The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Networking (ICN) (icn)
2008 (conf/icn/2008)


  1. Survey of Energy Efficient Strategies in Wireless Ad Hoc and Sensor Networks. [Citation Graph (, )][DBLP]


  2. Comparing AMRIS and ODMRP in Ad-Hoc Networks by QualNet. [Citation Graph (, )][DBLP]


  3. Practical MANETs for Pervasive Cattle Monitoring. [Citation Graph (, )][DBLP]


  4. QOS Multicast Routing Based on Bandwidth and Resource Availability in Mobile Adhoc Networks. [Citation Graph (, )][DBLP]


  5. Using Network Density as a New Parameter to Estimate Distance. [Citation Graph (, )][DBLP]


  6. Resource Allocation for Coexisting ZigBee-Based Personal Area Networks. [Citation Graph (, )][DBLP]


  7. Gateway Placement with QoS Constraints in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  8. Applying Distributed Classification Algorithms to Wireless Sensor Networks – A Brief View into the Application of the SPRINT Algorithm Family. [Citation Graph (, )][DBLP]


  9. Network Sender Multicast Routing Protocol. [Citation Graph (, )][DBLP]


  10. QoS as Means of Providing WSNs Security. [Citation Graph (, )][DBLP]


  11. Liberating TCP: The Free and the Stunts. [Citation Graph (, )][DBLP]


  12. Comparison of Schemes for Provision of Differentiated Availability-Guaranteed Services Using Dedicated Protection. [Citation Graph (, )][DBLP]


  13. NGN Charging in Enhanced IMS. [Citation Graph (, )][DBLP]


  14. Hybrid Admission Control Algorithm for IEEE 802.11e EDCA: Analysis. [Citation Graph (, )][DBLP]


  15. An Application Layer Multicast for Collaborative Scenarios: The OMCAST Protocol. [Citation Graph (, )][DBLP]


  16. On the Performance of Power and Rate Control in STDMA Multihop Networks with Advanced Antennas. [Citation Graph (, )][DBLP]


  17. Reduce Time Synchronization Cost for High Latency and Resource-Constrained Sensor Networks. [Citation Graph (, )][DBLP]


  18. Smart Platform for Wireless Communication - Case Study. [Citation Graph (, )][DBLP]


  19. SLACP: A Novel Link-Layer Protocol for Wireless WANs. [Citation Graph (, )][DBLP]


  20. Stable and Fair MANETs: A Scalable Multi-Measure Clustering Framework. [Citation Graph (, )][DBLP]


  21. Seamless Mobility Architecture Supporting Ad-Hoc Environments. [Citation Graph (, )][DBLP]


  22. Robust Packet Detection Algorithm for DBO-CSS. [Citation Graph (, )][DBLP]


  23. Optimising the Use of Robust Header Compression Profiles in NEMO Networks. [Citation Graph (, )][DBLP]


  24. Communication Performance of Mesh- and Ring-Based NoCs. [Citation Graph (, )][DBLP]


  25. A Formal and Practical Framework for Constraint-Based Routing. [Citation Graph (, )][DBLP]


  26. On Destination Set in IP-Level Topology Measurement. [Citation Graph (, )][DBLP]


  27. Bayes Optimal DDoS Mitigation by Adaptive History-Based IP Filtering. [Citation Graph (, )][DBLP]


  28. Effect of Packet Shuffler on Parallel TCP Stream Network. [Citation Graph (, )][DBLP]


  29. A Transport-layer Approach for Achieving Predictable Throughput for Internet Applications. [Citation Graph (, )][DBLP]


  30. A Limited-Client-Capability Broadcasting Scheme for VoD Applications. [Citation Graph (, )][DBLP]


  31. New Approach to Converged Networks. [Citation Graph (, )][DBLP]


  32. Efficient Method for Content Extraction Applied in Multimedia Communication. [Citation Graph (, )][DBLP]


  33. Protocol Family for Optimal and Deterministic Symmetric Key Assignment. [Citation Graph (, )][DBLP]


  34. An Access Control Model for Web-Services That Supports Delegation and Creation of Authority. [Citation Graph (, )][DBLP]


  35. Fault-Tolerant Extension of Hypercube for Secure and Reliable Group Communications. [Citation Graph (, )][DBLP]


  36. Further Classification of Bluetooth-Enabled Ad-Hoc Networks Depending on a Risk Analysis within Each Classified Group. [Citation Graph (, )][DBLP]


  37. Mitigation of TCP-SYN Attacks with Microsoft’s Windows XP Service Pack2 (SP2) Software. [Citation Graph (, )][DBLP]


  38. Application Level Proxies on Bridges. [Citation Graph (, )][DBLP]


  39. Home Network Security. [Citation Graph (, )][DBLP]


  40. MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications. [Citation Graph (, )][DBLP]


  41. An Application of the (max, +) Algebra to Information Flow Security. [Citation Graph (, )][DBLP]


  42. Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS Attacks. [Citation Graph (, )][DBLP]


  43. Some Connection Problems with BitTorrent. [Citation Graph (, )][DBLP]


  44. Enhance Retrieval Efficiency on the Internet. [Citation Graph (, )][DBLP]


  45. A Peer-to-Peer Service Platform Architecture for Extended Home Services. [Citation Graph (, )][DBLP]


  46. A Distributed and Adaptive Revocation Mechanism for P2P Networks. [Citation Graph (, )][DBLP]


  47. Mobile IPTV Expanding the Value of IPTV. [Citation Graph (, )][DBLP]


  48. Interactive and Personalized Services for an Open IMS-Based IPTV Infrastructure. [Citation Graph (, )][DBLP]


  49. XML Based 3G/LTE Network and Service Management Concept. [Citation Graph (, )][DBLP]


  50. VPN Creation in IP/MPLS Network in Kosova. [Citation Graph (, )][DBLP]


  51. New Tunneling Capabilities for BGP/MPLS IP VPN in GNU/Linux. [Citation Graph (, )][DBLP]


  52. Understanding BitTorrent Download Performance. [Citation Graph (, )][DBLP]


  53. Collision Avoidance in Hierarchical Peer-to-Peer Systems. [Citation Graph (, )][DBLP]


  54. Peer-to-Peer Streaming Technology Survey. [Citation Graph (, )][DBLP]


  55. Time-Related Replication for P2P Storage System. [Citation Graph (, )][DBLP]


  56. Effect of Triangular Routing in Mixed IPv4/IPv6 Networks. [Citation Graph (, )][DBLP]


  57. A Proposal of Quasi-Static Approach for Analyzing the Stability of IP Telephony Systems. [Citation Graph (, )][DBLP]


  58. Comparison of Heuristic Methods Applied to Optimization of Computer Networks. [Citation Graph (, )][DBLP]


  59. A Methodology for Evaluating Vertical Handoff Decision Mechanisms. [Citation Graph (, )][DBLP]


  60. A Simulation Study of the WFQ Scheduler in a DiffServ Node under LRD Traffic. [Citation Graph (, )][DBLP]


  61. An Entropy Based Algorithm to Find Critical Traffic Matrices. [Citation Graph (, )][DBLP]


  62. Java RMI versus .NET Remoting Architectural Comparison and Performance Evaluation. [Citation Graph (, )][DBLP]


  63. A Comparison of Cluster and Grid Configurations Executing Image Processing Tasks in a Local Network. [Citation Graph (, )][DBLP]


  64. Performance Evaluation of Deadline Monotonic Policy over 802.11 Throughput and Average Service Time. [Citation Graph (, )][DBLP]


  65. L-MMIRA: Light Multicast Minimal Interference Routing Module in MPLS Network. [Citation Graph (, )][DBLP]


  66. Game-Theoretical Effectiveness Evaluation of DDoS Defense. [Citation Graph (, )][DBLP]


  67. Evaluating Service Scalability of Network Architectures. [Citation Graph (, )][DBLP]


  68. InFeCT - Network Traffic Classification. [Citation Graph (, )][DBLP]


  69. Applying a Macro Model of Ad Hoc Networks to Access Control. [Citation Graph (, )][DBLP]


  70. A Framework for IMS Interworking Networks with Quality of Service Guarantee. [Citation Graph (, )][DBLP]


  71. NLWCA—Node and Link Weighted Clustering Algorithm for Backbone-Assisted Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  72. Internet Traffic Modeling with Lévy Flights. [Citation Graph (, )][DBLP]


  73. Half-Overlap Subchannel Filtered MultiTone Modulation with the Small Delay. [Citation Graph (, )][DBLP]


  74. Main Memory Commit Protocols for Multiple Backups. [Citation Graph (, )][DBLP]


  75. DiffServ-Based User-Manageable Quality of Service Control System. [Citation Graph (, )][DBLP]


  76. TCP Flows in Stochastic Network Environment: Models and Characteristics. [Citation Graph (, )][DBLP]


  77. Detection Network Anomalies Based on Packet and Flow Analysis. [Citation Graph (, )][DBLP]


  78. Analysis of Priority Queues with Session-Based Arrival Streams. [Citation Graph (, )][DBLP]


  79. Experimental Evaluation and Characterization of Long-Distance 802.11g Links. [Citation Graph (, )][DBLP]


  80. Comparative Study of Wireless Network Simulators. [Citation Graph (, )][DBLP]


  81. Packet Loss Process in a Queue with Markovian Arrivals. [Citation Graph (, )][DBLP]


  82. Marine Wireless Sensor Networks: Challenges and Applications. [Citation Graph (, )][DBLP]


  83. Embedded System with Speech Recognition for Wireless Actuator Control. [Citation Graph (, )][DBLP]


  84. Dynamic Channel Assignment for Wireless Mesh Networks Using Clustering. [Citation Graph (, )][DBLP]


  85. Simulation of Blind Flooding over Wireless Sensor Networks Based on a Realistic Battery Model. [Citation Graph (, )][DBLP]


  86. A Hierarchical Game for Uplink CDMA Transmissions with Random Active Users. [Citation Graph (, )][DBLP]


  87. Surveillance and Quality Evaluation System for Real-Time Audio Signal Streaming. [Citation Graph (, )][DBLP]


  88. LISS Algorithm with Modified Length Bias Term in Turbo Equalization. [Citation Graph (, )][DBLP]


  89. Filters Eliminating Input Impedance of Input Current Terminal for High-Speed Analog Signal Processing. [Citation Graph (, )][DBLP]


  90. Square-Root-Free QRD-LSL Adaptive Algorithm with Improved Numerical Robustness. [Citation Graph (, )][DBLP]


  91. Spectral Characteristics of Nonlinear Systems Approximated by Piecewise Linear Function. [Citation Graph (, )][DBLP]


  92. Adapting Constant Modulus Algorithm for Phase Modulation Signals. [Citation Graph (, )][DBLP]


  93. Fast and Robust Analytical Design of Equiripple Comb FIR Filters for Communication Purposes. [Citation Graph (, )][DBLP]


  94. Managing Real-World System Configurations with Constraints. [Citation Graph (, )][DBLP]


  95. Improving Availability of Mobile Code Systems by Decoupling Interaction from Mobility. [Citation Graph (, )][DBLP]


  96. Scheduling on Networks of Workstations with Task Runtime Restrictions. [Citation Graph (, )][DBLP]


  97. Large Scale Deployment a Mobile Agent Approach to Network Management. [Citation Graph (, )][DBLP]


  98. Restoration Mechanism for the N2R Topological Routing Algorithm. [Citation Graph (, )][DBLP]


  99. RIP-MTI: A New Way to Cope with Routing Loops. [Citation Graph (, )][DBLP]


  100. Optimum Routing and Forwarding Arrangement in Bufferless Data Vortex Switch Network. [Citation Graph (, )][DBLP]


  101. Large Scale Topology Discovery for Public IPv6 Networks. [Citation Graph (, )][DBLP]


  102. Post-Disaster Communications: A Cognitive Agent Approach. [Citation Graph (, )][DBLP]


  103. A Distributed Routing Algorithm Based on Architecture of ForCES. [Citation Graph (, )][DBLP]


  104. Fast Reservation Protocols for Latency Reduction in Optical Burst-Switched Networks Based on Predictions. [Citation Graph (, )][DBLP]


  105. Improving the Sustainability of Autonomous Systems. [Citation Graph (, )][DBLP]


  106. Routing Performance in Air Traffic Services Networks. [Citation Graph (, )][DBLP]


  107. Highly Efficient Call Admission Control for Wireless Multimedia Traffic. [Citation Graph (, )][DBLP]


  108. Module and Distortion Analysis for Video Decoding on Mobile Devices. [Citation Graph (, )][DBLP]


  109. MobileAERO: Using Tag Clouds for Mobile Knowledge Management. [Citation Graph (, )][DBLP]


  110. A Novel Route Guidance Algorithm with Maximum Coverage and Minimum Handover for Vehicular Networks. [Citation Graph (, )][DBLP]


  111. NSIS-Based Firewall Detection in Mobile IPv6. [Citation Graph (, )][DBLP]


  112. Flexible Host-Based Handoff Selection for Next Generation Networks. [Citation Graph (, )][DBLP]


  113. Privacy Improvement through Pseudonymity in Parlay X for Location Based Services. [Citation Graph (, )][DBLP]


  114. Proactive Handover in Heterogeneous Networks Using SIPs. [Citation Graph (, )][DBLP]


  115. Comparison of Two Forward Error Correction Approaches for Packet Protection in HDTV with Variable Bit Rate Transmission. [Citation Graph (, )][DBLP]


  116. Best Video Stream Variation Selection in Wireless Networks. [Citation Graph (, )][DBLP]


  117. A Performance Evaluation of H.264 FGS Sequences over Hybrid Networks. [Citation Graph (, )][DBLP]


  118. Integration of Host Position Prediction into Hierarchical Aggregation. [Citation Graph (, )][DBLP]


  119. Multicast Voice Transmission over Vehicular Ad Hoc Networks: Issues and Challenges. [Citation Graph (, )][DBLP]


  120. Demand Pricing & Resource Allocation in Market-Based Compute Grids: A Model and Initial Results. [Citation Graph (, )][DBLP]


  121. User Maturity Based Trust Management for Grid Computing. [Citation Graph (, )][DBLP]


  122. A Price-Based Task Scheduling for Grid Computing. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002