The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Computer Network and Mobile Computing (iccnmc)
2005 (conf/iccnmc/2005)

  1. John A. Stankovic
    Self-organizing Wireless Sensor Networks in Action. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1- [Conf]
  2. Donald F. Towsley
    The Internet Control Architecture: Successes and Challenges. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:2- [Conf]
  3. Yanmin Zhu, Min Gao, Lionel M. Ni
    Distributed Localization Refinements for Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:3-12 [Conf]
  4. Qing Yang, Lu Su, Quanlong Li, Xiaofei Xu
    Cooperative Target Localization Method for Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:13-22 [Conf]
  5. Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan, Dong Xuan
    Sensor Network Configuration Under Physical Attacks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:23-32 [Conf]
  6. Fang Liu, Xiuzhen Cheng, Dong Hua, Dechang Chen
    TPSS: A Time-Based Positioning Scheme for Sensor Networks with Short Range Beacons. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:33-42 [Conf]
  7. Mingming Lu, Jie Wu, Mihaela Cardei, Minglu Li
    Energy-Efficient Connected Coverage of Discrete Targets in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:43-52 [Conf]
  8. Lu Su, Qing Yang, Quanlong Li, Xiaofei Xu
    Coverage Algorithm and Protocol in Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:53-63 [Conf]
  9. Man-Ching Yuen, Ji Shen, Weijia Jia, Bo Han
    Simplified Message Transformation for Optimization of Message Processing in 3G-324M Control Protocol. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:64-73 [Conf]
  10. Kunqi Guo, Shilou Jia, Lixin Sun
    Dynamic Packet Scheduling Based on Utility Optimization in OFDM Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:74-83 [Conf]
  11. Qihong Ge, Huazhong Yang
    Comb-Pattern Optimal Pilot in MIMO-OFDM System. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:84-92 [Conf]
  12. Yongchan Jeong, Jitae Shin, Hyoung-Kee Choi
    Channel-Adaptive GPS Scheduling for Heterogeneous Multimedia in CDMA Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:93-101 [Conf]
  13. Eric Hsiao-Kuang Wu, Chiang Jui-Hao, Hsin-Pu Chung
    An Adaptive Scheduled Transmission Strategy for Multimedia Services in WCDMA Systems. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:102-112 [Conf]
  14. Songtao Lin, Junliang Chen
    Semantic Web Enabled VHE for 3 rd Generation Telecommunications. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:113-122 [Conf]
  15. Yuancheng Wu, Wenhua Lang, Mingtian Zhou
    An Adaptive Replication Algorithm in Overlay Networking. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:123-132 [Conf]
  16. Lu Yan
    Performance Modeling of Mobile Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:133-142 [Conf]
  17. Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, Abhishek P. Patil
    A Random Walk Based Anonymous Peer-to-Peer Protocol Design. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:143-152 [Conf]
  18. T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jonathan, Arvind Chandrasekhar
    A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:153-162 [Conf]
  19. YuHui Zhao, Yuyan An, Jiemin Liu, Cuirong Wang, Yuan Gao
    BSMON: Bandwidth-Satisfied Multicast in Overlay Network for Large-Scale Live Media Applications. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:163-172 [Conf]
  20. Xiaogang Qi, Sanyang Liu, Junfeng Qiao
    A Routing and Wavelength Assignment Algorithms Based on the State Level of Links. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:173-177 [Conf]
  21. Keqiu Li, Hong Shen, Francis Y. L. Chin
    Cooperative Determination on Cache Replacement Candidates for Transcoding Proxy Caching. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:178-187 [Conf]
  22. Kai Zheng, Zhen Liu, Bin Liu
    High Performance Embedded Route Lookup Coprocessor for Network Processors. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:188-197 [Conf]
  23. Kun Zhang, Hong Zhang, Jian Xu
    An Efficient Distributed Dynamic Multicast Routing with Delay and Delay Variation Constraints. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:198-207 [Conf]
  24. Jian Zhai, Qing Li, Xiang Li
    Data Caching in Selfish MANETs. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:208-217 [Conf]
  25. Hengchang Liu, Baohua Zhao
    Optimal Scheduling for Link Assignment in Traffic-Sensitive STDMA Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:218-228 [Conf]
  26. Wenfeng Du, Lidong Lin, Weijia Jia, Guojun Wang
    Modeling and Performance Evaluation of Handover Service in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:229-238 [Conf]
  27. Donghoi Kim, Joinin Kim
    The Optimum Parameter Design for WCDMA Intra-frequency Handover Initiation. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:239-248 [Conf]
  28. Jian-Wu Zhang, Jia-Rong Xi
    A New Location Management Scheme for the Next-Generation Mobile Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:249-258 [Conf]
  29. Jun Tian, Abdelsalam Helal
    Rapid Mobility of Mobile IP over WLAN. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:259-267 [Conf]
  30. Yong-Jin Lee, Mohammed Atiquzzaman
    Least Cost Multicast Spanning Tree Algorithm for Local Computer Network. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:268-275 [Conf]
  31. Miae Woo, Ho-Hyun Park
    A New Multicast Group Management Scheme for IP Mobility Support. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:276-285 [Conf]
  32. Chen-guang Xu, Yin-long Xu, Jun-min Wu
    On the Minimization of the Number of Forwarding Nodes for Multicast in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:286-294 [Conf]
  33. Guoliang Xie, Mingwei Xu, Kwok-Yan Lam, Qian Wu
    The Impact of Mobility Modeling in Mobile IP Multicast Research. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:295-304 [Conf]
  34. Fangai Liu, Ying Song
    Broadcast in the Locally k-Subcube-Connected Hypercube Networks with Faulty Tolerance. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:305-313 [Conf]
  35. Xian Liu, Yupo Chan
    Performance Analysis of Route Discovery in Wireless Ad Hoc Networks: A Unified Model. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:314-323 [Conf]
  36. Hyun Kyung Cho, Eun Seok Kim, Dae-Wook Kang
    A Load-Balancing Control Method Considering Energy Consumption Rate in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:324-333 [Conf]
  37. Mingmei Li, Eiji Kamioka, Shigeki Yamada, Yang Cui
    Efficient Node Forwarding Strategies via Non-cooperative Game for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:334-343 [Conf]
  38. Guangming Hu, Xiaohui Kuang, Zhenghu Gong
    A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:344-353 [Conf]
  39. Insu Jeong, Yeonkwon Jeong, Joongsoo Ma, Daeyoung Kim
    Enhanced Positioning Probability System for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:354-363 [Conf]
  40. Guojun Wang, Lifan Zhang, Jiannong Cao
    A Virtual Circle-Based Clustering Algorithm with Mobility Prediction in Large-Scale MANETs. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:364-374 [Conf]
  41. Chia-Cheng Hu, Eric Hsiao-Kuang Wu, Gen-Huey Chen, Chiang Jui-Hao
    Mobility-Aware On-demand Global Hosts for Ad-Hoc Multicast. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:375-384 [Conf]
  42. Weiping Zhu
    Bottom Up Algorithm to Identify Link-Level Transition Probability. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:385-394 [Conf]
  43. Wang Hao, Yan Wei
    An Extended GIX/M/1/N Queueing Model for Evaluating the Performance of AQM Algorithms with Aggregate Traffic. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:395-404 [Conf]
  44. Min Song, Sachin Shetty, Wu Li
    Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:405-413 [Conf]
  45. Ilhyung Jung, Hwa Jong Kim, Jun Kyun Choi
    Detour Path Optimization Algorithm Based on Traffic Duration Time in MPLS Network. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:414-422 [Conf]
  46. Yu-Kwong Kwok, Rohit Tripathi, Yu Chen, Kai Hwang
    HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:423-432 [Conf]
  47. Jianhua Yang, Shou-Hsuan Stephen Huang
    Improved Thumbprint and Its Application for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:433-442 [Conf]
  48. Jinkeun Hong, Kihong Kim
    Performance Enhancement of Wireless Cipher Communication. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:443-451 [Conf]
  49. Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao
    SAS: A Scalar Anonymous Communication System. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:452-461 [Conf]
  50. Runhua Shi, Jiaxing Cheng
    Two New Fast Methods for Simultaneous Scalar Multiplication in Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:462-470 [Conf]
  51. En Cheng, Hai Jin, Zongfen Han, Jianhua Sun
    Network-Based Anomaly Detection Using an Elman Network. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:471-480 [Conf]
  52. Yuan He, Yi Zhang, Jiang Guo
    On Mitigating Network Partitioning in Peer-to-Peer Massively Multiplayer Games. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:481-490 [Conf]
  53. Lina Zhao, Yin Zhang, Sanyuan Zhang, Xiuzi Ye
    P2P-Based Software Engineering Management. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:491-500 [Conf]
  54. Wei Lin, Yongtian Yang, Shuqin Zhang
    A Computational Reputation Model in P2P Networks Based on Trust and Distrust. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:501-508 [Conf]
  55. Jianqiang Hu, Changguo Guo, Huaimin Wang, Peng Zou
    Web Services Peer-to-Peer Discovery Service for Automated Web Service Composition. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:509-518 [Conf]
  56. Jian Chen, Liangyi Ou, Jian Yin, Jin Huang
    Efficient Mining of Cross-Transaction Web Usage Patterns in Large Database. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:519-528 [Conf]
  57. Yuan Zhang, Bo Yang
    Delay-Constrained Multicasting with Power-Control in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:529-538 [Conf]
  58. Ruidong Li, Jie Li, Hisao Kameda
    Distributed Hierarchical Access Control for Secure Group Communications. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:539-548 [Conf]
  59. Weijia Jia, Wanqing Tu, Jie Wu
    Hierarchical Multicast Tree Algorithms for Application Layer Mesh Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:549-559 [Conf]
  60. Jiannong Cao, Lin Liao, Guojun Wang, Bin Xiao
    A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:560-569 [Conf]
  61. DaDong Wang, Hongjun Wang, YuHui Zhao, Yuan Gao
    Interdomain Traffic Control over Multiple Links Based on Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:570-579 [Conf]
  62. S. Suresh, Özdemir Göl
    Congestion Management of IP Traffic Using Adaptive Exponential RED. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:580-589 [Conf]
  63. Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung
    An Analysis and Evaluation of Policy-Based Network Management Approaches. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:590-599 [Conf]
  64. Huagang Shao, Weinong Wang
    An End-to-End QoS Provisioning Architecture in IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:600-609 [Conf]
  65. Francesco Palmieri, Ugo Fiore
    Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:610-619 [Conf]
  66. Fangcheng Tang, Lu Ruan
    A Protection Tree Scheme for First-Failure Protection and Second-Failure Restoration in Optical Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:620-631 [Conf]
  67. Ling Zhang, Chengbo Huang, Jie Zhou
    Distributed Dynamic Resource Management for the AF Traffic of the Differentiated Services Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:632-641 [Conf]
  68. Qiang Li, Qinyuan Feng, Kun Liu, Jiubin Ju
    Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:642-651 [Conf]
  69. Yanlei Shang, Shiduan Cheng
    An Enhanced Packet Scheduling Algorithm for QoS Support in IEEE 802.16 Wireless Network. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:652-661 [Conf]
  70. Wenyu Gao, Jianxin Wang, Songqiao Chen
    A Novel Core Stateless Virtual Clock Scheduling Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:662-671 [Conf]
  71. Yong Jiang, Jianping Wu
    Proportional Differentiated Services for End-to-End Traffic Control. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:672-681 [Conf]
  72. Tingxin Yan, Yanzhong Bi, Limin Sun, Hongsong Zhu
    Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:682-691 [Conf]
  73. Jun Shen, Kun Yang, Shaochun Zhong
    A Prediction-Based Location Update Algorithm in Wireless Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:692-701 [Conf]
  74. Ming Liu, Ming T. Liu, David Q. Liu
    Combining Power Management and Power Control in Multihop IEEE 802.11 Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:702-711 [Conf]
  75. Min-Te Sun, Xiaoli Ma, Chih-Wei Yi, Chuan-Kai Yang, Ten-Hwang Lai
    Minimum Disc Cover Set Construction in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:712-721 [Conf]
  76. Liang Ou, Xiansi Tan, Huaxiong Yao, Wenqing Cheng
    A Study on Dynamic Load Balanced Routing Techniques in Time-Slotted Optical Burst Switched Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:722-731 [Conf]
  77. Xiaole Bai, Marcin Matuszewski, Shuping Liu, Raimo Kantola
    A Novel Multi-path Routing Protocol. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:732-741 [Conf]
  78. Zhe Yuan, Jun Zhang, Zhongkan Liu
    A Simplified Routing and Simulating Scheme for the LEO/MEO Two-Layered Satellite Network. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:742-751 [Conf]
  79. Xiaozhe Zhang, Wei Peng, Peidong Zhu
    ARS: An Synchronization Algorithm Maintaining Single Image Among Nodes' Forwarding Tables of Clustered Router. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:752-761 [Conf]
  80. Baosheng Wang, Xicheng Lu
    Design and Implementation of Control-Extensible Router. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:762-771 [Conf]
  81. Zhitang Li, Wei Guo, Fuquan Xu
    Dependable Propagating Routing Information in MANET. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:772-780 [Conf]
  82. Weirong Jiang
    Data Structure Optimization of AS_PATH in BGP. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:781-788 [Conf]
  83. Wen-hua Dou, Ming Liu, He-ying Zhang, Yan-xing Zheng
    A Framework for Designing Adaptive AQM Schemes. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:789-799 [Conf]
  84. Li Qing, Qingxin Zhu, Mingwen Wang
    Designing Adaptive PI Algorithm Based on Single Neuron. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:800-807 [Conf]
  85. Kebo Wang, Zhiying Wang, Yan Jia, Weihong Han
    An Optimal Component Distribution Algorithm Based on MINLP. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:808-816 [Conf]
  86. Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:817-825 [Conf]
  87. Guiling Zhang
    Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:826-835 [Conf]
  88. Jianhong Zhang, Jiancheng Zou, Yumin Wang
    A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:836-844 [Conf]
  89. Shiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu
    Identity Based Conference Key Distribution Scheme from Parings. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:845-852 [Conf]
  90. Tianbo Lu, Binxing Fang, Yuzhong Sun, Li Guo
    Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:853-862 [Conf]
  91. Lin Qiao, Weitong Huang, Qi Wen, Xiaolong Fu
    An Integrated Information Retrieval Support System for Multiple Distributed Heterogeneous Cross-Lingual Information Sources. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:863-872 [Conf]
  92. Jinlong Wang, Congfu Xu, Huifeng Shen, Zhaohui Wu, Yunhe Pan
    DHAI: Dynamic Hierarchical Agent-Based Infrastructure for Supporting Large-Scale Distributed Information Processing. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:873-882 [Conf]
  93. Chi-Hung Chi, Hongguang Wang, William Ku
    Server-Assisted Bandwidth Negotiation Mechanism for Parallel Segment Retrieval of Web Objects. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:883-890 [Conf]
  94. Lu Yan, Zhang Liang
    Multiple Schema Based XML Indexing. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:891-900 [Conf]
  95. Qing Xiong, Chanle Wu, Jianbing Xing, Libing Wu, Huyin Zhang
    A Linked-List Data Structure for Advance Reservation Admission Control. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:901-910 [Conf]
  96. Tsung-Chuan Huang, Sheng-Yi Wu
    An Adaptive Gateway Discovery Algorithm for the Integrated Network of Internet and MANET. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:911-920 [Conf]
  97. Yi Sun, Jihua Zhou, Jinglin Shi
    A Sender-Oriented Back-Track Enabled Resource Reservation Scheme. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:921-930 [Conf]
  98. Fang Qi, Jin Zheng, Weijia Jia, Guojun Wang
    Available Bandwidth Measurement Schemes over Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:931-940 [Conf]
  99. Fei Ge, Yang Cao, Yuan-ni Wang
    Chaotic Dynamic Analysis of MPEG-4 Video Traffic and Its Influence on Packet Loss Ratio. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:941-950 [Conf]
  100. Yan Wei, Cheng Yuan, Ren Maosheng
    A Simple Streaming Media Transport Protocols Based on IPv6 QoS Mechanism. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:951-960 [Conf]
  101. Cheng-Yuan Ho, Chen-Hua Shih, Yaw-Chung Chen, Yi-Cheng Chan
    An Aided Congestion Avoidance Mechanism for TCP Vegas. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:961-971 [Conf]
  102. Jun Jiang, Chen He, Ling-ge Jiang
    On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:972-981 [Conf]
  103. Meng Wang, Hui Li, Zhijing Liu
    Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:982-991 [Conf]
  104. F. An, X. Cheng, J. M. Rivera, J. Li, Z. Cheng
    PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:992-1001 [Conf]
  105. Amandeep Thukral, Xukai Zou
    Secure Group Instant Messaging Using Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1002-1011 [Conf]
  106. Cungang Yang, Chang N. Zhang
    A Privacy Enhanced Role-Based Access Control Model for Enterprises. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1012-1021 [Conf]
  107. Xin Xu, Bofeng Zhang, Qiuxi Zhong
    Text Categorization Using SVMs with Rocchio Ensemble for Internet Information Classification. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1022-1031 [Conf]
  108. Feng Zhao, JinShu Su, Xiaomei Cheng
    OpenRouter: A TCP-Based Lightweight Protocol for Control Plane and Forwarding Plane Communication. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1032-1041 [Conf]
  109. Wenjie Li, Lei Shi, Yang Xu, Bin Liu
    Efficient Approach to Merge and Segment IP Packets. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1042-1051 [Conf]
  110. Hui Zhou, Yongji Wang, Qing Wang
    Measuring Internet Bottlenecks: Location, Capacity, and Available Bandwidth. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1052-1062 [Conf]
  111. Kai Wang, Zhong-Cheng Li, Feng Yang, Qi Wu, Jingping Bi
    Experiment and Analysis of Active Measurement for Packet Delay Dynamics. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1063-1072 [Conf]
  112. Mingqiao Wu, Zhongliang Zhu, Shiyao Jin
    A New Steganalytic Algorithm for Detecting Jsteg. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1073-1082 [Conf]
  113. Mingfeng Tan, Zexin Lu, Lei Gao
    Packet Classification Algorithm Using Multiple Subspace Intersecting. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1083-1093 [Conf]
  114. Ping Li, Lalin Jiang, Jiayin Wu, Jing Zhang
    RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1094-1104 [Conf]
  115. Jianghua Lv, Shilong Ma, Aili Wang, Jing Pan
    Using Ambient in Computational Reflection Semantics Description. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1105-1114 [Conf]
  116. Sangho Yi, Geunyoung Park, Junyoung Heo, Jiman Hong, Gwangil Jeon, Yookun Cho
    Energy Aware Routing Based on Adaptive Clustering Mechanism for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1115-1124 [Conf]
  117. Jin Zhang, Ya-Ping Lin, Mu Lin, Ping Li, Si-wang Zhou
    Curve-Based Greedy Routing Algorithm for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1125-1133 [Conf]
  118. Hai-gang Gong, Ming Liu, Yinchi Mao, Li-jun Chen, Li Xie
    Traffic Adaptive MAC Protocol for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1134-1143 [Conf]
  119. Lionel M. Ni, Yanmin Zhu, Jian Ma, Minglu Li, Qiong Luo, Yunhao Liu, S. C. Cheung, Qiang Yang
    Semantic Sensor Net: An Extensible Framework. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1144-1153 [Conf]
  120. Yanping Li, Xin Wang, Florian Baueregger, Xiangyang Xue, C. K. Toh
    Loop-Based Topology Maintenance in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1154-1162 [Conf]
  121. Chuan-dong Huang, Fan Jiang
    Generating Minimal Synchronizable Test Sequence That Detects Output-Shifting Faults. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1163-1170 [Conf]
  122. Hao Yin, Zhangxi Tan, Chuang Lin, Geyong Min, Xiaowen Chu
    Considering Network Context for Efficient Simulation of Highly Parallel Network Processors. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1171-1180 [Conf]
  123. Xianghui Liu, Jianping Yin, Zhiping Cai, Shaohe Lv
    On the Placement of Active Monitor in IP Network. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1181-1187 [Conf]
  124. Yinan Jing, Jingtao Li, Gendu Zhang
    An Adaptive Edge Marking Based Hierarchical IP Traceback System. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1188-1197 [Conf]
  125. Jin Wu, Karim Djemame
    FAOM: A Novel Active Queue Management with Fuzzy Logic for TCP-Based Interactive Communications. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1198-1207 [Conf]
  126. Wanjun Huang, Xiaohua Fan, Christoph Meinel
    A CORBA-Based Dynamic Reconfigurable Middleware. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1208-1217 [Conf]
  127. Chunqing Wu, Xuejun Yang
    An Integrated Architecture for QoS-Enable Router and Grid-Oriented Supercomputer. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1218-1226 [Conf]
  128. Dechang Pi, Qiang Wang, Weiqi Li, Jun Lv
    APA: An Interior-Oriented Intrusion Detection System Based on Multi-agents. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1227-1233 [Conf]
  129. Jian-min He, Rui Min, Yuan-yuan Wang
    Implementation of Ant Colony Algorithm Based-On Multi-agent System. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1234-1242 [Conf]
  130. Yongjian Yang, Yajun Chen, Xiaodong Cao, Jiubin Ju
    Load Balancing Using Mobile Agent and a Novel Algorithm for Updating Load Information Partially. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1243-1252 [Conf]
  131. Ling Gao, Zheng Wang, Ting Zhang
    Online Internet Traffic Prediction Models Based on MMSE. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1253-1262 [Conf]
  132. Changzheng Zhu, Zhaolin Yin, Aijuan Zhang
    Mobile Code Security on Destination Platform. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1263-1270 [Conf]
  133. Yin-Qiao Peng, Shi-Yi Xie, Yue-Feng Chen, Rui Deng, Ling-Xi Peng
    A Publicly Verifiable Authenticated Encryption Scheme with Message Linkages. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1271-1276 [Conf]
  134. Chunxiang Gu, Yuefei Zhu
    Provable Security of ID-Based Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1277-1286 [Conf]
  135. Heng Pan, JingFeng Li, Yuefei Zhu, DaWei Wei
    A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1287-1294 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002