The SCEAS System
Navigation Menu

Conferences in DBLP

International Symposium on Computers and Communications (iscc)
2008 (conf/iscc/2008)


  1. 2MC-Match: A topology matching technique with 2-means clustering algorithm in P2P systems. [Citation Graph (, )][DBLP]


  2. The next generation wireless network challenges for an emergency preparedness and response class of applications: A necessary public safety and security. [Citation Graph (, )][DBLP]


  3. Distributed pattern matching: Concept and applications in internet-scale networks. [Citation Graph (, )][DBLP]


  4. The state-of-the-art in acquiring and processing satellite remotely sensed data worldwide. [Citation Graph (, )][DBLP]


  5. Message from the technical program chairs. [Citation Graph (, )][DBLP]


  6. Success and failures of "de-randomized" congestion losses losses losses. [Citation Graph (, )][DBLP]


  7. Ten years of experimentation in Information Mining & Software Research with applications in telecommunications industry. [Citation Graph (, )][DBLP]


  8. Message from the general chair. [Citation Graph (, )][DBLP]


  9. Block-based rateless coding for energy-efficient video streaming over bluetooth. [Citation Graph (, )][DBLP]


  10. Streaming video timing analysis in wireless ad-hoc networks. [Citation Graph (, )][DBLP]


  11. Analysis of compressed depth and image streaming on unreliable networks. [Citation Graph (, )][DBLP]


  12. A measurement study of Speex VoIP and H.264/AVC video over IEEE 802.16d and IEEE 802.11g. [Citation Graph (, )][DBLP]


  13. Efficient collision detection for auto rate fallback algorithm. [Citation Graph (, )][DBLP]


  14. Improving audio streaming over multi-hop ZigBee networks. [Citation Graph (, )][DBLP]


  15. Caller identity privacy in SIP heterogeneous realms: A practical solution. [Citation Graph (, )][DBLP]


  16. A complete content production and delivery system in a controlled multimedia network. [Citation Graph (, )][DBLP]


  17. Efficient delivery of MBMS multicast traffic over HSDPA. [Citation Graph (, )][DBLP]


  18. On controlling burst loss ratio inside an OBS network. [Citation Graph (, )][DBLP]


  19. Performance evaluation of routing and wavelength assignment algorithms for optical networks. [Citation Graph (, )][DBLP]


  20. Arranging shareability dynamically for the availability-constrained design of optical transport networks. [Citation Graph (, )][DBLP]


  21. A novel distributed destination routing-based Availability-Aware provisioning framework for differentiated protection services in optical mesh networks. [Citation Graph (, )][DBLP]


  22. On the application of long soas in linear operating and saturation regimes: Exploitation in high bit rate optical networks. [Citation Graph (, )][DBLP]


  23. Using adapted visibility graphs for network planning. [Citation Graph (, )][DBLP]


  24. Autonomous preference-aware multi-service integration and allocation. [Citation Graph (, )][DBLP]


  25. Automating media processes in a service oriented architecture. [Citation Graph (, )][DBLP]


  26. Towards business model and technical platform for the service oriented context-aware mobile virtual communities. [Citation Graph (, )][DBLP]


  27. A user-centric composition model for the Internet of Services. [Citation Graph (, )][DBLP]


  28. An efficient adaptive Cross-Layer interaction mechanism for TCP traffic over heterogeneous networks. [Citation Graph (, )][DBLP]


  29. An efficient rate adaptation scheme for multihop wireless networks using Kalman Filter. [Citation Graph (, )][DBLP]


  30. Rate adaptation algorithms for IEEE 802.11 networks: A survey and comparison. [Citation Graph (, )][DBLP]


  31. A robust controller for the TCP congestion window. [Citation Graph (, )][DBLP]


  32. A dynamic rate adaptation with fragmentation MAC protocol against channel variation for wireless LANs. [Citation Graph (, )][DBLP]


  33. Adaptive window size to reduce the influence of heterogeneous mobility on TCP performance. [Citation Graph (, )][DBLP]


  34. F2-TCP: A fairer and TCP-friendlier congestion control protocol for high-speed networks. [Citation Graph (, )][DBLP]


  35. Evaluating and improving the TCP/UDP performances of IEEE 802.11(p)/1609 networks. [Citation Graph (, )][DBLP]


  36. A Double K-Clustering Approach for restructuring Distributed Object-Oriented software. [Citation Graph (, )][DBLP]


  37. Mining drug targets based on microarray experiments. [Citation Graph (, )][DBLP]


  38. Mining software aging: A neural network approach. [Citation Graph (, )][DBLP]


  39. Investigation of feature dimension reduction based DCT/SVM for face recognition. [Citation Graph (, )][DBLP]


  40. Power-Controlled Rate and Coverage Adaptation for WCDMA cellular networks. [Citation Graph (, )][DBLP]


  41. Call admission control for H.264 traffic transmission over wireless cellular networks. [Citation Graph (, )][DBLP]


  42. Uplink call admission control in multi-services W-CDMA network. [Citation Graph (, )][DBLP]


  43. Efficient traffic policing for videoconference traffic over wireless cellular networks. [Citation Graph (, )][DBLP]


  44. A resource allocation algorithm and system architecture to extend the cell coverage and alleviate the inter-cell interference. [Citation Graph (, )][DBLP]


  45. A study on optimal termination target of synchronous H-ARQ for the next generation cellular system. [Citation Graph (, )][DBLP]


  46. CPK-based fast authentication method in Mobile IPv6 networks. [Citation Graph (, )][DBLP]


  47. Analyzing a human-based trust model for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  48. A sybilproof distributed identity management for P2P networks. [Citation Graph (, )][DBLP]


  49. An analysis of ASMA performances against packet dropping attacks in dense networks. [Citation Graph (, )][DBLP]


  50. The impact of wireless LAN security on performance of different Windows operating systems. [Citation Graph (, )][DBLP]


  51. Efficient routing in WiMax/802.16 based mesh networks with centralized scheduling. [Citation Graph (, )][DBLP]


  52. Distributed channel assignment for multi-radio wireless mesh networks. [Citation Graph (, )][DBLP]


  53. Managing community aware Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  54. Header compression for VoIP over multi-hop wireless mesh networks. [Citation Graph (, )][DBLP]


  55. Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool. [Citation Graph (, )][DBLP]


  56. Highly compressed Aho-Corasick automata for efficient intrusion detection. [Citation Graph (, )][DBLP]


  57. Efficient disk encryption and verification through trusted nonce. [Citation Graph (, )][DBLP]


  58. Global abnormal correlation analysis for DDoS attack detection. [Citation Graph (, )][DBLP]


  59. Fast multiplication techniques for public key cryptography. [Citation Graph (, )][DBLP]


  60. A phishing vulnerability analysis of web based systems. [Citation Graph (, )][DBLP]


  61. UBSF: A novel online URL-Based Spam Filter. [Citation Graph (, )][DBLP]


  62. Evaluation of resilience for Data Center systems. [Citation Graph (, )][DBLP]


  63. Building a secure medical research organization. [Citation Graph (, )][DBLP]


  64. A new approach for efficient MBMS service provision in UTRAN. [Citation Graph (, )][DBLP]


  65. An enhanced approach for efficient MBMS handovers in 3G networks. [Citation Graph (, )][DBLP]


  66. Power counting for optimized capacity in MBMS enabled UTRAN. [Citation Graph (, )][DBLP]


  67. Power saving methods for MBMS transmissions in UTRAN. [Citation Graph (, )][DBLP]


  68. Access control in Group Communication Systems. [Citation Graph (, )][DBLP]


  69. FlexBox: Sandboxing internet servers based on layer-7 contexts. [Citation Graph (, )][DBLP]


  70. A two-level source address spoofing prevention based on automatic signature and verification mechanism. [Citation Graph (, )][DBLP]


  71. An unsupervised network anomaly detection approach by k-Means clustering & ID3 algorithms. [Citation Graph (, )][DBLP]


  72. Optimal number and class selection of nodes in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  73. End-to-end shared restoration algorithms in multi-domain mesh networks. [Citation Graph (, )][DBLP]


  74. High throughput path selection for multi-path video streaming in Ad-hoc networks. [Citation Graph (, )][DBLP]


  75. A queue based dynamic approach for the Coordinated distributed scheduler of the IEEE 802.16. [Citation Graph (, )][DBLP]


  76. A load-aware routing metric for wireless mesh networks. [Citation Graph (, )][DBLP]


  77. CLE2aR2: A cross-layer energy-efficient and reliable routing protocol for wireless ad hoc networks. [Citation Graph (, )][DBLP]


  78. Pro-active task sharing in a self-organizing server cluster. [Citation Graph (, )][DBLP]


  79. Model for on-demand virtual computing architectures - OVCA. [Citation Graph (, )][DBLP]


  80. Performance modeling of a grid-based Data Distribution Management protocol. [Citation Graph (, )][DBLP]


  81. Improving reliability and energy efficiency of disk systems via utilization control. [Citation Graph (, )][DBLP]


  82. Impact of interconnection networks and application granularity to compound cluster environments. [Citation Graph (, )][DBLP]


  83. Building efficient multi-core clusters for high performance computing. [Citation Graph (, )][DBLP]


  84. P-CDN: Extending access control capabilities of P2P systems to provide CDN services. [Citation Graph (, )][DBLP]


  85. Multicast-P2P content distribution in large-scale enterprise networks. [Citation Graph (, )][DBLP]


  86. VoRaQue: Range queries on Voronoi overlays. [Citation Graph (, )][DBLP]


  87. An empirical approach to a system design methodology for mobile Peer-to-Peer computing. [Citation Graph (, )][DBLP]


  88. TorrentLab: investigating BitTorrent through simulation and live experiments. [Citation Graph (, )][DBLP]


  89. A real-time road traffic information system based on a peer-to-peer approach. [Citation Graph (, )][DBLP]


  90. Formal automated transformation of SDL specifications to Lotos specifications. [Citation Graph (, )][DBLP]


  91. Tile logic as an architectural model for mobility. [Citation Graph (, )][DBLP]


  92. Comparison of four similarity measures based on GO annotations for Gene Clustering. [Citation Graph (, )][DBLP]


  93. Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. [Citation Graph (, )][DBLP]


  94. A proactive burst assembly algorithm for optical burst switched networks. [Citation Graph (, )][DBLP]


  95. Modeling wireless channel for ad-hoc network routing protocol. [Citation Graph (, )][DBLP]


  96. A queuing analysis of packet dropping for real-time applications in wireless networks. [Citation Graph (, )][DBLP]


  97. Multicast in wireless erasure networks with feedback. [Citation Graph (, )][DBLP]


  98. Impact evaluation of radio propagation models on performance parameters of application layer in Wireless Mesh Backbone simulation. [Citation Graph (, )][DBLP]


  99. S-Box: A scalability analysis framework for ad hoc routing protocols. [Citation Graph (, )][DBLP]


  100. Document clustering based on diffusion maps and a comparison of the k-means performances in various spaces. [Citation Graph (, )][DBLP]


  101. Probability Density Estimation over evolving data streams using Tilted Parzen Window. [Citation Graph (, )][DBLP]


  102. Semi-supervised Clustering and Aggregation of Relational Data. [Citation Graph (, )][DBLP]


  103. Session mobility in the mockets communication middleware. [Citation Graph (, )][DBLP]


  104. Dynamic load balancing among multiple home agents for MIPv6. [Citation Graph (, )][DBLP]


  105. Release of unnecessary resource reservation in mobility cases. [Citation Graph (, )][DBLP]


  106. Game theory and an interface selection mechanism for Multi-homed Mobile Nodes. [Citation Graph (, )][DBLP]


  107. A reference architecture for micro-mobility support in IP networks. [Citation Graph (, )][DBLP]


  108. Pitfalls and tradeoffs on dealing with handoff management in bluetooth-based WPANs for real-time applications. [Citation Graph (, )][DBLP]


  109. Using path length measure for gene clustering based on similarity of annotation terms. [Citation Graph (, )][DBLP]


  110. Towards sound development of PIXITP, conformance test suites, and conforming implementations for various Formal Description Techniques. [Citation Graph (, )][DBLP]


  111. Combining multiple segmentation methods for improving the segmentation accuracy. [Citation Graph (, )][DBLP]


  112. Metrics applied to Aspect Oriented Design using UML profiles. [Citation Graph (, )][DBLP]


  113. An interoperability approach based on asynchronous replication among distributed internet databases. [Citation Graph (, )][DBLP]


  114. Model for polling in noisy multihop systems with application to PLC and AMR. [Citation Graph (, )][DBLP]


  115. A new signal separation technique using double referenced system. [Citation Graph (, )][DBLP]


  116. A graph theory based scheduling algorithm For MIMO-CDMA systems using zero forcing beamforming. [Citation Graph (, )][DBLP]


  117. An efficient maximum likelihood carrier frequency offset estimation technique for OFDM systems. [Citation Graph (, )][DBLP]


  118. Performance analysis for resource coordination in a high-density wireless environment. [Citation Graph (, )][DBLP]


  119. MC-CDMA multiuser detection using a hybrid immune clonal selection algorithm with Hopfield Neural Network in fading channels. [Citation Graph (, )][DBLP]


  120. Formal specification of a particular banking domain with RAISE specification language. [Citation Graph (, )][DBLP]


  121. SSMS - A secure SMS messaging protocol for the m-payment systems. [Citation Graph (, )][DBLP]


  122. Operational semantics of probabilistic Kleene algebra with tests. [Citation Graph (, )][DBLP]


  123. Theory framework for event structure slicing. [Citation Graph (, )][DBLP]


  124. Primal-dual algorithm for linear optimization problems based on a new class of kernel functions. [Citation Graph (, )][DBLP]


  125. Variability modeling for Business Component customization. [Citation Graph (, )][DBLP]


  126. Efficient sorting algorithms for the cell broadband engine. [Citation Graph (, )][DBLP]


  127. The operation mode selection in FMIPv6. [Citation Graph (, )][DBLP]


  128. How node mobility affects k-hop cluster quality in Mobile Ad Hoc NETworks: A quantitative evaluation. [Citation Graph (, )][DBLP]


  129. Implementation and experimental evaluation of a fast local mobility protocol. [Citation Graph (, )][DBLP]


  130. An IMS vertical handoff solution to dynamically adapt mobile multimedia services. [Citation Graph (, )][DBLP]


  131. Performance testing of Mobile IPv6 protocol. [Citation Graph (, )][DBLP]


  132. Measuring and visualizing interdomain routing dynamics with BGPATH. [Citation Graph (, )][DBLP]


  133. Distributed fault localization for multi-domain all-optical networks with partial power monitoring. [Citation Graph (, )][DBLP]


  134. Design and evaluation of a P2MP MPLS-based hierarchical service management system. [Citation Graph (, )][DBLP]


  135. A flexible network monitoring tool based on a data stream management system. [Citation Graph (, )][DBLP]


  136. Using visualization techniques for SNMP traffic analyses. [Citation Graph (, )][DBLP]


  137. Adaptive RAKE combining schemes in the soft handover region. [Citation Graph (, )][DBLP]


  138. Blind MIMO deconvolution of any source distributions via high-order spectra. [Citation Graph (, )][DBLP]


  139. Investigation on folded patch antenna for cellular applications. [Citation Graph (, )][DBLP]


  140. On the space-time correlation of MIMO fading channels in 3D scattering models. [Citation Graph (, )][DBLP]


  141. Capacity improvement by employing femto cells in a macro cell HSDPA network. [Citation Graph (, )][DBLP]


  142. Comparison of CDMA tele-traffic models. [Citation Graph (, )][DBLP]


  143. Proper nouns in English-Arabic Cross Language Information Retrieval. [Citation Graph (, )][DBLP]


  144. An Efficient XML query processing based on combining T-Bitmap and index techniques. [Citation Graph (, )][DBLP]


  145. Pseudo-space Persian/Arabic text steganography. [Citation Graph (, )][DBLP]


  146. Multi-word term indexing for Arabic document retrieval. [Citation Graph (, )][DBLP]


  147. OOV words in an English-Arabic CLIR system. [Citation Graph (, )][DBLP]


  148. A stateless architectural approach to inter-domain QoS. [Citation Graph (, )][DBLP]


  149. Analysis of the EDCA access mechanism for an IEEE 802.11e-compatible wireless LAN. [Citation Graph (, )][DBLP]


  150. A vendor-independent resource control framework for WiMAX. [Citation Graph (, )][DBLP]


  151. Fast-reroute procedures for multi-point to multi-point MPLS tunnels. [Citation Graph (, )][DBLP]


  152. Distributed Quality-of-Service routing of best constrained shortest paths. [Citation Graph (, )][DBLP]


  153. Relaxed min-augmented range trees for the representation of dynamic IP router tables. [Citation Graph (, )][DBLP]


  154. Searching nearest neighbor in overlay network. [Citation Graph (, )][DBLP]


  155. Bypass: Providing secure DHT routing through bypassing malicious peers. [Citation Graph (, )][DBLP]


  156. A Partially Buffered Crossbar packet switching architecture and its scheduling. [Citation Graph (, )][DBLP]


  157. Scheduling high-rate sessions in Fractional Lambda Switching networks: Algorithm and analysis. [Citation Graph (, )][DBLP]


  158. MOTE: Efficient monitoring of top-k set in sensor networks. [Citation Graph (, )][DBLP]


  159. Exploiting the cloning capability of Mobile Agents for cost-effective data fusion in wireless sensor networks. [Citation Graph (, )][DBLP]


  160. On the self-healing properties of an extremely low power indoor metering network. [Citation Graph (, )][DBLP]


  161. A hybrid energy aware routing algorithm for wireless sensor networks. [Citation Graph (, )][DBLP]


  162. EATA: Effectiveness based Aggregation Time Allocation algorithm for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  163. Topology control for minimal path interference in wireless sensor networks. [Citation Graph (, )][DBLP]


  164. A new approach of 3D watermarking based on image segmentation. [Citation Graph (, )][DBLP]


  165. A robust digital image watermarking method using Dual Tree Complex Wavelet Transform. [Citation Graph (, )][DBLP]


  166. Using the maximum Mutual Information criterion to textural Feature Selection for satellite image classification. [Citation Graph (, )][DBLP]


  167. Automatic color face tracking using gray information. [Citation Graph (, )][DBLP]


  168. Deterministic service on IEEE 802.11-like networks. [Citation Graph (, )][DBLP]


  169. Applying a self-configuring admission control algorithm in a new QoS architecture for IEEE 802.16 networks. [Citation Graph (, )][DBLP]


  170. QoS-aware Application Layer Multicast. [Citation Graph (, )][DBLP]


  171. Wavelet-based geometry coding for 3D mesh using space frequency quantization. [Citation Graph (, )][DBLP]


  172. Robustness study of MBAC algorithms. [Citation Graph (, )][DBLP]


  173. Multi-point to multi-point traffic engineering. [Citation Graph (, )][DBLP]


  174. Flooding Zone Initialization Protocol (FZIP): Enabling efficient multimedia diffusion for multi-hop wireless networks. [Citation Graph (, )][DBLP]


  175. Measuring network performance of swarm power aware routing protocol for MANETs. [Citation Graph (, )][DBLP]


  176. A Reliability Aware Flooding Algorithm (RAFA) in wireless multi-hop networks. [Citation Graph (, )][DBLP]


  177. A spatial extension of TinyDB for wireless sensor networks. [Citation Graph (, )][DBLP]


  178. A reliable synchronous transport protocol for wireless image sensor networks. [Citation Graph (, )][DBLP]


  179. Broadcast routing in Wireless Sensor Networks with Dynamic Power Management. [Citation Graph (, )][DBLP]


  180. Data collection in sensor networks with data mules: An integrated simulation analysis. [Citation Graph (, )][DBLP]


  181. A new approach to content-based file type detection. [Citation Graph (, )][DBLP]


  182. JaDE: A JXTA support for distributed virtual environments. [Citation Graph (, )][DBLP]


  183. Reducing null message traffic in large parallel and distributed systems. [Citation Graph (, )][DBLP]


  184. Transactional Agents for Pervasive Computing. [Citation Graph (, )][DBLP]


  185. Improving the performance of End-to-End single rate Multicast Congestion Control. [Citation Graph (, )][DBLP]


  186. Cooperative load balancing in IEEE 802.11 networks with cell breathing. [Citation Graph (, )][DBLP]


  187. ROHC and aggregated VoIP over fixed WiMAX: An empirical evaluation. [Citation Graph (, )][DBLP]


  188. LDCOM: a Layered degree-constrained overlay multicast for interactive media. [Citation Graph (, )][DBLP]


  189. Efficient failover and Load Balancing for dependable SIP proxy servers. [Citation Graph (, )][DBLP]


  190. Enhancing campus VoIP service for ubiquitous communication on dual-mode mobile handsets. [Citation Graph (, )][DBLP]


  191. Underwater Wireless Hybrid Sensor Networks. [Citation Graph (, )][DBLP]


  192. A Time-based Cluster-Head Selection Algorithm for LEACH. [Citation Graph (, )][DBLP]


  193. Efficient surface gateway deployment for underwater sensor networks. [Citation Graph (, )][DBLP]


  194. Enlightness: An enhanced and lightweight algorithm for time-space localization in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  195. AT-Angle: A distributed method for localization using angles in sensor networks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002