Conferences in DBLP
John A. Stankovic Self-organizing Wireless Sensor Networks in Action. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1- [Conf ] Donald F. Towsley The Internet Control Architecture: Successes and Challenges. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:2- [Conf ] Yanmin Zhu , Min Gao , Lionel M. Ni Distributed Localization Refinements for Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:3-12 [Conf ] Qing Yang , Lu Su , Quanlong Li , Xiaofei Xu Cooperative Target Localization Method for Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:13-22 [Conf ] Xun Wang , Wenjun Gu , Kurt Schosek , Sriram Chellappan , Dong Xuan Sensor Network Configuration Under Physical Attacks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:23-32 [Conf ] Fang Liu , Xiuzhen Cheng , Dong Hua , Dechang Chen TPSS: A Time-Based Positioning Scheme for Sensor Networks with Short Range Beacons. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:33-42 [Conf ] Mingming Lu , Jie Wu , Mihaela Cardei , Minglu Li Energy-Efficient Connected Coverage of Discrete Targets in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:43-52 [Conf ] Lu Su , Qing Yang , Quanlong Li , Xiaofei Xu Coverage Algorithm and Protocol in Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:53-63 [Conf ] Man-Ching Yuen , Ji Shen , Weijia Jia , Bo Han Simplified Message Transformation for Optimization of Message Processing in 3G-324M Control Protocol. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:64-73 [Conf ] Kunqi Guo , Shilou Jia , Lixin Sun Dynamic Packet Scheduling Based on Utility Optimization in OFDM Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:74-83 [Conf ] Qihong Ge , Huazhong Yang Comb-Pattern Optimal Pilot in MIMO-OFDM System. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:84-92 [Conf ] Yongchan Jeong , Jitae Shin , Hyoung-Kee Choi Channel-Adaptive GPS Scheduling for Heterogeneous Multimedia in CDMA Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:93-101 [Conf ] Eric Hsiao-Kuang Wu , Chiang Jui-Hao , Hsin-Pu Chung An Adaptive Scheduled Transmission Strategy for Multimedia Services in WCDMA Systems. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:102-112 [Conf ] Songtao Lin , Junliang Chen Semantic Web Enabled VHE for 3 rd Generation Telecommunications. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:113-122 [Conf ] Yuancheng Wu , Wenhua Lang , Mingtian Zhou An Adaptive Replication Algorithm in Overlay Networking. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:123-132 [Conf ] Lu Yan Performance Modeling of Mobile Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:133-142 [Conf ] Jinsong Han , Yunhao Liu , Li Lu , Lei Hu , Abhishek P. Patil A Random Walk Based Anonymous Peer-to-Peer Protocol Design. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:143-152 [Conf ] T. Srinivasan , Jayesh Seshadri , J. B. Siddharth Jonathan , Arvind Chandrasekhar A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:153-162 [Conf ] YuHui Zhao , Yuyan An , Jiemin Liu , Cuirong Wang , Yuan Gao BSMON: Bandwidth-Satisfied Multicast in Overlay Network for Large-Scale Live Media Applications. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:163-172 [Conf ] Xiaogang Qi , Sanyang Liu , Junfeng Qiao A Routing and Wavelength Assignment Algorithms Based on the State Level of Links. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:173-177 [Conf ] Keqiu Li , Hong Shen , Francis Y. L. Chin Cooperative Determination on Cache Replacement Candidates for Transcoding Proxy Caching. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:178-187 [Conf ] Kai Zheng , Zhen Liu , Bin Liu High Performance Embedded Route Lookup Coprocessor for Network Processors. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:188-197 [Conf ] Kun Zhang , Hong Zhang , Jian Xu An Efficient Distributed Dynamic Multicast Routing with Delay and Delay Variation Constraints. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:198-207 [Conf ] Jian Zhai , Qing Li , Xiang Li Data Caching in Selfish MANETs. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:208-217 [Conf ] Hengchang Liu , Baohua Zhao Optimal Scheduling for Link Assignment in Traffic-Sensitive STDMA Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:218-228 [Conf ] Wenfeng Du , Lidong Lin , Weijia Jia , Guojun Wang Modeling and Performance Evaluation of Handover Service in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:229-238 [Conf ] Donghoi Kim , Joinin Kim The Optimum Parameter Design for WCDMA Intra-frequency Handover Initiation. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:239-248 [Conf ] Jian-Wu Zhang , Jia-Rong Xi A New Location Management Scheme for the Next-Generation Mobile Cellular Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:249-258 [Conf ] Jun Tian , Abdelsalam Helal Rapid Mobility of Mobile IP over WLAN. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:259-267 [Conf ] Yong-Jin Lee , Mohammed Atiquzzaman Least Cost Multicast Spanning Tree Algorithm for Local Computer Network. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:268-275 [Conf ] Miae Woo , Ho-Hyun Park A New Multicast Group Management Scheme for IP Mobility Support. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:276-285 [Conf ] Chen-guang Xu , Yin-long Xu , Jun-min Wu On the Minimization of the Number of Forwarding Nodes for Multicast in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:286-294 [Conf ] Guoliang Xie , Mingwei Xu , Kwok-Yan Lam , Qian Wu The Impact of Mobility Modeling in Mobile IP Multicast Research. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:295-304 [Conf ] Fangai Liu , Ying Song Broadcast in the Locally k-Subcube-Connected Hypercube Networks with Faulty Tolerance. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:305-313 [Conf ] Xian Liu , Yupo Chan Performance Analysis of Route Discovery in Wireless Ad Hoc Networks: A Unified Model. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:314-323 [Conf ] Hyun Kyung Cho , Eun Seok Kim , Dae-Wook Kang A Load-Balancing Control Method Considering Energy Consumption Rate in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:324-333 [Conf ] Mingmei Li , Eiji Kamioka , Shigeki Yamada , Yang Cui Efficient Node Forwarding Strategies via Non-cooperative Game for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:334-343 [Conf ] Guangming Hu , Xiaohui Kuang , Zhenghu Gong A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:344-353 [Conf ] Insu Jeong , Yeonkwon Jeong , Joongsoo Ma , Daeyoung Kim Enhanced Positioning Probability System for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:354-363 [Conf ] Guojun Wang , Lifan Zhang , Jiannong Cao A Virtual Circle-Based Clustering Algorithm with Mobility Prediction in Large-Scale MANETs. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:364-374 [Conf ] Chia-Cheng Hu , Eric Hsiao-Kuang Wu , Gen-Huey Chen , Chiang Jui-Hao Mobility-Aware On-demand Global Hosts for Ad-Hoc Multicast. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:375-384 [Conf ] Weiping Zhu Bottom Up Algorithm to Identify Link-Level Transition Probability. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:385-394 [Conf ] Wang Hao , Yan Wei An Extended GIX /M/1/N Queueing Model for Evaluating the Performance of AQM Algorithms with Aggregate Traffic. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:395-404 [Conf ] Min Song , Sachin Shetty , Wu Li Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:405-413 [Conf ] Ilhyung Jung , Hwa Jong Kim , Jun Kyun Choi Detour Path Optimization Algorithm Based on Traffic Duration Time in MPLS Network. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:414-422 [Conf ] Yu-Kwong Kwok , Rohit Tripathi , Yu Chen , Kai Hwang HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:423-432 [Conf ] Jianhua Yang , Shou-Hsuan Stephen Huang Improved Thumbprint and Its Application for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:433-442 [Conf ] Jinkeun Hong , Kihong Kim Performance Enhancement of Wireless Cipher Communication. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:443-451 [Conf ] Hongyun Xu , Xinwen Fu , Ye Zhu , Riccardo Bettati , Jianer Chen , Wei Zhao SAS: A Scalar Anonymous Communication System. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:452-461 [Conf ] Runhua Shi , Jiaxing Cheng Two New Fast Methods for Simultaneous Scalar Multiplication in Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:462-470 [Conf ] En Cheng , Hai Jin , Zongfen Han , Jianhua Sun Network-Based Anomaly Detection Using an Elman Network. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:471-480 [Conf ] Yuan He , Yi Zhang , Jiang Guo On Mitigating Network Partitioning in Peer-to-Peer Massively Multiplayer Games. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:481-490 [Conf ] Lina Zhao , Yin Zhang , Sanyuan Zhang , Xiuzi Ye P2P-Based Software Engineering Management. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:491-500 [Conf ] Wei Lin , Yongtian Yang , Shuqin Zhang A Computational Reputation Model in P2P Networks Based on Trust and Distrust. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:501-508 [Conf ] Jianqiang Hu , Changguo Guo , Huaimin Wang , Peng Zou Web Services Peer-to-Peer Discovery Service for Automated Web Service Composition. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:509-518 [Conf ] Jian Chen , Liangyi Ou , Jian Yin , Jin Huang Efficient Mining of Cross-Transaction Web Usage Patterns in Large Database. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:519-528 [Conf ] Yuan Zhang , Bo Yang Delay-Constrained Multicasting with Power-Control in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:529-538 [Conf ] Ruidong Li , Jie Li , Hisao Kameda Distributed Hierarchical Access Control for Secure Group Communications. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:539-548 [Conf ] Weijia Jia , Wanqing Tu , Jie Wu Hierarchical Multicast Tree Algorithms for Application Layer Mesh Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:549-559 [Conf ] Jiannong Cao , Lin Liao , Guojun Wang , Bin Xiao A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:560-569 [Conf ] DaDong Wang , Hongjun Wang , YuHui Zhao , Yuan Gao Interdomain Traffic Control over Multiple Links Based on Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:570-579 [Conf ] S. Suresh , Özdemir Göl Congestion Management of IP Traffic Using Adaptive Exponential RED. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:580-589 [Conf ] Hyung-Jin Lim , Dong-Young Lee , Tae-Kyung Kim , Tai-Myoung Chung An Analysis and Evaluation of Policy-Based Network Management Approaches. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:590-599 [Conf ] Huagang Shao , Weinong Wang An End-to-End QoS Provisioning Architecture in IPv6 Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:600-609 [Conf ] Francesco Palmieri , Ugo Fiore Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:610-619 [Conf ] Fangcheng Tang , Lu Ruan A Protection Tree Scheme for First-Failure Protection and Second-Failure Restoration in Optical Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:620-631 [Conf ] Ling Zhang , Chengbo Huang , Jie Zhou Distributed Dynamic Resource Management for the AF Traffic of the Differentiated Services Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:632-641 [Conf ] Qiang Li , Qinyuan Feng , Kun Liu , Jiubin Ju Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:642-651 [Conf ] Yanlei Shang , Shiduan Cheng An Enhanced Packet Scheduling Algorithm for QoS Support in IEEE 802.16 Wireless Network. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:652-661 [Conf ] Wenyu Gao , Jianxin Wang , Songqiao Chen A Novel Core Stateless Virtual Clock Scheduling Algorithm. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:662-671 [Conf ] Yong Jiang , Jianping Wu Proportional Differentiated Services for End-to-End Traffic Control. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:672-681 [Conf ] Tingxin Yan , Yanzhong Bi , Limin Sun , Hongsong Zhu Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:682-691 [Conf ] Jun Shen , Kun Yang , Shaochun Zhong A Prediction-Based Location Update Algorithm in Wireless Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:692-701 [Conf ] Ming Liu , Ming T. Liu , David Q. Liu Combining Power Management and Power Control in Multihop IEEE 802.11 Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:702-711 [Conf ] Min-Te Sun , Xiaoli Ma , Chih-Wei Yi , Chuan-Kai Yang , Ten-Hwang Lai Minimum Disc Cover Set Construction in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:712-721 [Conf ] Liang Ou , Xiansi Tan , Huaxiong Yao , Wenqing Cheng A Study on Dynamic Load Balanced Routing Techniques in Time-Slotted Optical Burst Switched Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:722-731 [Conf ] Xiaole Bai , Marcin Matuszewski , Shuping Liu , Raimo Kantola A Novel Multi-path Routing Protocol. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:732-741 [Conf ] Zhe Yuan , Jun Zhang , Zhongkan Liu A Simplified Routing and Simulating Scheme for the LEO/MEO Two-Layered Satellite Network. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:742-751 [Conf ] Xiaozhe Zhang , Wei Peng , Peidong Zhu ARS: An Synchronization Algorithm Maintaining Single Image Among Nodes' Forwarding Tables of Clustered Router. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:752-761 [Conf ] Baosheng Wang , Xicheng Lu Design and Implementation of Control-Extensible Router. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:762-771 [Conf ] Zhitang Li , Wei Guo , Fuquan Xu Dependable Propagating Routing Information in MANET. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:772-780 [Conf ] Weirong Jiang Data Structure Optimization of AS_PATH in BGP. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:781-788 [Conf ] Wen-hua Dou , Ming Liu , He-ying Zhang , Yan-xing Zheng A Framework for Designing Adaptive AQM Schemes. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:789-799 [Conf ] Li Qing , Qingxin Zhu , Mingwen Wang Designing Adaptive PI Algorithm Based on Single Neuron. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:800-807 [Conf ] Kebo Wang , Zhiying Wang , Yan Jia , Weihong Han An Optimal Component Distribution Algorithm Based on MINLP. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:808-816 [Conf ] Hong-Wei Sun , Kwok-Yan Lam , Siu Leung Chung , Ming Gu , Jia-Guang Sun An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:817-825 [Conf ] Guiling Zhang Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:826-835 [Conf ] Jianhong Zhang , Jiancheng Zou , Yumin Wang A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:836-844 [Conf ] Shiqun Li , Kefei Chen , Xiangxue Li , Rongxing Lu Identity Based Conference Key Distribution Scheme from Parings. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:845-852 [Conf ] Tianbo Lu , Binxing Fang , Yuzhong Sun , Li Guo Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:853-862 [Conf ] Lin Qiao , Weitong Huang , Qi Wen , Xiaolong Fu An Integrated Information Retrieval Support System for Multiple Distributed Heterogeneous Cross-Lingual Information Sources. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:863-872 [Conf ] Jinlong Wang , Congfu Xu , Huifeng Shen , Zhaohui Wu , Yunhe Pan DHAI: Dynamic Hierarchical Agent-Based Infrastructure for Supporting Large-Scale Distributed Information Processing. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:873-882 [Conf ] Chi-Hung Chi , Hongguang Wang , William Ku Server-Assisted Bandwidth Negotiation Mechanism for Parallel Segment Retrieval of Web Objects. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:883-890 [Conf ] Lu Yan , Zhang Liang Multiple Schema Based XML Indexing. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:891-900 [Conf ] Qing Xiong , Chanle Wu , Jianbing Xing , Libing Wu , Huyin Zhang A Linked-List Data Structure for Advance Reservation Admission Control. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:901-910 [Conf ] Tsung-Chuan Huang , Sheng-Yi Wu An Adaptive Gateway Discovery Algorithm for the Integrated Network of Internet and MANET. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:911-920 [Conf ] Yi Sun , Jihua Zhou , Jinglin Shi A Sender-Oriented Back-Track Enabled Resource Reservation Scheme. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:921-930 [Conf ] Fang Qi , Jin Zheng , Weijia Jia , Guojun Wang Available Bandwidth Measurement Schemes over Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:931-940 [Conf ] Fei Ge , Yang Cao , Yuan-ni Wang Chaotic Dynamic Analysis of MPEG-4 Video Traffic and Its Influence on Packet Loss Ratio. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:941-950 [Conf ] Yan Wei , Cheng Yuan , Ren Maosheng A Simple Streaming Media Transport Protocols Based on IPv6 QoS Mechanism. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:951-960 [Conf ] Cheng-Yuan Ho , Chen-Hua Shih , Yaw-Chung Chen , Yi-Cheng Chan An Aided Congestion Avoidance Mechanism for TCP Vegas. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:961-971 [Conf ] Jun Jiang , Chen He , Ling-ge Jiang On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:972-981 [Conf ] Meng Wang , Hui Li , Zhijing Liu Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:982-991 [Conf ] F. An , X. Cheng , J. M. Rivera , J. Li , Z. Cheng PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:992-1001 [Conf ] Amandeep Thukral , Xukai Zou Secure Group Instant Messaging Using Cryptographic Primitives. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1002-1011 [Conf ] Cungang Yang , Chang N. Zhang A Privacy Enhanced Role-Based Access Control Model for Enterprises. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1012-1021 [Conf ] Xin Xu , Bofeng Zhang , Qiuxi Zhong Text Categorization Using SVMs with Rocchio Ensemble for Internet Information Classification. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1022-1031 [Conf ] Feng Zhao , JinShu Su , Xiaomei Cheng OpenRouter: A TCP-Based Lightweight Protocol for Control Plane and Forwarding Plane Communication. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1032-1041 [Conf ] Wenjie Li , Lei Shi , Yang Xu , Bin Liu Efficient Approach to Merge and Segment IP Packets. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1042-1051 [Conf ] Hui Zhou , Yongji Wang , Qing Wang Measuring Internet Bottlenecks: Location, Capacity, and Available Bandwidth. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1052-1062 [Conf ] Kai Wang , Zhong-Cheng Li , Feng Yang , Qi Wu , Jingping Bi Experiment and Analysis of Active Measurement for Packet Delay Dynamics. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1063-1072 [Conf ] Mingqiao Wu , Zhongliang Zhu , Shiyao Jin A New Steganalytic Algorithm for Detecting Jsteg. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1073-1082 [Conf ] Mingfeng Tan , Zexin Lu , Lei Gao Packet Classification Algorithm Using Multiple Subspace Intersecting. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1083-1093 [Conf ] Ping Li , Lalin Jiang , Jiayin Wu , Jing Zhang RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1094-1104 [Conf ] Jianghua Lv , Shilong Ma , Aili Wang , Jing Pan Using Ambient in Computational Reflection Semantics Description. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1105-1114 [Conf ] Sangho Yi , Geunyoung Park , Junyoung Heo , Jiman Hong , Gwangil Jeon , Yookun Cho Energy Aware Routing Based on Adaptive Clustering Mechanism for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1115-1124 [Conf ] Jin Zhang , Ya-Ping Lin , Mu Lin , Ping Li , Si-wang Zhou Curve-Based Greedy Routing Algorithm for Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1125-1133 [Conf ] Hai-gang Gong , Ming Liu , Yinchi Mao , Li-jun Chen , Li Xie Traffic Adaptive MAC Protocol for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1134-1143 [Conf ] Lionel M. Ni , Yanmin Zhu , Jian Ma , Minglu Li , Qiong Luo , Yunhao Liu , S. C. Cheung , Qiang Yang Semantic Sensor Net: An Extensible Framework. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1144-1153 [Conf ] Yanping Li , Xin Wang , Florian Baueregger , Xiangyang Xue , C. K. Toh Loop-Based Topology Maintenance in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1154-1162 [Conf ] Chuan-dong Huang , Fan Jiang Generating Minimal Synchronizable Test Sequence That Detects Output-Shifting Faults. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1163-1170 [Conf ] Hao Yin , Zhangxi Tan , Chuang Lin , Geyong Min , Xiaowen Chu Considering Network Context for Efficient Simulation of Highly Parallel Network Processors. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1171-1180 [Conf ] Xianghui Liu , Jianping Yin , Zhiping Cai , Shaohe Lv On the Placement of Active Monitor in IP Network. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1181-1187 [Conf ] Yinan Jing , Jingtao Li , Gendu Zhang An Adaptive Edge Marking Based Hierarchical IP Traceback System. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1188-1197 [Conf ] Jin Wu , Karim Djemame FAOM: A Novel Active Queue Management with Fuzzy Logic for TCP-Based Interactive Communications. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1198-1207 [Conf ] Wanjun Huang , Xiaohua Fan , Christoph Meinel A CORBA-Based Dynamic Reconfigurable Middleware. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1208-1217 [Conf ] Chunqing Wu , Xuejun Yang An Integrated Architecture for QoS-Enable Router and Grid-Oriented Supercomputer. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1218-1226 [Conf ] Dechang Pi , Qiang Wang , Weiqi Li , Jun Lv APA: An Interior-Oriented Intrusion Detection System Based on Multi-agents. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1227-1233 [Conf ] Jian-min He , Rui Min , Yuan-yuan Wang Implementation of Ant Colony Algorithm Based-On Multi-agent System. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1234-1242 [Conf ] Yongjian Yang , Yajun Chen , Xiaodong Cao , Jiubin Ju Load Balancing Using Mobile Agent and a Novel Algorithm for Updating Load Information Partially. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1243-1252 [Conf ] Ling Gao , Zheng Wang , Ting Zhang Online Internet Traffic Prediction Models Based on MMSE. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1253-1262 [Conf ] Changzheng Zhu , Zhaolin Yin , Aijuan Zhang Mobile Code Security on Destination Platform. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1263-1270 [Conf ] Yin-Qiao Peng , Shi-Yi Xie , Yue-Feng Chen , Rui Deng , Ling-Xi Peng A Publicly Verifiable Authenticated Encryption Scheme with Message Linkages. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1271-1276 [Conf ] Chunxiang Gu , Yuefei Zhu Provable Security of ID-Based Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1277-1286 [Conf ] Heng Pan , JingFeng Li , Yuefei Zhu , DaWei Wei A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1287-1294 [Conf ]