graph (, )][DBLP]


  14. Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  15. Performance Analysis of Group Based Detection for Sparse Sensor Networks. [Citation Graph (, )][DBLP]


  16. Enabling Accurate Node Control in Randomized Duty Cycling Networks. [Citation Graph (, )][DBLP]


  17. CME: A Contour Mapping Engine in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  18. LHT: A Low-Maintenance Indexing Scheme over DHTs. [Citation Graph (, )][DBLP]


  19. Distributed Line Graphs: A Universal Framework for Building DHTs Based on Arbitrary Constant-Degree Graphs. [Citation Graph (, )][DBLP]


  20. iSky: Efficient and Progressive Skyline Computing in a Structured P2P Network. [Citation Graph (, )][DBLP]


  21. Peer-to-Peer File Sharing Based on Network Coding. [Citation Graph (, )][DBLP]


  22. Analysis of Maximum Executable Length for Detecting Text-Based Malware. [Citation Graph (, )][DBLP]


  23. Efficient Distributed Third-Party Data Authentication for Tree Hierarchies. [Citation Graph (, )][DBLP]


  24. Updates and Asynchronous Communication in Trusted Computing Systems. [Citation Graph (, )][DBLP]


  25. On Detection of Malicious Users Using Group Testing Techniques. [Citation Graph (, )][DBLP]


  26. The SCREAM Approach for Efficient Distributed Scheduling with Physical Interference in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  27. Achieving Global End-to-End Maxmin in Multihop Wireless Networks. [Citation Graph (, )][DBLP]


  28. PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living. [Citation Graph (, )][DBLP]


  29. Optimized Multipath Network Coding in Lossy Wireless Networks. [Citation Graph (, )][DBLP]


  30. Compiler-Assisted Application-Level Checkpointing for MPI Programs. [Citation Graph (, )][DBLP]


  31. Byzantine Fault-Tolerant Web Services for n-Tier and Service Oriented Architectures. [Citation Graph (, )][DBLP]


  32. A Formal Specification and Verification Framework for Designing and Verifying Reliable and Dependable Software for Computerized Numerical Control (CNC) Systems. [Citation Graph (, )][DBLP]


  33. A Connectivity-Driven Retransmission Scheme Based On Transport Layer Readdressing. [Citation Graph (, )][DBLP]


  34. A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  35. How to Monitor for Missing RFID tags. [Citation Graph (, )][DBLP]


  36. Controlled Information Sharing in Collaborative Distributed Query Processing. [Citation Graph (, )][DBLP]


  37. Efficient Privacy-Preserving k-Nearest Neighbor Search. [Citation Graph (, )][DBLP]


  38. Prospect and Challenges for Network Development. [Citation Graph (, )][DBLP]


  39. Efficient and Robust Local Mutual Exclusion in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  40. On the Longest RNG Edge of Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  41. Two-Phased Approximation Algorithms for Minimum CDS in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  42. DTP: Double-Pairwise Time Protocol for Disruption Tolerant Networks. [Citation Graph (, )][DBLP]


  43. End-to-End Congestion Control for High Speed Networks Based on Population Ecology Models. [Citation Graph (, )][DBLP]


  44. Measurement Manipulation and Space Selection in Network Coordinates. [Citation Graph (, )][DBLP]


  45. Inbound Traffic Load Balancing in BGP Multi-homed Stub Networks. [Citation Graph (, )][DBLP]


  46. Relative Network Positioning via CDN Redirections. [Citation Graph (, )][DBLP]


  47. Optimal Placements in Ring Network for Data Replicas in Distributed Database with MajorityVoting Protocol. [Citation Graph (, )][DBLP]


  48. Wavenet: A Wavelet-Based Approach to Monitor Changes on Data Distribution in Networks. [Citation Graph (, )][DBLP]


  49. Scalable and Adaptive Metadata Management in Ultra Large-Scale File Systems. [Citation Graph (, )][DBLP]


  50. MR-PDP: Multiple-Replica Provable Data Possession. [Citation Graph (, )][DBLP]


  51. Opportunity-Based Topology Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  52. Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor Networks. [Citation Graph (, )][DBLP]


  53. Sensor Node Localization Using Uncontrolled Events. [Citation Graph (, )][DBLP]


  54. Quality of Trilateration: Confidence Based Iterative Localization. [Citation Graph (, )][DBLP]


  55. Deadlock-Free Fully Adaptive Routing in 2-Dimensional Tori Based on New Virtual Network Partitioning Scheme. [Citation Graph (, )][DBLP]


  56. DCAR: Distributed Coding-Aware Routing in Wireless Networks. [Citation Graph (, )][DBLP]


  57. Utility-Based Opportunistic Routing in Multi-Hop Wireless Networks. [Citation Graph (, )][DBLP]


  58. Decentralized Routing in Nonhomogeneous Poisson Networks. [Citation Graph (, )][DBLP]


  59. Multi-Site Retrieval of Declustered Data. [Citation Graph (, )][DBLP]


  60. A Nonblocking Approach for Reaching an Agreement on Request Total Orders. [Citation Graph (, )][DBLP]


  61. An Arbitrary Tree-Structured Replica Control Protocol. [Citation Graph (, )][DBLP]


  62. Correlation-Aware Object Placement for Multi-Object Operations. [Citation Graph (, )][DBLP]


  63. Locality Sensitive Information Brokerage in Distributed Sensor Networks. [Citation Graph (, )][DBLP]


  64. Mobile Filtering for Error-Bounded Data Collection in Sensor Networks. [Citation Graph (, )][DBLP]


  65. Data Estimation in Sensor Networks Using Physical and Statistical Methodologies. [Citation Graph (, )][DBLP]


  66. Probing Queries in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  67. Quantum-Adaptive Scheduling for Multi-Core Network Processors. [Citation Graph (, )][DBLP]


  68. SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability. [Citation Graph (, )][DBLP]


  69. Fast Path Session Creation on Network Processors. [Citation Graph (, )][DBLP]


  70. Reconfigurable Real-Time Middleware for Distributed Cyber-Physical Systems with Aperiodic Events. [Citation Graph (, )][DBLP]


  71. Availability and Fairness Support for Storage QoS Guarantee. [Citation Graph (, )][DBLP]


  72. Can We Really Recover Data if Storage Subsystem Fails? [Citation Graph (, )][DBLP]


  73. QoS Scheduling for Networked Storage System. [Citation Graph (, )][DBLP]


  74. stdchk: A Checkpoint Storage System for Desktop Grid Computing. [Citation Graph (, )][DBLP]


  75. Challenges and Future Research Directions in Large-Scale Complex Systems. [Citation Graph (, )][DBLP]


  76. Routing of XML and XPath Queries in Data Dissemination Networks. [Citation Graph (, )][DBLP]


  77. Multi-query Optimization for Distributed Similarity Query Processing. [Citation Graph (, )][DBLP]


  78. Towards Multi-Site Collaboration in 3D Tele-Immersive Environments. [Citation Graph (, )][DBLP]


  79. Fair K Mutual Exclusion Algorithm for Peer to Peer Systems. [Citation Graph (, )][DBLP]


  80. Conditions for Set Agreement with an Application to Synchronous Systems. [Citation Graph (, )][DBLP]


  81. Distributed Connected Dominating Set Construction in Geometric k-Disk Graphs. [Citation Graph (, )][DBLP]


  82. Weak vs. Self vs. Probabilistic Stabilization. [Citation Graph (, )][DBLP]


  83. WebIBC: Identity Based Cryptography for Client Side Security in Web Applications. [Citation Graph (, )][DBLP]


  84. J2EE Architecture for Database Cluster-Based High Volume E-Commerce Web Applications. [Citation Graph (, )][DBLP]


  85. Online Measurement of the Capacity of Multi-Tier Websites Using Hardware Performance Counters. [Citation Graph (, )][DBLP]


  86. Heuristics-Based Strategies for Resolving Context Inconsistencies in Pervasive Computing Applications. [Citation Graph (, )][DBLP]


  87. MC2: Multiple Clients on a Multilevel Cache. [Citation Graph (, )][DBLP]


  88. On Cooperative Caching in Wireless P2P Networks. [Citation Graph (, )][DBLP]


  89. PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems. [Citation Graph (, )][DBLP]


  90. Online Optimization for Latency Assignment in Distributed Real-Time Systems. [Citation Graph (, )][DBLP]


  91. Resource Bundles: Using Aggregation for Statistical Wide-Area Resource Discovery and Allocation. [Citation Graph (, )][DBLP]


  92. Autotuning Configurations in Distributed Systems for Performance Improvements Using Evolutionary Strategies. [Citation Graph (, )][DBLP]


  93. Accessibility-Based Resource Selection in Loosely-Coupled Distributed Systems. [Citation Graph (, )][DBLP]


  94. Fully Adaptive Power Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System. [Citation Graph (, )][DBLP]


  95. Hotness-Aware Sensor Networks. [Citation Graph (, )][DBLP]


  96. Improving Energy Conservation Using Bulk Transmission over High-Power Radios in Sensor Networks. [Citation Graph (, )][DBLP]


  97. Energy and Timing Constrained System Reward Maximization on Wireless Networks. [Citation Graph (, )][DBLP]


  98. Game Theoretic Peer Selection for Resilient Peer-to-Peer Media Streaming Systems. [Citation Graph (, )][DBLP]


  99. Toward Predictive Failure Management for Distributed Stream Processing Systems. [Citation Graph (, )][DBLP]


  100. Crystal: An Emulation Framework for Practical Peer-to-Peer Multimedia Streaming Systems. [Citation Graph (, )][DBLP]


  101. Video Distribution Under Multiple Constraints. [Citation Graph (, )][DBLP]


  102. Bandwidth Allocation for Elastic Real-Time Flows in Multihop Wireless Networks Based on Network Utility Maximization. [Citation Graph (, )][DBLP]


  103. PIRD: P2P-Based Intelligent Resource Discovery in Internet-Based Distributed Systems. [Citation Graph (, )][DBLP]


  104. Frequency Domain Filter Design and Analysis of Request Scheduling in Internet Servers. [Citation Graph (, )][DBLP]


  105. Adaptive Distributed Time-Slot Based Scheduling for Fairness in Multi-Hop Wireless Networks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002