The SCEAS System
Navigation Menu

Conferences in DBLP

(netcom)
2009 (conf/netcom/2009)


  1. Secure Key Exchange and Encryption Mechanism for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  2. Impact of Sink Mobility on Network Performance in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  3. Intelligent Clustering in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  4. A Novel Algorithm for Graded Precision Localization in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  5. MSTBBN: M-way Search Tree Based Base Station to Node Communication Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  6. Energy Efficient Wireless Sensor MAC Protocol for Collision Avoidance. [Citation Graph (, )][DBLP]


  7. Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  8. Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks. [Citation Graph (, )][DBLP]


  9. K Bipartite Partitioning Algorithm for Channel Allocation Problem in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  10. Posture-Predictive Power Control in Body Sensor Networks Using Linear-Quadratic Gaussian Control. [Citation Graph (, )][DBLP]


  11. Cross-Layer Interference Avoidance MAC Protocol for Dense Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  12. Vertical Handoff in Heterogeneous Wireless Mobile Networks. [Citation Graph (, )][DBLP]


  13. Multiple Mobile Routers Based Seamless Handover Scheme for Next Generation Heterogeneous Networks. [Citation Graph (, )][DBLP]


  14. A Practical Approach for Planning WLAN Deployment under 3G Cellular Network. [Citation Graph (, )][DBLP]


  15. A Scheduling Policy for Battery Management in Mobile Devices. [Citation Graph (, )][DBLP]


  16. AMOBIROUTE: An Advanced Mobility Based Ad Hoc Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  17. Node Mobility Support Scheme Between the Mobile Network and PMIPv6 Networks. [Citation Graph (, )][DBLP]


  18. An Analytical Model of Multi-service Call Admission Control in Next Generation Wireless Overlay Networks. [Citation Graph (, )][DBLP]


  19. An Improved Method of Detecting Spoofed Attack in Wireless LAN. [Citation Graph (, )][DBLP]


  20. Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet. [Citation Graph (, )][DBLP]


  21. High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGA. [Citation Graph (, )][DBLP]


  22. Accuracy of 3D Location Computation in GSM Through NS2. [Citation Graph (, )][DBLP]


  23. Cricket/Mica2 Based Discrete Event Simulator for WiHoc Ver.1.0 Localization Analysis. [Citation Graph (, )][DBLP]


  24. Performance Improvement of Wireless Sensor Networks Using Layered Space Time Codes. [Citation Graph (, )][DBLP]


  25. The FN Quadratic Marking/Dropping Probability Function. [Citation Graph (, )][DBLP]


  26. Performance Analysis of MANET under Blackhole Attack. [Citation Graph (, )][DBLP]


  27. Comparative Study of Various Cooling Schedules for Location Area Planning in Cellular Networks Using Simulated Annealing. [Citation Graph (, )][DBLP]


  28. A Pascal Graph Property and Computer Network Topology. [Citation Graph (, )][DBLP]


  29. Perceptual Features Based Isolated Digit and Continuous Speech Recognition Using Iterative Clustering Approach. [Citation Graph (, )][DBLP]


  30. Just Queueing (JQ): Scheduling Algorithm for the Internet. [Citation Graph (, )][DBLP]


  31. Performance of Dominating Sets in AODV Routing Protocol for MANETs. [Citation Graph (, )][DBLP]


  32. On-body Packet Routing Algorithms for Body Sensor Networks. [Citation Graph (, )][DBLP]


  33. End-to-End Network Delay-Constrained for QoS Multicast Routing. [Citation Graph (, )][DBLP]


  34. Enhancing QoS and QoE in IMS Enabled Next Generation Networks. [Citation Graph (, )][DBLP]


  35. Securing Internet Protocol (IP) Storage: A Case Study. [Citation Graph (, )][DBLP]


  36. Tree-Like Peer-to-Peer Symmetric Key Management in Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]


  37. Service Coverage Bounds Through Efficient Load Approximation in UMTS Network Planning. [Citation Graph (, )][DBLP]


  38. An Energy-Conserving Topology Maintenance Algorithm for MANETs. [Citation Graph (, )][DBLP]


  39. Agent Based Web Services with RuleML for Network Management. [Citation Graph (, )][DBLP]


  40. A Status Monitoring System Design/Implementation for Home Appliances Controlled by Home Server. [Citation Graph (, )][DBLP]


  41. A Genetic Algorithm Based Oblivious Image Watermarking Scheme Using Singular Value Decomposition (SVD). [Citation Graph (, )][DBLP]


  42. Energy Based Quantization for Image Compression Using Contourlet Transform. [Citation Graph (, )][DBLP]


  43. PhishNet: Enhancing the Security Aspect of IMS Users. [Citation Graph (, )][DBLP]


  44. Fault Analysis of Security Policy Implementations in Enterprise Networks. [Citation Graph (, )][DBLP]


  45. Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication. [Citation Graph (, )][DBLP]


  46. An Attack Vector for Deception Through Persuasion Used by Hackers and Crakers. [Citation Graph (, )][DBLP]


  47. Anonymous but Traceable IP Address-Based Communication System. [Citation Graph (, )][DBLP]


  48. A Scheme for the Design and Implementation of a Distributed IDS. [Citation Graph (, )][DBLP]


  49. Secure Mobile Multicast Handoff Mechanisms Using a Time-Limited Key. [Citation Graph (, )][DBLP]


  50. A Middleware Architectural framework for Vehicular Safety over VANET (InVANET). [Citation Graph (, )][DBLP]


  51. An Approach for Security Assessment of Network Configurations Using Attack Graph. [Citation Graph (, )][DBLP]


  52. Galaxia: A Semi-decentralized System for Implementing Secure-Group P2P Networks. [Citation Graph (, )][DBLP]


  53. "Reminder: please update your details": Phishing Trends. [Citation Graph (, )][DBLP]


  54. On Some Sufficient Conditions for Distributed Quality-of-Service Support in Wireless Networks. [Citation Graph (, )][DBLP]


  55. On a Local Heuristic for a Reverse Multicast Forwarding Game. [Citation Graph (, )][DBLP]


  56. Random Key Graphs. [Citation Graph (, )][DBLP]


  57. Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  58. A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  59. An Alternative Approach to Find the Fermat Point of a Polygonal Geographic Region for Energy Efficient Geocast Routing Protocols: Global Minima Scheme. [Citation Graph (, )][DBLP]


  60. Analysis of Hierarchical Mobile IP Based Fast Mobility Management Schemes. [Citation Graph (, )][DBLP]


  61. Efficient Power-Aware Packet Scheduling for Multiantenna Packet Radio Systems. [Citation Graph (, )][DBLP]


  62. Time Domain Equalization Technique Using RAKE-MMSE Receivers for High Data Rate UWB Communication System. [Citation Graph (, )][DBLP]


  63. Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols. [Citation Graph (, )][DBLP]


  64. Anomaly Behavior Analysis for Web Page Inspection. [Citation Graph (, )][DBLP]


  65. Fairness Strategy and Scheduling Algorithm for IEEE 802.16 Wireless Access Systems. [Citation Graph (, )][DBLP]


  66. Fuzzy Switching Controller for the Security in 802.11 Networks. [Citation Graph (, )][DBLP]


  67. Performance Evaluation of ADV with AODV for Mobile Ad-hoc Networks. [Citation Graph (, )][DBLP]


  68. An Agent Based Security Framework for Protecting Routing Layer Operations in MANET. [Citation Graph (, )][DBLP]


  69. An Improved Collaborative Recommender System. [Citation Graph (, )][DBLP]


  70. A Handoff Management Scheme for Mobile Station in Wireless Body Area Mesh Networks. [Citation Graph (, )][DBLP]


  71. An Efficient Routing Protocol Based on Position Information in Mobile Wireless Body Area Sensor Networks. [Citation Graph (, )][DBLP]


  72. Analysis and Proposal of Wireless Mesh Network's Routing Metric for WBAN. [Citation Graph (, )][DBLP]


  73. A Self-Adjustable Rate Control in Wireless Body Area Networks. [Citation Graph (, )][DBLP]


  74. Simulation Based Performance Comparison of Community Model, GFMM, RPGM, Manhattan Model and RWP-SS Mobility Models in MANET. [Citation Graph (, )][DBLP]


  75. iMeasure Security (iMS): A Novel Framework for Security Quantification. [Citation Graph (, )][DBLP]


  76. Supporting Negative Authorization in Spatiotemporal Role Based Access Control. [Citation Graph (, )][DBLP]


  77. A Framework for Licensed Digital Signatures. [Citation Graph (, )][DBLP]


  78. Packet Marking with Distance Based Probabilities for IP Traceback. [Citation Graph (, )][DBLP]


  79. Crowd Management with RFID and Wireless Technologies. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002