The SCEAS System
Navigation Menu

Conferences in DBLP

Advanced Information Networking and Applications (aina)
2007 (conf/aina/2007w1)

  1. Lei Liang, Peter Graham
    Assessment of a Mobile Agent Based Routing Protocol for Mobile Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:1-5 [Conf]
  2. B. S. Manoj, R. Hegde, B. D. Rao, Ramesh R. Rao
    Sentient Networks: A New Dimension in Network Capability. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:6-11 [Conf]
  3. Hyung-Min Koo, In-Young Ko
    A Cell-Based Approach for Evolutionary Component Repositories for Intelligent Service Robots. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:12-17 [Conf]
  4. Amjad Gawanmeh, Sofiène Tahar
    Rank Theorems for Forward Secrecy in Group Key Management Protocols. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:18-23 [Conf]
  5. Amy Beth Corman, Peter Schachte, Vanessa Teague
    A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:24-29 [Conf]
  6. Vesselin Tzvetkov, Holger Zuleger
    Service Provider Implementation of SIP Regarding Security. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:30-35 [Conf]
  7. Fareed Zaffar, Gershon Kedem
    A Service Architecture for Countering Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:36-42 [Conf]
  8. Md. Ashiqur Rahman, Sajid Hussain
    Effective Caching in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:43-47 [Conf]
  9. Ying-Hong Wang, Chih-Peng Hsu, Chien-Min Lee, Kuo-Feng Huang, Ting-Wei Chang
    A Location Mechanism with Mobile Reference Nodes in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:48-55 [Conf]
  10. Malka Halgamuge
    Efficient Battery Management for Sensor Lifetime. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:56-61 [Conf]
  11. Keiji Ozaki, Naohiro Hayashibara, Makoto Takizawa
    Coordination Protocols of Multiple Actuator Nodes in a Multi-Actuator/Multi-Sensor Model. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:62-67 [Conf]
  12. Satoshi Kurihara, Kensuke Fukuda, Shin-ya Sato, Toshiharu Sugawara
    Multi-Agent Coordination Mechanism Based on Indirect Interaction. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:68-72 [Conf]
  13. Andreas Rott
    Self-Healing in Distributed Network Environments. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:73-78 [Conf]
  14. Ageliki Tsioliaridou, Christos V. Samaras, Vassilis Tsaoussidis
    On the Miscollaboration of Congestion Control Mechanisms at the Transport and the Network Layers. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:79-84 [Conf]
  15. Han-Ching Wu, Shou-Hsuan Stephen Huang
    Detecting Stepping-Stone with Chaff Perturbations. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:85-90 [Conf]
  16. Sheng Di, Hai Jin, Shengli Li, Ling Chen, Li Qi, Chengwei Wang
    Ontology Based Grid Information Interoperation. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:91-96 [Conf]
  17. Ying-Hong Wang, Chin-Yung Yu, Ping-Fang Fu
    A Coverage and Connectivity Method to Cluster Topology in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:97-102 [Conf]
  18. Toshiki Watanabe, Takahiro Hara, Yuki Kido, Shojiro Nishio
    An Update Propagation Strategy for Delay Reduction and Node Failure Tolerance in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:103-108 [Conf]
  19. Chen Yang, Furong Wang, Xinmei Wang
    Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:109-112 [Conf]
  20. Xiandeng He, Changxing Pei, Changhua Zhu, Jiandong Li
    BER Analysis of a GMSK System Using Decision Feedback. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:113-118 [Conf]
  21. David Argles, Alex Pease, Robert John Walters
    An Improved Approach to Secure Authentication and Signing. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:119-123 [Conf]
  22. Sudip Misra, B. John Oommen
    The Pursuit Automaton Approach for Estimating All-Pairs Shortest Paths in Dynamically Changing Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:124-129 [Conf]
  23. I-Hsuan Peng, Kuo-Wei Peng, Yen-Wen Chen
    Cross Layer Routing for Reliable Connections in IP over WDM Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:130-135 [Conf]
  24. Chao Peng, Yasuo Tan, Laurence Tianruo Yang
    New Algorithms for the Minimum-Cost Single-Source Unsplittable Flow Problem. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:136-141 [Conf]
  25. Masafumi Watari, Atsushi Tagami, Teruyuki Hasegawa, Shigehiro Ano
    A Scalable and Efficient Client Emulation Method for IP Multicast Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:142-147 [Conf]
  26. Akio Koyama, Junpei Arai, Satoshi Sasaki, Takuya Numajiri, Leonard Barolli
    Implementation and Field Experiments of a Remote Medical-Care Supporting System. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:148-153 [Conf]
  27. Yosuke Sato, Yuya Maita, Koji Hashimoto, Yoshitaka Shibata
    Performance Evaluation of a New Teleconference System by High Definition Omni-Directional Video Transmission. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:154-159 [Conf]
  28. Jinfeng Zhang, Jianwei Niu, Rui He, Jian Ma
    Adaptive Video Streaming over P2P Multi-Hop Path. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:160-165 [Conf]
  29. Akhilesh Shrestha, Liudong Xing
    Common-Cause Failure Analysis for Dynamic Hierarchical Systems. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:166-171 [Conf]
  30. Enchang Sun, Bin Tian, Yongchao Wang, Kechu Yi
    Quasi-Orthogonal Time Division Multiplexing and Its Applications under Rayleigh Fading Channels. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:172-176 [Conf]
  31. Dominik Jungo, David Buchmann, Ulrich Ultes-Nitsche
    Assessment of Code Quality through Classification of Unit Tests in VeriNeC. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:177-182 [Conf]
  32. Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong
    Specification Synthesis for Monitoring and Analysis of MANET Protocols. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:183-187 [Conf]
  33. Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch
    A Traffic Classification Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:188-193 [Conf]
  34. Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata
    A New Approach to Early Detection of an Unknown Worm. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:194-198 [Conf]
  35. Hiroaki Kikuchi, Yuichi Nakamura
    Online and Offline Presence Information Integrated with RFID and Instant Messaging Agent. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:199-202 [Conf]
  36. Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao
    Conditional Random Fields for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:203-208 [Conf]
  37. Chung-Ming Huang, Ching-Hsien Tsai
    WiMP-SCTP: Multi-Path Transmission Using Stream Control Transmission Protocol (SCTP) in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:209-214 [Conf]
  38. Hiroyuki Hisamatsu, Go Hasegawa, Masayuki Murata
    Sizing Router Buffers for Large-Scale TCP/IP Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:215-219 [Conf]
  39. Luis H. García-Muñoz, José Enrique Armendáriz-Iñigo, Hendrik Decker, Francesc D. Muñoz-Escoí
    Recovery Protocols for Replicated Databases - A Survey. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:220-227 [Conf]
  40. Takuo Nakashima, Toshinori Sueyoshi
    Self-Similar Property for TCP Traffic under the Bottleneck Restrainment. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:228-233 [Conf]
  41. Joao Paulo F. de Oliveira, Michael Schuenck, Glêdson Elias da Silveira
    Sharing Software Components Using a Service-Oriented, Distributed and Secure Infrastructure. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:234-239 [Conf]
  42. Roman Y. Shtykh, Qun Jin
    Enhancing IR with User-Centric Integrated Approach of Interest Change Driven Layered Profiling and User Contributions. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:240-245 [Conf]
  43. Atsushi Watanabe, Hiroshi Haruki, Shun Shimotomai, Takeshi Saito, Tomoyuki Nagase, Yoshio Yoshioka, Yoshiei Hasegawa
    A New Mutable Nonlinear Transformation Algorithm for S-box. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:246-251 [Conf]
  44. Paula Cecilia Fritzsche, Dolores Rexachs, Emilio Luque
    A Computational Approach to TSP Performance Prediction Using Data Mining. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:252-259 [Conf]
  45. Elisa Noguera, Fernando Llopis, Antonio Ferrández, Alberto Escapa
    Evaluation of Open-Domain Question Answering Systems within a Time Constraint. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:260-265 [Conf]
  46. Kelvin Wu, Lei Yu, Michal Cutler
    Towards Answering How do I Questions Using Classification. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:266-271 [Conf]
  47. M. Mohandes, S. I. Quadri, Mohamed Deriche
    Arabic Sign Language Recognition an Image-Based Approach. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:272-276 [Conf]
  48. Yuanning Liu, Xiaodong Zhu, Lingge Sui, Zhen Liu
    Morphological Zerotree Compression Coding Based on Integer Wavelet Transform for Iris Image. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:277-282 [Conf]
  49. Shisanu Tongchim, Virach Sornlertlamvanich, Hitoshi Isahara
    Examining the Feasibility of Metasearch Based on Results of Human Judgements on Thai Queries. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:283-288 [Conf]
  50. Dany Gebara, Reda Alhajj
    WaveQ: Combining Wavelet Analysis and Clustering for Effective Image Retrieval. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:289-294 [Conf]
  51. Xuheng Xu, Xiaodan Zhang, Xiaohua Hu
    Using Two-Stage Concept-Based Singular Value Decomposition Technique as a Query Expansion Strategy. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:295-300 [Conf]
  52. Jian Wen, Zhoujun Li, Lijuan Zhang, Xiaohua Hu, Huowang Chen
    A New Method of Cluster-Based Topic Language Model for Genomic IR. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:301-306 [Conf]
  53. Masashi Inoue
    Mining Visual Knowledge for Multi-Lingual Image Retrieval. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:307-312 [Conf]
  54. Karlheinz E. S. Toni
    Proactive Documents--A New Paradigm to Access Document Information from Various Contexts. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:313-320 [Conf]
  55. L. M. Spracklin, Lawrence V. Saxton
    Filtering Spam Using Kolmogorov Complexity Estimates. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:321-328 [Conf]
  56. Jiawei Rong, Dejing Dou, Gwen A. Frishkoff, Robert Frank, Allen D. Malony, Don M. Tucker
    A Semi-Automatic Framework for Mining ERP Patterns. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:329-334 [Conf]
  57. Jia Zeng, Reda Alhajj
    Effectiveness of Multi-Perspective Representation Scheme on Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:335-340 [Conf]
  58. Kin Fun Li, Darshika G. Perera
    An Investigation of Chip-Level Hardware Support for Web Mining. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:341-348 [Conf]
  59. Jee-Hyub Kim, Melanie Hilario
    Learning Relations and Information Extraction Rules for Protein Annotation. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:349-354 [Conf]
  60. Fatima Ashraf, Reda Alhajj
    ClusTex: Information Extraction from HTML Pages. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:355-360 [Conf]
  61. Yuan J. Lui, Richard Brent, Ani Calinescu
    Extracting Significant Phrases from Text. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:361-366 [Conf]
  62. Jacob Kogan
    Hybrid Clustering of Large Text Data. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:367-372 [Conf]
  63. Sayed W. Qaiyumi, Daniel Stamate
    Reduction in Dimensions and Clustering Using Risk and Return Model. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:373-378 [Conf]
  64. Quang Minh Vu, Tomonari Masada, Atsuhiro Takasu, Jun Adachi
    Using Web Directories for Similarity Measurement in Personal Name Disambiguation. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:379-384 [Conf]
  65. Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai
    Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:385-391 [Conf]
  66. Tian Zhu, Sixue Bai
    A Parallel Mining Algorithm for Closed Sequential Patterns. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:392-395 [Conf]
  67. Adam J. Elbirt
    Fast and Efficient Implementation of AES via Instruction Set Extensions. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:396-403 [Conf]
  68. Peter Lory
    Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:404-408 [Conf]
  69. Eun-Kyung Ryu, Tsuyoshi Takagi
    Efficient Conjunctive Keyword-Searchable Encryption. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:409-414 [Conf]
  70. Birger Tödtmann, Erwin P. Rathgeb
    Advanced Packet Filter Placement Strategies for Carrier-Grade IP-Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:415-423 [Conf]
  71. Gansen Zhao, David Chadwick, Sassa Otenko
    Obligations for Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:424-431 [Conf]
  72. Chunming Rong, Won-Chol Kim
    Effective Storage Security in Incompletely Trusted Environment. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:432-437 [Conf]
  73. Canming Jiang, Bao Li, Haixia Xu
    An Efficient Scheme for User Authentication in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:438-442 [Conf]
  74. Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry
    Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:443-450 [Conf]
  75. Qinghua Wang, Tingting Zhang
    Detecting Anomaly Node Behavior in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:451-456 [Conf]
  76. Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen
    Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:457-462 [Conf]
  77. Vandana Gunupudi, Stephen R. Tate
    Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:463-469 [Conf]
  78. Janne Merete Hagen, Tormod Kalberg Sivertsen, Chungming Rong
    Information Security Threats and Access Control Practices in Norwegian Businesses. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:470-476 [Conf]
  79. Slim Trabelsi, Laurent Gomez, Yves Roudier
    Context-Aware Security Policy for the Service Discovery. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:477-482 [Conf]
  80. Lau Cheuk Lung, Marcelo Shinji Higashiyama, Rafael R. Obelheiro, Joni da Silva Fraga
    Adapting the UCON_ABC Usage Control Policies on CORBASec Infrastructure. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:483-488 [Conf]
  81. Giovanni Russello, Changyu Dong, Naranker Dulay
    Enforcing Fine-Grained Authorization Policies for Java Mobile Agents. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:489-496 [Conf]
  82. Feike W. Dillema, Simone Lupetti, Tage Stabell-Kulø
    A Decentralized Authorization Architecture. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:497-504 [Conf]
  83. Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
    Conflict Detection and Resolution in Context-Aware Authorization. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:505-511 [Conf]
  84. Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen
    Authenticated Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:512-518 [Conf]
  85. Sunam Ryu, Kevin Butler, Patrick Traynor, Patrick Drew McDaniel
    Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:519-524 [Conf]
  86. Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw
    A Certified Email Protocol Using Key Chains. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:525-530 [Conf]
  87. Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
    Heuristics for Improving Cryptographic Key Assignment in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:531-536 [Conf]
  88. Khaled Masmoudi, Hossam Afifi
    An Identity-Based Key Management Framework for Personal Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:537-543 [Conf]
  89. Ford-Long Wong, Hoon Wei Lim
    Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:544-550 [Conf]
  90. H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar
    A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:551-556 [Conf]
  91. Srinivas Mukkamala, K. Yendrapalli, R. B. Basnet, Andrew H. Sung
    Detecting Coordinated Distributed Multiple Attacks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:557-562 [Conf]
  92. Neil C. Rowe
    Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:563-568 [Conf]
  93. Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig
    Intrusion Detection for Encrypted Web Accesses. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:569-576 [Conf]
  94. Byungseung Kim, Saewoong Bahk
    Relative Entropy-Based Filtering of Internet Worms by Inspecting TCP SYN Retry Packets. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:577-582 [Conf]
  95. Lifu Wang, Partha Dasgupta
    Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:583-589 [Conf]
  96. Thawatchai Chomsiri
    HTTPS Hacking Protection. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:590-594 [Conf]
  97. Azzam Mourad, Marc-Andre Laverdiere, Mourad Debbabi
    Towards an Aspect Oriented Approach for the Security Hardening of Code. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:595-600 [Conf]
  98. Ping Yu, Stephen R. Tate
    An Online/Offline Signature Scheme Based on the Strong RSA Assumption. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:601-606 [Conf]
  99. Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert
    Authenticating Feedback in Multicast Applications Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:607-613 [Conf]
  100. Daniel Kouril, Ludek Matyska, Michal Procházka
    A Robust and Efficient Mechanism to Distribute Certificate Revocation Information Using the Grid Monitoring Architecture. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:614-619 [Conf]
  101. Ronggong Song, Larry Korba, George Yee
    Privacy Rights Management for Privacy Compliance Systems. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:620-625 [Conf]
  102. Jakob Illeborg Pagter, Michael Østergaard Pedersen
    The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:626-631 [Conf]
  103. Hilmi Günes Kayacik, A. Nur Zincir-Heywood
    On the Contribution of Preamble to Information Hiding in Mimicry Attacks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:632-638 [Conf]
  104. Nawar Malhis, Kelvin Xi Zhang, B. F. Francis Ouellette
    Detecting Protein-Domains DNA-Motifs Association in Saccharomyces cerevisiae Regulatory Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:639-644 [Conf]
  105. Wendy Osborn
    A Spatial Indexing Approach for Protein Structure Modeling. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:645-650 [Conf]
  106. José Antônio Fernandes de Macêdo, Fabio Porto, Sérgio Lifschitz, Philippe Picouet
    Dealing with Some Conceptual Data Model Requirements for Biological Domains. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:651-656 [Conf]
  107. Mingjun Song, Sanguthevar Rajasekaran
    A Greedy Correlation-Incorporated SVM-Based Algorithm for Gene Selection. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:657-661 [Conf]
  108. Monther Tarawneh, Bing Bing Zhou, Pinghao Wang, Albert Y. Zomaya
    Investigation of Relationships among Excavate Taxa Using a New Quartet-Based Phylogenetic Analysis Method. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:662-667 [Conf]
  109. Georges Valétudie, Jacky Desachy, Christophe Sola
    Markov Models to Classify M. tuberculosis Spoligotypes. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:668-671 [Conf]
  110. Santan Challa, Parimala Thulasiraman
    A Graph Based Approach to Discover Conserved Regions in DNA and Protein Sequences. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:672-677 [Conf]
  111. Mohammed Al-Shalalfa, Reda Alhajj
    Attractive Feature Reduction Approach for Colon Data Classification. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:678-683 [Conf]
  112. Wei-bang Chen, Chengcui Zhang, Xin Chen
    Biological Sequence Clustering and Classification with a Hybrid Method and Dynamic Programming. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:684-689 [Conf]
  113. Andrei Doncescu, Yoshitaka Yamamoto, Katsumi Inoue
    Biological Systems Analysis Using Inductive Logic Programming. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:690-695 [Conf]
  114. Hans De Sterck, Chen Zhang, Aleks Papo
    Database-Driven Grid Computing with GridBASE. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:696-701 [Conf]
  115. Yong Li, Xiujuan Chen, Saeid Belkasim, Yi Pan
    Parallel Contour Matching and 3D Partial Retrieval in Bio-Image Database. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:702-706 [Conf]
  116. Jamal Alhiyafi, Cavitha Sebesan, Shiyong Lu, Melphine Harriott, Deborah Jurczyszyn, Raquel P. Ritchie, Felicitas S. Gonzales, Jeffrey L. Ram
    Computational Methods for Analysis of Cryptic Recombination in the Performance of Genomic Recombination Detection Software. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:707-712 [Conf]
  117. Maria Mirto, Massimo Cafaro, Sandro Fiore, Giovanni Aloisio
    A Grid System for the Ingestion of Biological Data into a Relational DBMS. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:713-718 [Conf]
  118. Jacques Demongeot, Andrés Moreira
    A Circular Hamming Distance, Circular Gumbel Distribution, RNA Relics and Primitive Genome. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:719-726 [Conf]
  119. Hiroshi Kobayashi, Ryuzo Azuma, Akihiko Konagaya
    Kinetic Analysis of Ligand-Receptor Complex Formation with the Aid of Computer Simulation. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:727-732 [Conf]
  120. Mohammed Al-Shalalfa, Reda Alhajj
    Application of Double Clustering to Gene Expression Data for Class Prediction. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:733-738 [Conf]
  121. Mehdi Pirooznia, Youping Deng
    Efficiency of Hybrid Normalization of Microarray Gene Expression: A Simulation Study. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:739-744 [Conf]
  122. Jean-Louis Lassez, Ryan A. Rossi, Axel E. Bernal
    Crick's Hypothesis Revisited: The Existence of a Universal Coding Frame. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:745-751 [Conf]
  123. Antonio Flores, Juan L. Aragón, Manuel E. Acacio
    Sim-PowerCMP: A Detailed Simulator for Energy Consumption Analysis in Future Embedded CMP Architectures. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:752-757 [Conf]
  124. Rongrong Zhong, Yongxin Zhu, Weiwei Chen, Mingliang Lin, Weng-Fai Wong
    An Inter-Core Communication Enabled Multi-Core Simulator Based on SimpleScalar. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:758-763 [Conf]
  125. Rahman Hassan, Antony Harris, Nigel P. Topham, Aristides Efthymiou
    Synthetic Trace-Driven Simulation of Cache Memory. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:764-771 [Conf]
  126. Nan Guan, Mingsong Lv, Qingxu Deng, Ge Yu
    A Real-Time Scheduling Algorithm with Buffer Optimization for Embedded Signal Processing Systems. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:772-777 [Conf]
  127. Wei Luo, Xiao Qin, Kiranmai Bellam
    Reliability-Driven Scheduling of Periodic Tasks in Heterogeneous Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:778-783 [Conf]
  128. Karsten Walther, Jörg Nolte
    A Flexible Scheduling Framework for Deeply Embedded Systems. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:784-791 [Conf]
  129. Abhishek Pillai, Wei Zhang, Laurence Tianruo Yang
    Exploring Functional Unit Design Space of VLIW Processors for Optimizing Both Performance and Energy Consumption. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:792-797 [Conf]
  130. Mallik Kandala, Wei Zhang, Laurence Tianruo Yang
    An Area-Efficient Approach to Improving Register File Reliability against Transient Errors. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:798-803 [Conf]
  131. Gul N. Khan, Usman Ahmed
    Hardware-Software Cosynthesis of Multiprocessor Embedded Architectures. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:804-810 [Conf]
  132. Abhishek Pillai, Wei Zhang, Dimitrios Kagaris
    Detecting VLIW Hard Errors Cost-Effectively through a Software-Based Approach. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:811-815 [Conf]
  133. Adrian P. Lauf, Richard A. Peters, William H. Robinson
    Embedded Intelligent Intrusion Detection: A Behavior-Based Approach. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:816-821 [Conf]
  134. Abdulhadi Shoufan, Ralf Laue, Sorin A. Huss
    High-Flexibility Rekeying Processor for Key Management in Secure Multicast. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:822-829 [Conf]
  135. C. Gonzalez-Concejero, V. Rodellar, Agustín Álvarez Marquina, E. Martinez de Icaya, Pedro Gómez Vilda
    A Soft-Core for Pattern Recognition. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:830-834 [Conf]
  136. Katsuyoshi Matsumoto, Hideki Mori, Minoru Uehara
    Fault Tolerance in Small World Cellular Neural Networks for Image Processing. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:835-839 [Conf]
  137. Junjie Ni, Yongxin Zhu, Wei Guo
    An Improved RAIM Scheme for Processing Multiple Outliers in GNSS. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:840-845 [Conf]
  138. Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar
    Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:846-851 [Conf]
  139. Sudath Indrasinghe, Rubem Pereira, John Haggerty
    Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:852-857 [Conf]
  140. Ying-Dar Lin, Kuo-Kun Tseng, Chen-Chou Hung, Yuan-Cheng Lai
    Scalable Automaton Matching for High-Speed Deep Content Inspection. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:858-863 [Conf]
  141. F. Bouhafs, Madjid Merabti, Hala M. Mokhtar
    Mobile Event Monitoring Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:864-869 [Conf]
  142. Pi-Chung Wang, Chia-Tai Chan, Po-Yen Lin
    MAC Address Translation for Enabling Scalable Virtual Private LAN Services. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:870-875 [Conf]
  143. Rubem Pereira, Ella Pereira
    Real Time Scheduling for Audio and Video Streams. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:876-881 [Conf]
  144. Tarag Fahad, Djamel Djenouri, Robert Askwith, Madjid Merabti
    A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:882-887 [Conf]
  145. Minoru Uehara
    A Toolkit for Virtual Large-Scale Storage in a Learning Environment. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:888-893 [Conf]
  146. Kenvi Wang, Lin-Yi Peng, Tsung-Mao Chen, Szu-Yu Chen
    A Fuzzy-Based and Simulated IP Network Traffic Engineering Promoting Multi-Service Performance. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:894-899 [Conf]
  147. Stefan Wallin, Viktor Leijon
    Multi-Purpose Models for QoS Monitoring. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:900-905 [Conf]
  148. Chiou-Yng Lee, Yung-Hui Chen
    Low-Complexity Parallel Systolic Architectures for Computing Multiplication and Squaring over FG(2m). [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:906-911 [Conf]
  149. Suleiman Y. Yerima, Khalid Al-Begain
    Buffer Management for Multimedia QoS Control over HSDPA Downlink. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:912-917 [Conf]
  150. Te-Lung Liu, C. Eugene Yeh
    Planning and Design of TWAREN: Advanced National Research and Education Network in Taiwan. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:918-922 [Conf]
  151. E. C. L. Watts, Madjid Merabti, A. Taleb-Bendiab
    A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:923-928 [Conf]
  152. Fong-Hao Liu
    Constructing Enterprise Information Network Security Risk Management Mechanism by Using Ontology. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:929-934 [Conf]
  153. Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Abdennour El Rhalibi
    Bridging the Gap between Networked Appliances and Virtual Worlds. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:935-940 [Conf]
  154. Daniel Barisic, Martin Krogmann, Guido Stromberg, Peter Schramm
    Making Embedded Software Development More Efficient with SOA. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:941-946 [Conf]
  155. François Jammes, Antoine Mensch, Harm Smit
    Service-Oriented Device Communications Using the Devices Profile for Web services. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:947-955 [Conf]
  156. Elmar Zeeb, Andreas Bobek, Hendrik Bohn, Frank Golatowski
    Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web Services. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:956-963 [Conf]
  157. Markus Zajac, Brigitte Oesterdiekhoff, Chris Loeser, Hendrik Bohn
    Bilateral Service Mapping Approaches between the Different Service Oriented Architectures Web Services and UPnP. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:964-969 [Conf]
  158. Michael Ditze, Matthias Grawinkel
    Fuzzy Logic Based Admission Control for Multimedia Streams in the UPnP QoS Architecture. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:970-976 [Conf]
  159. Nicolas Van Wambeke, François Armando, Christophe Chassot, Ernesto Exposito
    Architecture and Models for Self-Adaptability of Transport Protocols. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:977-982 [Conf]
  160. Frank Bormann, Stephan Flake, Jürgen Tacken
    Convergent Online Charging for Context-Aware Mobile Services. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:983-988 [Conf]
  161. Davy Preuveneers, Julien Pauty, Dimitri Van Landuyt, Yolande Berbers, Wouter Joosen
    Comparative Evaluation of Converged Service-Oriented Architectures. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:989-994 [Conf]
  162. Farhana Zulkernine, Patrick Martin
    Conceptual Framework for a Comprehensive Service Management Middleware. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:995-1000 [Conf]
  163. Chen Wu, Elizabeth Chang
    An Analysis of Web Services Mediation Architecture and Pattern in Synapse. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:1001-1006 [Conf]
  164. Lina Fang, Shengqun Tang, Yan Yang, Ruliang Xiao, Ling Li, Xinguo Deng, Yang Xu, Youwei Xu
    An User-Driven Slight Ontology Framework Based on Meta-Ontology for Change Management. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:1007-1014 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002