|
Conferences in DBLP
- Krithi Ramamritham
Taming the Dynamics of Distributed Data. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:1- [Conf]
- Vijay Kumar
Data in Your Space. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:2-20 [Conf]
- Sharma Chakravarthy
Enabling Technologies for Harnessing Information Explosion. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:21- [Conf]
- Siddhartha Brahma, Sandeep Macharla, Sudebkumar Prasant Pal, Sudhir Kumar Singh
Fair Leader Election by Randomized Voting. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:22-31 [Conf]
- Pradeep Parvathipuram, Vijay Kumar, Gi-Chul Yang
An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:32-41 [Conf]
- Amiya K. Tripathy, Tripti Negi, Anil Singh
Distributed Balanced Tables: A New Approach. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:42-49 [Conf]
- Rajesh Kalmady, Digamber Sonvane
Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:50-59 [Conf]
- Vijay Shanker Tripathi, Sudarshan Tiwari
Performance Evaluation of a Modified-Cyclic-Banyan Based ATM/IP Switching Fabric. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:60-64 [Conf]
- Sathish Rajasekhar, Ibrahim Khalil, Zahir Tari
A Scalable and Roboust QoS Architecture for WiFi P2P Networks. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:65-74 [Conf]
- Shilpa Dhar, Krishnendu Roy, Rajgopal Kannan
NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:75-84 [Conf]
- Narottam Chand, Ramesh C. Joshi, Manoj Misra
Energy Efficient Cache Invalidation in a Disconnected Mobile Environment. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:85-95 [Conf]
- KwangJin Park, MoonBae Song, Chong-Sun Hwang
An Efficient Data Dissemination Schemes for Location Dependent Information Services. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:96-105 [Conf]
- Sharma Chakravarthy, Nishant Vontella
A Publish/Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:106-116 [Conf]
- Debmalya Biswas, K. Vidyasankar
A Nested Transaction Model for LDAP Transactions. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:117-126 [Conf]
- Ankur Gupta, Nitin Gupta, R. K. Ghosh, M. M. Gore
Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:127-134 [Conf]
- Diganta Goswami, S. Sahu
An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:135-144 [Conf]
- Pradeep K. Khosla
Cybersecurity: Opportunities and Challenges. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:145- [Conf]
- Bharat K. Bhargava, Leszek Lilien
Vulnerabilities and Threats in Distributed Systems. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:146-157 [Conf]
- Yih-Ling Hedley, Muhammad Younas, Anne E. James
A TNATS Approcah to Hidden Web Documents. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:158-167 [Conf]
- Manjeet Rege, Izabell Caraconcea, Shiyong Lu, Farshad Fotouhi
Querying XML Documents from a Relational Database in the Presence of DTDs. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:168-177 [Conf]
- M. K. MadhuMohan, Sujatha R. Upadhyaya, P. Sreenivasa Kumar
SAQI: Semantics Aware Query Interface. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:178-193 [Conf]
- Paola Flocchini, Amiya Nayak, Ming Xie
Hybrid-Chord: A Peer-to-Peer System Based on Chord. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:194-203 [Conf]
- Corina Ferdean, Mesaac Makpangou
A Generic and Flexible Model for Replica Consistency Management. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:204-209 [Conf]
- Vijayalakshmi Hadimani, R. C. Hansdah
An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:210-216 [Conf]
- Jeong-Oog Lee, Myeong-Cheol Ko, Woojin Paik, Heung Seok Jeon, Junghwan Kim, Hyun-Kyu Kang, Jinsoo Kim
The Roles of Ontology and Metadata Registry for Interoperable Databases. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:217-226 [Conf]
- Gi-Chul Yang, Sanjay Kumar Madria
DHL: Semantically Rich Dynamic and Active Hyperlinks. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:227-236 [Conf]
- Hea-Sook Park, Yan Ha, Soon-Mi Lee, Young-Whan Park, Doo-Kwon Baik
User-Class Based Service Acceptance Policy Using Cluster Analysis. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:237-242 [Conf]
- Satish Chandra
Tools and Techniques for Multi-site Sotware Development. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:243- [Conf]
- Satyajit Acharya, Chris George, Hrushikesha Mohanty
Specifying a Mobile Computing Infrastructure and Services. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:244-254 [Conf]
- Xiaoshan Li, Zhiming Liu, Jifeng He, Quan Long
Generating a Prototype from a UML Model of System Requirements. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:255-265 [Conf]
- M. Devi Prasad, Banshi Dhar Chaudhary
A Type System for an Aspect Oriented Programming Language. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:266-272 [Conf]
- Arnab Ray, Bikram Sengupta, Rance Cleaveland
Secure Requirements Elicitation Through Triggered Message Sequence Charts. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:273-282 [Conf]
- Ramakrishnan Venkitaraman, Gopal Gupta
Framework for Safe Reuse of Software Binaries. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:283-293 [Conf]
- Padmanabhan Krishnan, Lai Wang
Supporting Partial Component Matching. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:294-303 [Conf]
- Durga Prasad Mohapatra, Rajib Mall, Rajeev Kumar
A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:304-309 [Conf]
- Jianfei Yin, Heqing Guo, Xinyi Peng, Manshan Lin
Pattern Semantic Link: A Reusable Pattern Representation in MDA Context. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:310-317 [Conf]
- Johannes Maria Zaha, Marco Geisenberger, Martin Groth
Compatibility Test and Adapter Generation for Interfaces of Software Components. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:318-328 [Conf]
- Sukhamay Kundu
A Modern Graphic Flowchart Layout Tool. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:329-335 [Conf]
- Sushil Jajodia, Duminda Wijesekera
A Flexible Authorization Framework for E-Commerce. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:336-345 [Conf]
- Niranjan K. Boora, Chiranjib Bhattacharyya, K. Gopinath
Efficient Algorithms for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:346-352 [Conf]
- Samik Basu, Prem Uppuluri
Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:353-362 [Conf]
- Indrakshi Ray, Marianna Muller
Using Schemas to Simplify Access Control for XML Documents. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:363-368 [Conf]
- Vijayalakshmi Atluri, Janice Warner
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:369-378 [Conf]
- Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia
Implementing Consistency Checking in Correlating Attacks. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:379-384 [Conf]
- Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang
LSAD: Lightweight SYN Flooding Attack Detector. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:385-390 [Conf]
- Neelima Arora, R. K. Shyamasundar
UGSP: Secure Key Establishment Protocol for Ad-Hoc Network. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:391-399 [Conf]
- Shravan K. Rayanchu, Gautam Barua
Tracing Attackers with Deterministic Edge Router Marking (DERM). [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:400-409 [Conf]
- Sandeep S. Kulkarni, Bezawada Bruhadeshwar
Distributing Key Updates in Secure Dynamic Groups. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:410-419 [Conf]
- Jing Zhou, Brajendra Panda, Yi Hu
Succinct and Fast Accessible Data Structures for Database Damage Assessment. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:420-429 [Conf]
- Vamsi Kambhampati, Indrajit Ray, Eunjong Kim
A Secure Checkpointing Protocol for Survivable Server Design. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:430-440 [Conf]
- Ranjit Abbadasari, Ravi Mukkamala, V. Valli Kumari
MobiCoin: Digital Cash for M-Commerce. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:441-451 [Conf]
- Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
Cellular Automata : An Ideal Candidate for a Block Cipher. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:452-457 [Conf]
- S. N. Sivanandam, C. K. Gokulnath, K. Prasanna, S. Rajeev
NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:458-467 [Conf]
- Yanxin Wang, Andrew S. Miner, Johnny Wong, Prem Uppuluri
Improving Feature Selection in Anomaly Intrusion Detection Using Specifications. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:468- [Conf]
- Vishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh
Towards Automatic Learning of Valid Services for Honeypots. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:469-470 [Conf]
|