The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Networking (ICN) (icn)
2007 (conf/icn/2007)

  1. Bartosz Wietrzyk, Milena Radenkovic
    Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:1- [Conf]
  2. Reza Shokri, Maysam Yabandeh, Nasser Yazdani
    Anonymous Routing in MANET Using Random Identifiers. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:2- [Conf]
  3. Tibor Gyires
    Traffic Engineering in Fourth Generation Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:3- [Conf]
  4. Junayed Islam, Muhidul Islam, Nazrul Islam
    A-sLEACH: An Advanced Solar Aware Leach Protocol for Energy Efficient Routing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:4- [Conf]
  5. Zhiwei Zhao, Xinming Zhang, Peng Sun, Pengxi Liu
    A Transmission Power Control MAC Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:5- [Conf]
  6. Wei Yang, Yang Wei
    On the Performance of V-BLAST Detectors in MIMO MT-CDMA Uplink over Multipath Fading Channel. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:6- [Conf]
  7. Weiwei Fang, Yi Liu, Depei Qian
    EDDS: An Efficient Data Delivery Scheme for Address-Free Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:7- [Conf]
  8. Dong Shi, Xinming Zhang, Xuemei Gao, Wenbo Zhu, Fengfu Zou
    A Link Reliability-Aware Route Maintenance Mechanism for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:8- [Conf]
  9. Pengxi Liu, Xinming Zhang, Shuang Tian, Zhiwei Zhao, Peng Sun
    A Novel Virtual Anchor Node-Based Localization Algorithm for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:9- [Conf]
  10. Paul Barom Jeon, George Kesidis
    GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:10- [Conf]
  11. Norbert Jordan, Alexander Poropatich, Peter Reichl
    Simulative Considerations for Future 4G Hierarchical Mobility Management in All-IP Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:11- [Conf]
  12. Bing Liu 0006, Lin Zhang, Huimin Zhang
    An Adaptive Schedule Medium Access Control for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:12- [Conf]
  13. Wei Yang, Ying Huang
    Wireless Sensor Network Based Coal Mine Wireless and Integrated Security Monitoring Information System. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:13- [Conf]
  14. Robert Bestak
    Influence of Release Timer on MAC-hs Performance. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:14- [Conf]
  15. G. Narsimha, A. Venugopal Reddy, S. S. V. N. Sarma
    The Effective Multicasting Routing Protocol in Wireless Mobile Adhoc Network. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:15- [Conf]
  16. Sandhya Khurana, Neelima Gupta, Nagender Aneja
    Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET). [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:16- [Conf]
  17. Pavel Mach, Robert Bestak
    WiMAX Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:17- [Conf]
  18. Ahmed M. Mahdy, Jitender S. Deogun, Jun Wang
    A Dynamic Approach for the Selection of Super Peers in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:18- [Conf]
  19. Matthias R. Brust, Steffen Rothkugel
    Localized Support for Injection Point Election in Hybrid Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:19- [Conf]
  20. Leila Boukhalfa, Pascale Minet, Serge Midonnet
    QoS Support in a MANET Based on OLSR and CBQ. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:20- [Conf]
  21. Dewan Tanvir Ahmed, Shervin Shirmohammadi
    Architectural Analysis of Multicast Routing Protocols for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:21- [Conf]
  22. Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadaris
    Heuristic Approach of Optimal Code Allocation in High Speed Downlink Packet Access Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:22- [Conf]
  23. Xiang Yu, Xinming Zhang, Can Que, Qiong Liu
    A Practical Low Interference Topology Control for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:23- [Conf]
  24. Trishla Sutaria, Imad Mahgoub, Ali Humos, Ahmed Badi
    Implementation of an Energy Model for JiST/SWANS Wireless Network Simulator. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:24- [Conf]
  25. Matthias R. Brust, Steffen Rothkugel
    A Taxonomic Approach to Topology Control in Ad Hoc and Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:25- [Conf]
  26. Dewan Tanvir Ahmed, Shervin Shirmohammadi
    Design Issues of Peer-to-Peer Systems for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:26- [Conf]
  27. H.-C. Le, Hervé Guyennet, N. Zerhouni
    A New Contention Access Method for Collision Avoidance in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:27- [Conf]
  28. Zhiming Zhang, Weirong Jiang, Yibo Xue
    A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:28- [Conf]
  29. Seung Chul Han, Ye Xia
    Optimal Leader Election Scheme for Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:29- [Conf]
  30. Huanan Zhang, Jinfeng Hu, Chunhui Hong, Dongsheng Wang
    Tourist: Self-Adaptive Structured Overlay. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:30- [Conf]
  31. XueLian Lin, Jinpeng Huai, Xudong Liu, Jun Han
    Active Peer to Peer. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:31- [Conf]
  32. Om Vikas, Nitin J. Chiluka, Purushottam K. Ray, Girraj Meena, Akhil K. Meshram, Amit Gupta, Abhishek Sisodia
    WebMiner--Anatomy of Super Peer Based Incremental Topic-Specific Web Crawler. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:32- [Conf]
  33. Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Kazuhiro Matsuda
    Ring-Based Virtual Private Network Supporting a Large Number of VPNs. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:33- [Conf]
  34. Tomoyoshi Fukuta, Hiroshi Masuyama, Toshihiko Sasama
    Hierarchical System-Level Diagnosis Based on a Voting Scheme for Identical-Unit-Interconnection Systems. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:34- [Conf]
  35. Andrew P. Snow, Gary R. Weckman
    What Are the Chances an Availability SLA will be Violated? [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:35- [Conf]
  36. Linhua Zhong, Jin Xu, Xianlei Wang
    VWQGRR: A Novel Packet Scheduler. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:36- [Conf]
  37. Alex Vallejo, Agustin Zaballos, Jaume Abella, Joseph M. Selga, Carles Duz
    Performance of a Policy-Based Management System in IPv6 Networks Using COPS-PR. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:37- [Conf]
  38. Anna Shklyaeva, David Kubanek, Vit Novotny
    Analysis of IEEE 802.11e for Delay Sensitive Traffic in Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:38- [Conf]
  39. Sandrine Duflos, Brigitte Kervella, Valerie C. Gay
    Considering Security and Quality of Service in SLS to Improve Policy-Based Management of Multimedia Services. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:39- [Conf]
  40. Mostafa Shaad Zolpirani, Mohammad-Mahdi Bidmeshki, Seyed Ghassem Miremadi
    Improving Network's Performability Using Parallel Processing. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:40- [Conf]
  41. Yoshinori Kitatsuji, Satoshi Katsuno, Masato Tsuru, Tetsuya Takine, Yuji Oie
    Traffic Characteristics-Based Flow Assignment Method for Reducing Queuing Delay. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:41- [Conf]
  42. M. Shamim Hossain, Abdulmotaleb El-Saddik
    Proxy-Based Visual Content Repurposing Using Selection Algorithm. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:42- [Conf]
  43. Marc Cheboldaeff
    Interactions between a Mobile Virtual Network Operator and External Networks with Regard to Service Triggering. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:43- [Conf]
  44. Birger Tödtmann, Erwin P. Rathgeb
    Integrated Management of Distributed Packet Filter Configurations in Carrier-Grade IP Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:44- [Conf]
  45. José Soler, Michael Gandy
    Personalized Home-Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:45- [Conf]
  46. Gaogang Xie, Jianhua Yang, Valérie Issarny, Alberto Conte
    An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed Link. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:46- [Conf]
  47. Sartaj Sahni, Nageshwara Rao, Sanjay Ranka, Yan Li, Eun-Sung Jung, Nara Kamath
    Bandwidth Scheduling and Path Computation Algorithms for Connection-Oriented Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:47- [Conf]
  48. Alexandre Mateus, Pedro Ferreira
    Inefficiency from Provisioning the Internet Selfishly. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:48- [Conf]
  49. Sven Ubik, Demetres Antoniades, Arne Øslebø
    ABW - Short-Timescale Passive Bandwidth Monitoring. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:49- [Conf]
  50. Edmund Smith, Paul Anderson
    Toward Broad-Spectrum Autonomic Management. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:50- [Conf]
  51. Sebastien Linck, Eugen Dedu, François Spies
    Distance-Dependent RED Policy (DDRED). [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:51- [Conf]
  52. Jun Luv, Xing Li, Tong Li
    The New Detection Algorithms for Network Traffic Anomalies. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:52- [Conf]
  53. Hylke W. van Dijk, Hans J. Scholten, Alvaro Tobalina, Victor Garcia Munoz, Stephane Milanini, Antonio Kung
    Open Home Networks: The TEAHA Approach. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:53- [Conf]
  54. Anahita Gouya, Noël Crespi
    Service Broker for Managing Feature Interactions in IP Multimedia Subsystem. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:54- [Conf]
  55. Vladimir S. Zaborovsky, Andrey Rudskoy, Alex Sigalov
    Network Traffic Invariant Characteristics: Metering Aspects. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:55- [Conf]
  56. Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou
    A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:56- [Conf]
  57. Karim Mohammed Rezaul, Vic Grout
    CoLoRaDe: A Novel Algorithm for Controlling Long-Range Dependent Network Traffic. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:57- [Conf]
  58. Leszek Koszalka
    The Choice of Mesh Structure in Computer Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:58- [Conf]
  59. Miroslav Svéda, Radimir Vrba
    Dependability-Driven Embedded Systems Networking. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:59- [Conf]
  60. H. Mellah, Salima Hassas, I. Halilali, Z. Mesneb, H. Drias
    Towards a Self Organizing Protocol for a Multi Agents System (MASSOP). [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:60- [Conf]
  61. Vaclav Dvorak, Jirí Jaros, Milos Ohlídal
    Optimum Topology-Aware Scheduling of Many-to-Many Collective Communications. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:61- [Conf]
  62. Bingfeng Zhang, Weihong Zhu, Zhenming Gao
    System Capacity of Filtered Multitone Modulation. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:62- [Conf]
  63. Xuelan Zou, Guangzeng Feng
    Performance Comparison of Iterative Decoding Algorithm Using the Extrinsic Information Transfer Chart. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:63- [Conf]
  64. Li Tang, Yin Chen, Fei Li, Hui Zhang, Jun Li
    Empirical Study on the Evolution of PlanetLab. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:64- [Conf]
  65. Hanxun Zhou, Yingyou Wen, Hong Zhao
    Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:65- [Conf]
  66. Ahmed M. Mahdy, Jitender S. Deogun
    Optimizing Free Space Optics for City-Wide Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:66- [Conf]
  67. Dariusz Koscielnik
    The Structure of a Control Network Integrated with the S-bus of an ISDN Network. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:67- [Conf]
  68. Pavel Zahradnik, Miroslav Vlcek, Boris Simák
    DC-Notch FIR Filters for Zero-IF Receivers. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:68- [Conf]
  69. Pavel Silhavy
    Time Domain Equalization in Modern Communication Systems Based on Discrete Multitone Modulation. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:69- [Conf]
  70. Michal Kohoutek, Kamil Vrba
    Image Processing Method Based on Subpixel Analysis for Accurate Measurement of Dimensions. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:70- [Conf]
  71. Eva Gescheidtova, Radek Kubasek, Karel Bartusek, Zdenek Smékal
    Shortening the Switching Times of Gradients for MR Tomography and Spectroscopy. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:71- [Conf]
  72. Ivo Lattenberg, Kamil Vrba
    Low Input-Impedance Current-Mirror for High-Speed Data Communication. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:72- [Conf]
  73. Martin Minarcik, Kamil Vrba
    Continuous-Time Multifunctional Filters with Wide Bandwidth Using Universal Voltage Conveyors. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:73- [Conf]
  74. Silke Holtmanns, Son Phan-Anh
    Access Authentication to IMS Systems in Next Generation Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:74- [Conf]
  75. I-Shyan Hwang, Zen-Der Shyu, Liang-Yu Ke, Chun-Che Chang
    A Novel Early DBA Mechanism with Prediction-Based Fair Excessive Bandwidth Reallocation Scheme in EPON. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:75- [Conf]
  76. Tatiana Kovacikova, Pavol Segec
    NGN Standards Activities in ETSI. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:76- [Conf]
  77. Petr Krupa, Michal Javornik, Otto Dostal
    Opportunities of Today's ICT Technologies for Support of Education and Training in Radiology. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:77- [Conf]
  78. Wencheng Lu, Sartaj Sahni
    Succinct Representation of Static Packet Forwarding Tables. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:78- [Conf]
  79. Sartaj Sahni, Haibin Lu
    Dynamic Tree Bitmap for IP Lookup and Update. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:79- [Conf]
  80. I-Shyan Hwang, Ren-Yuan Cheng, Zen-Der Shyu
    A Novel Dynamic Multiple Rings-Based Local Restoration for One-to-Multipoint Multicast Traffic in WDM Mesh Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:80- [Conf]
  81. I-Shyan Hwang, San-Nan Lee, Kuo-Chang Chien
    A High Performance Multicast Scheme Based on Virtual 2D Torus Topology. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:81- [Conf]
  82. Weiming Wang, Ligang Dong, Bin Zhuge, Ming Gao, Fenggen Jia, Rong Jin, Jin Yu, Xiaochun Wu
    Design and Implementation of an Open Programmable Router Compliant to IETF ForCES Specifications. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:82- [Conf]
  83. Yan Pan, Lacra Pavel
    Iterative Algorithms for Nash Equilibrium of an Extended OSNR Game. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:83- [Conf]
  84. Xiaogang Yang, Lei Lei
    End-to-End Congestion Control for H.264/SVC. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:84- [Conf]
  85. Dan Komosny, Vit Novotny
    Tree Structure for Specific-Source Multicast with Feedback Aggregation. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:85- [Conf]
  86. Kari Aho, Tapani Ristaniemi, Janne Kurjenniemi, Ville Haikola
    Performance Enhancement of Multimedia Broadcast Multicast Service (MBMS) with Receive Diversity. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:86- [Conf]
  87. Raimund Schatz, Norbert Jordan, Siegfried Wagner
    Beyond Broadcast--A Hybrid Testbed for Mobile TV 2.0 Services. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:87- [Conf]
  88. Dang Nguyen, Pascale Minet
    Scalability of the OLSR Protocol with the Fish Eye Extension. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:88- [Conf]
  89. Konstantin Shemyak, Kai Vehmanen
    Scalability of TCP Servers, Handling Persistent Connections. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:89- [Conf]
  90. Guoqing Li, Jing Zhu
    Performance Analysis on Utilizing Directional Antenna in High-Density WLAN. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:90- [Conf]
  91. Guangwen Li, Guangzeng Feng
    Weighted IS Method of Estimating FER of LDPC Codes in High SNR Region. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:91- [Conf]
  92. Thi-Thanh-Mai Hoang
    Planning of IP Networks with Quality of Service Guarantee. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:92- [Conf]
  93. Marina Petrova, Lili Wu, Petri Mähönen, Janne Riihijärvi
    Interference Measurements on Performance Degradation between Colocated IEEE 802.11g/n and IEEE 802.15.4 Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:93- [Conf]
  94. Thomas C. Schmidt, Matthias Wählisch, Ying Zhang
    On the Correlation of Geographic and Network Proximity at Internet Edges and Its Implications for Mobile Unicast and Multicast Routing. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:94- [Conf]
  95. Iwona Pozniak-Koszalka, Dawid Zydek
    Algorithms of Unicast, Multicast and Broadcast Transmission for Optical Switches. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:95- [Conf]
  96. Birger Tödtmann, Stephan Riebach, Erwin P. Rathgeb
    The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:96- [Conf]
  97. Tutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira
    Performance Evaluation of a Multi-Stage Network Event Detection Scheme for Decreasing the False-Positive Rate for a Large Number of Simultaneous, Unknown Events. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:97- [Conf]
  98. M. S. De-Silva, David J. Parish, P. Sandford, J. M. Sandford
    Automated Detection of Emerging Network Security Threats. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:98- [Conf]
  99. Jens Rudinger, Adolf Finger
    Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:99- [Conf]
  100. P. Sandford, David J. Parish, J. M. Sandford
    Traffic Summary Analysis for Network Abuse Detection in High Date-Rate ISP Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:100- [Conf]
  101. Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt
    A Robust Single Sign-On Model Based on Multi-Agent System and PKI. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:101- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002