The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Networking (ICN) (icn)
2005 (conf/icn/2005-2)

  1. Jia Hou, Moon Ho Lee, Ju Yong Park, Jeong Su Kim
    Decoding Consideration for Space Time Coded MIMO Channel with Constant Amplitude Multi-code System. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1-7 [Conf]
  2. Laurent Cariou, Jean-Francois Helard
    MIMO Frequency Hopping OFDM-CDMA: A Novel Uplink System for B3G Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:8-17 [Conf]
  3. Cheol Yong Jeon, Yeong Min Jang
    Transient Capacity Evaluation of UWB Ad Hoc Network with MIMO. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:18-25 [Conf]
  4. Ke Deng, Qinye Yin, Yiwen Zhang, Ming Luo
    Chip-by-Chip Iterative Multiuser Detection for VBLAST Coded Multiple-Input Multiple-Output Systems. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:26-33 [Conf]
  5. Yun-Lung Chen, Chienhua Chen
    The Performance Analysis of Two-Class Priority Queueing in MPLS-Enabled IP Network. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:34-41 [Conf]
  6. Praveen Kumar, Niranjan Dhanakoti, Srividya Gopalan, V. Sridhar
    Constraint Based LSP Handover (CBLH) in MPLS Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:42-49 [Conf]
  7. Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong
    Optimizing Inter-domain Multicast Through DINloop with GMPLS. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:50-57 [Conf]
  8. Jenhui Chen, Chung-Ching Chiou, Shih-Lin Wu
    A Fast Path Recovery Mechanism for MPLS Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:58-65 [Conf]
  9. Priscila Solís Barreto, Georges Amvame-Nze, C. V. Silva, Juliana Santos Sombra Oliveira, Paulo Henrique Portela de Carvalho, Humberto Abdalla Jr., Antonio José Martins Soares, Ricardo Staciarini Puttini
    A Study of Billing Schemes in an Experimental Next Generation Network. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:66-74 [Conf]
  10. Luo Wen, Jianping Wu, Ke Xu
    Overlay Logging: An IP Traceback Scheme in MPLS Network. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:75-82 [Conf]
  11. Remi Badonnel, Radu State, Olivier Festor
    Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:83-90 [Conf]
  12. Wonjong Noh, Sunshin An
    Multi-path Routing Using Local Virtual Infrastructure for Large-Scale Mobile Ad-Hoc Networks: Stochastic Optimization Approach. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:91-98 [Conf]
  13. Sebastian Speicher, Clemens H. Cap
    Candidate Discovery for Connected Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:99-106 [Conf]
  14. Djibo Karimou, Jean Frédéric Myoupo
    A Fault-Tolerant Permutation Routing Algorithm in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:107-115 [Conf]
  15. Marcos A. de Siqueira, Fabricio L. Figueiredo, Flavia M. F. Rocha, Jose A. Martins, Marcel C. de Castro
    Policy-Based Dynamic Reconfiguration of Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:116-124 [Conf]
  16. Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Byoung-Sun Choi, Jae-Kwang Lee
    V-TCP: A Novel TCP Enhancement Technique. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:125-132 [Conf]
  17. Alexander Kesselman, Yishay Mansour
    Optimizing TCP Retransmission Timeout. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:133-140 [Conf]
  18. Le Tuan Anh, Choong Seon Hong
    Stable Accurate Rapid Bandwidth Estimate for Improving TCP over Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:141-148 [Conf]
  19. Ziyu Shao, Ting Tong, Jia Jia Liao, Zhengbin Li, Ziyu Wang, Anshi Xu
    Performance Analysis of TCP Variants over Time-Space-Labeled Optical Burst Switched Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:149-155 [Conf]
  20. Cuneyt Akinlar, A. Udaya Shankar
    IPv4 Auto-Configuration of Multi-router Zeroconf Networks with Unique Subnets. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:156-163 [Conf]
  21. Said Hoceini, Abdelhamid Mellouk, Yacine Amirat
    K-Shortest Paths Q-Routing: A New QoS Routing Algorithm in Telecommunication Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:164-172 [Conf]
  22. Tarik Cicic, Audun Fosselie Hansen, Stein Gjessing, Olav Lysne
    Applicability of Resilient Routing Layers for k-Fault Network Recovery. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:173-183 [Conf]
  23. Guozhen Tan, Dong Li, Xiaohui Ping, Ningning Han, Yi Liu
    Network-Tree Routing Model for Large Scale Networks: Theories and Algorithms. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:184-191 [Conf]
  24. Eranga Perera, Aruna Seneviratne, Roksana Boreli, Michael Eyrich, Michael Wolf, Tim Leinmüller
    Failover for Mobile Routers: A Vision of Resilient Ambience. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:192-201 [Conf]
  25. Shen Lin, Yong Cui, Mingwei Xu, Ke Xu
    Quality of Service Routing Network and Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:202-209 [Conf]
  26. Nam-koo Ha, Byeong-Jik Lee, Kyung-jun Kim, Ki Jun Han
    A Partition Prediction Algorithm for Group Mobility in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:210-217 [Conf]
  27. Huda Md. Nurul, Shigeki Yamada, Eiji Kamioka
    Routing Cost Versus Network Stability in MANET. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:218-225 [Conf]
  28. Shouyi Yin, Xiaokang Lin
    Multipath Energy Efficient Routing in Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:226-233 [Conf]
  29. Hyun-Gon Seo, Ki-Hyung Kim, Won-Do Jung, Jun-Sung Park, Seung-Hwan Jo, Chang-Min Shin, Seung-Min Park, Heung-Nam Kim
    Performance of Service Location Protocols in MANET Based on Reactive Routing Protocols. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:234-241 [Conf]
  30. Guangsong Li, Wenbao Han
    A New Scheme for Key Management in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:242-249 [Conf]
  31. Arjuna Sathiaseelan, Tomasz Radzik
    Robust TCP (TCP-R) with Explicit Packet Drop Notification (EPDN) for Satellite Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:250-257 [Conf]
  32. Jin-Hee Choi, Jin-Ghoo Choi, Chuck Yoo
    Adapting TCP Segment Size in Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:258-265 [Conf]
  33. José Luis González Sánchez, Jordi Domingo-Pascual, João Chambel Vieira
    AcTMs (Active ATM Switches) with TAP (Trusted and Active PDU Transfers) in a Multiagent Architecture to Better the Chaotic Nature of TCP Congestion Control. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:266-274 [Conf]
  34. Emmanuel Lochin, Pascal Anelli, Serge Fdida
    AIMD Penalty Shaper to Enforce Assured Service for TCP Flows. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:275-283 [Conf]
  35. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato, Kozo Itano
    Name-Level Approach for Egress Network Access Control. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:284-296 [Conf]
  36. Euisuk Kang, Sook-Heon Lee, Myong-Soon Park
    Efficient Prioritized Service Recovery Using Content-Aware Routing Mechanism in Web Server Cluster. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:297-306 [Conf]
  37. Yusuke Shinohara, Norio Yamagaki, Hideki Tode, Koso Murakami
    Queue Management Scheme Stabilizing Buffer Utilization in the IP Router. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:307-317 [Conf]
  38. Changyong Zhang, Robert Rodosek
    Two Mathematically Equivalent Models of the Unique-Path OSPF Weight Setting Problem. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:318-326 [Conf]
  39. Ngoc Chi Nguyen, Nhat Minh Dinh Vo, Sungyoung Lee
    Fault Free Shortest Path Routing on the de Bruijn Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:327-334 [Conf]
  40. Ljiljana Adamovic, Karol Kowalik, Martin Collier
    Traffic Control in IP Networks with Multiple Topology Routing. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:335-342 [Conf]
  41. Jihoon Lee, Wonjong Noh
    Dynamic Path Control Scheme in Mobile Ad Hoc Networks Using On-Demand Routing Protocol. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:343-352 [Conf]
  42. Qin-yun Dai, Xiu-lin Hu, Hong-Yi Yu, Jun Zhao
    On the Capacity of Wireless Ad-Hoc Network Basing on Graph Theory. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:353-360 [Conf]
  43. Ryuji Wakikawa, Hiroki Matsutani, Rajeev Koodli, Anders Nilsson, Jun Murai
    Mobile Gateways for Mobile Ad-Hoc Networks with Network Mobility Support. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:361-368 [Conf]
  44. Sangman Moh
    Energy Consumption in Multicast Protocols for Static Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:369-376 [Conf]
  45. Guo-kai Zeng, Yin-long Xu, Ya-feng Wu, Xi Wang
    Weighted Flow Contention Graph and Its Applications in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:377-383 [Conf]
  46. Eva Gescheidtova, Radek Kubasek, Zdenek Smékal, Karel Bartusek
    Automatic Adjustment of Time-Variant Thresholds When Filtering Signals in MR Tomography. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:384-391 [Conf]
  47. Pavel Zahradnik, Miroslav Vlcek, Boris Simák
    Analytical Design of Maximally Flat Notch FIR Filters for Communication Purposes. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:392-400 [Conf]
  48. Ming Luo, Qinye Yin, Le Ding, Yiwen Zhang
    Iterative Decoding and Carrier Frequency Offset Estimation for a Space-Time Block Code System. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:401-409 [Conf]
  49. Ivo Lattenberg, Kamil Vrba, David Kubanek
    Signal Processing for High-Speed Data Communication Using Pure Current Mode Filters. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:410-416 [Conf]
  50. Kamil Vrba, Radek Sponar, David Kubanek
    Current-Mode VHF High-Quality Analog Filters Suitable for Spectral Network Analysis. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:417-424 [Conf]
  51. Jiri Schimmel, Petr Sysel
    Control of Digital Audio Signal Processing over Communication Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:425-432 [Conf]
  52. Xiaozhe Zhang, Peidong Zhu, Xicheng Lu
    Fully-Distributed and Highly-Parallelized Implementation Model of BGP4 Based on Clustered Routers. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:433-441 [Conf]
  53. Mounir Achir, Laurent Ouvry
    A Routing Protocol for Wireless Ad Hoc Sensor Networks: Multi-path Source Routing Protocol (MPSR). [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:442-453 [Conf]
  54. Vince Grolmusz, Zoltán Király
    Generalized Secure Routerless Routing. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:454-462 [Conf]
  55. Liwen He
    A Verified Distance Vector Routing Protocol for Protection of Internet Infrastructure. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:463-470 [Conf]
  56. Eli Winjum, Anne Marie Hegland, Øivind Kure, Pål Spilling
    Replay Attacks in Mobile Wireless Ad Hoc Networks: Protecting the OLSR Protocol. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:471-479 [Conf]
  57. Hui-shan Liu, Ke Xu, Mingwei Xu, Yong Cui
    S-Chord: Hybrid Topology Makes Chord Efficient. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:480-487 [Conf]
  58. Yunkuk Kim, Sangwook Kang, Donghyun Chae, Sunshin An
    Hierarchical Multi-hop Handoff Architecture for Wireless Network Mobility. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:488-495 [Conf]
  59. Norbert Jordan, Alexander Poropatich, Joachim Fabini
    Mobility Adaptation Layer Framework for Heterogeneous Wireless Networks Based on Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:496-503 [Conf]
  60. Joo-Ho Kim, Bo-Seok Moon, Myong-Soon Park
    MiSC: A New Availability Remote Storage System for Mobile Appliance. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:504-520 [Conf]
  61. Kazuhiko Kinoshita, Nariyoshi Yamai, Koso Murakami
    A Logical Network Topology Design for Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:521-530 [Conf]
  62. Nimrod Lilith, Kutluyil Dogancay
    Reduced-State SARSA Featuring Extended Channel Reassignment for Dynamic Channel Allocation in Mobile Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:531-542 [Conf]
  63. Kyungkoo Jun, Seokhoon Kang
    Call Admission Control for Next Generation Cellular Networks Using on Demand Round Robin Bandwidth Sharing. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:543-550 [Conf]
  64. Fredrik Davik, Amund Kvalbein, Stein Gjessing
    Performance Evaluation and Improvement of Non-stable Resilient Packet Ring Behavior. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:551-563 [Conf]
  65. Thomas Dreibholz, Erwin P. Rathgeb, Michael Tüxen
    Load Distribution Performance of the Reliable Server Pooling Framework. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:564-574 [Conf]
  66. Margaret M. McMahon, Eric C. Firkin
    Performance of a Hub-Based Network-Centric Application over the Iridium Satellite Network. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:575-584 [Conf]
  67. Sebastià Galmés, Ramón Puigjaner
    Performance Evaluation of Multichannel Slotted-ALOHA Networks with Buffering. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:585-596 [Conf]
  68. Shashank Khanvilkar, Ashfaq A. Khokhar
    Towards a Scalable and Flexible Architecture for Virtual Private Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:597-605 [Conf]
  69. Holger Bleul, Erwin P. Rathgeb
    A Simple, Efficient and Flexible Approach to Measure Multi-protocol Peer-to-Peer Traffic. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:606-616 [Conf]
  70. Stephen Herborn, Tim Hsin-Ting Hu, Roksana Boreli, Aruna Seneviratne
    Secure Identity and Location Decoupling Using Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:617-624 [Conf]
  71. Joaquín Caraballo Moreno, Olivier Fourmaux
    Live Streaming on a Peer-to-Peer Overlay: Implementation and Validation. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:625-633 [Conf]
  72. Vassilios M. Stathopoulos, Nikolaos D. Dragios, Nikolas Mitrou
    Distributed Object Location with Queue Management Provision in Peer-to-Peer Content Management Systems. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:634-642 [Conf]
  73. Yongquan Ma, Dongsheng Wang
    An Approach to Fair Resource Sharing in Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:643-652 [Conf]
  74. Tim Schattkowsky
    Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:653-661 [Conf]
  75. Himanshu Khurana, Rafael Bonilla, Adam J. Slagell, Raja Afandi, Hyung-Seok Hahm, Jim Basney
    Scalable Group Key Management with Partially Trusted Controllers. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:662-672 [Conf]
  76. Lubomir Cvrk, Vaclav Zeman, Dan Komosny
    H.323 Client-Independent Security Approach. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:673-680 [Conf]
  77. Vladimir S. Zaborovskii, Y. A. Shemanin, Andrey Rudskoy
    Architecture of Distributed Network Processors: Specifics of Application in Information Security Systems. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:681-688 [Conf]
  78. Gaeil Ahn, Kiyoung Kim
    Active Host Information-Based Abnormal IP Address Detection. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:689-698 [Conf]
  79. Hayriye Altunbasak, Sven Krasser, Henry L. Owen, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol
    Securing Layer 2 in Local Area Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:699-706 [Conf]
  80. Erkay Savas, Berk Sunar
    A Practical and Secure Communication Protocol in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:707-717 [Conf]
  81. Antonio Pescapè, Luca Vollero, Giulio Iannello, Giorgio Ventre
    Measuring Quality of Service Parameters over Heterogeneous IP Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:718-727 [Conf]
  82. Yaw-Chung Chen, Pi-Chung Wang, Chun-Liang Lee, Chia-Tai Chan
    Performance Improvement of Hardware-Based Packet Classification Algorithm. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:728-736 [Conf]
  83. Davide Rossi, Elisa Turrini
    Analyzing Performance Data Exchange in Content Delivery Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:737-745 [Conf]
  84. Jianping Yin, Zhiping Cai, Wentao Zhao, Xianghui Liu
    Passive Calibration of Active Measuring Latency. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:746-753 [Conf]
  85. Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong
    Application-Level Multicast Using DINPeer in P2P Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:754-761 [Conf]
  86. Guido Malpohl, Florin Isaila
    Paradis-Net. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:762-771 [Conf]
  87. Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Seung Sik Choi, Sungtek Kahng
    Reliable Mobile Ad Hoc P2P Data Sharing. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:772-780 [Conf]
  88. Stefan Zöls, Rüdiger Schollmeier, Wolfgang Kellerer, Anthony Tarlano
    The Hybrid Chord Protocol: A Peer-to-Peer Lookup Service for Context-Aware Mobile Applications. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:781-792 [Conf]
  89. Xicheng Lu, Qianbing Zheng, Peidong Zhu, Wei Peng
    LQPD: An Efficient Long Query Path Driven Replication Strategy in Unstructured P2P Network. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:793-799 [Conf]
  90. Chris Loeser, Gunnar Schomaker, André Brinkmann, Mario Vodisek, Michael Heidebuer
    Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:800-809 [Conf]
  91. Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana
    Critical Analysis and New Perspective for Securing Voice Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:810-818 [Conf]
  92. Liang Cai, Xiaohu Yang, Chun Chen
    Architecture of a Server-Aided Signature Service (SASS) for Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:819-826 [Conf]
  93. Duncan S. Wong, Agnes Hui Chan, Feng Zhu
    Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:827-834 [Conf]
  94. Ray-I Chang, Chih-Chun Chu
    An Efficient Anonymous Scheme for Mutual Anonymous Communications. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:835-843 [Conf]
  95. Gilles Guette, Bernard Cousin, David Fort
    GDS Resource Record: Generalization ofthe Delegation Signer Model. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:844-851 [Conf]
  96. Yoon-Jung Rhee
    Secure Initialization Vector Transmission on IP Security. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:852-858 [Conf]
  97. Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga
    Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:859-867 [Conf]
  98. Ho Seok Kang, Young-Chul Shim
    Secure Multicast in Micro-Mobility Environments. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:868-875 [Conf]
  99. Petr Holub, Eva Hladká, Ludek Matyska
    Scalability and Robustness of Virtual Multicast for Synchronous Multimedia Distribution. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:876-883 [Conf]
  100. Jae Keun Park, Sung Je Hong, Jong Kim
    Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:884-891 [Conf]
  101. Hidetoshi Ueno, Hideharu Suzuki, Norihiro Ishikawa
    A Group Management Protocol for Mobile Multicast. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:892-903 [Conf]
  102. Sun-Kuk Noh, Dong-You Choi, Chang-kyun Park
    Propagation Path Analysis for Location Selection of Base-Station in the Microcell Mobile Communications. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:904-911 [Conf]
  103. Fei Yu, Vikram Krishnamurthy
    Efficient Radio Resource Management in Integrated WLAN/CDMA Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:912-919 [Conf]
  104. Dong-You Choi, Sun-Kuk Noh
    A Study on the Cell Sectorization Using the WBTC and NBTC in CDMA Mobile Communication Systems. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:920-927 [Conf]
  105. Yanxing Zeng, Qinye Yin, Le Ding, Jianguo Zhang
    DOA-Matrix Decoder for STBC-MC-CDMA Systems. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:928-935 [Conf]
  106. Insoo Koo, Jeongrok Yang, Kiseon Kim
    Erlang Capacity of Voice/Data CDMA Systems with Service Requirements of Blocking Probability and Delay Constraint. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:936-943 [Conf]
  107. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:944-952 [Conf]
  108. Jinkeun Hong
    The Fuzzy Engine for Random Number Generator in Crypto Module. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:953-963 [Conf]
  109. Haipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng
    A Packet Marking Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:964-971 [Conf]
  110. Jong-Phil Yang, Kyung Hyune Rhee
    Securing Admission Control in Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:972-979 [Conf]
  111. Purui Su, Dequan Li, Haipeng Qu, Dengguo Feng
    Detecting the Deviations of Privileged Process Execution. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:980-988 [Conf]
  112. Zonghua Zhang, Hong Shen
    Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:989-996 [Conf]
  113. Sanjeev Kumar
    Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:997-1002 [Conf]
  114. Deuk-Whee Kwak, Jongwon Kim
    Design of Network Management System Employing Secure Multicast SNMP. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1003-1011 [Conf]
  115. Yuliang Li, Alistair Munro, Dritan Kaleshi
    Multi-rate Congestion Control over IP Multicast. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1012-1022 [Conf]
  116. Giacomo Morabito, Sergio Palazzo, Antonio Pantò
    A TCP-Friendly Multicast Protocol Suite for Satellite Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1023-1030 [Conf]
  117. Seung-Jei Yang, Sung-Han Park
    An Enhanced Multicast Routing Protocol for Mobile Hosts in IP Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1031-1038 [Conf]
  118. Thomas C. Schmidt, Matthias Wählisch
    Analysis of Handover Frequencies for Predictive, Reactive and Proxy Schemes and Their Implications on IPv6 and Multicast Mobility. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1039-1046 [Conf]
  119. Farhan Siddiqui, Sherali Zeadally, Ece Yaprak
    Design Architectures for 3G and IEEE 802.11 WLAN Integration. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1047-1054 [Conf]
  120. See-hwan Yoo, Jin-Hee Choi, Jae-Hyun Hwang, Chuck Yoo
    Eliminating the Performance Anomaly of 802.11b. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1055-1062 [Conf]
  121. Bo Gao, Yuhang Yang, Huiye Ma
    Energy Efficiency Analysis of IEEE 802.11 DCF with Variable Packet Length. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1063-1070 [Conf]
  122. Michael Ditze, Kay Klobedanz, Guido Kämper, Peter Altenbernd
    Scheduling MPEG-4 Video Streams Through the 802.11e Enhanced Distributed Channel Access. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1071-1079 [Conf]
  123. Namgi Kim, Sunwoong Choi, Hyunsoo Yoon
    IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1080-1087 [Conf]
  124. Sungwoo Tak
    Some Principles Incorporating Topology Dependencies for Designing Survivable WDM Optical Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1088-1096 [Conf]
  125. Audun Fosselie Hansen, Amund Kvalbein, Tarik Cicic, Stein Gjessing
    Resilient Routing Layers for Network Disaster Planning. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1097-1105 [Conf]
  126. Hyun-Gon Seo, Ki-Hyung Kim
    Design of a Service Discovery Architecture for Mobility-Supported Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1106-1113 [Conf]
  127. Fang Liu, Kui Dai, Zhiying Wang, Jun Ma
    Research on Fuzzy Group Decision Making in Security Risk Assessment. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1114-1121 [Conf]
  128. Ki-Hyung Kim, Won-Do Jung, Jun-Sung Park, Hyun-Gon Seo, Seung-Hwan Jo, Chang-Min Shin, Seung-Min Park, Heung-Nam Kim
    A Resilient Multipath Routing Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1122-1129 [Conf]
  129. Lothar Fritsch, Tobias Scherner
    A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil Protection. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1130-1137 [Conf]
  130. Jin-Ho Hwang, Won Kim, Jun-Won Lee, Sung Un Kim
    Survivability-Guaranteed Network Resiliency Methods in DWDM Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:1138-1145 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002