The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE International Performance, Computing, and Communications Conference (IPCCC) (ipccc)
2006 (conf/ipccc/2006)


  1. Path cost metrics for multi-hop network routing. [Citation Graph (, )][DBLP]


  2. On capturing and containing E-mail worms. [Citation Graph (, )][DBLP]


  3. Routing and wavelength assignment in optical mesh networks with wavelength conversion. [Citation Graph (, )][DBLP]


  4. An analytical model of TCP performance. [Citation Graph (, )][DBLP]


  5. Unstructured peer-to-peer session over IP using SIP. [Citation Graph (, )][DBLP]


  6. Performance problem analysis method for Web systems using multiple decision trees. [Citation Graph (, )][DBLP]


  7. BGP with an adaptive minimal route advertisement interval. [Citation Graph (, )][DBLP]


  8. Channel distribution fairness in multi-channel wireless ad-hoc networks using a channel distribution index. [Citation Graph (, )][DBLP]


  9. A modularized QoS multicasting approach on common homogeneous trees for heterogeneous members in DiffServ. [Citation Graph (, )][DBLP]


  10. Caching of interactive multiple choice MPEG-4 presentations. [Citation Graph (, )][DBLP]


  11. PaScal - a new parallel and scalable server IO networking infrastructure for supporting global storage/file systems in large-size Linux clusters. [Citation Graph (, )][DBLP]


  12. Data replication in collaborative sensor network systems. [Citation Graph (, )][DBLP]


  13. A control-theoretic approach to improving fairness in DCF based WLANs. [Citation Graph (, )][DBLP]


  14. Towards a framework for worm-defense evaluation. [Citation Graph (, )][DBLP]


  15. Energy efficient model for data gathering in structured multiclustered wireless sensor network. [Citation Graph (, )][DBLP]


  16. Enabling mobility in enterprise security management. [Citation Graph (, )][DBLP]


  17. Performance evaluation of DS-BPSK UWB multiple-access systems in standard UWB channels. [Citation Graph (, )][DBLP]


  18. Performance modeling of TCP/AQM with generalized AIMD under intermediate buffer sizes. [Citation Graph (, )][DBLP]


  19. Optimising malware. [Citation Graph (, )][DBLP]


  20. Maille authorization - a distributed, redundant authorization protocol. [Citation Graph (, )][DBLP]


  21. A framework for distributed key management schemes in heterogeneous wireless sensor networks. [Citation Graph (, )][DBLP]


  22. An efficient load balancing algorithm for heterogeneous grid systems considering desirability of grid sites. [Citation Graph (, )][DBLP]


  23. Maintaining an energy-efficient Bluetooth scatternet. [Citation Graph (, )][DBLP]


  24. Performance modeling of fully adaptive wormhole routing in n-dimensional mesh-connected multicomputers. [Citation Graph (, )][DBLP]


  25. dRamDisk: efficient RAM sharing on a commodity cluster. [Citation Graph (, )][DBLP]


  26. Wireless intrusion protection system using distributed collaborative intelligence. [Citation Graph (, )][DBLP]


  27. A survey of PKI components and scalability issues. [Citation Graph (, )][DBLP]


  28. Connectionless port scan detection on the backbone. [Citation Graph (, )][DBLP]


  29. Monitor placement for stepping stone analysis. [Citation Graph (, )][DBLP]


  30. SeMAC: robust broadcast MAC protocol for multi-hop wireless ad hoc networks. [Citation Graph (, )][DBLP]


  31. An energy-efficient sensing coverage protocol for surveillance and monitoring applications using wireless sensors. [Citation Graph (, )][DBLP]


  32. Source traffic regulation in reserved delivery subnetworks. [Citation Graph (, )][DBLP]


  33. A distributed fairness algorithm for bus-based metropolitan optical network. [Citation Graph (, )][DBLP]


  34. Evaluating the impact of reactivity on the performance of Web applications. [Citation Graph (, )][DBLP]


  35. Transmit power reduction by adapting rate or power for single carrier wireless systems. [Citation Graph (, )][DBLP]


  36. A novel queue management mechanism for improving performance of multihop flows in IEEE 802.11s based mesh networks. [Citation Graph (, )][DBLP]


  37. Coding schemes for integrated transport and storage reliability. [Citation Graph (, )][DBLP]


  38. Enhanced blocking probability in adaptive multimedia wireless networks. [Citation Graph (, )][DBLP]


  39. And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure. [Citation Graph (, )][DBLP]


  40. A stratified model for security in peer networks: a case for fine grain granularity. [Citation Graph (, )][DBLP]


  41. Key establishment with source coding and reconciliation for wireless sensor networks. [Citation Graph (, )][DBLP]


  42. Role-based profile analysis for scalable and accurate insider-anomaly detection. [Citation Graph (, )][DBLP]


  43. An improved Wu-Manber multiple patterns matching algorithm. [Citation Graph (, )][DBLP]


  44. Automatically deducing propagation sequences that circumvent a collaborative worm defense. [Citation Graph (, )][DBLP]


  45. Incorruptible system self-cleansing for intrusion tolerance. [Citation Graph (, )][DBLP]


  46. Polar LEO satellite constellation measurement by delay probing. [Citation Graph (, )][DBLP]


  47. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. [Citation Graph (, )][DBLP]


  48. Portal monitoring based anti-malware framework: design and implementation. [Citation Graph (, )][DBLP]


  49. Reliability enhancements for a Jini and JavaSpaces based network management system. [Citation Graph (, )][DBLP]


  50. QoS reliability of hierarchical clustered wireless sensor networks. [Citation Graph (, )][DBLP]


  51. A novel channel assignment algorithm based on topology simplification in multi-radio wirelesss mesh networks. [Citation Graph (, )][DBLP]


  52. Minimum-energy route configuration for wireless ad hoc networks. [Citation Graph (, )][DBLP]


  53. Safe base-station repositioning in wireless sensor networks. [Citation Graph (, )][DBLP]


  54. A traffic-classified technique for filtering spam from bulk delivery E-mails. [Citation Graph (, )][DBLP]


  55. A grouped and proportional-fair subcarrier allocation scheme for multiuser OFDM systems. [Citation Graph (, )][DBLP]


  56. Topological dynamics characterization for layered satellite networks. [Citation Graph (, )][DBLP]


  57. OS-aware tuning: improving instruction cache energy efficiency on system workloads. [Citation Graph (, )][DBLP]


  58. A group signature scheme with signature claiming and variable linkability. [Citation Graph (, )][DBLP]


  59. A new secure group key management scheme for multicast over wireless cellular networks. [Citation Graph (, )][DBLP]


  60. Avoiding store misses to fully modified cache blocks. [Citation Graph (, )][DBLP]


  61. High performance and alleviated hot-spot problem in processor frontend with enhanced instruction fetch bandwidth utilization. [Citation Graph (, )][DBLP]


  62. An analytical study on routing overhead of two-level cluster-based routing protocols for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  63. PROFITIS: architecture for location-based vertical handovers supporting real-time applications. [Citation Graph (, )][DBLP]


  64. Risk reduction based survivable WDM network design. [Citation Graph (, )][DBLP]


  65. A TCP-aware call admission control scheme for packet-switched wireless networks. [Citation Graph (, )][DBLP]


  66. Detection of stepping stone attack under delay and chaff perturbations. [Citation Graph (, )][DBLP]


  67. Truthful application-layer multicast in mesh-based selfish overlays. [Citation Graph (, )][DBLP]


  68. Wireless sensor network based model for secure railway operations. [Citation Graph (, )][DBLP]


  69. Discovery-based role activations in role-based access control. [Citation Graph (, )][DBLP]


  70. Analysis of power control for indoor wireless infrared CDMA communication. [Citation Graph (, )][DBLP]


  71. Multiple design patterns for voice over IP (VoIP) security. [Citation Graph (, )][DBLP]


  72. Excess bandwidth distribution in DiffServ networks. [Citation Graph (, )][DBLP]


  73. Cluster based approaches for end-to-end complete feedback collection in multicast. [Citation Graph (, )][DBLP]


  74. Voice over application-level multicast. [Citation Graph (, )][DBLP]


  75. Adapting connected d-hop dominating sets to topology changes in wireless ad hoc networks. [Citation Graph (, )][DBLP]


  76. AVARE: aggregated vulnerability assessment and response against zero-day exploits. [Citation Graph (, )][DBLP]


  77. Energy-efficient cooperative routing in multi-hop wireless ad hoc networks. [Citation Graph (, )][DBLP]


  78. AWARDS: an adaptive write strategy for secure local disk systems. [Citation Graph (, )][DBLP]


  79. Extending sensor network lifetime via first hop data aggregation. [Citation Graph (, )][DBLP]


  80. Total information efficiency in multihop wireless networks. [Citation Graph (, )][DBLP]


  81. Efficient server cooperation mechanism in content delivery network. [Citation Graph (, )][DBLP]


  82. The impacts of timing constraints on virtual channels multiplexing in interconnect networks. [Citation Graph (, )][DBLP]


  83. The delay distribution of IEEE 802.11e EDCA and 802.11 DCF. [Citation Graph (, )][DBLP]


  84. Overcoming the challenge of security in a mobile environment. [Citation Graph (, )][DBLP]


  85. TMS: a trust management system for access control in dynamic collaborative environments. [Citation Graph (, )][DBLP]


  86. SHARP: a new real-time scheduling algorithm to improve security of parallel applications on heterogeneous clusters. [Citation Graph (, )][DBLP]


  87. Wavelength retuning in a WDM mesh network with survivable traffic grooming. [Citation Graph (, )][DBLP]


  88. From Network Planning to Traffic Engineering for Optical VPN and Multi-Granular Random Demands. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002