The SCEAS System
Navigation Menu

Conferences in DBLP

(nas)
2007 (conf/nas/2007)


  1. Design of NIC Based on I/O Processor for Cluster Interconnect Network. [Citation Graph (, )][DBLP]


  2. Simplified Multi-Ported Cache in High Performance Processor. [Citation Graph (, )][DBLP]


  3. The bi-panconnectivity of the hypercube. [Citation Graph (, )][DBLP]


  4. The Implementation and Design of a Low-Power Clock Distribution Microarchitecture. [Citation Graph (, )][DBLP]


  5. More Efficient Mechanism of Topology-Aware Overlay Construction in Application-Layer Multicast. [Citation Graph (, )][DBLP]


  6. MLCC: A Multi Layered Correlative Control Mechanism for the VPN Topology. [Citation Graph (, )][DBLP]


  7. The Dynamic Endpoint-Based Access Control Model on VPN. [Citation Graph (, )][DBLP]


  8. Routing Protocols Based on Double Auction for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  9. A Novel Cooperative Caching Scheme for Wireless Ad Hoc Networks: GroupCaching. [Citation Graph (, )][DBLP]


  10. An Optimal MPLS-TE Solution to Route Selection and Redistribution on Congested Networks. [Citation Graph (, )][DBLP]


  11. An Improved Designated-Verifier Proxy Signature Scheme. [Citation Graph (, )][DBLP]


  12. PKI-Based Authentication Mechanisms in Grid Systems. [Citation Graph (, )][DBLP]


  13. Assessing Attack Threat by the Probability of Following Attacks. [Citation Graph (, )][DBLP]


  14. Mitigating Denial of Capability with An Notification Mechanism. [Citation Graph (, )][DBLP]


  15. HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast. [Citation Graph (, )][DBLP]


  16. Discovering Novel Multistage Attack Patterns in Alert Streams. [Citation Graph (, )][DBLP]


  17. Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing. [Citation Graph (, )][DBLP]


  18. Mining Moving Patterns Based on Frequent Patterns Growth in Sensor Networks. [Citation Graph (, )][DBLP]


  19. An Active Region-based Storage Mechanism in Large Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  20. A Novel Network Management Architecture for Self-organizing Network. [Citation Graph (, )][DBLP]


  21. A Peer-To-Peer Traffic Identification Method Using Machine Learning. [Citation Graph (, )][DBLP]


  22. GSM-R: A Hybrid Scheduling Approach to Dynamic Load Balancing in Hierarchical Cluster of Servers. [Citation Graph (, )][DBLP]


  23. Software Fault Localization Based on Testing Requirement and Program Slice. [Citation Graph (, )][DBLP]


  24. An Efficient SAN-Level Caching Method Based on Chunk-Aging. [Citation Graph (, )][DBLP]


  25. FTRAID: A Fat-tree Based Parallel Storage Architecture for Very Large Disk Array. [Citation Graph (, )][DBLP]


  26. A New Data Format and a New Error Control Scheme for Optical-Storage Systems. [Citation Graph (, )][DBLP]


  27. iSAN: Storage Area Network Management Modeling Simulation. [Citation Graph (, )][DBLP]


  28. Dynamics Process of Long-running Allocation/Collection in Linear Storage Space. [Citation Graph (, )][DBLP]


  29. A New Method of Pefetching I/O Requests. [Citation Graph (, )][DBLP]


  30. Performance Evaluation of A Load Self-Balancing Method for Heterogeneous Metadata Server Cluster Using Trace-Driven and Synthetic Workload Simulation. [Citation Graph (, )][DBLP]


  31. DiskGroup: Energy Efficient Disk Layout for RAID1 Systems. [Citation Graph (, )][DBLP]


  32. M2SI: An Improved Coherency Protocol in CMP. [Citation Graph (, )][DBLP]


  33. An Adaptive Arbitration Algorithm for SoC Bus. [Citation Graph (, )][DBLP]


  34. The System Design and Performance Analysis of WiMAX Base Station MAC Based on Intel Network Processor. [Citation Graph (, )][DBLP]


  35. Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP Systems. [Citation Graph (, )][DBLP]


  36. Research and Implementation of RAID Algorithm base on RAID Controller. [Citation Graph (, )][DBLP]


  37. B+ Tree Management Method of Object Attributes for Object-Based Storage. [Citation Graph (, )][DBLP]


  38. An analytical model for evaluating utilization of TCP TAHOE using markovian model. [Citation Graph (, )][DBLP]


  39. Sliding Window Based Security Event Correlation. [Citation Graph (, )][DBLP]


  40. Safety Critical Network Based on Fibre Channel. [Citation Graph (, )][DBLP]


  41. Distributed Fault Monitoring Scheme Based on Optical Power for Optical Burst Switching Network. [Citation Graph (, )][DBLP]


  42. A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. [Citation Graph (, )][DBLP]


  43. RH-SCSI: A Reliable HyperSCSI Protocol for Networking Storage. [Citation Graph (, )][DBLP]


  44. A New Method for RAID Consistency Initialization. [Citation Graph (, )][DBLP]


  45. Implementation and performance evaluation of an iSCSI-Based Storage Virtualization. [Citation Graph (, )][DBLP]


  46. An Object-based Storage Controller Based on Switch Fabric. [Citation Graph (, )][DBLP]


  47. Design and Implementation of an Efficient Multi-version File System. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002