The SCEAS System
Navigation Menu

Conferences in DBLP

Distributed Computing and Internet Technology (icdcit)
2004 (conf/icdcit/2004)

  1. Krithi Ramamritham
    Taming the Dynamics of Distributed Data. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:1- [Conf]
  2. Vijay Kumar
    Data in Your Space. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:2-20 [Conf]
  3. Sharma Chakravarthy
    Enabling Technologies for Harnessing Information Explosion. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:21- [Conf]
  4. Siddhartha Brahma, Sandeep Macharla, Sudebkumar Prasant Pal, Sudhir Kumar Singh
    Fair Leader Election by Randomized Voting. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:22-31 [Conf]
  5. Pradeep Parvathipuram, Vijay Kumar, Gi-Chul Yang
    An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:32-41 [Conf]
  6. Amiya K. Tripathy, Tripti Negi, Anil Singh
    Distributed Balanced Tables: A New Approach. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:42-49 [Conf]
  7. Rajesh Kalmady, Digamber Sonvane
    Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:50-59 [Conf]
  8. Vijay Shanker Tripathi, Sudarshan Tiwari
    Performance Evaluation of a Modified-Cyclic-Banyan Based ATM/IP Switching Fabric. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:60-64 [Conf]
  9. Sathish Rajasekhar, Ibrahim Khalil, Zahir Tari
    A Scalable and Roboust QoS Architecture for WiFi P2P Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:65-74 [Conf]
  10. Shilpa Dhar, Krishnendu Roy, Rajgopal Kannan
    NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:75-84 [Conf]
  11. Narottam Chand, Ramesh C. Joshi, Manoj Misra
    Energy Efficient Cache Invalidation in a Disconnected Mobile Environment. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:85-95 [Conf]
  12. KwangJin Park, MoonBae Song, Chong-Sun Hwang
    An Efficient Data Dissemination Schemes for Location Dependent Information Services. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:96-105 [Conf]
  13. Sharma Chakravarthy, Nishant Vontella
    A Publish/Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:106-116 [Conf]
  14. Debmalya Biswas, K. Vidyasankar
    A Nested Transaction Model for LDAP Transactions. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:117-126 [Conf]
  15. Ankur Gupta, Nitin Gupta, R. K. Ghosh, M. M. Gore
    Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:127-134 [Conf]
  16. Diganta Goswami, S. Sahu
    An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:135-144 [Conf]
  17. Pradeep K. Khosla
    Cybersecurity: Opportunities and Challenges. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:145- [Conf]
  18. Bharat K. Bhargava, Leszek Lilien
    Vulnerabilities and Threats in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:146-157 [Conf]
  19. Yih-Ling Hedley, Muhammad Younas, Anne E. James
    A TNATS Approcah to Hidden Web Documents. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:158-167 [Conf]
  20. Manjeet Rege, Izabell Caraconcea, Shiyong Lu, Farshad Fotouhi
    Querying XML Documents from a Relational Database in the Presence of DTDs. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:168-177 [Conf]
  21. M. K. MadhuMohan, Sujatha R. Upadhyaya, P. Sreenivasa Kumar
    SAQI: Semantics Aware Query Interface. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:178-193 [Conf]
  22. Paola Flocchini, Amiya Nayak, Ming Xie
    Hybrid-Chord: A Peer-to-Peer System Based on Chord. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:194-203 [Conf]
  23. Corina Ferdean, Mesaac Makpangou
    A Generic and Flexible Model for Replica Consistency Management. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:204-209 [Conf]
  24. Vijayalakshmi Hadimani, R. C. Hansdah
    An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:210-216 [Conf]
  25. Jeong-Oog Lee, Myeong-Cheol Ko, Woojin Paik, Heung Seok Jeon, Junghwan Kim, Hyun-Kyu Kang, Jinsoo Kim
    The Roles of Ontology and Metadata Registry for Interoperable Databases. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:217-226 [Conf]
  26. Gi-Chul Yang, Sanjay Kumar Madria
    DHL: Semantically Rich Dynamic and Active Hyperlinks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:227-236 [Conf]
  27. Hea-Sook Park, Yan Ha, Soon-Mi Lee, Young-Whan Park, Doo-Kwon Baik
    User-Class Based Service Acceptance Policy Using Cluster Analysis. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:237-242 [Conf]
  28. Satish Chandra
    Tools and Techniques for Multi-site Sotware Development. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:243- [Conf]
  29. Satyajit Acharya, Chris George, Hrushikesha Mohanty
    Specifying a Mobile Computing Infrastructure and Services. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:244-254 [Conf]
  30. Xiaoshan Li, Zhiming Liu, Jifeng He, Quan Long
    Generating a Prototype from a UML Model of System Requirements. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:255-265 [Conf]
  31. M. Devi Prasad, Banshi Dhar Chaudhary
    A Type System for an Aspect Oriented Programming Language. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:266-272 [Conf]
  32. Arnab Ray, Bikram Sengupta, Rance Cleaveland
    Secure Requirements Elicitation Through Triggered Message Sequence Charts. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:273-282 [Conf]
  33. Ramakrishnan Venkitaraman, Gopal Gupta
    Framework for Safe Reuse of Software Binaries. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:283-293 [Conf]
  34. Padmanabhan Krishnan, Lai Wang
    Supporting Partial Component Matching. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:294-303 [Conf]
  35. Durga Prasad Mohapatra, Rajib Mall, Rajeev Kumar
    A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:304-309 [Conf]
  36. Jianfei Yin, Heqing Guo, Xinyi Peng, Manshan Lin
    Pattern Semantic Link: A Reusable Pattern Representation in MDA Context. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:310-317 [Conf]
  37. Johannes Maria Zaha, Marco Geisenberger, Martin Groth
    Compatibility Test and Adapter Generation for Interfaces of Software Components. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:318-328 [Conf]
  38. Sukhamay Kundu
    A Modern Graphic Flowchart Layout Tool. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:329-335 [Conf]
  39. Sushil Jajodia, Duminda Wijesekera
    A Flexible Authorization Framework for E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:336-345 [Conf]
  40. Niranjan K. Boora, Chiranjib Bhattacharyya, K. Gopinath
    Efficient Algorithms for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:346-352 [Conf]
  41. Samik Basu, Prem Uppuluri
    Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:353-362 [Conf]
  42. Indrakshi Ray, Marianna Muller
    Using Schemas to Simplify Access Control for XML Documents. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:363-368 [Conf]
  43. Vijayalakshmi Atluri, Janice Warner
    Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:369-378 [Conf]
  44. Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia
    Implementing Consistency Checking in Correlating Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:379-384 [Conf]
  45. Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang
    LSAD: Lightweight SYN Flooding Attack Detector. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:385-390 [Conf]
  46. Neelima Arora, R. K. Shyamasundar
    UGSP: Secure Key Establishment Protocol for Ad-Hoc Network. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:391-399 [Conf]
  47. Shravan K. Rayanchu, Gautam Barua
    Tracing Attackers with Deterministic Edge Router Marking (DERM). [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:400-409 [Conf]
  48. Sandeep S. Kulkarni, Bezawada Bruhadeshwar
    Distributing Key Updates in Secure Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:410-419 [Conf]
  49. Jing Zhou, Brajendra Panda, Yi Hu
    Succinct and Fast Accessible Data Structures for Database Damage Assessment. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:420-429 [Conf]
  50. Vamsi Kambhampati, Indrajit Ray, Eunjong Kim
    A Secure Checkpointing Protocol for Survivable Server Design. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:430-440 [Conf]
  51. Ranjit Abbadasari, Ravi Mukkamala, V. Valli Kumari
    MobiCoin: Digital Cash for M-Commerce. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:441-451 [Conf]
  52. Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
    Cellular Automata : An Ideal Candidate for a Block Cipher. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:452-457 [Conf]
  53. S. N. Sivanandam, C. K. Gokulnath, K. Prasanna, S. Rajeev
    NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:458-467 [Conf]
  54. Yanxin Wang, Andrew S. Miner, Johnny Wong, Prem Uppuluri
    Improving Feature Selection in Anomaly Intrusion Detection Using Specifications. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:468- [Conf]
  55. Vishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh
    Towards Automatic Learning of Valid Services for Honeypots. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:469-470 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002