The SCEAS System
Navigation Menu

Conferences in DBLP

(cse)
2009 (conf/cse/2009)


  1. Noise Injection for Search Privacy Protection. [Citation Graph (, )][DBLP]


  2. Performance Modelling and Analysis of Integrated WLANs and Internet-Access Mesh Networks. [Citation Graph (, )][DBLP]


  3. On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE Terminals. [Citation Graph (, )][DBLP]


  4. Edge Anonymity in Social Network Graphs. [Citation Graph (, )][DBLP]


  5. A Region-Based Allocation Approach for Page-Based Scratch-Pad Memory in Embedded Systems. [Citation Graph (, )][DBLP]


  6. Guanxi in the Chinese Web. [Citation Graph (, )][DBLP]


  7. Privacy-Preserving Bayesian Network for Horizontally Partitioned Data. [Citation Graph (, )][DBLP]


  8. A Trade-Off Approach to Optimal Resource Allocation Algorithm with Cache Technology in Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]


  9. Self-Tuning the Parameter of Adaptive Non-linear Sampling Method for Flow Statistics. [Citation Graph (, )][DBLP]


  10. Privacy-Preserving Multi-agent Constraint Satisfaction. [Citation Graph (, )][DBLP]


  11. Better Than Optimal: Fast Identification of Custom Instruction Candidates. [Citation Graph (, )][DBLP]


  12. Anomaly Detection in Dynamic Social Systems Using Weak Estimators. [Citation Graph (, )][DBLP]


  13. A Cognitive Approach to Achieve Fair Uplink and Downlink Utilities in Wireless Networks. [Citation Graph (, )][DBLP]


  14. Fast Inter Mode Decision Algorithm Based on the MB Activity for MPEG-2 to H.264/AVC Transcoding. [Citation Graph (, )][DBLP]


  15. FaceCloak: An Architecture for User Privacy on Social Networking Sites. [Citation Graph (, )][DBLP]


  16. Structure of Neighborhoods in a Large Social Network. [Citation Graph (, )][DBLP]


  17. A Weighted-Dissimilarity-Based Anomaly Detection Method for Mobile Wireless Networks. [Citation Graph (, )][DBLP]


  18. Dynamic Reconfigurable Shaders with Load Balancing for Embedded Graphics Processing. [Citation Graph (, )][DBLP]


  19. Adapting Privacy-Preserving Computation to the Service Provider Model. [Citation Graph (, )][DBLP]


  20. Deriving Expertise Profiles from Tags. [Citation Graph (, )][DBLP]


  21. A Novel Resource Management Scheme for Integrated Multiple Traffic Heterogeneous Systems. [Citation Graph (, )][DBLP]


  22. Real Time Multiple Object Tracking Using Tracking Matrix. [Citation Graph (, )][DBLP]


  23. A Safe RSS Approach for Securely Sharing Mobile SVG Biomedical Images for Web 2.0. [Citation Graph (, )][DBLP]


  24. Visible and IR Data Fusion Technique Using the Contourlet Transform. [Citation Graph (, )][DBLP]


  25. Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach. [Citation Graph (, )][DBLP]


  26. Probabilistic Generative Models of the Social Annotation Process. [Citation Graph (, )][DBLP]


  27. Scalable APRIORI-Based Frequent Pattern Discovery. [Citation Graph (, )][DBLP]


  28. Rotation Scheduling and Voltage Assignment to Minimize Energy for SoC. [Citation Graph (, )][DBLP]


  29. Detecting Communities from Bipartite Networks Based on Bipartite Modularities. [Citation Graph (, )][DBLP]


  30. Privacy-Enhanced Event Scheduling. [Citation Graph (, )][DBLP]


  31. Event-Driven Approach for Logic-Based Complex Event Processing. [Citation Graph (, )][DBLP]


  32. Grouping-Based Dynamic Power Management for Multi-threaded Programs in Chip-Multiprocessors. [Citation Graph (, )][DBLP]


  33. Visually and Acoustically Exploring the High-Dimensional Space of Music. [Citation Graph (, )][DBLP]


  34. Privacy Management, the Law & Business Strategies: A Case for Privacy Driven Design. [Citation Graph (, )][DBLP]


  35. Incremental Discovery of Sequential Patterns Using a Backward Mining Approach. [Citation Graph (, )][DBLP]


  36. K-Stage Pipelined Bloom Filter for Packet Classification. [Citation Graph (, )][DBLP]


  37. A Semantic Imitation Model of Social Tag Choices. [Citation Graph (, )][DBLP]


  38. t-Plausibility: Semantic Preserving Text Sanitization. [Citation Graph (, )][DBLP]


  39. A Two-Stage Bootloader to Support Multi-application Deployment and Switching in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  40. Data Distribution Methods for Communication Localization in Multi-clusters with Heterogeneous Network. [Citation Graph (, )][DBLP]


  41. A Visual Interface for Social Information Filtering. [Citation Graph (, )][DBLP]


  42. Policy-Based Malicious Peer Detection in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  43. An Analytical Model of Communication Networks in Multi-cluster Systems in the Presence of Non-uniform Traffic. [Citation Graph (, )][DBLP]


  44. Residual Time Aware Forwarding for Randomly Duty-Cycled Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  45. Equilibria and Efficiency Loss in Games on Networks. [Citation Graph (, )][DBLP]


  46. Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. [Citation Graph (, )][DBLP]


  47. Balanced and Efficient Data Placement and Replication Strategy for Distributed Backup Storage Systems. [Citation Graph (, )][DBLP]


  48. The More Relay Nodes, the More Energy Efficient? [Citation Graph (, )][DBLP]


  49. Ranking Comments on the Social Web. [Citation Graph (, )][DBLP]


  50. Tuning Evidence-Based Trust Models. [Citation Graph (, )][DBLP]


  51. MALADY: A Machine Learning-Based Autonomous Decision-Making System for Sensor Networks. [Citation Graph (, )][DBLP]


  52. Improvement on Scheduling Dependent Tasks for Grid Applications. [Citation Graph (, )][DBLP]


  53. Structure of Heterogeneous Networks. [Citation Graph (, )][DBLP]


  54. Trust Is in the Eye of the Beholder. [Citation Graph (, )][DBLP]


  55. Design of an RFID Air Protocol Filtering Technique. [Citation Graph (, )][DBLP]


  56. Fault-Tolerance Scheduling by Using Rough Set Based Multi-checkpointing on Economic Grids. [Citation Graph (, )][DBLP]


  57. Online User Activities Discovery Based on Time Dependent Data. [Citation Graph (, )][DBLP]


  58. A Trust-Based Multiagent System. [Citation Graph (, )][DBLP]


  59. Completely Distributed Low Duty Cycle Communication for Long-Living Sensor Networks. [Citation Graph (, )][DBLP]


  60. A Volunteer-Computing-Based Grid Environment for Connect6 Applications. [Citation Graph (, )][DBLP]


  61. Socio-semantic Dynamics in a Blog Network. [Citation Graph (, )][DBLP]


  62. Implementation of Rate Control in Distributed Wireless Multicast by Neural Network Prediction. [Citation Graph (, )][DBLP]


  63. Towards Automating Social Engineering Using Social Networking Sites. [Citation Graph (, )][DBLP]


  64. Integration of Mobile Agents Technology and Globus for Assisted Design and Automated Development of Grid Services. [Citation Graph (, )][DBLP]


  65. The Formation of Task-Oriented Groups: Exploring Combat Activities in Online Games. [Citation Graph (, )][DBLP]


  66. Social Inference Risk Modeling in Mobile and Social Applications. [Citation Graph (, )][DBLP]


  67. Adaptive and Intelligent Route Learning for Mobile Assets Using Geo-tracking and Context Profiles. [Citation Graph (, )][DBLP]


  68. Improvement of Directed Diffusion Protocol Based on Data Aggregation. [Citation Graph (, )][DBLP]


  69. Incremental SVM Model for Spam Detection on Dynamic Email Social Networks. [Citation Graph (, )][DBLP]


  70. An Energy Efficient Routing Protocol in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  71. Control-Channel-Reuse-Based Multiple-Channel MAC (CRM-MAC) for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  72. Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans. [Citation Graph (, )][DBLP]


  73. Evaluating the Impact of Attacks in Collaborative Tagging Environments. [Citation Graph (, )][DBLP]


  74. Privacy Requirements in Vehicular Communication Systems. [Citation Graph (, )][DBLP]


  75. Location-Based Adaptive Mobile Learning Research Framework and Topics. [Citation Graph (, )][DBLP]


  76. Analysing BitTorrent's Seeding Strategies. [Citation Graph (, )][DBLP]


  77. Community Computing: Comparisons between Rural and Urban Societies Using Mobile Phone Data. [Citation Graph (, )][DBLP]


  78. A Framework to Balance Privacy and Data Usability Using Data Degradation. [Citation Graph (, )][DBLP]


  79. Stable Bayesian Parameter Estimation for Biological Dynamical Systems. [Citation Graph (, )][DBLP]


  80. A Middleware for Controlling the Execution of Composite Services. [Citation Graph (, )][DBLP]


  81. Social Synchrony: Predicting Mimicry of User Actions in Online Social Media. [Citation Graph (, )][DBLP]


  82. A Lattice-Based Privacy Aware Access Control Model. [Citation Graph (, )][DBLP]


  83. 2T-DHT: A Two Tier DHT for Implementing Publish/Subscribe. [Citation Graph (, )][DBLP]


  84. On Performance Enhancement of Circuit Simulation Using Multithreaded Techniques. [Citation Graph (, )][DBLP]


  85. Representing Small Group Evolution. [Citation Graph (, )][DBLP]


  86. Modelling of Pseudonymity under Probabilistic Linkability Attacks. [Citation Graph (, )][DBLP]


  87. A Software Architecture-Based Framework Supporting Suggestion of Medical Surveillance Level from Classification of Electronic Patient Records. [Citation Graph (, )][DBLP]


  88. Private Buddy Search: Enabling Private Spatial Queries in Social Networks. [Citation Graph (, )][DBLP]


  89. mBrace: Action-Based Performance Monitoring of Multi-tier Web Applications. [Citation Graph (, )][DBLP]


  90. Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. [Citation Graph (, )][DBLP]


  91. Reducing Code Size by Graph Coloring Register Allocation and Assignment Algorithm for Mixed-Width ISA Processor. [Citation Graph (, )][DBLP]


  92. Multi-level Cellular Automata & Social Dynamics. [Citation Graph (, )][DBLP]


  93. Robust Translational Motion of Single-Row SPCE by the Parallel Binocular. [Citation Graph (, )][DBLP]


  94. User-centric Privacy Framework: Integrating Legal, Technological and Human Aspects into User-Adapting Systems. [Citation Graph (, )][DBLP]


  95. Mining Frequent Patterns with Gaps and One-Off Condition. [Citation Graph (, )][DBLP]


  96. Extended Social Tags: Identity Tags Meet Social Networks. [Citation Graph (, )][DBLP]


  97. Optimization of Component Connections for an Embedded Component System. [Citation Graph (, )][DBLP]


  98. An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation. [Citation Graph (, )][DBLP]


  99. An Evolutionary Approach for Multi-objective 3D Differentiated Sensor Network Deployment. [Citation Graph (, )][DBLP]


  100. Size Matters: Variation in Personal Network Size, Personality and Effect on Information Transmission. [Citation Graph (, )][DBLP]


  101. Improving Hybrid Flash-Disk Storage by Incorporating Sequential Pattern Mining into Fully-Associative Sector Translation. [Citation Graph (, )][DBLP]


  102. A Hybrid Enforcement Model for Group-centric Secure Information Sharing. [Citation Graph (, )][DBLP]


  103. Solving 0/1 Knapsack Problem for Light Communication SLA-Based Workflow Mapping Using CUDA. [Citation Graph (, )][DBLP]


  104. TagRec: Leveraging Tagging Wisdom for Recommendation. [Citation Graph (, )][DBLP]


  105. A Framework for Enforcing Constrained RBAC Policies. [Citation Graph (, )][DBLP]


  106. Distributed Agents Network for Ubiquitous Monitoring and Services Exploitation. [Citation Graph (, )][DBLP]


  107. Development and Validation of an Agent-Based Simulation Model of Juvenile Delinquency. [Citation Graph (, )][DBLP]


  108. A Coarse-Grain Parallel Genetic Algorithm for Flexible Job-Shop Scheduling with Lot Streaming. [Citation Graph (, )][DBLP]


  109. Guarantee-Based Access Control. [Citation Graph (, )][DBLP]


  110. Extended Dempster-Shafer Theory in Context Reasoning for Ubiquitous Computing Environments. [Citation Graph (, )][DBLP]


  111. Integrity Verification of Outsourced XML Databases. [Citation Graph (, )][DBLP]


  112. Using Hierarchical Bayesian Models to Learn about Reputation. [Citation Graph (, )][DBLP]


  113. Parallel Computation of Nash Equilibria in N-Player Games. [Citation Graph (, )][DBLP]


  114. GUPSS: A Gateway-Based Ubiquitous Platform for Smart Space. [Citation Graph (, )][DBLP]


  115. Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study. [Citation Graph (, )][DBLP]


  116. Web Science 2.0: Identifying Trends through Semantic Social Network Analysis. [Citation Graph (, )][DBLP]


  117. An Efficient Dynamic Load Balancing Scheme for Multi-agent System Reflecting Agent Workload. [Citation Graph (, )][DBLP]


  118. A Unified Approach to Intra-domain Security. [Citation Graph (, )][DBLP]


  119. Leveraging Computation Sharing and Parallel Processing in Location-Based Services. [Citation Graph (, )][DBLP]


  120. Social Awareness Concepts to Support Social Computing. [Citation Graph (, )][DBLP]


  121. Efficient Broadcast on Area of Interest in Voronoi Overlays. [Citation Graph (, )][DBLP]


  122. A Low-Cost Green IT Design and Application of VHSP Based on Virtualization Technology. [Citation Graph (, )][DBLP]


  123. An Agent-Based Approach to Modeling and Analysis of Safety Culture in Air Traffic. [Citation Graph (, )][DBLP]


  124. A Recommendation Framework towards Personalized Services in Intelligent Museum. [Citation Graph (, )][DBLP]


  125. Improving Host Profiling with Bidirectional Flows. [Citation Graph (, )][DBLP]


  126. Hardware Supported Multicast in 2-D Mesh InfiniBand Networks. [Citation Graph (, )][DBLP]


  127. Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets. [Citation Graph (, )][DBLP]


  128. Clustering Signature in Complex Social Networks. [Citation Graph (, )][DBLP]


  129. Nearby-Friend Discovery Protocol for Multiple Users. [Citation Graph (, )][DBLP]


  130. Energy Consumption of Residential and Professional Switches. [Citation Graph (, )][DBLP]


  131. The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism. [Citation Graph (, )][DBLP]


  132. Self-Adaptation of Fault Tolerance Requirements Using Contracts. [Citation Graph (, )][DBLP]


  133. Inferring the Maximum Likelihood Hierarchy in Social Networks. [Citation Graph (, )][DBLP]


  134. A Comparative Study of Blocking Storage Methods for Sparse Matrices on Multicore Architectures. [Citation Graph (, )][DBLP]


  135. Is the Crowd's Wisdom Biased? A Quantitative Analysis of Three Online Communities. [Citation Graph (, )][DBLP]


  136. Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. [Citation Graph (, )][DBLP]


  137. Architectural Support for Automated Software Attack Detection, Recovery, and Prevention. [Citation Graph (, )][DBLP]


  138. Social Learning Applications in Resource Constrained Networks. [Citation Graph (, )][DBLP]


  139. MCD: Mesh Closure Detection for Localized Load Balancing in Scientific Applications. [Citation Graph (, )][DBLP]


  140. How to overcome the 'Trusted Node Model' in Quantum Cryptography. [Citation Graph (, )][DBLP]


  141. Swift Mode Changes in Memory Constrained Real-Time Systems. [Citation Graph (, )][DBLP]


  142. The Influence of Personalities Upon the Dynamics of Trust and Reputation. [Citation Graph (, )][DBLP]


  143. Analysis of a Location-Based Social Network. [Citation Graph (, )][DBLP]


  144. Robust Optimization on Across-Chain Inventory Control of Cluster Supply Chains. [Citation Graph (, )][DBLP]


  145. WCET Analysis of the mC/OS-II Real-Time Kernel. [Citation Graph (, )][DBLP]


  146. Large Online Social Footprints-An Emerging Threat. [Citation Graph (, )][DBLP]


  147. Modeling User Perception of Interaction Opportunities for Effective Teamwork. [Citation Graph (, )][DBLP]


  148. VFT: An Ontology-Based Tool for Visualization and Formalization of Web Service Composition. [Citation Graph (, )][DBLP]


  149. Real Time Rectification for Stereo Correspondence. [Citation Graph (, )][DBLP]


  150. A Case Study of Individual Trust Development in Computer Mediated Collaboration Teams. [Citation Graph (, )][DBLP]


  151. Parameter Identifiability and Optimal Experimental Design. [Citation Graph (, )][DBLP]


  152. Finding Cohesive Subgroups and Relevant Members in the Nokia Friend View Mobile Social Network. [Citation Graph (, )][DBLP]


  153. On the Feasibility of Remote Attestation for Web Services. [Citation Graph (, )][DBLP]


  154. Capturing On-Line Social Network Link Dynamics Using Event-Driven Sampling. [Citation Graph (, )][DBLP]


  155. Coordinated Runtime Adaptations in Cooperative Open Real-Time Systems. [Citation Graph (, )][DBLP]


  156. High Performance Printing: Increasing Personalized Documents Rendering through PPML Jobs Profiling and Scheduling. [Citation Graph (, )][DBLP]


  157. Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures. [Citation Graph (, )][DBLP]


  158. A P2P Hierarchical Metascheduler to Obtain QoS in a Grid Economy Services. [Citation Graph (, )][DBLP]


  159. How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm. [Citation Graph (, )][DBLP]


  160. Avoiding Delay Jitter in Cyber-Physical Systems Using One Way Delay Variations Model. [Citation Graph (, )][DBLP]


  161. ProActive Caching: Generating Caching Heuristics for Business Process Environments. [Citation Graph (, )][DBLP]


  162. A Second-Order Markov Random Walk Approach for Collaborative Filtering. [Citation Graph (, )][DBLP]


  163. An Architecture for Integrating Databases with Replication Support Based on the OGSA-DAI Middleware. [Citation Graph (, )][DBLP]


  164. Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device. [Citation Graph (, )][DBLP]


  165. Towards Demarcation and Modeling of Small Sub-Communities/Groups in P2P Social Networks. [Citation Graph (, )][DBLP]


  166. Combining Attribute-Based and Access Systems. [Citation Graph (, )][DBLP]


  167. Performance Comparison of Four-Socket Server Architecture on HPC Workload. [Citation Graph (, )][DBLP]


  168. Design and Implementation of WLAN-Based Automatic Vehicle Identification. [Citation Graph (, )][DBLP]


  169. XML with Recursive Querying. [Citation Graph (, )][DBLP]


  170. Extracting Multi-facet Community Structure from Bipartite Networks. [Citation Graph (, )][DBLP]


  171. Analysis of the GMPLS Control Plane Security. [Citation Graph (, )][DBLP]


  172. An Efficient High-Dimensional Indexing Scheme Using a Clustering Technique for Content-Based Retrieval. [Citation Graph (, )][DBLP]


  173. A Tree-Structured Intelligence Entity Pool and Its Sharing among Ubiquitous Objects. [Citation Graph (, )][DBLP]


  174. Diversity in Network Attacker Motivation: A Literature Review. [Citation Graph (, )][DBLP]


  175. The Use of Online Videos in the 2008 U.S. Congressional Elections. [Citation Graph (, )][DBLP]


  176. Emergency Privacy Measures. [Citation Graph (, )][DBLP]


  177. IMBT-A Binary Tree for Efficient Support Counting of Incremental Data Mining. [Citation Graph (, )][DBLP]


  178. The Social Behaviors of Experts in Massive Multiplayer Online Role-Playing Games. [Citation Graph (, )][DBLP]


  179. A Lightweight Architecture for Secure Two-Party Mobile Payment. [Citation Graph (, )][DBLP]


  180. Designing Privacy for Scalable Electronic Healthcare Linkage. [Citation Graph (, )][DBLP]


  181. Optimization of Distributed SPARQL Queries Using Edmonds' Algorithm and Prim's Algorithm. [Citation Graph (, )][DBLP]


  182. First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. [Citation Graph (, )][DBLP]


  183. Comparison of Bank Change Mechanisms for Banked Reduced Encoding Architectures. [Citation Graph (, )][DBLP]


  184. Routing Policy Conflict Detection without Violating ISP's Privacy. [Citation Graph (, )][DBLP]


  185. An Effective Data Gathering Scheme in Heterogeneous Energy Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  186. Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGs. [Citation Graph (, )][DBLP]


  187. Optimizing Embedded Virtual Machines. [Citation Graph (, )][DBLP]


  188. Practical Values for Privacy. [Citation Graph (, )][DBLP]


  189. CA-MAC: Context Adaptive MAC Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  190. Surfing a Web of Trust: Reputation and Reciprocity on CouchSurfing.com. [Citation Graph (, )][DBLP]


  191. Phishpin: An Identity-Based Anti-phishing Approach. [Citation Graph (, )][DBLP]


  192. Spiral Grid Routing for Load Balance in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  193. Support of Paged Register Files for Improving Context Switching on Embedded Processors. [Citation Graph (, )][DBLP]


  194. Security Implications of Virtualization: A Literature Study. [Citation Graph (, )][DBLP]


  195. Virtually There: Exploring Proximity and Homophily in a Virtual World. [Citation Graph (, )][DBLP]


  196. SVM Based Hybrid Moment Features for Natural Scene Categorization. [Citation Graph (, )][DBLP]


  197. Dynamic Scratch-Pad Memory Management with Data Pipelining for Embedded Systems. [Citation Graph (, )][DBLP]


  198. ViDPSec Visual Device Pairing Security Protocol. [Citation Graph (, )][DBLP]


  199. The Altruistic Searcher. [Citation Graph (, )][DBLP]


  200. A Fast Backlight Module Luminance Inspection Method. [Citation Graph (, )][DBLP]


  201. Lightweight IDS Based on Features Selection and IDS Classification Scheme. [Citation Graph (, )][DBLP]


  202. Evaluating the Performance of a Chaos Genetic Algorithm for Solving the Network on Chip Mapping Problem. [Citation Graph (, )][DBLP]


  203. On the Design of Collective Applications. [Citation Graph (, )][DBLP]


  204. SOM-Based Hedge Ratio Estimation with Hierarchical Cluster Resampling. [Citation Graph (, )][DBLP]


  205. A Study of the Methods for Improving Internet Usage Policy Compliance. [Citation Graph (, )][DBLP]


  206. Reducing Leakage Power of JPEG Image on Asymmetric SRAM. [Citation Graph (, )][DBLP]


  207. Development of Integrated Retrieval Methods for OpenAPIs and Mash-Up Capable Services. [Citation Graph (, )][DBLP]


  208. Inferring Unobservable Inter-community Links in Large Social Networks. [Citation Graph (, )][DBLP]


  209. Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk. [Citation Graph (, )][DBLP]


  210. Social Relationship Identification: An Example of Social Query. [Citation Graph (, )][DBLP]


  211. Study on 3D Annotation in Virtual Space for Collaboration. [Citation Graph (, )][DBLP]


  212. On the Design of Flexible Real-Time Schedulers for Embedded Systems. [Citation Graph (, )][DBLP]


  213. An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002. [Citation Graph (, )][DBLP]


  214. Minesweeper for Sensor Networks-Making Event Detection in Sensor Networks Dependable. [Citation Graph (, )][DBLP]


  215. Delayed Interrupt Processing Technique for Reducing Latency of Timer Interrupt in Embedded Linux. [Citation Graph (, )][DBLP]


  216. metaViz: Visualizing Computationally Identified Metaphors in Political Blogs. [Citation Graph (, )][DBLP]


  217. Ceremonies Formal Analysis in PKI's Context. [Citation Graph (, )][DBLP]


  218. Practical Implementation of a Middleware and Software Component Architecture Supporting Reconfigurability of Real-Time Embedded Systems. [Citation Graph (, )][DBLP]


  219. An Evaluating Model for Anti-virus Ability Based on AHP. [Citation Graph (, )][DBLP]


  220. Implementing Social Norms Using Policies. [Citation Graph (, )][DBLP]


  221. Activity and Artifact Views of a Secure Software Development Process. [Citation Graph (, )][DBLP]


  222. Analysis of 2-State, 3-Neighborhood Cellular Automata Rules for Cryptographic Pseudorandom Number Generation. [Citation Graph (, )][DBLP]


  223. Usable Privacy Controls for Blogs. [Citation Graph (, )][DBLP]


  224. Blocked-Z Test for Reducing Rasterization, Z Test and Shading Workloads. [Citation Graph (, )][DBLP]


  225. A New Security Mechanism to Perform Traffic Anonymity with Dummy Traffic Synthesis. [Citation Graph (, )][DBLP]


  226. An AHP-Based Framework for Quality and Security Evaluation. [Citation Graph (, )][DBLP]


  227. A Hierarchical Primitive Lists Structure for Tile-Based Rendering. [Citation Graph (, )][DBLP]


  228. Feedback Loops of Attention in Peer Production. [Citation Graph (, )][DBLP]


  229. Assurance Process for Large Open Source Code Bases. [Citation Graph (, )][DBLP]


  230. Implementation and Evaluation of Modular Neural Networks in a Multiple Processor System on Chip to Classify Electric Disturbance. [Citation Graph (, )][DBLP]


  231. Methods for Precise False-Overlap Detection in Tile-Based Rendering. [Citation Graph (, )][DBLP]


  232. New Media Use in Context: Environmental Cues and Online Self-Disclosure via Weblogs. [Citation Graph (, )][DBLP]


  233. A New Hierarchical Network Coordinate Algorithm Based on Community Structure. [Citation Graph (, )][DBLP]


  234. Code Obfuscation Using Pseudo-random Number Generators. [Citation Graph (, )][DBLP]


  235. H-Buffer: An Efficient History-Based and Overflow Sharing Transparent Fragment Storage Method. [Citation Graph (, )][DBLP]


  236. Churn Prediction in MMORPGs: A Social Influence Based Approach. [Citation Graph (, )][DBLP]


  237. Power Efficient Large Matrices Multiplication by Load Scheduling on Multi-core and GPU Platform with CUDA. [Citation Graph (, )][DBLP]


  238. Misuse Cases + Assets + Security Goals. [Citation Graph (, )][DBLP]


  239. HyperCircle: An Efficient Broadcast Protocol for Super-Peer P2P Networks. [Citation Graph (, )][DBLP]


  240. SpamClean: Towards Spam-Free Tagging Systems. [Citation Graph (, )][DBLP]


  241. Specification of Fair Data Practice Principles Using Privacy Policy Languages. [Citation Graph (, )][DBLP]


  242. A Design Methodology for Self-Management in Distributed Environments. [Citation Graph (, )][DBLP]


  243. Caching-Based Multipath Routing Protocol. [Citation Graph (, )][DBLP]


  244. Social Authentication Protocol for Mobile Phones. [Citation Graph (, )][DBLP]


  245. Computer Simulation of the Anisotropy of Fluorescence in Ring Molecular Systems: Influence of Disorder and Ellipticity. [Citation Graph (, )][DBLP]


  246. Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model. [Citation Graph (, )][DBLP]


  247. A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless Networks. [Citation Graph (, )][DBLP]


  248. Modeling Ethno-religious Conflicts as Prisoner's Dilemma Game in Graphs. [Citation Graph (, )][DBLP]


  249. Flattened Conservative Parallel Simulator for DEVS and CELL-DEVS. [Citation Graph (, )][DBLP]


  250. A Privacy Framework for Personal Self-Improving Smart Spaces. [Citation Graph (, )][DBLP]


  251. Analysis of Vehicular Roaming through Multiple WLAN APs in Container Terminal. [Citation Graph (, )][DBLP]


  252. Supply Chain Design Model Based on Multi-supply Hubs. [Citation Graph (, )][DBLP]


  253. Whither the Experts? Social Affordances and the Cultivation of Experts in Community Q&A Systems. [Citation Graph (, )][DBLP]


  254. Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. [Citation Graph (, )][DBLP]


  255. Processing Approximate Moving Range Queries in Mobile Sensor Environments. [Citation Graph (, )][DBLP]


  256. Managing Risk of IT Security Outsourcing in the Decision-Making Stage. [Citation Graph (, )][DBLP]


  257. The Power of Grassroots Influentials: The Optimal Heterophily between Sender and Receiver. [Citation Graph (, )][DBLP]


  258. Service-Oriented Adaptation in Ubiquitous Computing Environments. [Citation Graph (, )][DBLP]


  259. Risk Perceptions of Information Security: A Measurement Study. [Citation Graph (, )][DBLP]


  260. A Model of Tacit Knowledge and Action. [Citation Graph (, )][DBLP]


  261. Rehoming Decision Algorithm: Design and Empirical Evaluation. [Citation Graph (, )][DBLP]


  262. iKnow Where You Are. [Citation Graph (, )][DBLP]


  263. Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging Problem. [Citation Graph (, )][DBLP]


  264. Managing Risks on Critical IT Systems in Public Service Organizations. [Citation Graph (, )][DBLP]


  265. Incorporating Participant Reputation in Community-Driven Question Answering Systems. [Citation Graph (, )][DBLP]


  266. Choosing Service Directory Nodes in Proposed Service Discovery Model for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  267. Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors. [Citation Graph (, )][DBLP]


  268. Expertise Modeling and Recommendation in Online Question and Answer Forums. [Citation Graph (, )][DBLP]


  269. Accumulating a Personalised Ubiquitous Learning Platform for Enhancing the Third Level Educational Experience. [Citation Graph (, )][DBLP]


  270. A Dynamic Trust Evaluation Model on C2C Marketplaces. [Citation Graph (, )][DBLP]


  271. Threat Modeling for CSRF Attacks. [Citation Graph (, )][DBLP]


  272. MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing Protocol. [Citation Graph (, )][DBLP]


  273. Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media. [Citation Graph (, )][DBLP]


  274. A Novel Approach to DRM Systems. [Citation Graph (, )][DBLP]


  275. A Hierarchical Authentication Scheme for the Different Radio Ranges Sensor Networks. [Citation Graph (, )][DBLP]


  276. A Language of Life: Characterizing People Using Cell Phone Tracks. [Citation Graph (, )][DBLP]


  277. Worm Path Identification Using Visualization System. [Citation Graph (, )][DBLP]


  278. On the Synergy of Conflict and Collective Creativity in Open Innovation Socio-technical Ecologies. [Citation Graph (, )][DBLP]


  279. Are You a Safe Driver? [Citation Graph (, )][DBLP]


  280. A Simulation of Various Variable Hacker Populations. [Citation Graph (, )][DBLP]


  281. Performance Improvement for Flash Memories Using Loop Optimization. [Citation Graph (, )][DBLP]


  282. Investigating User Experience of Online Communities: The Influence of Community Type. [Citation Graph (, )][DBLP]


  283. Efficient and Adapted Component-Based Strategies for Embedded Software Device Drivers Development. [Citation Graph (, )][DBLP]


  284. Enabling Video-Blogging without Relying on External Service-Providers. [Citation Graph (, )][DBLP]


  285. The Software and Hardware Integration Linker for Reconfigurable Embedded System. [Citation Graph (, )][DBLP]


  286. Improving Interobserver Reliability by Artificial Intelligence Techniques in Behavioural Research. [Citation Graph (, )][DBLP]


  287. Codesign of Embedded Systems with Process/Module Level Real-Time Deadlines. [Citation Graph (, )][DBLP]


  288. Health Insurance Reform in an Experimental Market: Human Subjects, Agents Combined to Study Complex Regulatory Reform Proposals. [Citation Graph (, )][DBLP]


  289. Pricing the American Option Using Reconfigurable Hardware. [Citation Graph (, )][DBLP]


  290. QoS-Aware Power Management for Energy Harvesting Wireless Sensor Network Utilizing Reinforcement Learning. [Citation Graph (, )][DBLP]


  291. Social Interaction History: A Framework for Supporting Exploration of Social Information Spaces. [Citation Graph (, )][DBLP]


  292. Prospector: Multiscale Energy Measurement of Networked Embedded Systems with Wideband Power Signals. [Citation Graph (, )][DBLP]


  293. Social Network Analysis and Geotemporal Reasoning in a Web 3.0 World. [Citation Graph (, )][DBLP]


  294. Emergence of Social Norms in Complex Networks. [Citation Graph (, )][DBLP]


  295. Self-Organized Data-Energy-Aware Clustering and Routing for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  296. Local Semi-linear Regression for River Runoff Forecasting. [Citation Graph (, )][DBLP]


  297. A New Energy-Balanced Data Aggregation Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  298. Centrality and Power among Website Users: A Social Network Analysis Application. [Citation Graph (, )][DBLP]


  299. Dispatch of Mobile Resources in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  300. Introducing Electronic Child Records: Balancing Personal Interests, System Perfomance, and Social Values. [Citation Graph (, )][DBLP]


  301. A Time & Energy Efficient Topology Discovery and Scheduling Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  302. Towards an Introduction to Collaborative Filtering. [Citation Graph (, )][DBLP]


  303. Precision Time Synchronization Using IEEE 1588 for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  304. Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery. [Citation Graph (, )][DBLP]


  305. Localization of Shipping Containers in Ports and Terminals Using Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  306. Web Page Classification Using Social Tags. [Citation Graph (, )][DBLP]


  307. A Failure Adapted, Load-Balanced Distributed Routing for Wireless Ad Hoc Sensor Networks. [Citation Graph (, )][DBLP]


  308. Davis Social Links or: How I Learned to Stop Worrying and Love the Net. [Citation Graph (, )][DBLP]


  309. Evaluation of an Adaptive PI Rate Controller for Congestion Control in Wireless Ad-Hoc/Sensor Networks. [Citation Graph (, )][DBLP]


  310. A Stigmergy Approach for Open Source Software Developer Community Simulation. [Citation Graph (, )][DBLP]


  311. Visualization of the Constrained Coverage of Mobile Sensor Networks Based on GML. [Citation Graph (, )][DBLP]


  312. Personality in Social Group Dynamics. [Citation Graph (, )][DBLP]


  313. A Resource Management System for Fault Tolerance in Grid Computing. [Citation Graph (, )][DBLP]


  314. Lending Behavior and Community Structure in an Online Peer-to-Peer Economic Network. [Citation Graph (, )][DBLP]


  315. A Distributed Reservation Protocol for Collision-Free Three-Hop Mobility Support in WiMedia MAC. [Citation Graph (, )][DBLP]


  316. Temporal Issue Trend Identifications in Blogs. [Citation Graph (, )][DBLP]


  317. Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers. [Citation Graph (, )][DBLP]


  318. Gaming On and Off the Social Graph: The Social Structure of Facebook Games. [Citation Graph (, )][DBLP]


  319. Reprogrammable Module-Linker for Energy-Efficient Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  320. Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. [Citation Graph (, )][DBLP]


  321. The Socio-cultural Factors Influencing Online Female Consumers in Saudi Arabia. [Citation Graph (, )][DBLP]


  322. Experience Search: Accessing the Emergent Knowledge from Annotated Blog Postings. [Citation Graph (, )][DBLP]


  323. Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  324. Adaptive Tourism Modeling and Socialization System. [Citation Graph (, )][DBLP]


  325. Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks. [Citation Graph (, )][DBLP]


  326. Open Editing Algorithm: A Collaborative News Promotion Algorithm Based on Users' Voting History. [Citation Graph (, )][DBLP]


  327. Designing Social Computing Using Traditions of Symbolism, Personalization, and Gift Culture. [Citation Graph (, )][DBLP]


  328. Data Deletion with Time-Aware Adversary Model. [Citation Graph (, )][DBLP]


  329. Obfuscation Mechanism in Conjunction with Tamper-Proof Module. [Citation Graph (, )][DBLP]


  330. Social Ability in Online Groups: Representing the Quality of Interactions in Social Computing Environments. [Citation Graph (, )][DBLP]


  331. TBDRM: A TPM-Based Secure DRM Architecture. [Citation Graph (, )][DBLP]


  332. A Study of Information Diffusion over a Realistic Social Network Model. [Citation Graph (, )][DBLP]


  333. A Novel Server-Based Application Execution Architecture. [Citation Graph (, )][DBLP]


  334. Modeling Human, Social, Cultural or Behavioral Events for Real World Applications: Results and Implications from the State Stability Project. [Citation Graph (, )][DBLP]


  335. Multidimensional Dynamic Trust Management for Federated Services. [Citation Graph (, )][DBLP]


  336. Security Protocol Testing Using Attack Trees. [Citation Graph (, )][DBLP]


  337. System Theoretic Formalization of Social Group Processes and Optimal Evidence-Indicator Discovery. [Citation Graph (, )][DBLP]


  338. Co-located Many-Player Gaming on Large High-Resolution Displays. [Citation Graph (, )][DBLP]


  339. Optimal LFSR-Coding Test Data Compression Based on Test Cube Dividing. [Citation Graph (, )][DBLP]


  340. Quasi-classical Semantics and Tableau Calculus of Description Logics for Paraconsistent Reasoning in the Semantic Web. [Citation Graph (, )][DBLP]


  341. Analyzing Enterprise Social Media Networks. [Citation Graph (, )][DBLP]


  342. Concurrency Control Strategy to Reduce Frequent Rollbacks in Mobile Environments. [Citation Graph (, )][DBLP]


  343. Mining and Analyzing Multirelational Social Networks. [Citation Graph (, )][DBLP]


  344. An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. [Citation Graph (, )][DBLP]


  345. Development of a Meeting Browser towards Supporting Public Involvement. [Citation Graph (, )][DBLP]


  346. A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature. [Citation Graph (, )][DBLP]


  347. A Survey of Human Computation Systems. [Citation Graph (, )][DBLP]


  348. A Multi-party Contract Signing Protocol and Its Implementation via Trusted Computing. [Citation Graph (, )][DBLP]


  349. Tag Sense Disambiguation for Clarifying the Vocabulary of Social Tags. [Citation Graph (, )][DBLP]


  350. An Anonymous Property-Based Attestation Protocol from Bilinear Maps. [Citation Graph (, )][DBLP]


  351. Predicting Interests of People on Online Social Networks. [Citation Graph (, )][DBLP]


  352. Bio-chaotic Stream Cipher-Based Iris Image Encryption. [Citation Graph (, )][DBLP]


  353. Will Networking Nerds Pay for Stuff That Matters? The Relationship between Social Networks and Subscriptions in Virtual Communities. [Citation Graph (, )][DBLP]


  354. Trust-Based Countermeasures for Securing OLSR Protocol. [Citation Graph (, )][DBLP]


  355. Names of Our Lives. [Citation Graph (, )][DBLP]


  356. Using Qtag to Extract Dominant Public Opinion in Very Large-Scale Conversation. [Citation Graph (, )][DBLP]


  357. Fault Tolerance in MANETs Using a Task-to-Resource Reallocation Framework. [Citation Graph (, )][DBLP]


  358. Study on Collective Memory in the Blogosphere. [Citation Graph (, )][DBLP]


  359. An Effective RM-Based Scheduling Algorithm for Fault-Tolerant Real-Time Systems. [Citation Graph (, )][DBLP]


  360. RepCom: Towards Reputation Composition over Peer-to-Peer Communities. [Citation Graph (, )][DBLP]


  361. Personal Management of Social Networks Data. [Citation Graph (, )][DBLP]


  362. The Effect of Trust and Perceived Risk on Consumers' Online Purchase Intention. [Citation Graph (, )][DBLP]


  363. HASS: Highly Available, Scalable and Secure Distributed Data Storage Systems. [Citation Graph (, )][DBLP]


  364. Ego-centric Network Sampling in Viral Marketing Applications. [Citation Graph (, )][DBLP]


  365. Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. [Citation Graph (, )][DBLP]


  366. Integration of User Experiences to Advancement of B2B-Software-on-Demand Systems. [Citation Graph (, )][DBLP]


  367. Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  368. Application of New A Priori Algorithm MDNC to Exchange Traded Fund. [Citation Graph (, )][DBLP]


  369. Enhancing Airline Customer Relationship Management Data by Inferring Ties between Passengers. [Citation Graph (, )][DBLP]


  370. HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments. [Citation Graph (, )][DBLP]


  371. The Benefits of Synchronized Genuine Smiles in Face-to-Face Service Encounters. [Citation Graph (, )][DBLP]


  372. Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol. [Citation Graph (, )][DBLP]


  373. DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation. [Citation Graph (, )][DBLP]


  374. A Proposal of Discovering User Interest by Support Vector Machine and Decision Tree on Document Classification. [Citation Graph (, )][DBLP]


  375. Analyzing Multi-source Social Data for Extracting and Mining Social Networks. [Citation Graph (, )][DBLP]


  376. A GEP-Based Anomaly Detection Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  377. A Study of Co-relational Personalities of the Social Network in Organization. [Citation Graph (, )][DBLP]


  378. L-UCON: Towards Layered Access Control with UCON. [Citation Graph (, )][DBLP]


  379. Information Retrieval in Wikis Using an Ontology. [Citation Graph (, )][DBLP]


  380. Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems. [Citation Graph (, )][DBLP]


  381. The Effect of Network Position and Relationship Quality on Organizational Performance-The ABW Family. [Citation Graph (, )][DBLP]


  382. A Software Based Approach for Trusted Agent Execution on Malicious Host. [Citation Graph (, )][DBLP]


  383. Concepts, Technology, and Assessment of the Social Music Game "Sync-in-Team'. [Citation Graph (, )][DBLP]


  384. Toward a Real-Time Automated Measure of Empathy and Dominance. [Citation Graph (, )][DBLP]


  385. A Smart Card Power Analysis Simulator. [Citation Graph (, )][DBLP]


  386. Reinforcement Learning of Listener Response for Mood Classification of Audio. [Citation Graph (, )][DBLP]


  387. TSGen: A UML Activity Diagram-Based Test Scenario Generation Tool. [Citation Graph (, )][DBLP]


  388. Dynamic Social Interaction in a Collective Mobile Music Performance. [Citation Graph (, )][DBLP]


  389. Lightweight Hardware Return Address and Stack Frame Tracking to Prevent Function Return Address Attack. [Citation Graph (, )][DBLP]


  390. NetBeat and Net4Tet-Networked Performance Instruments for Electroacoustic Music Students. [Citation Graph (, )][DBLP]


  391. Sharing Application Sessions for Peer-to-Peer Learning. [Citation Graph (, )][DBLP]


  392. RBAC-Based Secure Interoperation Using Constraint Logic Programming. [Citation Graph (, )][DBLP]


  393. Web2.0 Tools to Support the Instructional Method "Thinking Actively in a Creative Environment". [Citation Graph (, )][DBLP]


  394. Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  395. Approach for Name Ambiguity Problem Using a Multiple-Layer Clustering. [Citation Graph (, )][DBLP]


  396. HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management. [Citation Graph (, )][DBLP]


  397. Let's Meet: Integrating Social and Learning Worlds. [Citation Graph (, )][DBLP]


  398. A Decision Support System for Institutional Research Management in Higher Education: Data Mining to Determine Research Focus, Intensity and Synergy. [Citation Graph (, )][DBLP]


  399. Autonomous Management and Control of Sensor Network-Based Applications. [Citation Graph (, )][DBLP]


  400. Online Presence in Adaptive Learning on the Social Semantic Web. [Citation Graph (, )][DBLP]


  401. Intelligent Middleware for Adaptive Sensing of Tennis Coaching Sessions. [Citation Graph (, )][DBLP]


  402. Design of a Platform of Popular Science Education Based on Social Computing. [Citation Graph (, )][DBLP]


  403. Petri Net Based Reconfigurable Wireless Sensor Networks for Intelligent Monitoring Systems. [Citation Graph (, )][DBLP]


  404. Architecture Synthesis Methodology for Run-Time Reconfigurable Systems. [Citation Graph (, )][DBLP]


  405. Spurring Design Thinking through Educational Weblogging. [Citation Graph (, )][DBLP]


  406. Designing to Attract Participation in a Niche Community for Women in Science & Engineering. [Citation Graph (, )][DBLP]


  407. Run-Time Component Relocation in Partially-Reconfigurable FPGAs. [Citation Graph (, )][DBLP]


  408. SCI: Towards a Social Collaborative Integrated Development Environment. [Citation Graph (, )][DBLP]


  409. Efficient Translation of Algorithmic Kernels on Large-Scale Multi-cores. [Citation Graph (, )][DBLP]


  410. An Empirical Study of Research Collaboration Using Social Network Analysis. [Citation Graph (, )][DBLP]


  411. Multi-objective Placement of Reconfigurable Hardware Tasks in Real-Time System. [Citation Graph (, )][DBLP]


  412. From Reconfigurable Architectures to Self-Adaptive Autonomic Systems. [Citation Graph (, )][DBLP]


  413. Ambulation: A Tool for Monitoring Mobility Patterns over Time Using Mobile Phones. [Citation Graph (, )][DBLP]


  414. The Impact of Human Mobility on Spatial Disease Dynamics. [Citation Graph (, )][DBLP]


  415. A Fast H.264 Spatial Downscaling Transcoder for Wireless Communication. [Citation Graph (, )][DBLP]


  416. Scaling Behaviors in the Communication Network between Cities. [Citation Graph (, )][DBLP]


  417. Link-Aware Geographic Routing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  418. The Importance of Data Collection for Modelling Contact Networks. [Citation Graph (, )][DBLP]


  419. A Congestion Control Framework for Handling Video Surveillance Traffics on WSN. [Citation Graph (, )][DBLP]


  420. Investigating Bimodal Clustering in Human Mobility. [Citation Graph (, )][DBLP]


  421. Mining Mobility Behavior from Trajectory Data. [Citation Graph (, )][DBLP]


  422. Research on an Improved Genetic Algorithm Which Can Improve the Node Positioning Optimized Solution of Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  423. Decentralized Detection of Group Formations from Wearable Acceleration Sensors. [Citation Graph (, )][DBLP]


  424. A Self-Similarity Frame Traffic Model Based on the Frame Components in 802.11 Networks. [Citation Graph (, )][DBLP]


  425. Touch Me Wear: Getting Physical with Social Networks. [Citation Graph (, )][DBLP]


  426. Cross-Layer Optimized Data Gathering in Wireless Multimedia Sensor Networks. [Citation Graph (, )][DBLP]


  427. Sensor-Based Feedback Systems in Organizational Computing. [Citation Graph (, )][DBLP]


  428. Prediction and Key Computer Programming of Mechanical Properties of Hot Rolled Plate Based on BP Neural Network. [Citation Graph (, )][DBLP]


  429. All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks. [Citation Graph (, )][DBLP]


  430. Efficient UDD Architecture for Underwater Wireless Acoustic Sensor Network. [Citation Graph (, )][DBLP]


  431. Privacy in Online Social Networking at Workplace. [Citation Graph (, )][DBLP]


  432. An Underwater Communication Modem Using TMS320C6416 DSK. [Citation Graph (, )][DBLP]


  433. Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens. [Citation Graph (, )][DBLP]


  434. Neighbor Nodes Aware MAC Scheduling Scheme in Underwater Acoustic Sensor Networks. [Citation Graph (, )][DBLP]


  435. Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites. [Citation Graph (, )][DBLP]


  436. Design of OFDM System for High Speed Underwater Communication. [Citation Graph (, )][DBLP]


  437. Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0. [Citation Graph (, )][DBLP]


  438. An Improved Chinese Segmentation Algorithm Based on New Dictionary Construction. [Citation Graph (, )][DBLP]


  439. Trust Inference in Complex Trust-Oriented Social Networks. [Citation Graph (, )][DBLP]


  440. Network Bandwidth Allocation Based on QoS in iSCSI OSD Storage System. [Citation Graph (, )][DBLP]


  441. Wireless ECG Monitoring System Based on OMAP. [Citation Graph (, )][DBLP]


  442. Security and Trust through Electronic Social Network-Based Interactions. [Citation Graph (, )][DBLP]


  443. Routing in 802.11-Based Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  444. Witness-Based Collusion and Trust-Aware Societies. [Citation Graph (, )][DBLP]


  445. An Improved SPECK Algorithm with Bit Plane Lifting and the Optimal Single Value Prediction. [Citation Graph (, )][DBLP]


  446. Enabling Privacy as a Fundamental Construct for Social Networks. [Citation Graph (, )][DBLP]


  447. A Research on the Self-Applicable Network Virtual Storage Data Distribution Arithmetic. [Citation Graph (, )][DBLP]


  448. Automated Murmurs: The Social Mobile Tourist Application. [Citation Graph (, )][DBLP]


  449. Mobile Agent-Based Data Gathering for Web Image Retrieval. [Citation Graph (, )][DBLP]


  450. The Circles of Latitude: Adoption and Usage of Location Tracking in Online Social Networking. [Citation Graph (, )][DBLP]


  451. A Videoconference System on the Campus Networks Based on H.323 Protocol. [Citation Graph (, )][DBLP]


  452. Quantifying Reciprocity in Social Networks. [Citation Graph (, )][DBLP]


  453. Edge Detection Based on Fast Adaptive Mean Shift Algorithm. [Citation Graph (, )][DBLP]


  454. Solutions to Security and Privacy Issues in Mobile Social Networking. [Citation Graph (, )][DBLP]


  455. Implementation of Unlimited Integer. [Citation Graph (, )][DBLP]


  456. Where Information Searches for You: The Visible Past Ubiquitous Knowledge Environment for Digital Humanities. [Citation Graph (, )][DBLP]


  457. Ride Comfort Simulation Based on the Vibration Characteristics of the Two-Mass System of Vehicle Body and Wheels. [Citation Graph (, )][DBLP]


  458. Has Anyone Seen My Goose? Social Network Services in Developing Regions. [Citation Graph (, )][DBLP]


  459. An Analysis and Hierarchical Decomposition for HAMs. [Citation Graph (, )][DBLP]


  460. Information Technology Capabilities for Digital Social Networks. [Citation Graph (, )][DBLP]


  461. Computer Calculation and Plotting on Dynamical Phase Diagrams of Carbon Steel. [Citation Graph (, )][DBLP]


  462. Social Tagging in Query Expansion: A New Way for Personalized Web Search. [Citation Graph (, )][DBLP]


  463. A Survey on Fault-Tolerance in Distributed Network Systems. [Citation Graph (, )][DBLP]


  464. Time Critical Content Delivery Using Predictable Patterns in Mobile Social Networks. [Citation Graph (, )][DBLP]


  465. A Hybrid Computational Approach for the Prediction of Small Non-coding RNAs from Genome Sequences. [Citation Graph (, )][DBLP]


  466. Information Flow and Search in Unstructured Keyword Based Social Networks. [Citation Graph (, )][DBLP]


  467. A New Computational Tool for the Post Session Analysis of the Prepulse Inhibition Test in Neural Science. [Citation Graph (, )][DBLP]


  468. WiFi-Based Telemedicine System: Signal Accuracy and Security. [Citation Graph (, )][DBLP]


  469. Ubiquitous Monitoring and Human Behaviour in Intelligent Pervasive Spaces. [Citation Graph (, )][DBLP]


  470. Fast Fusion of Medical Images Based on Bayesian Risk Minimization and Pixon Map. [Citation Graph (, )][DBLP]


  471. The Geolocation of Web Logs from Textual Clues. [Citation Graph (, )][DBLP]


  472. Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications. [Citation Graph (, )][DBLP]


  473. Identifying Connectors and Communities: Understanding Their Impacts on the Performance of a DTN Publish/Subscribe System. [Citation Graph (, )][DBLP]


  474. Using Converging Technology to Bring Social Networking to Commerce. [Citation Graph (, )][DBLP]


  475. Real World Routing Using Virtual World Information. [Citation Graph (, )][DBLP]


  476. Socially Enhanced Network Address Translation. [Citation Graph (, )][DBLP]


  477. Diverse Routing: Exploiting Social Behavior for Routing in Delay-Tolerant Networks. [Citation Graph (, )][DBLP]


  478. A Network-Aware Distributed Membership Protocol for Collaborative Defense. [Citation Graph (, )][DBLP]


  479. Role of Game Models in Social Networks. [Citation Graph (, )][DBLP]


  480. Social Networks' XSS Worms. [Citation Graph (, )][DBLP]


  481. Delivery Rate and Routing Overhead Analysis with Salvage in Collaborative On-Line Game Playing. [Citation Graph (, )][DBLP]


  482. Social Area Networks: Data Networking of the People, by the People, for the People. [Citation Graph (, )][DBLP]


  483. Satisficing the Masses: Applying Game Theory to Large-Scale, Democratic Decision Problems. [Citation Graph (, )][DBLP]


  484. Constructing a Virtual World as a Research Tool: Lessons Learned from the First Iteration in the Development of Greenland. [Citation Graph (, )][DBLP]


  485. Application and Evaluation of Analytic Gaming. [Citation Graph (, )][DBLP]


  486. Avatars in Analytical Gaming. [Citation Graph (, )][DBLP]


  487. ASC: A Proposed Architecture for Computing a Social Capital Gaming Metric. [Citation Graph (, )][DBLP]


  488. Validation of Sociocultural Models and Meta-Models via Serious Games. [Citation Graph (, )][DBLP]


  489. Gaming to Predict Human Responses to Mass Casualty Events: An Approach for Quick Look Tools for Pandemic Influenza. [Citation Graph (, )][DBLP]


  490. Inferring Player Rating from Performance Data in Massively Multiplayer Online Role-Playing Games (MMORPGs). [Citation Graph (, )][DBLP]


  491. Mathematical Modeling of Social Games. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002