The SCEAS System
Navigation Menu

Conferences in DBLP

(nbis)
2009 (conf/nbis/2009)


  1. Evaluation of Purpose Mark Releasing Protocol for Purpose-based Marking (PM) Protocol. [Citation Graph (, )][DBLP]


  2. Timeliness and QoS Aware Packet Scheduling for Next Generation Networks. [Citation Graph (, )][DBLP]


  3. A Proactive Fault Resilient Overlay Multicast for Media Streaming. [Citation Graph (, )][DBLP]


  4. Enhancing Simulation Mode Operation of ospfd. [Citation Graph (, )][DBLP]


  5. Consistency Based Approach for Agreement Achievement among Peers. [Citation Graph (, )][DBLP]


  6. Experimental Results and Evaluation of SmartBox Stimulation Device in a P2P E-learning System. [Citation Graph (, )][DBLP]


  7. Minimizing Power Consumption with Performance Efficiency Constraint in Web Server Clusters. [Citation Graph (, )][DBLP]


  8. A Selective Update Propagation Based on Degree of Data Update in Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  9. A Semantic P2P Overlay Network for Web Service Discovery. [Citation Graph (, )][DBLP]


  10. Improvement of a Worker's Motion Trace System Using a Terrestrial Magnetism Sensor. [Citation Graph (, )][DBLP]


  11. Pervasive Scene Map on Wireless Devices for City Navigation. [Citation Graph (, )][DBLP]


  12. A Mobile Graphics System for Ubiquitous Environment. [Citation Graph (, )][DBLP]


  13. The Complexity of Context in Mobile Information Systems. [Citation Graph (, )][DBLP]


  14. Parameter Tuning of JXTA-Based P2P Platforms. [Citation Graph (, )][DBLP]


  15. Towards Scalable Simulation of Large Scale Distributed Systems. [Citation Graph (, )][DBLP]


  16. HAP - A Heterogeneous Ad hoc Protocol. [Citation Graph (, )][DBLP]


  17. Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  18. A Survey on Bandwidth Resource Allocation and Scheduling in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  19. Energy Aware Adaptive Clustering for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  20. An Agent Based Layered Framework to Facilitate Intelligent Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  21. Per-Connection Return Routability Test in Mobile IPv6. [Citation Graph (, )][DBLP]


  22. A Survey of Internet Mobility. [Citation Graph (, )][DBLP]


  23. H-WSNMS: A Web-Based Heterogeneous Wireless Sensor Networks Management System Architecture. [Citation Graph (, )][DBLP]


  24. Event Coverage in Sparse Mobile Sensor Networks. [Citation Graph (, )][DBLP]


  25. A Mobile Personalized RFID System. [Citation Graph (, )][DBLP]


  26. An Implementation of Traffic Light System Using Multi-hop Ad hoc Networks. [Citation Graph (, )][DBLP]


  27. A Context-Aware Framework to Enable Adaptation in Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  28. A Survey of Security Middleware for Pervasive and Ubiquitous Systems. [Citation Graph (, )][DBLP]


  29. A Referral Approach to Finding Medical Informatics Reviewers. [Citation Graph (, )][DBLP]


  30. Hypotheses Generation Pertaining to Ayurveda Using Automated Vocabulary Generation and Transitive Text Mining. [Citation Graph (, )][DBLP]


  31. Non-exhaustive Learning for Bacteria Detection. [Citation Graph (, )][DBLP]


  32. A Security Framework for JXTA-Overlay. [Citation Graph (, )][DBLP]


  33. SRJE: Decentralized Authentication Scheme against Sybil Attacks. [Citation Graph (, )][DBLP]


  34. Reasonable Security by Effective Risk Management Practices: From Theory to Practice. [Citation Graph (, )][DBLP]


  35. Multicasting Key Management in Wireless Networks. [Citation Graph (, )][DBLP]


  36. A Membership-Oriented Group Key Management for Application Services. [Citation Graph (, )][DBLP]


  37. An Attack-Resilient Channel Assignment MAC Protocol. [Citation Graph (, )][DBLP]


  38. SSL Connection Failover in Web Clusters and its Evaluation. [Citation Graph (, )][DBLP]


  39. Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol. [Citation Graph (, )][DBLP]


  40. Embedded Soft Processor for Sensor Networks. [Citation Graph (, )][DBLP]


  41. Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison. [Citation Graph (, )][DBLP]


  42. An Indirect Proactive Handoff Scheme Using Location Information. [Citation Graph (, )][DBLP]


  43. Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks. [Citation Graph (, )][DBLP]


  44. Toward Ontology-Driven Omics Data Integration in Current Database Management Systems. [Citation Graph (, )][DBLP]


  45. Bridging Text Mining and Bayesian Networks. [Citation Graph (, )][DBLP]


  46. Visualizing a Correlative Multi-level Graph of Biology Entity Interactions. [Citation Graph (, )][DBLP]


  47. Privacy Preserving Portable Health Record (P^3HR). [Citation Graph (, )][DBLP]


  48. Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  49. Orthogonal Expansion of Port-scanning Packets. [Citation Graph (, )][DBLP]


  50. Performance Evaluation of a MANET Tested for Different Topologies. [Citation Graph (, )][DBLP]


  51. Performance Analysis of OLSR Protocol for Wireless Sensor Networks and Comparison Evaluation with AODV Protocol. [Citation Graph (, )][DBLP]


  52. Disjointed Conflict Free Address Auto-Configuration for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  53. Investigation and Implementation of Border Nodes in S-MAC. [Citation Graph (, )][DBLP]


  54. A Textbook Editor Based on a Customware Service. [Citation Graph (, )][DBLP]


  55. A Proposal and Trial on a Model of a Motion Monitor System for a Ski Jumper Using Terrestrial Magnetism and Acceleration Sensors. [Citation Graph (, )][DBLP]


  56. Development of Web Counseling System. [Citation Graph (, )][DBLP]


  57. Angular Mobility Assisted Coverage in Directional Sensor Networks. [Citation Graph (, )][DBLP]


  58. Applying the Service-Oriented Architecture for Network Discovery and Selection in the Next Generation Wireless Mobile Networks. [Citation Graph (, )][DBLP]


  59. LITS: Lightweight Intelligent Traffic Simulator. [Citation Graph (, )][DBLP]


  60. Web-Disk-Based Efficient Application Delivery Method for Grids. [Citation Graph (, )][DBLP]


  61. Analysis of Web Alert Models. [Citation Graph (, )][DBLP]


  62. A Middleware Architecture for Web Information Reuse. [Citation Graph (, )][DBLP]


  63. Genetic Algorithm for QoS-Aware Web Service Selection Based on Chaotic Sequences. [Citation Graph (, )][DBLP]


  64. Multiple Micro Virtual Disks for Constructing Large-scale Storage. [Citation Graph (, )][DBLP]


  65. Energy-Efficient Computation Models for Distributed Systems. [Citation Graph (, )][DBLP]


  66. A Log Management System for Internal Control. [Citation Graph (, )][DBLP]


  67. Evaluation of Stateful Reliability Counter in Small-World Cellular Neural Networks. [Citation Graph (, )][DBLP]


  68. Run-time Updating of Network Device Drivers. [Citation Graph (, )][DBLP]


  69. Combining N-ary RAID to RAID MP. [Citation Graph (, )][DBLP]


  70. Applied System of the Social Life Log for Ecological Lifestyle in the Home. [Citation Graph (, )][DBLP]


  71. A Conceptual Framework for Modelling Service Value Creation Networks. [Citation Graph (, )][DBLP]


  72. The Concept of Web Service Versioning in Provenance. [Citation Graph (, )][DBLP]


  73. Astro-WISE: Tracing and Using Lineage for Scientific Data Processing. [Citation Graph (, )][DBLP]


  74. A Multi-Tier Provenance Model for Global Climate Research. [Citation Graph (, )][DBLP]


  75. Supporting Data Regeneration in Integrated Rule Based Storage System. [Citation Graph (, )][DBLP]


  76. Motion Generation System Using Interactive Evolutionary Computation and Signal Processing. [Citation Graph (, )][DBLP]


  77. Selection of Relevant Parameters Based on Conflict. [Citation Graph (, )][DBLP]


  78. Multiresolution Learning on Neural Network Classifiers: A Systematic Approach. [Citation Graph (, )][DBLP]


  79. Balls Hierarchy: A Proximity Query for Metric Spaces and Covering Theorem. [Citation Graph (, )][DBLP]


  80. A Fuzzy Inference Model for Risk based Informed Decision-Making in e-Business. [Citation Graph (, )][DBLP]


  81. Real-Time Public Group Collaboration using IP Multicast Label Filters. [Citation Graph (, )][DBLP]


  82. Self-stabilized Flocking of a Group of Mobile Robots under Memory Corruption. [Citation Graph (, )][DBLP]


  83. A Client-Server Architecture for Context-Aware Search Application. [Citation Graph (, )][DBLP]


  84. A Configuration Method for Structured P2P Overlay Network Considering Delay Variations. [Citation Graph (, )][DBLP]


  85. Community Based P2P Video Streaming Service by Networked Consumer Electronics. [Citation Graph (, )][DBLP]


  86. A Method for Syncronous Transmissions with Exposing Terminal on the Basis of Overheating RTS Header Information. [Citation Graph (, )][DBLP]


  87. A Comparison Study of Two Fuzzy-Based Handover Systems for Avoiding Ping-Pong Effect in Wireless Cellular Networks. [Citation Graph (, )][DBLP]


  88. Locals Search Algorithms for Efficient Router Nodes Placement in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  89. A New Method for Improving MAC Level Broadcast Receive Ratio Using 2-Phase RTS/CTS Handshakes Sequence. [Citation Graph (, )][DBLP]


  90. Challenges in the Development of Mobile Applications in Industrial Field Service. [Citation Graph (, )][DBLP]


  91. Power Saving Cognitive Radio LANs for Disaster Information. [Citation Graph (, )][DBLP]


  92. Processing of Low Level Signals in Mixed Signal Environment - A Hardware Design for Better Performance. [Citation Graph (, )][DBLP]


  93. Reducing Total Energy Consumption with Collaboration between Network and End Systems. [Citation Graph (, )][DBLP]


  94. Tele-Immersion Environment for Video Avatar Based CVE. [Citation Graph (, )][DBLP]


  95. Study on Realistic Communication Technology with Tiled Displays Wall. [Citation Graph (, )][DBLP]


  96. Decision Model for a System to Start Communicating with a Human Using HMM. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002