The SCEAS System
Navigation Menu

Conferences in DBLP

Hawaii International Conference on System Sciences (HICSS) (hicss)
2004 (conf/hicss/2004-9)

  1. Gretchen H. Lynn, Taieb Znati
    Robust Multicasting Using An Underlying Link State Unicast Protocol. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  2. Manuel Oriol, Michel Pawlak
    Hot-Swapping Communication Models in P2P Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  3. Christian Pérez, Thierry Priol, André Ribes
    PACO++: A Parallel Object Model for High Performance Distributed Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  4. Brian S. Peterson, Rusty O. Baldwin, Jeffrey P. Kharoufeh
    A Specification-Compatible Bluetooth Inquiry Simplification. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  5. Mark G. Pleszkoch, Richard C. Linger
    Improving Network System Security with Function Extraction Technology for Automated Calculation of Program Behavior. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  6. Jari Porras, Petri Hiirsalmi, Ari Valtaoja
    Peer-to-Peer Communication Approach for a Mobile Environment. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  7. Rubén Prieto Díaz
    Framework and Methods for the Study and Analysis of Trust in Information Systems: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  8. Stacy J. Prowell
    A Cost-Benefit Stopping Criterion for Statistical Testing. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  9. Karthik Ramachandra, Hesham H. Ali
    Evaluating the Performance of Various Architectures for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  10. Paul W. Oman, Axel W. Krings
    Security and Survivability of Networked Systems: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  11. Stephan Olariu, Petia Todorova
    Quality of Service in Mobile and Wireless Networks: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  12. Stacy D. Nelson, Johann Schumann
    What Makes a Code Review Trustworthy? [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  13. Jens Mache, David Ely, Melanie Gilbert, Jason Gimba, Thierry Lopez, Matthew Wilkinson
    Modifying the Overlay Network of Freenet-Style Peer-to-Peer Systems after Successful Request Queries. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  14. Seng Wai Loke, Arkady B. Zaslavsky
    Integrated Ambient Services as Enhancement to Physical Marketplace. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  15. T. D. Lowen, P. T. O'Hare, Gregory M. P. O'Hare
    The WAY Ahead: Entity Rendezvous through Mobile Agents. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  16. Andreas Meissner, Zhou Wang, Lars C. Wolf
    Mobile Distributed Information Systems: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  17. Ali Mili, GuangJie Jiang, Bojan Cukic, Yan Liu, Rahma Ben Ayed
    Towards the Verification and Validation of Online Learning Systems: General Framework and Applications. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  18. Jan Mischke, Burkhard Stiller
    Peer-to-Peer and Distributed Search in Fixed and Mobile Environments. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  19. Vojislav B. Misic, Eric W. S. Ko, Jelena V. Misic
    Load and QoS-Adaptive Scheduling in Bluetooth Piconets. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  20. Wolfgang Mueller, Robbie Schaefer, Steffen Bleul
    Interactive Multimodal User Interfaces for Mobile Devices. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  21. Samuel T. Redwine Jr.
    A Logic for the Exclusion Basis System. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  22. Peter Rigole, Yolande Berbers, Tom Holvoet
    Bluetooth Enabled Interaction in a Distributed Camera Surveillance System. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  23. Nanbor Wang, Christopher D. Gill
    Improving Real-Time System Con.guration via a QoS-Aware CORBA Component Model. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  24. Alison Watkins, Donald J. Berndt, K. Aebischer, John W. Fisher, L. Johnson
    Breeding Software Test Cases for Complex Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  25. Vickie R. Westmark
    A Definition for Information System Survivability. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  26. Roger M. Whitaker, Larry Raisanen, Steve Hurley
    A Model for Conflict Resolution between Coverage and Cost in Cellular Wireless Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  27. Mikael Wiberg
    FolkMusic: A Mobile Peer-to-Peer Entertainment System. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  28. Mohamed F. Younis, Kemal Akkaya, Mohamed Eltoweissy, Ashraf Wadaa
    On Handling QoS Traffic in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  29. Dong Yu, Deborah A. Frincke
    Towards Survivable Intrusion Detection System . [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  30. Gergely V. Záruba, Vishant Gupta
    Simplified Bluetooth Device Discovery - Analysis and Simulation. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  31. Guijun Wang, Casey K. Fung
    Architecture Paradigms and Their Influences and Impacts on Component-Based Software Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  32. Dali Wang, Eric A. Carr, Louis J. Gross, Michael W. Berry
    Design and Implementation of a Parallel Fish Model for South Florida. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  33. Venkita Subramonian, Christopher D. Gill
    A Generative Programming Framework for Adaptive Middleware. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  34. G. Keith Roberts, James B. Pick
    Technology Factors in Corporate Adoption of Mobile Cell Phones: A Case Study Analysis. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  35. Pedro M. Ruiz, Juan A. Sánchez, Emilio Garcia, Antonio F. Gómez-Skarmeta, Juan A. Botía, Andreas Kassler, Teodora Guenkova-Luy
    Adaptive Multimedia Multi-Party Communication in Ad Hoc Environments. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  36. Kedar Samant, Siddhartha Bhattacharyya
    Topology, Search, and Fault Tolerance in Unstructured P2P Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  37. Frode Eika Sandnes, Haavard W. Thorkildssen, Alexander Arvei, Johannes O. Buverud
    Techniques for Fast and Easy Mobile Text-Entry with Three-Keys. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  38. Behrooz Shirazi, Mohan Kumar, Byung Y. Sung
    QoS Middleware Support for Pervasive Computing Applications. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  39. Boris Shishkov, Jan L. G. Dietz
    Design of Software Applications Using Generic Business Components. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  40. Ambareen Siraj, Rayford B. Vaughn, Susan Bridges
    Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  41. Hiranmayi Sreenivas, Hesham H. Ali
    An Evolutionary Bluetooth Scatternet Formation Protocol. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  42. Jianfan Zou, David Levy, Anna Liu
    Evaluating Overhead and Predictability of a Real-Time CORBA System. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  43. Weifa Liang, Yang Yuansheng
    Maximizing Battery Life Routing in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  44. Karl Aberer, Jean-Henry Morin, Aris M. Ouksel
    Peer-to-Peer Ecommerce Systems and Applications: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  45. Zizhong Chen, Jack Dongarra, Piotr Luszczek, Kenneth Roche
    The LAPACK for Clusters Project: An Example of Self Adapting Numerical Software. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  46. Shiping Chen, Paul Greenfield
    QoS Evaluation of JMS: An Empirical Approach. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  47. Brent N. Chun, Andy C. Bavier
    Decentralized Trust Management and Accountability in Federated Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  48. Prithviraj Dasgupta, Azad H. Azadmanesh
    Security and Survivability in Mobile Agent Based Distributed Systems: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  49. Travis Desell, Kaoutar El Maghraoui, Carlos A. Varela
    Load Balancing of Autonomous Actors over Dynamic Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  50. Zoran Despotovic, Jean-Claude Usunier, Karl Aberer
    Towards Peer-To-Peer Double Auctioning. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  51. Mohamed Eltoweissy, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
    Towards Trusted Online Dissemination of Consumer Information. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  52. Christian Erfurth, Arndt Döhler, Wilhelm Rossak
    A First Look at the Performance of Autonomous Mobile Agents in Dynamic Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  53. Ramaswamy Chandramouli, Mark R. Blackburn
    Automated Testing of Security Functions Using a Combined Model and Interface-Driven Approach. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  54. Ka Lok Chan, Vojislav B. Misic, Jelena V. Misic
    Efficient Polling Schemes for Bluetooth Picocells Revisited. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  55. Walter Cazzola, Dario Maggiorini
    Seamless Nomadic System-Aware Servants. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  56. Faisal N. Abu-Khzam, Michael A. Langston
    Grid Computing: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  57. Jim Alves-Foss, Carol Taylor, Paul W. Oman
    A Multi-Layered Approach to Security in High Assurance Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  58. Gul Agha
    Software Technology Track Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  59. Edoardo Biagioni, Shu Hui Chen
    A Reliability Layer for Ad-Hoc Wireless Sensor Network Routing. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  60. William B. Bradley, David P. Maher
    The NEMO P2P Service Orchestration Framework. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  61. Barrett R. Bryant, Rajeev R. Raje
    Distributed Object and Component-Based Software Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  62. Jinwei Cao, Dongsong Zhang, Kevin M. McNeill, Jay F. Nunamaker Jr.
    An Overview of Network-Aware Applications for Mobile Multimedia Delivery. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  63. Ionut Cardei, Sabera Kazi
    MAC Layer QoS Support for Wireless Networks of Unmanned Air Vehicles. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  64. Anete Persch Espindola, Karin Becker, Avelino F. Zorzo
    An Extension to UML Components to Consider Distribution Issues in Early Phases of Application Development. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  65. Katrina E. Falkner, Henry Detmold, Diana Howard, David S. Munro, Ronald Morrison, Stuart Norcross
    Unifying Static and Dynamic Approaches to Evolution through the Compliant Systems Architecture. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  66. Imad Jawhar, Jie Wu
    A Race-Free Bandwidth Reservation Protocol for QoS Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  67. Hai Jiang, Vipin Chaudhary
    Process/Thread Migration and Checkpointing in Heterogeneous Distributed Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  68. Frank Kargl, Elaine Lawrence, Gergely V. Záruba
    Wireless Personal Area Networks: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  69. Erik Klintskog, Zacharias El Banna, Per Brand, Seif Haridi
    The DSS, a Middleware Library for Ef.cient and Transparent Distribution of Language Entities. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  70. Axel W. Krings
    Agent Survivability: An Application for Strong andWeak Chain Constrained Scheduling. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  71. Otto Kolsi, Teemupekka Virtanen
    MIDP 2.0 Security Enhancements. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  72. Teemu Koponen, Teemupekka Virtanen
    A Service Discovery: A Service Broker Approach. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  73. Hyungjick Lee, Jim Alves-Foss, Scott Harrison
    The Use of Encrypted Functions for Mobile Agent Security. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  74. Martin Jandl, M. Alber, Wolfgang Radinger, Karl M. Göschka
    Experiences in Integration and Reuse of CORBA-Interfaced Software with Directory Services and Web Services. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  75. Nataliya Hristova, Gregory M. P. O'Hare
    Ad-me: Wireless Advertising Adapted to the User Location, Device and Emotions. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  76. Deborah Hix, Joseph L. Gabbard, J. Edward Swan II, Mark A. Livingston, Tobias Höllerer, Simon Julier, Yohan Baillot, Dennis Brown
    A Cost-Effective Usability Evaluation Progression for Novel Interactive Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  77. Daniel Fällmana, Andreas Lund, Mikael Wiberg
    ScrollPad: Tangible Scrolling with Mobile Devices. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  78. Thomas M. Galla, Karin A. Hummel, Roman Pallierer
    Software Implemented Fault Injection for Safety-Critical Distributed Systems by Means of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  79. Hassan Gomaa, Diana L. Webber
    Modeling Adaptive and Evolvable Software Product Lines Using the Variation Point Model. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  80. Ian Gorton, Anna Liu
    Empirical Software Evaluation: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  81. Jeffrey G. Gray, Raymond Klefstad, Marjan Mernik
    Adaptive and Evolvable Software Systems: Techniques, Tools, and Applications: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  82. Fan Guochuang, Chen An, Zhang WenBo, Huang Tao
    WebFrame: a Multi-Phase Reconfigurable Middleware Platform. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  83. Jon Heffley, Pascal Meunier
    Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  84. Alan R. Hevner, Richard C. Linger, Gwendolyn H. Walton
    Testing and Certification of Trustworthy Systems: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  85. Daniel Conte de Leon, Jim Alves-Foss
    Experiments on Processing and Linking Semantically Augmented Requirement Specifications. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002