The SCEAS System
Navigation Menu

Conferences in DBLP

International Symposium on Parallel Architectures, Algorithms and Networks (ispan)
2009 (conf/ispan/2009)


  1. Stochastically Robust Resource Management in Heterogeneous Parallel Computing Systems. [Citation Graph (, )][DBLP]


  2. Data Structures and Algorithms for Packet Forwarding and Classification. [Citation Graph (, )][DBLP]


  3. High-Performance Cloud Computing: A View of Scientific Applications. [Citation Graph (, )][DBLP]


  4. Constructing Independent Spanning Trees for Hypercubes and Locally Twisted Cubes. [Citation Graph (, )][DBLP]


  5. A Node-to-Set Disjoint-Path Routing Algorithm in Metacube. [Citation Graph (, )][DBLP]


  6. A New Network Topology for P2P Overlay Based on a Contracted Star Graph. [Citation Graph (, )][DBLP]


  7. A Fault-Tolerant Routing Algorithm with Safety Vectors on the (n, k)-Star Graph. [Citation Graph (, )][DBLP]


  8. A Single-Trace Cycle Collection for Reference Counting Systems. [Citation Graph (, )][DBLP]


  9. A Heuristic Routing Scheme for Wireless Sensor Networks Based on a Local Search Method. [Citation Graph (, )][DBLP]


  10. Identifying Useless States in Non-FIFO Distributed Computations by Using Pseudo Timestamps. [Citation Graph (, )][DBLP]


  11. Job Scheduling Techniques for Distributed Systems with Heterogeneous Processor Cardinality. [Citation Graph (, )][DBLP]


  12. Effective Use of Dynamic Page Migration on NUMA Platforms: The Gaussian Chemistry Code on the SunFire X4600M2 System. [Citation Graph (, )][DBLP]


  13. Pipelined Computation of Very Large Word-Length LNS Addition/Subtraction Computation with Exponential Convergence Rate. [Citation Graph (, )][DBLP]


  14. Smaller Split L-1 Data Caches for Multi-core Processing Systems. [Citation Graph (, )][DBLP]


  15. Conflict-Avoidance in Multicore Caching for Data-Similar Executions. [Citation Graph (, )][DBLP]


  16. dIP: A Non-intrusive Debugging IP for Dynamic Data Race Detection in Many-Core. [Citation Graph (, )][DBLP]


  17. Greedy Prefix Cache for IP Routing Lookups. [Citation Graph (, )][DBLP]


  18. Path-Analytic Distributed Object Prefetching. [Citation Graph (, )][DBLP]


  19. An Effective Throttling Method Based on Quasi-global Congestion Information. [Citation Graph (, )][DBLP]


  20. Design and Implementation of a Web2.0-Based Home-Appliances Control Service Platform. [Citation Graph (, )][DBLP]


  21. Towards Thermal Aware Workload Scheduling in a Data Center. [Citation Graph (, )][DBLP]


  22. Network Aware Compression Based Rate Control for Printing System. [Citation Graph (, )][DBLP]


  23. Toward a Human Nature Based Automation System with Dynamic Function Allocation Model Supported for Pervasive Systems. [Citation Graph (, )][DBLP]


  24. A Goal-Directed Human Activity Computing Model. [Citation Graph (, )][DBLP]


  25. PlaceAware: A Tool for Enhancing Social Interactions in Urban Places. [Citation Graph (, )][DBLP]


  26. A Pervasive System Architecture That Supports Adaptation Using Agents and Ontologies. [Citation Graph (, )][DBLP]


  27. SoCQ: A Framework for Pervasive Environments. [Citation Graph (, )][DBLP]


  28. Geo-spatial Tagging of Image Collections Using Temporal Camera Usage Dynamics. [Citation Graph (, )][DBLP]


  29. Defending Traffic Analysis with Communication Cycles in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  30. Chaining Clock Synchronization: An Energy-Efficient Clock Synchronization Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  31. Locally Approximate Boundaries in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  32. On the Reliability of Wireless Sensors with Software-Based Attestation for Intrusion Detection. [Citation Graph (, )][DBLP]


  33. TRENS: A Tracking-Assisted Routing Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  34. Performance of an Energy Efficient Routing Design for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  35. Energy Conservation with Network Coding for Wireless Sensor Networks with Multiple Crossed Information Flows. [Citation Graph (, )][DBLP]


  36. Research on Service Oriented and Middleware Based Active QoS Infrastructure of Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  37. A Bandwidth-Based Routing Protocol with Efficient Path Discovery in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  38. Hierarchical Cell Relay Scheme with GPS for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  39. A Capacity-Aware and Multipath-Supported Traffic Control Framework in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  40. A Zone Based Interleaved Scanning Technique for Fast Handoff in IEEE 802.11 Wireless Networks. [Citation Graph (, )][DBLP]


  41. An Energy-Efficient Dynamic Key Management Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  42. Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation. [Citation Graph (, )][DBLP]


  43. An Efficient Three Party Authenticated Key Exchange for Mobile Communications. [Citation Graph (, )][DBLP]


  44. A Trust Discovery Model Based on Weighted Closeness. [Citation Graph (, )][DBLP]


  45. Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem. [Citation Graph (, )][DBLP]


  46. Efficient Broadcast Mechanism for Cooperative Collision Avoidance Using Power Control. [Citation Graph (, )][DBLP]


  47. Extended MIMO Model Research of Seismic Specific Cable. [Citation Graph (, )][DBLP]


  48. Frame-Based Adaptive Uplink Scheduling Algorithm in OFDMA-Based WiMAX Networks. [Citation Graph (, )][DBLP]


  49. Improvement of Multi-hop Packet Transmission Scheduling in WDM Optical Star Networks. [Citation Graph (, )][DBLP]


  50. Solutions to Multihoming in IPv6 Based on MIPv6 and NEMO. [Citation Graph (, )][DBLP]


  51. QoS Aware Multiple Spanning Tree Mechanism in Multi-radio Multi-channel Wireless Mesh Network. [Citation Graph (, )][DBLP]


  52. Performance Analysis of Algorithms with Multiple Attributes for Adaptive Call Admission Control in Heterogeneous Wireless Networks. [Citation Graph (, )][DBLP]


  53. A Walkie-Talkie-Like Emergency Communication System for Catastrophic Natural Disasters. [Citation Graph (, )][DBLP]


  54. The Hierarchically Distributed Mobile Metadata (HDMM) Style of Architecture for Pervasive Metadata Networks. [Citation Graph (, )][DBLP]


  55. Bandwidth-Aware Minimum Power Multicast Routing in Wireless Networks. [Citation Graph (, )][DBLP]


  56. On Succinctness of Geometric Greedy Routing in Euclidean Plane. [Citation Graph (, )][DBLP]


  57. Shortest Multilayered Path for Dimensioning in Two-Layer Connection-Oriented Networks. [Citation Graph (, )][DBLP]


  58. Location-Based Reliable Multicast Routing Algorithm for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  59. A Data-Driven Architecture for Remote Control of Sensors over a Wireless Sensor Network and the Internet. [Citation Graph (, )][DBLP]


  60. Recommend Touring Routes to Travelers According to Their Sequential Wandering Behaviours. [Citation Graph (, )][DBLP]


  61. Using E-mail Authentication and Disposable E-mail Addressing for Filtering Spam. [Citation Graph (, )][DBLP]


  62. Random Early Detection Web Servers for Dynamic Load Balancing. [Citation Graph (, )][DBLP]


  63. Genetic Information Gathering System (GIGS): A New Meta-search Network Tool. [Citation Graph (, )][DBLP]


  64. Simulating an Automated System (SAS) for Merging Medical Vocabularies. [Citation Graph (, )][DBLP]


  65. Medical Terminologies That Work: The Example of MeSH. [Citation Graph (, )][DBLP]


  66. Platform-Based Inference System Design Using FML and Fuzzy Technology for Healthcare. [Citation Graph (, )][DBLP]


  67. An Electronic Hospital Bedside-Card Prototype Using RFID and DVB-MHP Platform. [Citation Graph (, )][DBLP]


  68. Robust Pairwise Registration for Images of Indocyanine-Green Angiographic Sequences. [Citation Graph (, )][DBLP]


  69. An Intelligent-Mamdani Inference Scheme for Healthcare Applications Based on Fuzzy Markup Language. [Citation Graph (, )][DBLP]


  70. A Framework for Personalized Health Trend Analysis. [Citation Graph (, )][DBLP]


  71. Developing a Scientific Image Retrieval System with Prediction Capability. [Citation Graph (, )][DBLP]


  72. An Approach for Incorporating End User Knowledge into Applications of Information Extraction Classification and Fusion in Institutional Eldercare. [Citation Graph (, )][DBLP]


  73. An Incremental Mining Algorithm for High Average-Utility Itemsets. [Citation Graph (, )][DBLP]


  74. Designing Hi-Facsimile Briefing Remote-Controller with Bluetooth and Speech-Recognition Processor. [Citation Graph (, )][DBLP]


  75. A Novel Approach to Establishing the VPRS Model with Threshold Parameter Selection Mechanism Based on Fuzzy Algorithms. [Citation Graph (, )][DBLP]


  76. 2-D TERCOM Guidance - Neural Net Approach. [Citation Graph (, )][DBLP]


  77. Estimation of Carrier Frequency Offset for Generalized OFDMA Uplink Systems Using Particle Swarm Optimization Algorithms. [Citation Graph (, )][DBLP]


  78. Attribute Normalization in Network Intrusion Detection. [Citation Graph (, )][DBLP]


  79. Reliability Analysis for Full-2 Code. [Citation Graph (, )][DBLP]


  80. Maximized L-Measure and Its Choquet Integral Regression Model. [Citation Graph (, )][DBLP]


  81. Improved Frame/Block Based Wyner-Ziv Residual Video Coding. [Citation Graph (, )][DBLP]


  82. A Low Complexity Error Concealment Method for H.264 Video Coding Facilitating Hardware Realization. [Citation Graph (, )][DBLP]


  83. Quality-of-Service Optimization for Multiple Multimedia Tasks in Real-Time Embedded Systems. [Citation Graph (, )][DBLP]


  84. A Demand-Aware Grouping Scheme for VoD Service in Peer to Peer Environment. [Citation Graph (, )][DBLP]


  85. Anode-ALM: An Aggregation-Based Application Level Multicast for Media Streaming. [Citation Graph (, )][DBLP]


  86. A Flexible and Effective Colorization System. [Citation Graph (, )][DBLP]


  87. Design and Implementation of Music Information Retrieval and Gathering Engine (MIRAGE). [Citation Graph (, )][DBLP]


  88. Watermarking Mechanism for Copyright Protection by Using the Pinned Field of the Pinned Sine Transform. [Citation Graph (, )][DBLP]


  89. Robust Light Objects Recognition Based on Computer Vision. [Citation Graph (, )][DBLP]


  90. Vector Bank Based Multimedia Codec System-on-a-Chip (SoC) Design. [Citation Graph (, )][DBLP]


  91. SARIDS: A Self-Adaptive Resource Index and Discovery System. [Citation Graph (, )][DBLP]


  92. Peer-to-Peer Video-on-Demand Service in NuWeb. [Citation Graph (, )][DBLP]


  93. Service Guarantee for Inter-domain Movement in Wireless Peer-to-Peer Live Streaming System. [Citation Graph (, )][DBLP]


  94. Improving Processor Allocation in Heterogeneous Computing Grid through Considering Both Speed Heterogeneity and Resource Fragmentation. [Citation Graph (, )][DBLP]


  95. Adaptive Workflow-Policy Based Management Scheme for Advanced Heart Disease Identification. [Citation Graph (, )][DBLP]


  96. Adaptivity in Risk and Emergency Management Applications on Pervasive Grids. [Citation Graph (, )][DBLP]


  97. Improving Dense Linear Equation Solver on Hybrid CPU-GPU System. [Citation Graph (, )][DBLP]


  98. Parallel Implementation and Performance Prediction of Object Detection in Videos on the Tilera Many-Core Systems. [Citation Graph (, )][DBLP]


  99. Enhanced Parallel Loop Self-Scheduling for Heterogeneous Multi-core Cluster Systems. [Citation Graph (, )][DBLP]


  100. The Restricted Connectivity of Locally Twisted Cubes. [Citation Graph (, )][DBLP]


  101. Multicast Network with MMI-Based Optical Switches on Active Splitter/Active Combiner Structure. [Citation Graph (, )][DBLP]


  102. A Path-Based Broadcast Algorithm for Wormhole Hypercubes. [Citation Graph (, )][DBLP]


  103. Fault-Tolerant Hamiltonicity of the WK-Recursive Networks. [Citation Graph (, )][DBLP]


  104. Efficient Algorithms for Embedding Cycles in Augmented Cubes. [Citation Graph (, )][DBLP]


  105. Independent Spanning Trees on Folded Hypercubes. [Citation Graph (, )][DBLP]


  106. The Mutually Independent Bipanconnected Property for Hypercube. [Citation Graph (, )][DBLP]


  107. Adaptive Reactive Routing for VANET in City Environments. [Citation Graph (, )][DBLP]


  108. Performance Evaluation of Broadcast Communication Protocol DSCF (Directional Store-Carry-Forward) for VANETs with Two-Dimensional Road Model. [Citation Graph (, )][DBLP]


  109. Cooperative Transmission Aid in Intermittent Broken Connection on VANET. [Citation Graph (, )][DBLP]


  110. Dissemination of Data Aggregation in Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  111. A Bulk Transfer Agent for Improving Data Communication Efficiency in Bullet Trains. [Citation Graph (, )][DBLP]


  112. V2X-Based Traffic Congestion Recognition and Avoidance. [Citation Graph (, )][DBLP]


  113. Spatial Context-Awareness in Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  114. Effectively Changing Pseudonyms for Privacy Protection in VANETs. [Citation Graph (, )][DBLP]


  115. Analyze a Privacy-Preserving Vehicular Communication Protocol and Propose a New One. [Citation Graph (, )][DBLP]


  116. A Simple Delay Time Estimation Method and Its Application to Adaptive OFDM Transmissions for Vehicular Wireless Networks. [Citation Graph (, )][DBLP]


  117. A Study of OFDMA Access Method in Multi-path Fading Channel. [Citation Graph (, )][DBLP]


  118. Improving Scientific Data Extraction Using Metadata Classification. [Citation Graph (, )][DBLP]


  119. Establishing and Evaluating Trust in a Grid Environment. [Citation Graph (, )][DBLP]


  120. Implementation of a Distributed File Storage on Peer-to-Peer Environments. [Citation Graph (, )][DBLP]


  121. Cyberaide Creative: On-Demand Cyberinfrastructure Provision in Clouds. [Citation Graph (, )][DBLP]


  122. Enabling Efficient Peer to Peer Resource Discovery in Dynamic Grids Using Variable Size Routing Indexes. [Citation Graph (, )][DBLP]


  123. Distributed Adaptive Load Balancing for P2P Grid Systems. [Citation Graph (, )][DBLP]


  124. On Effects of Resource Fragmentation on Job Scheduling Performance in Computing Grids. [Citation Graph (, )][DBLP]


  125. Characteristic Approximation for Resources on Computational Grids. [Citation Graph (, )][DBLP]


  126. WebDB-Based CEMS Design and Applications in the Universities of Taiwan. [Citation Graph (, )][DBLP]


  127. Temperature Control Framework Using Wireless Sensor Networks and Geostatistical Analysis for Total Spatial Awareness. [Citation Graph (, )][DBLP]


  128. An Agile and Low Cost FPGA Implementation of MPEG-2 TS Remultiplexer for CATV Head-End Equipment. [Citation Graph (, )][DBLP]


  129. The Design of Intelligent Decomposed LMS with Embedded Ganglia Agent. [Citation Graph (, )][DBLP]


  130. Bayesian Networks for Fault Detection under Lack of Historical Data. [Citation Graph (, )][DBLP]


  131. Information Provenance for Open Distributed Collaborative System. [Citation Graph (, )][DBLP]


  132. An Approach to Filtering RFID Data Streams. [Citation Graph (, )][DBLP]


  133. An Improved Parallel Implementation of 3D DRIE Simulation on GPU. [Citation Graph (, )][DBLP]


  134. A Batched GPU Algorithm for Set Intersection. [Citation Graph (, )][DBLP]


  135. High Speed Articulated Object Tracking Using GPUs: A Particle Filter Approach. [Citation Graph (, )][DBLP]


  136. A Layered Security Approach for Cloud Computing Infrastructure. [Citation Graph (, )][DBLP]


  137. Governance of Information Security Elements in Service-Oriented Enterprise Architecture. [Citation Graph (, )][DBLP]


  138. Entropy-Based High-Accuracy Distributed Faulty Sensor Detection Algorithm in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  139. Automatically Generating Classifier for Phishing Email Prediction. [Citation Graph (, )][DBLP]


  140. Determining Service Trustworthiness in Intercloud Computing Environments. [Citation Graph (, )][DBLP]


  141. Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling. [Citation Graph (, )][DBLP]


  142. How RFID Attacks Are Expressed in Output Data. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002