Conferences in DBLP
Jingping Bi , Qi Wu , Zhongcheng Li Packet delay and packet loss in the Internet. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:3-8 [Conf ] Augusto Ciuffoletti Session level rollback recovery. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:9-14 [Conf ] Ibrahima Niang , Frédérique Jacquet , Dominique Seret Mechanism for multi-domain marking in DiffServ architecture. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:15-20 [Conf ] Martin Jacobsson , Simon Oosthoek , Georgios Karagiannis Resource management in differentiated services: a prototype implementation. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:21-28 [Conf ] Ivan Stojmenovic , Susanta Datta Power and cost aware localized routing with guaranteed delivery in wireless networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:31-36 [Conf ] Cuneyt Akinlar , A. Udaya Shankar , Sarit Mukherjee , David Braun IP address configuration algorithms for routerless and single-router zeroconf networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:37-42 [Conf ] Mesut Günes , Donald Vlahovic The performance of the TCP/RCWE enhancement for ad-hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:43-48 [Conf ] Hend Koubaa , Eric Fleury Service location protocol overhead in the random graph model for ad hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:49-54 [Conf ] Miao Zhang , Jianping Wu , Chuang Lin , Ke Xu Rethink the tradeoff between proportional controller and PI controller. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:57-62 [Conf ] Chuang Lin , Dan C. Marinescu , Yongchang Ji , Gabriela M. Marinescu On synthetic criteria for evaluation of network traffic control policies. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:63-68 [Conf ] Reda A. Ammar , Abdulrahman Alhamdan Scheduling real time parallel structure on cluster computing. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:69-74 [Conf ] Jun Sun , Eytan Modiano Capacity provisioning and failure recovery in mesh-torus networks with application to satellite constellations. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:77-84 [Conf ] Abbas Ibrahim , Samir Tohmé Service multiplexing and resource allocation in S-CDMA/PRMA LEO systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:85-90 [Conf ] Guido Albertengo , Stefano Petroianni On the emulation of geostationary Earth orbit satellite systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:91-96 [Conf ] Jae Chung , Mark Claypool Rate-based active queue management with priority classes for better video transmission. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:99-105 [Conf ] Jun Takahashi , Hideki Tode , Koso Murakami QoS enhancement methods for MPEG video transmission on the Internet. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:106-113 [Conf ] Chris Bewick , Rubem Pereira , Madjid Merabti Network constrained smoothing: enhanced multiplexing of MPEG-4 video. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:114-119 [Conf ] Ashraf Awad , Martin W. McKinnon , Raghupathy Sivakumar Goodput estimation for an access node buffer carrying correlated video traffic. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:120-125 [Conf ] Paolo Bellavista , Antonio Corradi How to support Internet-based distribution of video on demand to portable devices. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:126-132 [Conf ] Khalid Begain , Gergo István Rózsa , András Pfening , Miklós Telek Performance analysis of GSM networks with intelligent underlay-overlay. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:135-141 [Conf ] Stefano Porcarelli , Felicita Di Giandomenico , Andrea Bondavalli Analyzing quality of service of GPRS network systems from a user's perspective. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:142-149 [Conf ] Ebrahim Karami , Mohsen Shiva , Mohsen Khansari An efficient multiuser detection algorithm for CDMA signals. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:150-154 [Conf ] Francesco Gallo , David Siorpaes TCP performance evaluation during handover among Bluetooth network access points. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:155-160 [Conf ] Vinh V. Phan , Savo G. Glisic MAC layer packet-length adaptive CLSP/DS-CDMA radio networks: performance in flat Rayleigh fading channel. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:161-166 [Conf ] Jürgen Foag , Thomas Wild , Nuria Pazos , Winthir Brunnbauer Predictive methodology for high-performance networking. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:169-174 [Conf ] Ling Tan , Zahir Tari Dynamic task assignment in server farms: better performance by task grouping. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:175-180 [Conf ] Markus Debusmann , Markus Schmid , Reinhold Kröger Measuring end-to-end performance of CORBA applications using a generic instrumentation approach. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:181-186 [Conf ] Geyong Min , Mohamed Ould-Khaoua Analysis of circuit-switched networks under long-range dependent traffic. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:187-192 [Conf ] Dervis Z. Deniz , Nagla O. Mohamed Performance evaluation of a CAC strategy for broadband networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:193-198 [Conf ] Danny Dolev , Osnat Mokryn , Yuval Shavitt , Innocenty Sukhov An integrated architecture for the scalable delivery of semi-dynamic Web content. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:201-206 [Conf ] George Karakostas , Dimitrios N. Serpanos Exploitation of different types of locality for Web caches. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:207-212 [Conf ] Hossam S. Hassanein , Zhengang Liang , Patrick Martin Performance comparison of alternative Web caching techniques. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:213-218 [Conf ] Thiemo Voigt , Per Gunningberg Adaptive resource-based Web server admission control. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:219-224 [Conf ] Maria Barra , A. Lannaccone , Giuseppina Palmieri , Vittorio Scarano Test++: an adaptive training system on the Internet. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:225-230 [Conf ] Marios D. Dikaiakos Intermediaries for the World-Wide Web: overview and classification. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:231-236 [Conf ] Sheng Uei Guan , Wei Liu , Kenneth Ong An extendible Petri net model for Memex-like applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:239-244 [Conf ] Ernestina Martel , Francisco Guerra Santana , Javier Miranda EPDA-modeller: a tool for modelling a distributed programming environment. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:245-250 [Conf ] Wen-Huei Chen , Cho-Ching Lu Executable test sequence for the protocol control and data flow property with overlapping. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:251-257 [Conf ] Rima Kilany , Ahmed Serhrouchni Using distributed component model for active service deployment. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:258-263 [Conf ] Hung-Yun Hsieh , Raghupathy Sivakumar Towards a hybrid network model for wireless packet data networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:264-271 [Conf ] Moufida Maimour , CongDuc Pham Dynamic replier active reliable multicast (DyRAM). [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:275-282 [Conf ] H. T. Kung , Koan-Sin Tan , Pai-Hsiang Hsiao TCP with sender-based delay control. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:283-290 [Conf ] Chi Zhang , Vassilios Tsaoussidis The interrelation of TCP responsiveness and smoothness in heterogeneous networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:291-297 [Conf ] Zhenghua Fu , Xiaoqiao Meng , Songwu Lu How bad TCP can perform in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:298-303 [Conf ] Ren Wang , Massimo Valla , M. Y. Sanadidi , Bryan K. F. Ng , Mario Gerla Efficiency/friendliness tradeoffs in TCP Westwood. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:304-311 [Conf ] Mostafa M. El-Said , Anup Kumar , Adel Said Elmaghraby An integrated neuro configuration management approach for hybrid mobile communication networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:315-320 [Conf ] Binh Thai , Stephen Wan 0002 , Aruna Seneviratne Executions of "home applications" and service customisations in Integrated Personal Mobility Architecture. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:321-326 [Conf ] Hamida Seba , Nadjib Badache , Abdelmadjid Bouabdallah Solving the consensus problem in a dynamic group: an approach suitable for a mobile environment. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:327-332 [Conf ] Iara Augustin , Adenauer C. Yamin , Jorge L. V. Barbosa , Cláudio F. R. Geyer ISAM, a software architecture for adaptive and distributed mobile applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:333-338 [Conf ] Orazio Tomarchio , Giuseppe Di Modica , Davide Vecchio , Dániel Hoványi , Erwin Postmann , Hans Portschy Code mobility for adaptation of multimedia services in a VHE environment. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:339-344 [Conf ] Gianluca Dini Increasing security and availability of an Internet voting system. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:347-354 [Conf ] Luis Mengual , Nicolás Barcia , Ernesto Jiménez , Ernestina Menasalvas Ruiz , Julio Setién , Javier Yágüez Automatic implementation system of security protocols based on formal description techniques. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:355-360 [Conf ] Artemios G. Voyiatzis , Dimitrios N. Serpanos Active hardware attacks and proactive countermeasures. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:361-366 [Conf ] Jian Ye , Symeon Papavassiliou , Giuseppe Anastasi , Antonio Puliafito Strategies for dynamic management of the QoS of mobile users in wireless networks through software agents. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:369-374 [Conf ] Gina Fábián , Aart van Halteren , Marco van de Logt , Frank Stoinski Design of a middleware for QoS-aware distribution transport content delivery. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:375-382 [Conf ] Sergio Andreozzi Differentiated services: an experimental vs. simulated case study. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:383-390 [Conf ] Marco Conti , Enrico Gregori Traffic and interference adaptive scheduling for Internet traffic in UMTS. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:391-396 [Conf ] Evi Tsolakou , Eugenia G. Nikolouzou , Iakovos S. Venieris A study of QoS performance for real time applications over a differentiated services network. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:397-403 [Conf ] Won-Joo Hwang , Makoto Wada , Hideki Tode , Koso Murakami HomeMAC: QoS-based MAC protocol for the home network. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:407-414 [Conf ] James S. Pascoe , Vaidy S. Sunderam , Roger J. Loader , G. Sibley Facilitating adaptation to trouble spots in wireless MANs. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:415-420 [Conf ] Dhananjay Lal , Rahul Gupta , Dharma P. Agrawal Throughput enhancement in wireless ad hoc networks with spatial channels a MAC layer perspective. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:421-428 [Conf ] Manthos Kazantzidis , Mario Gerla End-to-end versus explicit feedback measurement in 802.11 networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:429-434 [Conf ] Shiann-Tsong Sheu , Jenhui Chen MR2 RP: the multi-rate and multi-range routing protocol for ad hoc wireless networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:435-440 [Conf ] Sartaj Sahni , Kun Suk Kim O(log n) dynamic packet routing. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:443-448 [Conf ] Jun Jiang , Symeon Papavassiliou End-to-end quality of service in multi-class service high-speed networks via optimal least weight routing. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:449-454 [Conf ] Yongho Seok , Youngseok Lee , Yanghee Choi , Changhoon Kim Explicit multicast routing algorithms for constrained traffic engineering. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:455-461 [Conf ] Cuneyt Akinlar , A. Udaya Shankar , Sarit Mukherjee , David Braun An IP address configuration algorithm for multi-router zeroconf networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:462-467 [Conf ] Dritan Nace A linear programming based approach for computing optimal fair splittable routing. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:468-474 [Conf ] Antonio Puliafito , Orazio Tomarchio Design and development of a practical security model for a mobile agent system. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:477-483 [Conf ] Diana Berbecaru , Antonio Lioy , Marius Marian Security aspects in standard certificate revocation mechanisms: a case study for OCSP. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:484-489 [Conf ] Alain Pannetrat , Refik Molva Authenticating real time packet streams and multicasts. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:490-495 [Conf ] Domenico Cotroneo , L. Peluso , Simon Pietro Romano , Giorgio Ventre An active security protocol against DoS attacks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:496-501 [Conf ] R. Maresca , Maurizio D'Arienzo , Marcello Esposito , Simon Pietro Romano , Giorgio Ventre An active network approach to virtual private networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:502-507 [Conf ] Antonio Estepa , Rafael Estepa , Juan M. Vozmediano On the suitability of the E-model to VoIP networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:511-516 [Conf ] Takefumi Hiraguri , Takeo Ichikawa , Masataka Iizuka , Masahiro Morikura Novel multiple access protocol for voice over IP in wireless LAN. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:517-523 [Conf ] Mouna Benaissa , Vincent Lecuire , Francis LePage An algorithm for playout delay adjustment for interactive audio applications in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:524-529 [Conf ] R. Venkatesha Prasad , Abhijeet Sangwan , H. S. Jamadagni , M. C. Chiranth , Rahul Sah , Vishal Gaurav Comparison of voice activity detection algorithms for VoIP. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:530-535 [Conf ] Roberto Baldoni , Antonino Virgillito , Roberto Petrassi A distributed mutual exclusion algorithm for mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:539-544 [Conf ] Marc Mosko , J. J. Garcia-Luna-Aceves Performance of group communication over ad-hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:545-552 [Conf ] Devendra Goyal , James Caffery Jr. Partitioning avoidance in mobile ad hoc networks using network survivability concepts. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:553-558 [Conf ] Kumar Viswanath , Katia Obraczka An adaptive approach to group communications in multi hop ad hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:559-566 [Conf ] Haiyun Luo , Petros Zerfos , Jiejun Kong , Songwu Lu , Lixia Zhang Self-securing ad hoc wireless networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:567-574 [Conf ] Nir Naaman , Raphael Rom Scheduling constant bit rate flows in data over cable networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:577-582 [Conf ] Hala M. Mokhtar , Rubem Pereira , Madjid Merabti Fair-rate GPS: a new class for decoupling delay and bandwidth properties. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:583-588 [Conf ] Adel Said Elmaghraby , Anup Kumar , Mehmed M. Kantardzic , Mostafa Gamal Mostafa Bandwidth allocation in a dynamic environment using a variable pricing policy. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:589-594 [Conf ] Rocky K. C. Chang , King P. Fung Transport layer proxy for stateful UDP packet filtering. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:595-600 [Conf ] Luciano Paschoal Gaspary , Edgar Meneghetti , Fabricio Wendt , Lucio Braga , Roberto Storch , Liane Margarida Rockenbach Tarouco High-layer protocol and service management based on passive network traffic monitoring: the trace management platform. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:601-608 [Conf ] Francisco Javier Ovalle-Martínez , Julio Solano-González , Ivan Stojmenovic A parallel hill climbing algorithm for pushing dependent data in clients-providers-servers systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:611-616 [Conf ] Francesco Quaglia , Andrea Santoro Software supports for preemptive rollback in optimistic parallel simulation on Myrinet clusters. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:617-622 [Conf ] Xiaohui Yuan , Bill P. Buckles , Zhaoshan Yuan , Jian Zhang Mining negative association rules. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:623-628 [Conf ] Antonella Di Stefano , Giuseppe Pappalardo , Emiliano Tramontana Introducing distribution into applications: a reflective approach for transparency and dynamic fine-grained object allocation. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:629-636 [Conf ] Carlos Perez Leguizamo , Shohei Kato , Kenji Hirai , Kinji Mori Autonomous consistency coordination technique among distributed database systems for achieving high reliability. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:637-644 [Conf ] Chi-Chun Lo , Bin-Wen Chuang An adaptive survivability admission control mechanism using backup VPs for self-healing ATM networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:647-652 [Conf ] Chul Geun Park , Dong Hwan Han , Yutae Lee Queueing analysis of dynamic bandwidth allocation scheme for IP traffic on ATM networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:653-658 [Conf ] Tomoyuki Nagase , Takashi Araki , Yoshio Yoshioka , Tadao Nakamura Moderating traffic flow over conventional ATM service. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:659-663 [Conf ] Teerapat Sanguankotchakorn , Janet Aung Congestion control strategy for transient video source in ATM networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:664-669 [Conf ] Sándor Székely Signalling performance evaluation of large ATM networks based on measurements of isolated switches. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:670-675 [Conf ] Nicolas Rouhana , Eric Horlait BWIG: Bluetooth Web Internet Gateway. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:679-684 [Conf ] Amre El-Hoiydi Spatial TDMA and CSMA with preamble sampling for low power ad hoc wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:685-692 [Conf ] Andreas Miaoudakis , Apostolos Koukourgiannis , Grigorios Kalivas Carrier frequency offset estimation and correction for Hiperlan/2 WLANs. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:693-698 [Conf ] Diakoumis P. Gerakoulis , Paola Salmi Link performance of an ultra wide bandwidth wireless in-home network. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:699-704 [Conf ] Chih-Hao Lin , Frank Yeong-Sung Lin Resource and performance management in wireless communication networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:705-710 [Conf ] Dar-Zu Hsu Tunable fiber Bragg grating-based a pair of m-sequence coding for optical CDMA. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:713-718 [Conf ] Hungjen Wang , Eytan Modiano , Muriel Médard Partial path protection for WDM networks: end-to-end recovery using local failure information. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:719-725 [Conf ] Arunabha Sen , Bin Hao , Bao Hong Shen Survivable routing in WDM networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:726-731 [Conf ] Bin Zhou , Hussein T. Mouftah Spare capacity planning using survivable alternate routing for long-haul WDM networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:732-738 [Conf ] Sheng Uei Guan , Tianhan Wang , Sim Heng Ong A secure approach for mobile agent migration control. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:741-746 [Conf ] Stefania Bandini , Flavio De Paoli , Sara Manzoni , Carla Simone Mechanisms to support situated agent systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:747-752 [Conf ] Paolo Bellavista , Antonio Corradi , Silvia Vecchi Mobile agent solutions for accounting management in mobile computing. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:753-760 [Conf ] George Samaras , Constantinos Spyrou , Evaggelia Pitoura View Generator (VG): a mobile agent based system for the creation and maintenance of Web views. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:761-767 [Conf ] Marco Scarpa , Massimo Villari , Angelo Zaia , Antonio Puliafito From client/server to mobile agents: an in-depth analysis of the related performance aspects. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:768-773 [Conf ] Benjamin Gaidioz , Pascale Primet EDS: a new scalable service differentiation architecture for Internet. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:777-782 [Conf ] Csaba Simon , Attila Vidács , István Moldován , Attila Török , Keisuke Ishibashi , Arata Koike , H. Ichikawa End-to-end relative Differentiated Services for IP networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:783-788 [Conf ] Peter Barta , Felician Németh , Róbert Szabó , József Bíró Call admission control algorithms for tandem generalized processor sharing networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:789-795 [Conf ] Lisandro Zambenedetti Granville , Gustavo Augusto Faraco de Sá Coelho , Maria Janilce Bosquiroli Almeida , Liane Margarida Rockenbach Tarouco An architecture for automated replacement of QoS policies. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:796-801 [Conf ] Mohammad Hossien Yaghmaee , Seyed Mostafa Safavi A new FLC based model for Differentiated Services. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:802-807 [Conf ] Chi-Hsiang Yeh , Dali Zhang , Ronald A. Iltis , Hua Lee Code division multiple access with adaptable reservation: a new paradigm for CDMA-based multimedia wireless networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:811-818 [Conf ] Sachin Garg , Martin Kappes , Mahalingam Mani Wireless access server for quality of service and location based access control in 802.11 networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:819-824 [Conf ] Mario Gerla , Yeng-Zhong Lee , Rohit Kapoor , Ted Taekyoung Kwon , Andrea Zanella UMTS-TDD: a solution for internetworking Bluetooth piconets in indoor environments. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:825-830 [Conf ] Naoki Suehiro , Toshiaki Imoto , Noriyoshi Kuroyanagi Very efficient wireless frequency usage by coherent addition of multipath signals using ZCCZ sequence set. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:831-834 [Conf ] Igor D. D. Curcio , Miikka Lundan SIP call setup delay in 3G networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:835-840 [Conf ] Dinh-Dung Luong , József Bíró Analysis and application of congestion measures. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:843-848 [Conf ] Luigi Alfredo Grieco , Saverio Mascolo , Roberto Ferorelli Additive increase adaptive decrease congestion control: a mathematical model and its experimental validation. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:849-854 [Conf ] Zici Zheng , Robert E. Kinicki Adaptive explicit congestion notification. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:855-860 [Conf ] Fabien Chatté , Bertrand Ducourthial , Silviu-Iulian Niculescu Robustness issues of fluid approximations for congestion detection in best effort networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:861-866 [Conf ] Thomas Ziegler On averaging for active queue management congestion avoidance. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:867-873 [Conf ] Karima Boudaoud , Charles McCathieNevile An intelligent agent-based model for security management. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:877-882 [Conf ] Zhaoyu Liu , Roy H. Campbell , M. Dennis Mickunas Security as services in active networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:883-890 [Conf ] Eugenio Faldella , Marco Prandini A flexible scheme for on-line public-key certificate status updating and verification. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:891-898 [Conf ] Guoqing Zhang , Jie Wang , Chongying Cao An information protection system for intranets. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:899-903 [Conf ] Heejin Jang , Sangwook Kim An intruder tracing system based on a shadowing mechanism. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:904-909 [Conf ] Ali Boudani , Bernard Cousin A new approach to construct multicast trees in MPLS networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:913-919 [Conf ] Mohamed El-Darieby , Dorina C. Petriu , Jerry Rolia A hierarchical distributed protocol for MPLS path creation. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:920-926 [Conf ] Pin-Han Ho , Hussein T. Mouftah Capacity-balanced alternate routing for MPLS traffic engineering. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:927-932 [Conf ] Emre Yetginer , Ezhan Karasan Robust path design algorithms for traffic engineering with restoration in MPLS networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:933-938 [Conf ] Marius Portmann , Aruna Seneviratne The cost of application-level broadcast in a fully decentralized peer-to-peer network. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:941-946 [Conf ] Radu State Latent multicast monitoring. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:947-952 [Conf ] Vincent Roca , Benoît Mordelet Design of a multicast file transfer tool on top of ALC. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:953-958 [Conf ] Takumi Miyoshi , Shintaro Shimizu , Yoshiaki Tanaka Fast topological design with simulated annealing for multicast networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:959-966 [Conf ] Ken Tang , Katia Obraczka , Sung-Ju Lee , Mario Gerla Congestion controlled adaptive lightweight multicast in wireless mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:967-972 [Conf ] Atsushi Tagami , Teruyuki Hasegawa , Toru Hasegawa , Koji Nakao OC-48c traffic tester for generating and analyzing long-range dependence traffic. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:975-982 [Conf ] Andrea Gozzi , Massimo Paolucci , Antonio Boccalatte A multi-agent approach to support dynamic scheduling decisions. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:983-988 [Conf ] Dimitrios N. Serpanos , Apostolos Traganitis Object scheduling in broadcast systems for energy-limited clients. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:989-994 [Conf ] Gergely Seres , Árpád Szlávik , János Zátonyi , József Bíró Alternative admission rules based on the many sources asymptotics. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:995-1000 [Conf ] Arunabha Sen , Ibraz Mohammed , Ravikanth Samprathi , Subir Bandyopadhyay Fair queuing with round robin: a new packet scheduling algorithm for routers. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:1001-1006 [Conf ] Naofal Al-Dhahir Exploiting the structure of space-time codes. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:1009-1014 [Conf ] Mostafa Hashem Sherif , David A. Hoeflin , M. Recchia Reliability assessment of network elements using black box testing. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:1015-1020 [Conf ] Damien Magoni , Jean-Jacques Pansiot Internet topology modeler based on map sampling. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:1021-1027 [Conf ] Marcel Fernandez , Miguel Soriano Decoding codes with the identifiable parent property. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:1028-1033 [Conf ] Verayuth Lertnattee , Thanaruk Theeramunkong Combining homogeneous classifiers for centroid-based text classification. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:1034-1039 [Conf ] Kritsada Sriphaew , Thanaruk Theeramunkong A new method for finding generalized frequent itemsets in generalized association rule mining. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:1040-1045 [Conf ]