The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Parallel Computing (npc)
2008 (conf/npc/2008)


  1. An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks. [Citation Graph (, )][DBLP]


  2. Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  3. A Formal Approach to Robustness Testing of Network Protocol. [Citation Graph (, )][DBLP]


  4. Deadline Probing: Towards Timely Cognitive Wireless Network. [Citation Graph (, )][DBLP]


  5. SRDFA: A Kind of Session Reconstruction DFA. [Citation Graph (, )][DBLP]


  6. Measuring the Normality of Web Proxies' Behavior Based on Locality Principles. [Citation Graph (, )][DBLP]


  7. Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers. [Citation Graph (, )][DBLP]


  8. Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow. [Citation Graph (, )][DBLP]


  9. Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting. [Citation Graph (, )][DBLP]


  10. Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting. [Citation Graph (, )][DBLP]


  11. Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  12. A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay. [Citation Graph (, )][DBLP]


  13. HTL: A Locality Bounded Flat Hash Location Service. [Citation Graph (, )][DBLP]


  14. Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques. [Citation Graph (, )][DBLP]


  15. Online Accumulation: Reconstruction of Worm Propagation Path. [Citation Graph (, )][DBLP]


  16. HRS: A Hybrid Replication Strategy for Exhaustive P2P Search. [Citation Graph (, )][DBLP]


  17. ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework. [Citation Graph (, )][DBLP]


  18. A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies. [Citation Graph (, )][DBLP]


  19. Automatic Transformation for Overlapping Communication and Computation. [Citation Graph (, )][DBLP]


  20. Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid. [Citation Graph (, )][DBLP]


  21. CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem. [Citation Graph (, )][DBLP]


  22. Online Balancing Two Independent Criteria. [Citation Graph (, )][DBLP]


  23. Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds. [Citation Graph (, )][DBLP]


  24. Survey on Parallel Programming Model. [Citation Graph (, )][DBLP]


  25. An Integrated Framework for Wireless Sensor Web Service and Its Performance Analysis Based on Queue Theory. [Citation Graph (, )][DBLP]


  26. Grid Computing: A Case Study in Hybrid GMRES Method. [Citation Graph (, )][DBLP]


  27. Towards Resource Reliability Support for Grid Workflows. [Citation Graph (, )][DBLP]


  28. A SyncML Middleware-Based Solution for Pervasive Relational Data Synchronization. [Citation Graph (, )][DBLP]


  29. An Efficient Authentication and Key Agreement Protocol in RFID System. [Citation Graph (, )][DBLP]


  30. Grid Service Discovery Based on Cross-VO Service Domain Model. [Citation Graph (, )][DBLP]


  31. Ontology-Based Semantic Method for Service Modeling in Grid. [Citation Graph (, )][DBLP]


  32. A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC Environments. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002