The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Parallel Computing (npc)
2008 (conf/npc/2008w)


  1. A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks. [Citation Graph (, )][DBLP]


  2. Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem. [Citation Graph (, )][DBLP]


  3. Conditional Privacy Using Re-encryption. [Citation Graph (, )][DBLP]


  4. Using Outlier Detection to Reduce False Positives in Intrusion Detection. [Citation Graph (, )][DBLP]


  5. Identity-Based On-Line/Off-Line Signcryption. [Citation Graph (, )][DBLP]


  6. Attribute Delegation Authorization Based on Subjective Trust Evaluation. [Citation Graph (, )][DBLP]


  7. A Multi-core Supported Intrusion Detection System. [Citation Graph (, )][DBLP]


  8. Synchronization of Discrete Chaotic Dynamical Systems Using Active Control. [Citation Graph (, )][DBLP]


  9. Secure Prophet Address Allocation for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  10. Two Security Problems of RFID Security Method with Ownership Transfer. [Citation Graph (, )][DBLP]


  11. Novel Stream Cipher Using 2-D Hybrid CA and Variable Ordered Recursive CA Substitutions. [Citation Graph (, )][DBLP]


  12. Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm. [Citation Graph (, )][DBLP]


  13. A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism. [Citation Graph (, )][DBLP]


  14. Experimental Tests on SCTP over IPSec. [Citation Graph (, )][DBLP]


  15. A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks. [Citation Graph (, )][DBLP]


  16. Ontology-Based Knowledge Representation for a P2P Multi-agent Distributed Intrusion Detection System. [Citation Graph (, )][DBLP]


  17. Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication. [Citation Graph (, )][DBLP]


  18. Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow Protection. [Citation Graph (, )][DBLP]


  19. An Improved Method for Ranking of Search Results Based on User Interest. [Citation Graph (, )][DBLP]


  20. ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience. [Citation Graph (, )][DBLP]


  21. Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis. [Citation Graph (, )][DBLP]


  22. Towards Time Limited Secure Agent Execution on Malicious Host: A Concept Paper. [Citation Graph (, )][DBLP]


  23. Self-Authentication of Encrypted Channels in Service Network Graph. [Citation Graph (, )][DBLP]


  24. A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. [Citation Graph (, )][DBLP]


  25. Anomaly Detection Based on Available Bandwidth Estimation. [Citation Graph (, )][DBLP]


  26. Spam Mail Filtering Based on Network Processor. [Citation Graph (, )][DBLP]


  27. Extending BAN Logic for Reasoning with Modern PKI-Based Protocols. [Citation Graph (, )][DBLP]


  28. Detecting Network-Wide Traffic Anomalies Based on Spatial HMM. [Citation Graph (, )][DBLP]


  29. A Stable Clock Synchronization Based on Clock Drift Rate. [Citation Graph (, )][DBLP]


  30. Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture. [Citation Graph (, )][DBLP]


  31. A Service Trust Model with Passive Trust. [Citation Graph (, )][DBLP]


  32. A Maximum Entropy Based Multi-dimensional Trust Model. [Citation Graph (, )][DBLP]


  33. An Effective P2P Collaborative Mode for Mobile Web Surfing. [Citation Graph (, )][DBLP]


  34. Automatic Chatbot Knowledge Acquisition from Online Forum via Rough Set and Ensemble Learning. [Citation Graph (, )][DBLP]


  35. An MAODV-Based Energy Saving Multicast Routing Algorithm. [Citation Graph (, )][DBLP]


  36. Chaos of Software Requirements. [Citation Graph (, )][DBLP]


  37. A Parallel Algorithm for Simulating Photochemical Reaction. [Citation Graph (, )][DBLP]


  38. A Novel Genetic Algorithm and Its Application in TSP. [Citation Graph (, )][DBLP]


  39. Parallel Computing in Semiclassical Dynamics Simulation of Photochemical Reactions. [Citation Graph (, )][DBLP]


  40. Community Detection Based on Weighted Networks. [Citation Graph (, )][DBLP]


  41. A New Efficient Algorithm for Detecting Communities in Complex Networks. [Citation Graph (, )][DBLP]


  42. Construction and Application of Linux Virtual Server Cluster for Scientific Computing. [Citation Graph (, )][DBLP]


  43. An Empirical Study on the Informatization and E-commerce Development Level in Chongqing. [Citation Graph (, )][DBLP]


  44. MP-MAODV: A MAODV-Based Multipath Routing Algorithm. [Citation Graph (, )][DBLP]


  45. Benefit Optimization Resource Scheduling Algorithm in Three-Dimensional QoS Model in Grid Computing. [Citation Graph (, )][DBLP]


  46. Classified Optimization Scheduling Algorithm Driven by Multi-QoS Attributes in Economical Grid. [Citation Graph (, )][DBLP]


  47. A Spatial Renewal Video Traffic Model Based on Buffering Metrics. [Citation Graph (, )][DBLP]


  48. An Exception Handling Framework for Service-Oriented Computing. [Citation Graph (, )][DBLP]


  49. Research on Mapping of MPCC SCF to SIP Protocol in Parlay/OSA API. [Citation Graph (, )][DBLP]


  50. A Scheme of Detecting Cheaters Wholly in Threshold Secret Sharing for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  51. Research on T-bridge Algorithm of Web Session Fuzzy Clustering. [Citation Graph (, )][DBLP]


  52. A New Secure E-mail Scheme Based on Elliptic Curve Cryptography Combined Public Key. [Citation Graph (, )][DBLP]


  53. Traflow: Design and Complementation of a Real Time Traffic Measurement System in High-Speed Networks. [Citation Graph (, )][DBLP]


  54. Research on Design and Its Key Technologies of Web Service Platform in P2P Environment. [Citation Graph (, )][DBLP]


  55. Wiretap Channel with Side Information from Part of Encoder. [Citation Graph (, )][DBLP]


  56. Relay Aided Wireless Multicast Utilizing Network Coding: Outage Behaviour and Diversity Gain. [Citation Graph (, )][DBLP]


  57. Generation-Based Network Coding over Networks with Delay. [Citation Graph (, )][DBLP]


  58. Capacity and Delay of the Wireless Network with Special Relay Nodes. [Citation Graph (, )][DBLP]


  59. A Distributed Fast Light-path Set-up Protocol for Grid over OBS Networks. [Citation Graph (, )][DBLP]


  60. A Volunteer Computing in High Performance Environment Based on Availability Model. [Citation Graph (, )][DBLP]


  61. A Probabilistic Approach to Analyze the Effect of Free-Riders in P2P Streaming Services. [Citation Graph (, )][DBLP]


  62. Network Coding for P2P Live Media Streaming. [Citation Graph (, )][DBLP]


  63. Optimal Placement of Mesh Points in a Wireless Mesh Network Using Multi-path Routing Protocol. [Citation Graph (, )][DBLP]


  64. Towards Mapping Large Scale Ontologies Based on RFCA with Attribute Reduction. [Citation Graph (, )][DBLP]


  65. Design of a Collaborative Ontology Editing System for Enterprise Process Integration. [Citation Graph (, )][DBLP]


  66. Emerging Autopoietic Communities - Scalability of Knowledge Transfer in Complex Systems. [Citation Graph (, )][DBLP]


  67. Fostering the Knowledge-Sharing Behavior of Customers in Interorganizational Healthcare Communities. [Citation Graph (, )][DBLP]


  68. Fitting Grey Relation Model for the Performance of E-government Service: The Case of Kaohsiung City Service On-Line System in Taiwan. [Citation Graph (, )][DBLP]


  69. CUCS: A Web Page Classification Algorithm for Large Training Set. [Citation Graph (, )][DBLP]


  70. A DL-Based Approach for Eliminating Concept Restriction Conflicts in Ontology Merging. [Citation Graph (, )][DBLP]


  71. Knowledge Mining and Visualization on News Webpages and Large-Scale News Video Database. [Citation Graph (, )][DBLP]


  72. Object Lifecycle Evolution History Modeling and Reuse for Knowledge Management. [Citation Graph (, )][DBLP]


  73. Acquiring Compressor Design Case Knowledge Using Rough Set Theory. [Citation Graph (, )][DBLP]


  74. MFDSSF: A Mobile Fuzzy Decision Support System for Firefighter Cooperation in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  75. Behavior-Based Web Services Matchmaking. [Citation Graph (, )][DBLP]


  76. A Semantic Approach to Recommendation System Based on User Ontology and Spreading Activation Model. [Citation Graph (, )][DBLP]


  77. Semantic Mapping in Product Design and Catalog Integration. [Citation Graph (, )][DBLP]


  78. Research on the Modeling of Semantic-Based Web Resources Feature. [Citation Graph (, )][DBLP]


  79. A Semantic Annotation Based Software Knowledge Sharing Space. [Citation Graph (, )][DBLP]


  80. Research on Product Design Knowledge Reuse through Linkage with Design Iteration Records. [Citation Graph (, )][DBLP]


  81. A Method to Guarantee Ontology Consistency on Property Range Changes. [Citation Graph (, )][DBLP]


  82. An Adaptive Transmission Control Mechanism for Underwater Acoustic Sensor Network. [Citation Graph (, )][DBLP]


  83. EBMD: Energy-Balanced Multi-path Data Propation Algorithm for Sensor Networks. [Citation Graph (, )][DBLP]


  84. A Novel Communication Structure for Wireless Sensor Network. [Citation Graph (, )][DBLP]


  85. Quantum Secure Communication Network on EPR States. [Citation Graph (, )][DBLP]


  86. A Group Quantum Communication Network Using Quantum Secret Sharing. [Citation Graph (, )][DBLP]


  87. Data Gathering Approaches for Underwater Sensor Networks. [Citation Graph (, )][DBLP]


  88. The Application and Research of Ontology in Knowledge Management Field. [Citation Graph (, )][DBLP]


  89. EBAT: Energy Balanced Adaptive Transmission Algorithm for Sensor Networks. [Citation Graph (, )][DBLP]


  90. Implementation and Optimization of MPICH2 Multicast on Optical Fiber Network. [Citation Graph (, )][DBLP]


  91. A Resource Scheduling Strategy for Intrusion Detection on Multi-core Platform. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002