The SCEAS System
Navigation Menu

Conferences in DBLP

International Symposium on Computers and Communications (iscc)
2005 (conf/iscc/2005)


  1. Program Committee. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:- [Conf]

  2. Reviewers. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:- [Conf]

  3. Message from the Technical Program Chairs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:- [Conf]

  4. Message from the General Chairs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:- [Conf]

  5. Keynotes. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:- [Conf]
  6. Zhanfeng Jia, Rajarshi Gupta, Jean C. Walrand, Pravin Varaiya
    Bandwidth Guaranteed Routing for Ad Hoc Networks with Interference Consideration. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:3-9 [Conf]
  7. Laith A. Al-Sulaiman, Hussein M. Abdel-Wahab
    CACMAN: A Framework for Efficient and Highly Available CA Services in MANETs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:10-15 [Conf]
  8. C. Gomez, D. Garcia, Josep Paradells
    Improving Performance of a Real Ad Hoc Network by Tuning OLSR Parameters. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:16-21 [Conf]
  9. Gaurav Srivastava, Joe F. Chicharo, Paul Boustead
    Power Efficient Connected Topologies in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:22-27 [Conf]
  10. François Ingelrest, David Simplot-Ryl
    Localized Broadcast Incremental Power Protocol for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:28-33 [Conf]
  11. Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisalem
    A Reputation-Based Trust Mechanism for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:37-42 [Conf]
  12. Paolo Bellavista, Antonio Corradi, Eugenio Magistretti
    Comparing and Evaluating Lightweight Solutions for Replica Dissemination and Retrieval in Dense MANETs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:43-50 [Conf]
  13. Giuseppe Anastasi, Emilio Ancillotti, Marco Conti, Andrea Passarella
    TPA: A Transport Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:51-56 [Conf]
  14. Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario Gerla
    Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:57-62 [Conf]
  15. Eric Hsiao-Kuang Wu, Y. Ahmet Sekercioglu, Greg Daley, Sathya Narayanan
    An Analytical Study of Direct and Indirect Signaling for Mobile IPv6 in Mobile-to-Mobile Communications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:65-70 [Conf]
  16. Yi Wang, Shaozhi Ye, Xing Li
    Understanding Current IPv6 Performance: A Measurement Study. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:71-76 [Conf]
  17. Jhon Padilla, Monica Huerta, Josep Paradells, Xavier Hesselbach
    IntServ6: An Approach to Support QoS over IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:77-82 [Conf]
  18. Joan Ruiz, Alex Vallejo, Jaume Abella
    IPv6 Conformance and Interoperability Testing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:83-88 [Conf]
  19. Enrique Hernández-Orallo, Joan Vila i Carbó
    Efficient QoS Routing for Differentiated Services EF Flows. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:91-96 [Conf]
  20. Christoph Reichert, Yuri Glickmann, Thomas Magedanz
    Two Routing Algorithms for Failure Protection in IP Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:97-102 [Conf]
  21. Sajjad Zarifzadeh, Hamed Khanmirza, Nasser Yazdani
    Core Based Multipath Routing in DiffServ Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:103-109 [Conf]
  22. Cheng-Fu Chou, Jia-Jang Su, Chao-Yu Chen
    Straight Line Routing for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:110-115 [Conf]
  23. Sudip Misra, B. John Oommen
    New Algorithms for Maintaining All-Pairs Shortest Paths. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:116-121 [Conf]
  24. José Cano, Juan-Carlos Cano, Pietro Manzoni, David Ferrández-Bell
    On the Design of Spontaneous Networks Using a P2P Approach and Bluetooth. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:125-130 [Conf]
  25. Dhafer Ben Khedher, Roch H. Glitho, Rachida Dssouli
    Media Handling for Multiparty Sessions in Ad Hoc Peer-to-Peer Networks: A Novel Distributed Approach. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:131-136 [Conf]
  26. Jani Kurhinen, Jarkko Vuori
    Information Diffusion in a Single-Hop Mobile Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:137-142 [Conf]
  27. Michael Kleis, Eng Keong Lua, Xiaoming Zhou
    Hierarchical Peer-to-Peer Networks Using Lightweight SuperPeer Topologies. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:143-148 [Conf]
  28. K. R. Renjish Kumar, Heikki Hämmäinen
    Peer-to-Peer Content Delivery over Mobile Networks: A Techno-Economic Analysis. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:151-157 [Conf]
  29. Gennaro Cordasco, Luisa Gargano, Mikael Hammar, Vittorio Scarano
    Degree-Optimal Deterministic Routing for P2P Systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:158-163 [Conf]
  30. S. Johnstone, Paul Sage, Peter Milligan
    iXChange - A Self-Organising Super Peer Network Model. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:164-169 [Conf]
  31. András Kern, Mátyás Martinecz, Zalán Heszberger, Gyula Sallai
    Architecture and Configuration of Broadband Access Networks Supporting Multimedia Applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:173-178 [Conf]
  32. Francisco J. González-Castaño, Felipe J. Gil-Castiñeira, M. Rodelgo-Lacruz, Rafael Asorey-Cacheda
    Off-the-Shelf Transparent HomePlug Range Extension. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:179-184 [Conf]
  33. Bart De Vleeschauwer, Filip De Turck, Bart Dhoedt, Piet Demeester
    Server Placement Algorithms for the Construction of a QoS Enabled Gaming Infrastructure. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:185-190 [Conf]
  34. Christian Sauer, Matthias Gries, Sören Sonntag
    Modular Reference Implementation of an IP-DSLAM. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:191-198 [Conf]
  35. Sándor Székely, Szabolcs Máté Kis
    Benchmarking Symmetrical DSL Modems with Different Protocol Stacks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:199-208 [Conf]
  36. Toshiya Okabe, Takayuki Shizuno, Tsutomu Kitamura
    Wireless LAN Access Network System for Moving Vehicles. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:211-216 [Conf]
  37. Carlos Miguel Tavares Calafate, Pietro Manzoni, Manuel P. Malumbres
    Supporting Soft Real-Time Services in MANETs Using Distributed Admission Control and IEEE 802.11e Technology. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:217-222 [Conf]
  38. Juan-Carlos Cano, Pietro Manzoni, C. K. Toh
    First Experiences with Bluetooth and Java in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:223-228 [Conf]
  39. Miikka Lundan, Igor D. D. Curcio
    Mobile Streaming Services in WCDMA Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:231-236 [Conf]
  40. R. Venkatesha Prasad, H. N. Shankar, H. S. Jamadagni, M. V. Rohith, S. Vijay
    Heuristic Algorithms for Server Allocation in Distributed VoIP Conferencing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:237-242 [Conf]
  41. Sanaa Sharafeddine, Zaher Dawy
    Capacity Assignment for Video Traffic in Multiservice IP Networks with Statistical QoS Guarantees. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:243-248 [Conf]
  42. Guang Yang, Ling-Jyh Chen, Tony Sun, Mario Gerla, M. Y. Sanadidi
    Real-Time Streaming over Wireless Links: A Comparative Study. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:249-254 [Conf]
  43. G. Domenech, J. Hinojosa, J. Martinez, J. Garrigos
    Empirical Model Generations of Microwave Devices Exploiting Linear Regression Models. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:257-262 [Conf]
  44. J. Garrigos, J. Hinojosa, J. Martinez, G. Domenech
    Empirical Model Optimization of Microwave Devices Exploiting Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:263-268 [Conf]
  45. Mahmoud H. Ismail, Mustafa M. Matalgah
    Outage Probability Analysis in Cellular Systems with Noisy Weibull-Faded Lognormal-Shadowed Links. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:269-274 [Conf]
  46. Kevin Banovic, Esam Abdel-Raheem, Mohammed A. S. Khalid
    Hybrid Methods for Blind Adaptive Equalization: New Results and Comparisons. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:275-280 [Conf]
  47. Salim Alkhawaldeh, XiaoFeng Wang, Yousef Shayan
    Phase-Shift-Based Layered Linear Space-Time Codes. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:281-286 [Conf]
  48. Nicolas Montavont, Eric Njedjou, Franck Lebeugle, Thomas Noël
    Link Triggers Assisted Optimizations for Mobile IPv4/v6 Vertical Handovers. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:289-294 [Conf]
  49. Evsen Yanmaz, Ozan K. Tonguz
    Handover Performance of Dynamic Load Balancing Schemes in Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:295-300 [Conf]
  50. Rami Langar, Samir Tohmé, Gwendal Le Grand
    Micro Mobile MPLS: A New Scheme for Micro-mobility Management in 3G All-IP Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:301-306 [Conf]
  51. Jun-Zhao Sun, Jaakko Sauvola
    From Mobility Management to Connectivity Management. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:307-312 [Conf]
  52. Abolfazl Mehbodniya, Jalil Chitizadeh
    User Location Estimation in Wireless Networks with Application to Vertical Handoff Using Pattern Recognition. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:315-320 [Conf]
  53. Abraham George, Anup Kumar
    M3HN: An Adaptive Protocol for Mobility Management in Multi-Hop Heterogeneous Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:321-326 [Conf]
  54. Lila Dimopoulou, Georgios Leoleis, Iakovos S. Venieris
    Analysis and Evaluation of Layer 2 Assisted Fast Mobile IPv6 Handovers in a WLAN Environment. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:327-332 [Conf]
  55. Wenqing Chen, Yong Yuan, Changchun Xu, Kezhong Liu, Zongkai Yang
    Virtual MIMO Protocol Based on Clustering for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:335-340 [Conf]
  56. Ren-Song Ko, Chih-Chung Lai
    Density-Based Routing Mechanism for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:341-346 [Conf]
  57. Jean Carle, Antoine Gallais, David Simplot-Ryl
    Preserving Area Coverage in Wireless Sensor Networks by Using Surface Coverage Relay Dominating Sets. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:347-352 [Conf]
  58. Andrea Kulakov, Danco Davcev
    Distributed Data Processing in Wireless Sensor Networks Based on Artificial Neural-Networks Algorithms. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:353-358 [Conf]
  59. Daniel F. Macedo, Luiz Henrique A. Correia, Aldri L. dos Santos, Antonio Alfredo Ferreira Loureiro, José Marcos S. Nogueira
    A Pro-Active Routing Protocol for Continuous Data Dissemination in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:361-366 [Conf]
  60. Baoxian Zhang, Hussein T. Mouftah
    Efficient Grid-Based Routing in Wireless Multi-Hop Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:367-372 [Conf]
  61. Kuei-Ping Shih, Sheng-Shih Wang
    Distributed Direction-Based Localization in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:373-378 [Conf]
  62. Ignacio Solis, Katia Obraczka
    Isolines: Energy-Efficient Mapping in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:379-385 [Conf]
  63. Christopher K. Nguyen, Anup Kumar
    An Energy-Aware Medium-Access-Control Protocol with Frequent Sleeps for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:386-391 [Conf]
  64. Guangmin Hu, Rocky K. C. Chang
    Forwarding State Scalability-Aware Multicast Routing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:395-400 [Conf]
  65. Chiara Taddia, Alessandra Giovanardi, Gianluca Mazzini
    On the Impact of Distributed Power Control over Multicast Routing Protocols. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:401-405 [Conf]
  66. Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong
    A DINloop-Based Inter-domain Multicast Using MPLS. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:406-411 [Conf]
  67. Jun-Hong Cui, Li Lao, M. Y. Sanadidi, Mario Gerla
    Dynamic On-Line Group-Tree Matching for Large Scale Group Communications: A Performance Study. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:412-417 [Conf]
  68. Patroklos G. Argyroudis, Donal O'Mahony
    Towards Flexible Authorization Management. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:421-426 [Conf]
  69. ByungRae Cha, Binod Vaidya, Seung Jo Han
    Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:427-433 [Conf]
  70. Errin W. Fulp, Stephen J. Tarsa
    Trie-Based Policy Representations for Network Firewalls. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:434-441 [Conf]
  71. Wei Zhou, Christoph Meinel, Vinesh H. Raja
    A Framework for Supporting Distributed Access Control Policies. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:442-447 [Conf]
  72. Ji Hu, Dirk Cordel, Christoph Meinel
    Virtual Machine Management for Tele-Lab "IT-Security" Server. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:448-453 [Conf]
  73. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    Detection of Web-Based Attacks through Markovian Protocol Parsing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:457-462 [Conf]
  74. Ye Wang, Hussein M. Abdel-Wahab
    A Correlative Context-Based Framework for Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:463-468 [Conf]
  75. Christos Siaterlis, Vasilis Maglaris
    Detecting Incoming and Outgoing DDoS Attacks at the Edge Using a Single Set of Network Characteristics. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:469-475 [Conf]
  76. Pratima Adusumilli, Xukai Zou
    KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:476-481 [Conf]
  77. Ángel Martín del Rey
    Design of a Cryptosystem Based on Reversible Memory Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:482-486 [Conf]
  78. Javier Aracil, Daniel Morató, Eduardo Magaña, Mikel Izal
    MinMax Bandwidth Allocation for Time-Slotted Systems with Internet Traffic. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:489-494 [Conf]
  79. Marcelo Bagnulo, Alberto García-Martínez, Carlos Jesus Bernardos, Isaias Martinez, Arturo Azcorra
    Traffic Engineering in Multihomed Sites. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:495-500 [Conf]
  80. Yong-Jin Lee, Mohammed Atiquzzaman
    Optimal Delay-Constrained Minimum Cost Loop Algorithm for Local Computer Network. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:501-506 [Conf]
  81. Sergey Gorinsky, Anshul Kantawala, Jonathan S. Turner
    Link Buffer Sizing: A New Look at the Old Problem. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:507-514 [Conf]
  82. Georgios I. Papadimitriou, Amalia N. Miliou, Andreas S. Pomportsis
    An Optically Controlled Module for Wavelength Conversion Circuits. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:517-523 [Conf]
  83. Pablo Pavón-Mariño, Cristina López-Bravo, Joan García-Haro, Francisco J. González-Castaño
    Knockout Packet Loss Probability Analysis of SCWP Optical Packet Switching Wavelength Distributed Knockout Architecture. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:524-531 [Conf]
  84. Cai Ming, Luying Zhou, Mohan Gurusamy
    Dynamic Routing of Dependable Connections with Different QoP Grades in WDM Optical Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:532-537 [Conf]
  85. Mustafa M. Matalgah, Redha M. Radaydeh
    Power-Efficient Multi-level Modulation Scheme for High-Speed Optical Communications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:538-543 [Conf]
  86. Sofia A. Paredes, Trevor J. Hall
    Flexible Bandwidth Provision in a Sectored Packet Switch with an Optical Core. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:547-553 [Conf]
  87. Amund Kvalbein, Audun Fosselie Hansen, Tarik Cicic, Stein Gjessing, Olav Lysne
    Fast Recovery from Link Failures Using Resilient Routing Layers. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:554-560 [Conf]
  88. Anna Urra, José-Luis Marzo, Mateu Sbert, Eusebi Calle
    Estimation of the Probability of Congestion Using Monte Carlo Method in OPS Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:561-566 [Conf]
  89. Mosaab Daoud, Qusay H. Mahmoud
    Estimating the Task Route Reliability of Mobile Agent-Based Systems Using Monte Carlo Simulation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:569-574 [Conf]
  90. Suphithat Songsiri
    A New Approach for Computation Result Protection in the Mobile Agent Paradigm. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:575-581 [Conf]
  91. Mario Bisignano, Giuseppe Di Modica, Orazio Tomarchio
    A JXTA Compliant Framework for Mobile Handheld Devices in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:582-587 [Conf]
  92. Sven Hessler, Michael Welzl
    An Empirical Study of the Congestion Response of RealPlayer, Windows MediaPlayer and Quicktime. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:591-596 [Conf]
  93. T. Al-Khasib, Hussein M. Alnuweiri, H. Fattah, Victor C. M. Leung
    Fair and Efficient Frame-Based Scheduling Algorithm for Multimedia Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:597-603 [Conf]
  94. Abed Elhamid Lawabni, Ahmed H. Tewfik
    Resource Management and Quality Adaptation in Distributed Multimedia Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:604-610 [Conf]
  95. Jan Coppens, Tim Wauters, Filip De Turck, Bart Dhoedt, Piet Demeester
    Evaluation of a Monitoring-Based Architecture for Delivery of High Quality Multimedia Content. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:611-616 [Conf]
  96. Thomas Mundt
    Location Dependent Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:617-622 [Conf]
  97. Luis López, Antonio Fernández, Vicent Cholvi
    A Game Theoretic Analysis of Protocols Based on Fountain Codes. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:625-630 [Conf]
  98. Zsolt Kenesi, Zoltan Szabo, Zsolt Belicza, Sándor Molnár
    On the Effect of the Background Traffic on TCP's Throughput. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:631-636 [Conf]
  99. Andrzej Chydzinski, Ryszard Winiarczyk
    Distribution of the First Buffer Overflow Time in a Deterministic Service Time Queue. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:637-641 [Conf]
  100. Christos Bouras, Afrodite Sevasti
    Performance Enhancement of an AF Service Using TCP-Aware Marking and Dynamic WRED. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:642-647 [Conf]
  101. Arash Shokrani, Ioannis Lambadaris, Jerome Talim
    On Modeling of Fair Rate Calculation in Resilient Packet Rings. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:651-657 [Conf]
  102. Kuei-Ping Shih, Chien-Min Chou, Mu-Ying Lu, Szu-Min Chen
    A Distributed Spatial Reuse (DSR) MAC Protocol for IEEE 802.11 Ad Hoc Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:658-663 [Conf]
  103. Sebastian Fischmeister
    Describing Multidimensional Schedules for Media-Access Control in Time-Triggered Communication. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:664-670 [Conf]
  104. Tiantong You, Chi-Hsiang Yeh, Hossam S. Hassanein
    DRCE: A High Throughput QoS MAC Protocol for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:671-676 [Conf]
  105. Mozafar Bag Mohammadi, Nasser Yazdani, Siavash Samadian-Barzoki
    On the Efficiency of Explicit Multicast Routing Protocols. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:679-685 [Conf]
  106. Pedro M. Ruiz, Antonio F. Gómez-Skarmeta
    Approximating Optimal Multicast Trees in Wireless Multihop Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:686-691 [Conf]
  107. Ludmila Cherkasova
    Optimizing the Reliable Distribution of Large Files within CDNs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:692-697 [Conf]
  108. Taghrid Asfour-Block, Ahmed Serhrouchni
    Reliable Multicast over Satellite Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:698-703 [Conf]
  109. Omar Banimelhem, J. William Atwood, Anjali Agarwal
    Deploying Multicast Communication over MPLS Networks Using Tree Numbering. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:704-710 [Conf]
  110. George Apostolopoulos, Ioana Ciurea
    Reducing the Forwarding State Requirements of Point-to-Multipoint Trees Using MPLS Multicast. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:713-718 [Conf]
  111. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Juan M. Estévez-Tapiador
    PIM-DM Cost Analysis in Loop Free Topologies. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:719-723 [Conf]
  112. Marinho P. Barcellos, André Detsch
    Congestion Control with ECN Support in Poll-Based Multicast Protocols. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:724-729 [Conf]
  113. Javier Munoz Kirschberg, Marta Solera Delgado, Sebastia Sallent Ribes
    RCCMP: A TCP-Friendly Reliable Multicast Transport Protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:730-735 [Conf]
  114. Bela Berde, Hanine Abdelkrim, Martin Vigoureux, R. Douville, D. Papadimitriou
    Improving Network Performance through Policy-Based Management Applied to Generalized Multi-protocol Label Switching. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:739-745 [Conf]
  115. Fernando Solano, Ramón Fabregat, Yezid Donoso, José-Luis Marzo
    A Label Space Reduction Algorithm for P2MP LSPs Using Asymmetric Tunnels. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:746-751 [Conf]
  116. Anna Urra, Eusebi Calle, José-Luis Marzo
    Enhanced Protection Using Shared Segment Backups in a Multiservice GMPLS-Based Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:752-757 [Conf]
  117. Mina Amin, Kin-Hon Ho, George Pavlou, Michael P. Howarth
    Improving Survivability through Traffic Engineering in MPLS Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:758-763 [Conf]
  118. Polychronis Koutsakis
    Scheduling and Call Admission Control for Burst-Error Wireless Channels. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:767-772 [Conf]
  119. Wu-Hsiao Hsu, Cheng-Lin Yang, Li-Yuan Wu, Chiun-Sheng Hsu
    An Integrated Anycast End-to-End QoS Routing on DiffServ Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:773-779 [Conf]
  120. Dario Bruneo, Luca Paladina, Maurizio Paone, Antonio Puliafito
    Call Admission Control in Hierarchical Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:780-785 [Conf]
  121. Giuseppe Razzano, Hung Tuan Tran, Camilla Cantarella
    17 GHz Wireless LAN: Performance Analysis of CAC Algorithms. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:786-791 [Conf]
  122. Ashraf D. Elbayoumy, Simon J. Shepherd
    QoS Control Using an End-Point CPU Capability Detector in a Secure VoIP System. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:792-797 [Conf]
  123. Hamed Khanmirza, Sajjad Zarifzadeh, Nasser Yazdani
    ADPQ: An Adaptive Approach for Expedited Forwarding Traffic Scheduling. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:801-806 [Conf]
  124. Yuh-Shyan Chen, Keng-Shau Liu, Yun-Wei Lin
    A Credit-Based On-Demand QoS Routing Protocol over Bluetooth WPANs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:807-812 [Conf]
  125. Hanan H. Elazhary, Swapna S. Gokhale, Reda A. Ammar
    An Efficient QoS Distribution Monitoring Scheme. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:813-818 [Conf]
  126. Qiang Wang, Qing Ye, Liang Cheng
    An Inter-Application and Inter-Client Priority-Based QoS Proxy Architecture for Heterogeneous Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:819-824 [Conf]
  127. Rute Sofia, Roch Guérin, Pedro Veiga
    Enabling Scalable Inter-AS Signaling: A Load Reduction Approach. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:827-832 [Conf]
  128. Maria-Dolores Cano, Fernando Cerdán
    Proportional Bandwidth Distribution in IP Networks Implementing the Assured Forwarding PHB. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:833-839 [Conf]
  129. Bushar Yousef, Doan B. Hoang, Glynn Rogers
    Partitioning and Differentiated Resource Allocation in Programmable Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:840-845 [Conf]
  130. Wencheng Lu, Sartaj Sahni
    Packet Classification Using Two-Dimensional Multibit Tries. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:849-854 [Conf]
  131. Michael E. Kounavis, Frank L. Berry
    A Systematic Approach to Building High Performance Software-Based CRC Generators. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:855-862 [Conf]
  132. Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Chang Shih, Nen-Fu Huang
    FTSE: The FNP-Like TCAM Searching Engine. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:863-868 [Conf]
  133. Vinod Rajan, Yul Chu
    An Enhanced Dynamic Packet Buffer Management. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:869-874 [Conf]
  134. Devarshi Chatterjee, Zahir Tari, Albert Y. Zomaya
    A Task-Based Adaptive TTL Approach for Web Server Load Balancing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:877-884 [Conf]
  135. Malik Agyemang, Ken Barker, Reda Alhajj
    WCOND-Mine: Algorithm for Detecting Web Content Outliers from Web Documents. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:885-890 [Conf]
  136. L. G. Cárdenas, José A. Gil, Julio Sahuquillo, Ana Pont
    Emulating Web Cache Replacement Algorithms versus a Real System. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:891-897 [Conf]
  137. Georgios D. Pallas, Georgios I. Papadimitriou, Andreas S. Pomportsis
    A QoS Approach to Hybrid TDMA with Heuristic Traffic Shaping for Time Critical Application Environments. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:901-906 [Conf]
  138. Yuan-Cheng Lai, Arthur Chang
    Some Schedulers to Achieve Proportional Junk Rate Differentiation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:907-912 [Conf]
  139. Panagiotis Papadimitriou, Vassilis Tsaoussidis, Sofia Tsekeridou
    The Impact of Network and Protocol Heterogeneity on Real-Time Application QoS. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:913-918 [Conf]
  140. Gerardo Chavez
    Telecom Deregulation and Fast-Changing Broadband Internetworking Technologies: Status, Impacts and Trends in the Mexican Market. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:921-926 [Conf]
  141. David A. Hoeflin, Mostafa Hashem Sherif
    An Integrated Defect Tracking Model for Product Deployment in Telecom Services. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:927-932 [Conf]
  142. Leandro Carvalho, Edjair Mota, Regeane Aguiar, Ana F. Lima, José Neuman de Souza, Anderson Barreto
    An E-Model Implementation for Speech Quality Evaluation in VoIP Systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:933-938 [Conf]
  143. David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis
    The Bandwidth Exchange Architecture. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:939-944 [Conf]
  144. Joao P. Barraca, Susana Sargento, Rui L. Aguiar
    The Polynomial-Assisted Ad Hoc Charging Protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:945-952 [Conf]
  145. Andres Flores, Macario Polo
    Dynamic Component Assessment on PvC Environments. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:955-960 [Conf]
  146. Karthik Ramachandra, Hesham H. Ali
    HYDRA: A New Approach for Integrating Various Wireless Environments. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:961-968 [Conf]
  147. José María Pérez, Luis Miguel Sánchez, Félix García Carballeira, Alejandro Calderón, Jesús Carretero
    High Performance Java Input/Output for Heterogeneous Distributed Computing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:969-974 [Conf]
  148. Pedro Alípio, Solange Rito Lima, Paulo Carvalho
    XML Service Level Specification and Validation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:975-980 [Conf]
  149. Khaled Salah
    An Analytical Model for Evaluating Interrupt-Driven System Performance of Gigabit Ethernet Hosts with Finite Buffer. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:983-988 [Conf]
  150. Francisco José Alfaro, José L. Sánchez, José Duato
    Studying the Influence of the InfiniBand Packet Size to Guarantee QoS. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:989-994 [Conf]
  151. David Valencia, Antonio J. Plaza, Pablo Martínez Cobo, Javier Plaza
    On the Use of Cluster Computing Architectures for Implementation of Hyperspectral Image Analysis Algorithms. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:995-1000 [Conf]
  152. Alaa Amin, Reda A. Ammar, Sanguthevar Rajasekaran
    Maximizing Reliability While Scheduling Real-Time Task-Graphs on a Cluster of Computers. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:1001-1006 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002