The SCEAS System
Navigation Menu

Conferences in DBLP

International Symposium on Computers and Communications (iscc)
2004 (conf/iscc/2004)


  1. Technical program committee. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:- [Conf]

  2. Committees and chairs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:- [Conf]

  3. Author Index. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:- [Conf]

  4. Message from the general co-chairs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:- [Conf]

  5. Message from the technical program chairs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:- [Conf]

  6. Reviewers. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:- [Conf]
  7. Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang
    The construction of a novel agent fault-tolerant migration model. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1-6 [Conf]
  8. Ibrahim F. Imam
    Adaptive applications of intelligent agents. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:7-12 [Conf]
  9. Carsten Pils, K. Deissner, Stefan Diepolder, Jan Kritzner
    The performance server: rational server selection for mobile agents. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:13-18 [Conf]
  10. Xiaodong Lu, Ivan Luque, Miho Kanda, Kinji Mori
    Agent-based autonomous information services integration and allocation to achieve high response and low cost in distributed information service system. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:19-24 [Conf]
  11. Tim Hsin-Ting Hu, Binh Thai, Aruna Seneviratne
    Agent coordination in the mobile agent P2P architecture for supporting mobile devices in a Gnutella file-sharing network. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:25-30 [Conf]
  12. Muhammed S. Peerbocus, Zahir Tari
    A workflow-based dynamic scheduling approach for Web services platforms. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:31-37 [Conf]
  13. Dionisis X. Adamopoulos, Constantine A. Papandreou
    Enabling Web services: towards service grids. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:38-43 [Conf]
  14. Shengru Tu, Eric Normand, S. Kuchimanchi, V. Bizot, S. Shu, Mahdi Abdelguerfi, Jay J. Ratcliff, Kevin Shaw
    Integrating Web services into map image applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:44-49 [Conf]
  15. Weimin Lang, Zongkai Yang, Gan Liu, Wenqing Cheng, Yunmeng Tan
    A new efficient micropayment scheme against overspending. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:50-55 [Conf]
  16. Jun Wang, Yiming Hu
    A performance study on Internet Server Provider mail servers. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:56-61 [Conf]
  17. A. Amin, R. Ammar, A. El Dessouly
    Scheduling real time parallel structures on cluster computing with possible processor failures. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:62-67 [Conf]
  18. Gamal Attiya, Yskandar Hamam
    Reliability oriented task allocation in heterogeneous distributed computing systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:68-73 [Conf]
  19. Sarah Tasneem, Reda A. Ammar, Howard A. Sholl
    A methodology to compute task remaining execution time. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:74-79 [Conf]
  20. RazaRaza Ul-Mustafa, Ahmed E. Kamal
    On the grooming of multicast traffic in WDM networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:76-81 [Conf]
  21. Wanjun Huang, Xinhua Zhang, Uwe Roth, Christoph Meinel
    Routing based workflow for construction of distributed applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:80-85 [Conf]
  22. Asser N. Tantawi
    Optimized external scheduling for fair service discrimination. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:86-91 [Conf]
  23. E. A. El-Sebakhy
    Functional networks training algorithm for statistical pattern recognition. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:92-97 [Conf]
  24. Kazuhiro Morita, El-Sayed Atlam, Masao Fuketa, Yuki Kadoya, Toru Sumitomo, Jun-Ichi Aoe
    A new classification sentence technique using intension expressions. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:98-103 [Conf]
  25. El-Sayed Atlam, Elmarhomy Ghada, Masao Fuketa, Kazuhiro Morita, Jun-Ichi Aoe
    A compact memory space of dynamic full-text search using Bi-gram index. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:104-109 [Conf]
  26. Mehmet Kaya, Reda Alhajj
    Genetic algorithms based optimization of membership functions for fuzzy weighted association rules mining. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:110-115 [Conf]
  27. Tzung-Pei Hong, Chun-Hao Chen, Yu-Lung Wu, Yeong-Chyi Lee
    Using divide-and-conquer GA strategy in fuzzy data mining. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:116-121 [Conf]
  28. Toru Sumitomo, Yuki Kadoya, Masao Fuketa, Kazuhiro Morita, Shinkaku Kashiji, Jun-Ichi Aoe
    An new E-mail filtering technique using time priority measurement. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:122-127 [Conf]
  29. A. K. Sharma, A. Goswami, D. K. Gupta
    Discovery of fuzzy inclusion dependencies in fuzzy relational databases. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:128-133 [Conf]
  30. A. K. Sharma, A. Goswami, D. K. Gupta
    FTS relational data model for source-aware fuzzy relational multidatabases. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:134-139 [Conf]
  31. Doaa S. El Zanfaly, Reda A. Ammar, A. S. Eldin
    Modeling and analysis of a multilevel caching in distributed database systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:140-145 [Conf]
  32. Ayla Sayli, Bora Gökçe
    The use of SQO rules in DMLs. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:146-151 [Conf]
  33. Habib M. Ammari, Hesham El-Rewini
    Performance evaluation of hybrid environments with mobile gateways. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:152-157 [Conf]
  34. H. A. ElAdly, Thomas M. Chen
    Enhancing the support of multihopping in an IEEE 802.11 ad-hoc network. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:158-163 [Conf]
  35. M. Fazio, Massimo Villari, Antonio Puliafito
    Merging and partitioning in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:164-169 [Conf]
  36. Yu Wang, Ivan Stojmenovic, Xiang-Yang Li
    Bluetooth scatternet formation for single-hop ad hoc networks based on virtual positions. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:170-175 [Conf]
  37. Zhifei Li, Sukumar Nandi, Anil K. Gupta
    Achieving MAC fairness in wireless ad-hoc networks using adaptive transmission control. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:176-181 [Conf]
  38. Hari Rangarajan, J. J. Garcia-Luna-Aceves
    Achieving loop-free incremental routing in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:182-187 [Conf]
  39. Yao H. Ho, Ai Hua Ho, Kien A. Hua, Georgiana L. Hamza-Lup
    A connectionless approach to mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:188-195 [Conf]
  40. Mariusz A. Fecko, Ulas C. Kozat, Sunil Samtani, M. Ümit Uyar, Ibrahim Hökelek
    Dynamic survivable resource pooling in mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:196-201 [Conf]
  41. Huaming Wu, Alhussein A. Abouzeid
    Power aware image transmission in energy constrained wireless networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:202-207 [Conf]
  42. Cai ShaoBin, Yang XiaoZong, Yao WenBin
    PatchPSMP: an extension of NSMP based on pool node. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:208-213 [Conf]
  43. Jing Ai, Jingfei Kong, Damla Turgut
    An adaptive coordinated medium access control for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:214-219 [Conf]
  44. W. Yuan, Srikanth V. Krishnamurthy, Satish K. Tripathi
    Improving the reliability of event reports in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:220-225 [Conf]
  45. Jamal N. Al-Karaki, Ahmed E. Kamal
    On the correlated data gathering problem in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:226-231 [Conf]
  46. Hari Rangarajan, J. J. Garcia-Luna-Aceves
    Reliable data delivery in event-driven wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:232-237 [Conf]
  47. Thiemo Voigt, Adam Dunkels, Juan Alonso, Hartmut Ritter, Jochen H. Schiller
    Solar-aware clustering in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:238-243 [Conf]
  48. Amre El-Hoiydi, Jean-Dominique Decotignie
    WiseMAC: an ultra low power MAC protocol for the downlink of infrastructure wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:244-251 [Conf]
  49. Esa Hyytiä, L. Nieminen
    Linear program formulation for routing problem in OBS networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:252-257 [Conf]
  50. T. Komine, M. Nakagawa
    Performance evaluation of visible-light wireless communication system using white LED lightings. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:258-263 [Conf]
  51. Ayman Kaheel, Hussein M. Alnuweiri, Fayez Gebali
    A new analytical model for computing blocking probability in optical burst switching networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:264-269 [Conf]
  52. N. Elfaramawy, A. Awad
    All-optical logic circuits based on the nonlinear properties of the semiconductor optical amplifier. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:270-275 [Conf]
  53. Ahmad Khalil, Chadi Assi, Antonis M. Hadjiantonis, Georgios Ellinas, Mohamed A. Ali
    On multicast traffic grooming in WDM networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:282-287 [Conf]
  54. Stamatis Stefanakos, Thomas Erlebach
    Routing in all-optical ring networks revisited. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:288-293 [Conf]
  55. Nasir Ghani, Chadi Assi, Abdallah Shami, Mohamed A. Ali
    Integrated traffic grooming in converged data-optical networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:294-299 [Conf]
  56. M. R. Ahmadi
    Restoration techniques and delay analysis for fault recovery in WDM networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:300-305 [Conf]
  57. T. M. Barakat, I. I. Ismail, I. A. Ali, N. Abdrabouh
    Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:306-311 [Conf]
  58. S. Ray, K. Kwiat, D. Zhang
    Energy-efficient placement/activation algorithms for authorization servers in sensor network. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:312-317 [Conf]
  59. Bin Xie, A. Kumar
    A framework for integrated Internet and ad hoc network security. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:318-324 [Conf]
  60. O. M. Erdem
    EDKM: efficient distributed key management for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:325-330 [Conf]
  61. Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Rafael de Sousa
    A fully distributed IDS for MANET. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:331-338 [Conf]
  62. Christos Siaterlis, Basil S. Maglaris
    Detecting DDoS attacks with passive measurement based heuristics. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:339-344 [Conf]
  63. Guang Yang, Mario Gerla, M. Y. Sanadidi
    Defense against low-rate TCP-targeted denial-of-service attacks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:345-350 [Conf]
  64. Bao-Tung Wang, Henning Schulzrinne
    A denial-of-service-resistant IP traceback approach. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:351-356 [Conf]
  65. Fangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu
    Protecting integrity and confidentiality for data communication. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:357-362 [Conf]
  66. Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah
    A2cast: an adaptive source authentication protocol for multicast streams. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:363-368 [Conf]
  67. Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang
    An access control policy for active networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:369-374 [Conf]
  68. Zhide Chen, Hong Zhu
    Quantum m-out-of-n oblivious transfer. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:375-380 [Conf]
  69. A. M. Allam, I. I. Ibrahim, I. A. Ali, A. E. H. Elsawy
    Provably secure entity authentication the three party case. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:381-385 [Conf]
  70. D. Critchlow, Ning Zhang
    Revocation invocation for accountable anonymous PKI certificate trees. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:386-392 [Conf]
  71. Cássio Ditzel Kropiwiec, Edgard Jamhour, Carlos Maziero
    A framework for protecting Web services with IPsec. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:393-398 [Conf]
  72. Omaima Bamasak, Ning Zhang
    A secure proxy signature protocol for agent-based M-commerce applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:399-406 [Conf]
  73. Weimin Lang, Yunmeng Tan, Zongkai Yang, Gan Liu, Bing Peng
    A new efficient ID-based proxy blind signature scheme. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:407-411 [Conf]
  74. Aleksandra Nenadic, Ning Zhang, Stephen Barton
    A secure and fair DSA-based signature exchange protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:412-417 [Conf]
  75. A. G. Bafghi, B. Sadeghiyan
    Finding suitable differential characteristics for block ciphers with Ant colony technique. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:418-423 [Conf]
  76. Wenqing Cheng, Weimin Lang, Zongkai Yang, Gan Liu, Yunmeng Tan
    An identity-based proxy ring signature scheme from bilinear pairings. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:424-429 [Conf]
  77. Mohamed F. Tolba, M. A.-S. Ghonemy, I. A.-H. Taha, Amal S. Khalifa
    High capacity image steganography using wavelet-based fusion. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:430-435 [Conf]
  78. M. Shabany, K. Navaie, Elvino S. Sousa
    Downlink resource allocation for data traffic in heterogenous cellular CDMA networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:436-441 [Conf]
  79. M. Shabany, Elvino S. Sousa
    Joint rate allocation and routing scheme in multihop cellular CDMA networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:442-447 [Conf]
  80. José Ramón Gállego, A. Hernandez-Solaria, María Canales, Antonio Valdovinos
    Adaptive multimedia traffic multiplexing for dedicated channels in the UMTS system. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:448-453 [Conf]
  81. Gan Liu, Weimin Lang, Weimin Wu, Youlin Ruan, Xiaofeng Shen, Guangxi Zhu
    QoS-guaranteed call admission scheme for broadband multiservices mobile wireless networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:454-459 [Conf]
  82. Dario Bruneo, Luca Paladina, Maurizio Paone, Antonio Puliafito
    Resource reservation in mobile wireless networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:460-465 [Conf]
  83. Giuseppe Anastasi, Marco Conti, Enrico Gregori, Andrea Passarella
    Experimental analysis of an application-independent energy management policy for Wi-Fi hotspots. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:466-471 [Conf]
  84. Wei Wang, Soung C. Liew, Qixiang Pang, V. O. K. Li
    A multiplex-multicast scheme that improves system capacity of voice-over-IP on wireless LAN by 100%. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:472-477 [Conf]
  85. Seongkwan Kim, Sangwook Kang, Sunshin An
    Enhanced service differentiation extensions for the IEEE 802.11a wireless network. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:478-483 [Conf]
  86. Enrique Costa-Montenegro, Francisco J. González-Castaño, Ubaldo M. García-Palomares, M. Vilas-Paz, Pedro S. Rodríguez-Hernández
    Distributed and centralized algorithms for large-scale IEEE 802.11b infrastructure planning. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:484-491 [Conf]
  87. Z. G. Zhou, Aruna Seneviratne
    Improving wireless connectivity for mobile computing environments. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:492-497 [Conf]
  88. Paolo Bellavista, Antonio Corradi, Luca Foschini
    MUM: a middleware for the provisioning of continuous services to mobile users. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:498-505 [Conf]
  89. Georgios Leoleis, Lila Dimopoulou, Vaggelis Nikas, Iakovos S. Venieris
    Mobility management for multicast sessions in a UMTS-IP converged environment. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:506-511 [Conf]
  90. Azzedine Boukerche, Trivikram Dash, Maria Cristina Pinotti
    Performance analysis of a hybrid push-pull algorithm with QoS adaptations in wireless networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:512-524 [Conf]
  91. S. M. S. Masajedian, H. Khoshbin
    Cooperative location management method in next generation cellular networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:525-530 [Conf]
  92. Paolo Bellavista, Antonio Corradi
    A QoS management middleware based on mobility prediction for multimedia service continuity in the wireless Internet. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:531-538 [Conf]
  93. Ling-Jyh Chen, Tony Sun, M. Y. Sanadidi, Mario Gerla
    Improving wireless link throughput via interleaved FEC. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:539-544 [Conf]
  94. Kui-Fai Leung, K. L. Yeung
    G-Snoop: enhancing TCP performance over wireless networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:545-550 [Conf]
  95. Kui-Fai Leung, K. L. Yeung
    TCP-swift: an end-host enhancement scheme for TCP over satellite IP networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:551-555 [Conf]
  96. Jenn-Wei Lin
    An efficient fault-tolerant multicast approach for wireless mobile systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:556-561 [Conf]
  97. Anup Kumar, Mostafa M. El-Said, Adel Said Elmaghraby
    Base station assisted search approach for mitigation of pilot pollution interference. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:562-567 [Conf]
  98. Sayaka Harada, Hiroaki Higaki
    Wireless sporadic communication protocol for supporting cluster-to-base station communication. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:568-573 [Conf]
  99. Yuan-Pei Lin, See-May Phoong
    DFT based transceivers with-windowing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:574-579 [Conf]
  100. See-May Phoong, G. Quenot, E. Castelli
    Recognizing emotions for the audio-visual document indexing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:580-584 [Conf]
  101. B. Aoued
    Accelerating fractal image compression by domain pool reduction adaptive partitioning and structural block classification. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:585-589 [Conf]
  102. Hong Wen, Fei Hu, Fan Jin
    Design of odd-periodic complementary binary signal set. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:590-593 [Conf]
  103. Mohamed A. S. Hassan, Bayan S. Sharif, Wai Lok Woo, S. Jimaa
    Semiblind estimation of time varying STFBC-OFDM channels using Kalman filter and CMA. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:594-599 [Conf]
  104. Hung-Chang Yang, Hsiang-Fu Yu, Li-Ming Tseng, Yi-Ming Chen
    Interleaving harmonic broadcasting and receiving scheme with loss-anticipation delivery. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:600-605 [Conf]
  105. Reza Danesfahani, Tony Jeans
    A heuristic approach to optimization of the decision-directed maximum-likelihood feedforward carrier phase error detection algorithm. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:606-609 [Conf]
  106. A. M. Hmidat, Bayan S. Sharif, Wai Lok Woo, S. A. Jimma
    Nonlinear space-time multiuser detector for non-Gaussian channels. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:610-614 [Conf]
  107. Imed Bouazizi, Mesut Günes
    Distortion-optimized FEC for unequal error protection in MPEG-4 video delivery. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:615-620 [Conf]
  108. M. A. A. Mohamed, Hossam M. H. Shalaby, E.-S. A. El-Badawy
    Optical CDMA protocol with selective retransmission. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:621-626 [Conf]
  109. C. Khemapatapan, W. Benjapolakul
    Performance analyses of DPSK-FFHSS and DPSK-FFH-SSMA systems over Nakagami fading channels. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:627-632 [Conf]
  110. P. Sharma
    Time-series model for wireless fading channels in isotropic and non-isotropic scattering environments. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:633-638 [Conf]
  111. João H. Kleinschmidt, Marcelo Eduardo Pellenz, Luiz A. Paula Lima Jr.
    Evaluating and improving Bluetooth piconet performance over Nakagami-m fading channels. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:639-644 [Conf]
  112. Lingzhi Cao, Norman C. Beaulieu
    Closed-form results for the BER of maximal ratio combining with channel estimation errors in Ricean fading channels. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:645-650 [Conf]
  113. Yuling Zhang, Dongfeng Yuan, Haigang Zhang
    Adaptive LDPC for Rayleigh fading channel. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:651-656 [Conf]
  114. I. Popescu, P. Constantinou, M. Nafornita, I. Nafornita
    Generalized regression neural network prediction model for indoor environment. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:657-661 [Conf]
  115. Tak-Chung Fu, Fu-Lai Chung, Robert Wing Pong Luk, Chak-man Ng
    Progressive time series visualization in a mobile environment. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:662-667 [Conf]
  116. Hua Jing-Yu, You Xiao-Hu, Sheng Bin, W. Martin, S. Egon
    A fast convergent scheme for the Doppler shift estimation in mobile communication systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:668-671 [Conf]
  117. Min-Xiou Chen, Ben-Jye Chang, Ren-Hung Hwang, Jun-Fan Juang
    MDP-based OVSF code assignment scheme and call admission control for wideband-CDMA communications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:672-677 [Conf]
  118. L. Harju, J. Nurmi
    A baseband receiver architecture for UMTS-WLAN interworking applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:678-685 [Conf]
  119. Weijun Cheng, Laibo Zheng, Jiandong Hu
    Performance analysis of cooperative macro-diversity in mobile cellular networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:686-689 [Conf]
  120. N. E. Rittas, A. G. Asimakopoulos, D. G. Xenikos
    Path loss model for TETRA networks in metropolitan areas. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:690-695 [Conf]
  121. Tao Wang, Yong Wang
    Capacity of M-ary PAM impulse radio with various derivatives of Gaussian pulse subject to FCC spectral masks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:696-701 [Conf]
  122. Chang-Jun Ahn, K. Kamio, Satoshi Takahashi, Hiroshi Harada
    Reverse link performance improvement for an wideband OFDM using Alamouti coded heterogeneous polarization antennas. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:702-707 [Conf]
  123. K. Sathananthan, C. R. N. Athaudage, B. Qiu
    A novel ICI cancellation scheme to reduce both frequency offset and IQ imbalance effects in OFDM. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:708-713 [Conf]
  124. N. Papanikolaou, A. Spanakis, D. Apostolakis, P. Constantinou
    Radio coverage measurements into tunnel with leaky section radiating cable. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:714-719 [Conf]
  125. A. Mirzaee, H. Aghaeinia
    Design of a new class of spreading sequence using chaotic dynamical systems for asynchronous DS-CDMA applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:720-724 [Conf]
  126. S. Ruangsuthinarupap, K. M. Ahmed, W. A. C. Fernando, M. E. R. Khan
    PAPR reduction by combining selected mapping and selected spreading code in MC-CDMA systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:725-729 [Conf]
  127. Ayse Karaman, Hossam S. Hassanein
    Extended framework for delay-constrained multipoint-to-multipoint communication. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:730-735 [Conf]
  128. Juan A. Almendral, Luis L. Fernández, Vicent Cholvi, Miguel A. F. Sanjuan
    Oblivious router policies and Nash equilibrium. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:736-741 [Conf]
  129. Miao Zhang, Fengyuan Ren, Jianping Wu, Ke Xu
    Using fuzzy-PI controller in active queue management. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:742-747 [Conf]
  130. Fengyuan Ren, Chuang Lin, Bo Wei
    Design a robust controller for active queue management in large delay networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:748-754 [Conf]
  131. A. Delenda, Patrick Maillé, Bruno Tuffin
    Reserve price in progressive second price auctions. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:755-759 [Conf]
  132. Mina Guirguis, Azer Bestavros, Ibrahim Matta, N. Riga, G. Diamant, Yuting Zhang
    Providing soft bandwidth guarantees using elastic TCP-based tunnels. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:760-765 [Conf]
  133. Hakki C. Cankaya, A. Lardies, G. W. Ester
    Availability aware cost modeling of mesh architectures for long-haul networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:766-771 [Conf]
  134. Paolo Lollini, Andrea Bondavalli, Felicita Di Giandomenico, Stefano Porcarelli
    Congestion analysis during outage, congestion treatment and outage recovery for simple GPRS networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:772-778 [Conf]
  135. Hassan Naser, Hussein T. Mouftah
    Availability analysis and simulation of mesh restoration networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:779-785 [Conf]
  136. S. Ghani, M. Schwartz
    A hierarchical analysis of access multiplexers with multimedia traffic. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:786-791 [Conf]
  137. Chul Geun Park, Ho Suk Jung, Dong Hwan Han, Yutae Lee
    Performance analysis of DBA scheme with interleaved polling algorithm in an Ethernet PON. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:792-797 [Conf]
  138. Kai-Chien Chang, Wanjiun Liao
    Modeling the contention mechanism of DOCSIS in HFC networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:798-803 [Conf]
  139. Hideyuki Shimonishi, M. Y. Sanadidi, Mario Gerla
    Service differentiation at transport layer via TCP Westwood low-priority (TCPW-LP). [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:804-809 [Conf]
  140. Jianping Zou, M. Ümit Uyar, Mariusz A. Fecko, Sunil Samtani
    Preferential treatment of SCTP subflows: analysis and simulation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:810-815 [Conf]
  141. Stylianos Georgoulas, Panos Trimintzios, George Pavlou
    Admission control placement in differentiated services networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:816-821 [Conf]
  142. Tsang-Ling Sheu, Bing-Chi Kuo
    End-to-end jitter minimization with TCM for real-time multimedia traffic in DiffServ networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:822-827 [Conf]
  143. Naveen K. Chilamkurti, Ben Soh, A. Aitham
    SPLIT: A priority based TCP-friendly video protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:828-833 [Conf]
  144. Jie Lian, S. Naik, Gordon B. Agnew
    Optimal solution of total routing table size for hierarchical networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:834-839 [Conf]
  145. Haibin Lu, Sartaj K. Sahni
    A B-tree dynamic router-table design. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:840-845 [Conf]
  146. K. M. Elsayed
    HCASP: A hop-constrained adaptive shortest-path algorithm for routing bandwidth-guaranteed tunnels in MPLS networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:846-851 [Conf]
  147. Hanan H. Elazhary, Swapna S. Gokhale
    Integrating path computation and precomputation for quality-of-service provisioning. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:852-857 [Conf]
  148. Haibin Lu, Sartaj K. Sahni
    Dynamic IP router-tables using highest-priority matching. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:858-863 [Conf]
  149. Hossam S. Hassanein, Jian Zhao
    Supporting service differentiation through end-to-end QoS routing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:864-869 [Conf]
  150. Yanxing Zheng, Jing Tian, Zhifeng Liu, Wenhua Dou
    A limited path unicast QoS routing algorithm. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:870-875 [Conf]
  151. Alexander A. Kist, Richard J. Harris
    Cost efficient overflow routing for outbound ISP traffic. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:876-882 [Conf]
  152. Michael Menth, Jens Milbrandt, Stefan Kopf
    Impact of routing and traffic distribution on the performance of network admission control. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:883-890 [Conf]
  153. Sudip Misra, B. John Oommen
    Generalized pursuit learning algorithms for shortest path routing tree computation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:891-896 [Conf]
  154. Tiziano Inzerilli, E. Paone, Antonio Pietrabissa, G. Tarquini
    QoS support for interactive communication with DVB/RCS satellites. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:897-902 [Conf]
  155. Michael Menth, Jens Milbrandt, Simon Oechsner
    Experience-based admission control (EBAC). [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:903-910 [Conf]
  156. Yan Bai, Mabo Robert Ito
    FDDT+: improving fairness for video transmission over IP networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:911-914 [Conf]
  157. József Bíró, András Gulyás, T. Szenasi, Zalán Heszberger
    Distribution-free conservative bounds for QoS measures. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:915-920 [Conf]
  158. S. Shah-Heydari, W. Mardini, O. Yang
    Theoretical analysis of restorability of Hamiltonian protection cycles in random mesh networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:921-926 [Conf]
  159. Mohammad Hossien Yaghmaee, H. S. Farmad
    Improving the loss performance of random early detection gateway using fuzzy logic control. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:927-932 [Conf]
  160. J. L. Martinez, I. G. Munoz, J. F. Navajas
    QoS estimators for client-side dynamic server selection: limitations and keys. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:933-938 [Conf]
  161. Eugenia G. Nikolouzou, Sotirios Maniatis, Iakovos S. Venieris
    Resource allocation algorithms for intra-domain quality of service provisioning. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:939-944 [Conf]
  162. Sanaa Sharafeddine, Zaher Dawy
    A capacity margin for IP networks with QoS constraints and uncertain demands. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:945-950 [Conf]
  163. Jinwu Wei, Jiangxing Wu, Shuqiao Chen
    Joint multifractal network traffic generator and characteristics analysis. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:951-956 [Conf]
  164. Gábor Rétvári, József Bíró, Tibor Cinkler
    A novel Lagrangian-relaxation to the minimum cost multicommodity flow problem and its application to OSPF traffic engineering. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:957-962 [Conf]
  165. N. Sadek, Alireza Khotanzad
    K-factor Gegenbauer ARMA process for network traffic simulation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:963-968 [Conf]
  166. Miikka Lundan
    Streaming over EGPRS. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:969-974 [Conf]
  167. Ahmed Abd El Al, Tarek N. Saadawi, Myung J. Lee
    Bandwidth aggregation in stream control transmission protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:975-980 [Conf]
  168. Pere Vilà, José-Luis Marzo, Eusebi Calle, Liliana Carrillo
    Lightweight monitoring of label switched paths for bandwidth management. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:981-986 [Conf]
  169. Khaled Ragab, Yuji Horikoshi, Hisayuki Kuriyama, Kinji Mori
    Multi-layer autonomous community overlay network for enhancing communication delay. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:987-992 [Conf]
  170. Rui Prior, Susana Sargento, Pedro Brandão, Sérgio Crisóstomo
    Evaluation of a scalable reservation-based QoS architecture. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:993-999 [Conf]
  171. Sérgio Crisóstomo, Farzad Safaei, Don Platt
    On the provision of immersive audio communication to massively multi-player online games. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1000-1005 [Conf]
  172. Masakazu Ono, T. Hirakawa, Hiroaki Higaki
    Hybrid checkpoint protocol for cell-dependent infrastructured networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1006-1011 [Conf]
  173. Ali Boudani, Alexandre Guitton, Bernard Cousin
    GXcast: generalized explicit multicast routing protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1012-1017 [Conf]
  174. Yezid Donoso, Ramón Fabregat, José-Luis Marzo
    Multi-objective optimization scheme for dynamic multicast groups. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1018-1023 [Conf]
  175. ZhengQuan Xu, Lin Chen
    An effective heuristic algorithm for dynamic multicast routing with delay-constrained. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1024-1031 [Conf]
  176. Lin Chen, K. L. Yeung
    Fast-response receiver-driven layered multicast. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1032-1037 [Conf]
  177. T. Takahashi, M. Tammi, Heikki Vatiainen, Rami Lehtonen, J. Hatju
    Implementation and performance evaluation of multicast control protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1038-1043 [Conf]
  178. Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, J. J. Sanchez-Manzanares, Josemaria Malgosa-Sanahuja, Joan García-Haro
    Multicast synchronous transfer protocol: a complete study of packet delay and packet loss behavior. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1044-1050 [Conf]
  179. Emad Eldin Mohamed, Hussein M. Abdel-Wahab
    Multicast error control for multimedia collaborative applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1051-1056 [Conf]
  180. Ayman El-Sayed, Vincent Roca
    On robustness in application-level multicast: the case of HBM. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1057-1062 [Conf]
  181. Mozafar Bag Mohammadi, Siavash Samadian-Barzoki, M. Nikoopour, Nasser Yazdani, Nasser Rezaee
    A case for dense-mode multicast support in MPLS. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1063-1070 [Conf]
  182. Baitao Long, Lifeng Sun, Wenping Chen, Yuzhuo Zhong
    Improving the stability of spanning trees for application-layer multicast. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1071-1076 [Conf]
  183. U. T. Nguyen
    Evaluation of flow control algorithms for ABR multipoint services. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1077-1084 [Conf]
  184. Rohit Kapoor, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla
    Accuracy of link capacity estimates using passive and active approaches with CapProbe. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1085-1090 [Conf]
  185. Mario Gerla, Zahir Tari, Peter Bertók
    An analytical study of object relocation strategies for wireless environments. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1091-1097 [Conf]
  186. Swapna S. Gokhale
    Software application design based on architecture, reliability and cost. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1098-1103 [Conf]
  187. Habib Bakour, Nadia Boukhatem
    Provisioning virtual active networks for dynamic active service deployment. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1104-1109 [Conf]
  188. Sanaa Sharafeddine
    Implementation of the almost guaranteed dimensioning strategy in integrated IP networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1110-1116 [Conf]
  189. Vassilios M. Stathopoulos, Iakovos S. Venieris
    A middleware-based service for employing resource management algorithms at distributed networks and evaluating their performance. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1117-1122 [Conf]
  190. J. Back, J.-F. Paris
    A heuristic buffer management scheme for tree-based reliable multicast. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1123-1128 [Conf]
  191. Antonella Di Stefano, Giuseppe Pappalardo, Emiliano Tramontana
    An infrastructure for runtime evolution of software systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1129-1135 [Conf]
  192. Rodrigo Sanger Alves, Clarissa Cassales Marquezan, Lisandro Zambenedetti Granville
    Experiences in the implementation of an SNMP-based high performance cluster management system. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1136-1141 [Conf]
  193. Stamatios V. Kartalopoulos
    Terabit/s data communication in distributed computer cluster networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1142-1147 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002