The SCEAS System
Navigation Menu

Conferences in DBLP

2007 (conf/infoscale/2007)

  1. RTOIN: a new scalable optical interconnection network. [Citation Graph (, )][DBLP]

  2. Load-balancing and caching for collection selection architectures. [Citation Graph (, )][DBLP]

  3. Inferring and visualizing topological structures of large-scale complex network. [Citation Graph (, )][DBLP]

  4. Peer-to-peer replication with preferences. [Citation Graph (, )][DBLP]

  5. P2P file sharing networks allowing participants to freely assign structured meta-data to files. [Citation Graph (, )][DBLP]

  6. OntoZilla: an ontology-based, semi-structured, and evolutionary peer-to-peer network for information systems and services. [Citation Graph (, )][DBLP]

  7. A study of scalable search algorithm on unstructured P2P system. [Citation Graph (, )][DBLP]

  8. Research and implementation of a scalable P2P-C/S hybrid architecture and system. [Citation Graph (, )][DBLP]

  9. DHMT: a scalable and efficient hybrid application-layer multicast protocol. [Citation Graph (, )][DBLP]

  10. Brief account of multilayer portal model for information grid. [Citation Graph (, )][DBLP]

  11. PS-GIS: personalized and semantics-based grid information services. [Citation Graph (, )][DBLP]

  12. Grid workflow scheduling based on reliability cost. [Citation Graph (, )][DBLP]

  13. A decentralized quickest response algorithm for grid service discovery. [Citation Graph (, )][DBLP]

  14. Query-driven indexing for scalable peer-to-peer text retrieval. [Citation Graph (, )][DBLP]

  15. SDI: a swift tree structure for multi-dimensional data indexing in peer-to-peer networks. [Citation Graph (, )][DBLP]

  16. Contention-based performance evaluation of multidimensional range search in peer-to-peer networks. [Citation Graph (, )][DBLP]

  17. A trust domain management schema for multiple grid environments. [Citation Graph (, )][DBLP]

  18. Connectivity of mobile ad hoc sensor networks for vehicles. [Citation Graph (, )][DBLP]

  19. A hybrid range-free localization scheme in wireless sensor networks work in progress. [Citation Graph (, )][DBLP]

  20. A methodology for P2P traffic measurement using application signature work-in-progress. [Citation Graph (, )][DBLP]

  21. Data description and data access mechanism in distributed workflow system. [Citation Graph (, )][DBLP]

  22. An adaptive admission control policy for geographically distributed web systems. [Citation Graph (, )][DBLP]

  23. BUST: enabling scalable service orchestration. [Citation Graph (, )][DBLP]

  24. An agent-based decentralised process management framework for web service composition. [Citation Graph (, )][DBLP]

  25. Two extensions of service description to enhance the scalability of SOA. [Citation Graph (, )][DBLP]

  26. Evaluation study of a distributed caching based on query similarity in a P2P network. [Citation Graph (, )][DBLP]

  27. A fault tolerant and energy efficient routing protocol for urban sensor networks. [Citation Graph (, )][DBLP]

  28. Scalable keyword search based on semantic in DHT based peer-to-peer system. [Citation Graph (, )][DBLP]

  29. Adaptive semantic measurement for information filtering. [Citation Graph (, )][DBLP]

  30. Anysee2: an auto load balance P2P live streaming system with hybrid architecture. [Citation Graph (, )][DBLP]

  31. ADJSA: an adaptable dynamic job scheduling approach based on historical information. [Citation Graph (, )][DBLP]

  32. PMT: a generic object-oriented parallel multithread programming interface. [Citation Graph (, )][DBLP]

  33. MPUS: a scalable parallel simulator for RedNeurons parallel computer. [Citation Graph (, )][DBLP]

  34. Convergent SparseDT topology control protocol in dense sensor networks. [Citation Graph (, )][DBLP]

  35. Exploiting data correlation for multi-scale processing in sensor networks. [Citation Graph (, )][DBLP]

  36. Wireless sensor network aided search and rescue in trails. [Citation Graph (, )][DBLP]

  37. Fast detection of database system abuse behaviors based on data mining approach. [Citation Graph (, )][DBLP]

  38. A scalable sampling scheme for clustering in network traffic analysis. [Citation Graph (, )][DBLP]

  39. Acquisition of rule-based knowledge for analyzing DNA-binding sites in proteins. [Citation Graph (, )][DBLP]

  40. A model-based WiFi localization method. [Citation Graph (, )][DBLP]

  41. An evolution-based cache scheme for scalable mobile data access. [Citation Graph (, )][DBLP]

  42. Wireless fire monitoring system for ancient buildings. [Citation Graph (, )][DBLP]

  43. Mining query logs to optimize index partitioning in parallel web search engines. [Citation Graph (, )][DBLP]

  44. Spatial clustering with obstacles constraints using particle swarm optimization. [Citation Graph (, )][DBLP]

  45. Exploring lattice structures in mining multi-domain sequential patterns. [Citation Graph (, )][DBLP]

  46. Ontology driven adaptive data processing in wireless sensor networks. [Citation Graph (, )][DBLP]

  47. Polar: an efficient finding nearest neighbor algorithm for overlay network. [Citation Graph (, )][DBLP]

  48. Finding aggregate nearest neighbor efficiently without indexing. [Citation Graph (, )][DBLP]

  49. A Top-K-based cache model for deep web query. [Citation Graph (, )][DBLP]

  50. Efficient processing of branch queries for high-performance XML filtering. [Citation Graph (, )][DBLP]

  51. A framework of semantic cache for secure XML query answering: an interesting joint and novel perspective. [Citation Graph (, )][DBLP]

  52. DUMAX: a dual mode algebra for XML queries. [Citation Graph (, )][DBLP]

  53. Holistically processing XML twig queries with AND, OR, and NOT predicates. [Citation Graph (, )][DBLP]

  54. A new group rekeying scheme based on t-packing designs for ad hoc networks. [Citation Graph (, )][DBLP]

  55. ISA: a source code static vulnerability detection system based on data fusion. [Citation Graph (, )][DBLP]

  56. A dubiety-determining based model for database cumulated anomaly intrusion. [Citation Graph (, )][DBLP]

  57. An answer passage retrieval strategy for web-based question answering. [Citation Graph (, )][DBLP]

  58. A punishment/reward based approach to ranking. [Citation Graph (, )][DBLP]

  59. An improved cluster-based P2P multicasting approach. [Citation Graph (, )][DBLP]

  60. Hill-down strategy based DENsity CLUstEring and its application to medical image data. [Citation Graph (, )][DBLP]

  61. Heuristic learning of rules for information extraction from web documents. [Citation Graph (, )][DBLP]

  62. Citation data clustering for author name disambiguation. [Citation Graph (, )][DBLP]

  63. Comparing different units for query translation in Chinese cross-language information retrieval. [Citation Graph (, )][DBLP]

  64. A polymorphic shellcode detection mechanism in the network. [Citation Graph (, )][DBLP]

  65. Mitigating distributed denial-of-service attacks using network connection control charts. [Citation Graph (, )][DBLP]

  66. A verifiably encrypted signature scheme with strong unforgeability. [Citation Graph (, )][DBLP]

  67. A flexible mandatory access control policy for XML databases. [Citation Graph (, )][DBLP]

  68. Privacy-preserving statistical quantitative rules mining. [Citation Graph (, )][DBLP]

  69. A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. [Citation Graph (, )][DBLP]

  70. An e-mail signature protocol for anti-spam work-in-progress. [Citation Graph (, )][DBLP]

  71. Detecting early worm propagation based on entropy. [Citation Graph (, )][DBLP]

  72. Detection of steganographic information in tags of webpage. [Citation Graph (, )][DBLP]

  73. Privacy-preserving collision detection of two circles. [Citation Graph (, )][DBLP]

  74. Privacy-preserving technology and its applications in statistics measurements. [Citation Graph (, )][DBLP]

  75. A complete and efficient strategy based on petri net in automated trust negotiation. [Citation Graph (, )][DBLP]

  76. Scalable problem localization for distributed systems: principles and practices. [Citation Graph (, )][DBLP]

  77. Extremal search of decision policies for scalable distributed applications. [Citation Graph (, )][DBLP]

  78. Distributed hash table based design of Soft System Buses. [Citation Graph (, )][DBLP]

  79. A compositional symbolic verification framework for concurrent software. [Citation Graph (, )][DBLP]

  80. Video denoising using spatio-temporal filtering. [Citation Graph (, )][DBLP]

  81. Agent-oriented ontology for monitoring and detecting money laundering process. [Citation Graph (, )][DBLP]

  82. A distributed incremental nearest neighbor algorithm. [Citation Graph (, )][DBLP]

  83. A parallel LCS algorithm for biosequences alignment. [Citation Graph (, )][DBLP]

  84. A new smoothed fair scheduling algorithm based on timeslot reservation. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002