The SCEAS System
Navigation Menu

Conferences in DBLP

(new2an)
2009 (conf/new2an/2009)


  1. ITU G.hn Concept and Home Automation. [Citation Graph (, )][DBLP]


  2. Extending Context Spaces Theory by Predicting Run-Time Context. [Citation Graph (, )][DBLP]


  3. Cross-Domain Interoperability: A Case Study. [Citation Graph (, )][DBLP]


  4. A Topology Based Approach for Context-Awareness in Smart Environments. [Citation Graph (, )][DBLP]


  5. Anonymous Agent Coordination in Smart Spaces: State-of-the-Art. [Citation Graph (, )][DBLP]


  6. On-the-Fly Situation Composition within Smart Spaces. [Citation Graph (, )][DBLP]


  7. Empower Mobile Workspaces by Wireless Networks and Wearable Computing. [Citation Graph (, )][DBLP]


  8. Multimodal Interaction with Intelligent Meeting Room Facilities from Inside and Outside. [Citation Graph (, )][DBLP]


  9. Ubi-Check: A Pervasive Integrity Checking System. [Citation Graph (, )][DBLP]


  10. Towards a Lightweight Security Solution for User-Friendly Management of Distributed Sensor Networks. [Citation Graph (, )][DBLP]


  11. Cross-Site Management of User Online Attributes. [Citation Graph (, )][DBLP]


  12. Analysis and Optimization of Aggregation in a Reconfigurable Optical ADD/DROP Multiplexer. [Citation Graph (, )][DBLP]


  13. Teletraffic Capacity Performance of WDM/DS-OCDMA Passive Optical Network. [Citation Graph (, )][DBLP]


  14. Estimation of GoS Parameters in Intelligent Network. [Citation Graph (, )][DBLP]


  15. Multi-Skill Call Center as a Grading from "Old" Telephony. [Citation Graph (, )][DBLP]


  16. A Real-Time Algorithm for Skype Traffic Detection and Classification. [Citation Graph (, )][DBLP]


  17. HTTP Traffic Measurements on Access Networks, Analysis of Results and Simulation. [Citation Graph (, )][DBLP]


  18. The Video Streaming Monitoring in the Next Generation Networks. [Citation Graph (, )][DBLP]


  19. The Poisson Cluster Process Runs as a Model for the Internet Traffic. [Citation Graph (, )][DBLP]


  20. Proactive Peer-to-Peer Traffic Control When Delivering Large Amounts of Content within a Large-Scale Organization. [Citation Graph (, )][DBLP]


  21. ISP-Driven Managed P2P Framework for Effective Real-Time IPTV Service. [Citation Graph (, )][DBLP]


  22. Fault-Tolerant Architecture for Peer to Peer Network Management Systems. [Citation Graph (, )][DBLP]


  23. Public Key Signatures and Lightweight Security Solutions in a Wireless Environment. [Citation Graph (, )][DBLP]


  24. On the Operational Security Assurance Evaluation of Networked IT Systems. [Citation Graph (, )][DBLP]


  25. Trust Management Using Networks of Volunteers in Ubiquitous Computing Environments. [Citation Graph (, )][DBLP]


  26. A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks. [Citation Graph (, )][DBLP]


  27. Robust and Efficient Routing in Wireless Mesh Networks with Unreliable Nodes. [Citation Graph (, )][DBLP]


  28. Video Compression for Wireless Transmission: Reducing the Power Consumption of the WPAN Hi-Speed Systems. [Citation Graph (, )][DBLP]


  29. Link Stability-Aware Ad Hoc Routing Protocol with Multiple Sampling Rates. [Citation Graph (, )][DBLP]


  30. A Quality of Service Based Mobility Management in Heterogenous Wireless Networks. [Citation Graph (, )][DBLP]


  31. A Novel Cooperative Relaying Scheme for Next Generation Wireless Networks. [Citation Graph (, )][DBLP]


  32. Frequency Allocation Scheme to Maximize Cell Capacity in a Cellular System with Cooperative Relay. [Citation Graph (, )][DBLP]


  33. Achieving Secondary Capacity under Interference from a Primary Base Station. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002