Conferences in DBLP
Technical program committee. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:- [Conf ] Committees and chairs. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:- [Conf ] Author Index. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:- [Conf ] Message from the general co-chairs. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:- [Conf ] Message from the technical program chairs. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:- [Conf ] Reviewers. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:- [Conf ] Yichuan Jiang , Zhengyou Xia , YiPing Zhong , Shiyong Zhang The construction of a novel agent fault-tolerant migration model. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1-6 [Conf ] Ibrahim F. Imam Adaptive applications of intelligent agents. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:7-12 [Conf ] Carsten Pils , K. Deissner , Stefan Diepolder , Jan Kritzner The performance server: rational server selection for mobile agents. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:13-18 [Conf ] Xiaodong Lu , Ivan Luque , Miho Kanda , Kinji Mori Agent-based autonomous information services integration and allocation to achieve high response and low cost in distributed information service system. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:19-24 [Conf ] Tim Hsin-Ting Hu , Binh Thai , Aruna Seneviratne Agent coordination in the mobile agent P2P architecture for supporting mobile devices in a Gnutella file-sharing network. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:25-30 [Conf ] Muhammed S. Peerbocus , Zahir Tari A workflow-based dynamic scheduling approach for Web services platforms. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:31-37 [Conf ] Dionisis X. Adamopoulos , Constantine A. Papandreou Enabling Web services: towards service grids. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:38-43 [Conf ] Shengru Tu , Eric Normand , S. Kuchimanchi , V. Bizot , S. Shu , Mahdi Abdelguerfi , Jay J. Ratcliff , Kevin Shaw Integrating Web services into map image applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:44-49 [Conf ] Weimin Lang , Zongkai Yang , Gan Liu , Wenqing Cheng , Yunmeng Tan A new efficient micropayment scheme against overspending. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:50-55 [Conf ] Jun Wang , Yiming Hu A performance study on Internet Server Provider mail servers. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:56-61 [Conf ] A. Amin , R. Ammar , A. El Dessouly Scheduling real time parallel structures on cluster computing with possible processor failures. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:62-67 [Conf ] Gamal Attiya , Yskandar Hamam Reliability oriented task allocation in heterogeneous distributed computing systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:68-73 [Conf ] Sarah Tasneem , Reda A. Ammar , Howard A. Sholl A methodology to compute task remaining execution time. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:74-79 [Conf ] RazaRaza Ul-Mustafa , Ahmed E. Kamal On the grooming of multicast traffic in WDM networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:76-81 [Conf ] Wanjun Huang , Xinhua Zhang , Uwe Roth , Christoph Meinel Routing based workflow for construction of distributed applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:80-85 [Conf ] Asser N. Tantawi Optimized external scheduling for fair service discrimination. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:86-91 [Conf ] E. A. El-Sebakhy Functional networks training algorithm for statistical pattern recognition. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:92-97 [Conf ] Kazuhiro Morita , El-Sayed Atlam , Masao Fuketa , Yuki Kadoya , Toru Sumitomo , Jun-Ichi Aoe A new classification sentence technique using intension expressions. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:98-103 [Conf ] El-Sayed Atlam , Elmarhomy Ghada , Masao Fuketa , Kazuhiro Morita , Jun-Ichi Aoe A compact memory space of dynamic full-text search using Bi-gram index. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:104-109 [Conf ] Mehmet Kaya , Reda Alhajj Genetic algorithms based optimization of membership functions for fuzzy weighted association rules mining. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:110-115 [Conf ] Tzung-Pei Hong , Chun-Hao Chen , Yu-Lung Wu , Yeong-Chyi Lee Using divide-and-conquer GA strategy in fuzzy data mining. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:116-121 [Conf ] Toru Sumitomo , Yuki Kadoya , Masao Fuketa , Kazuhiro Morita , Shinkaku Kashiji , Jun-Ichi Aoe An new E-mail filtering technique using time priority measurement. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:122-127 [Conf ] A. K. Sharma , A. Goswami , D. K. Gupta Discovery of fuzzy inclusion dependencies in fuzzy relational databases. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:128-133 [Conf ] A. K. Sharma , A. Goswami , D. K. Gupta FTS relational data model for source-aware fuzzy relational multidatabases. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:134-139 [Conf ] Doaa S. El Zanfaly , Reda A. Ammar , A. S. Eldin Modeling and analysis of a multilevel caching in distributed database systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:140-145 [Conf ] Ayla Sayli , Bora Gökçe The use of SQO rules in DMLs. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:146-151 [Conf ] Habib M. Ammari , Hesham El-Rewini Performance evaluation of hybrid environments with mobile gateways. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:152-157 [Conf ] H. A. ElAdly , Thomas M. Chen Enhancing the support of multihopping in an IEEE 802.11 ad-hoc network. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:158-163 [Conf ] M. Fazio , Massimo Villari , Antonio Puliafito Merging and partitioning in ad hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:164-169 [Conf ] Yu Wang , Ivan Stojmenovic , Xiang-Yang Li Bluetooth scatternet formation for single-hop ad hoc networks based on virtual positions. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:170-175 [Conf ] Zhifei Li , Sukumar Nandi , Anil K. Gupta Achieving MAC fairness in wireless ad-hoc networks using adaptive transmission control. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:176-181 [Conf ] Hari Rangarajan , J. J. Garcia-Luna-Aceves Achieving loop-free incremental routing in ad hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:182-187 [Conf ] Yao H. Ho , Ai Hua Ho , Kien A. Hua , Georgiana L. Hamza-Lup A connectionless approach to mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:188-195 [Conf ] Mariusz A. Fecko , Ulas C. Kozat , Sunil Samtani , M. Ümit Uyar , Ibrahim Hökelek Dynamic survivable resource pooling in mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:196-201 [Conf ] Huaming Wu , Alhussein A. Abouzeid Power aware image transmission in energy constrained wireless networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:202-207 [Conf ] Cai ShaoBin , Yang XiaoZong , Yao WenBin PatchPSMP: an extension of NSMP based on pool node. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:208-213 [Conf ] Jing Ai , Jingfei Kong , Damla Turgut An adaptive coordinated medium access control for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:214-219 [Conf ] W. Yuan , Srikanth V. Krishnamurthy , Satish K. Tripathi Improving the reliability of event reports in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:220-225 [Conf ] Jamal N. Al-Karaki , Ahmed E. Kamal On the correlated data gathering problem in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:226-231 [Conf ] Hari Rangarajan , J. J. Garcia-Luna-Aceves Reliable data delivery in event-driven wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:232-237 [Conf ] Thiemo Voigt , Adam Dunkels , Juan Alonso , Hartmut Ritter , Jochen H. Schiller Solar-aware clustering in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:238-243 [Conf ] Amre El-Hoiydi , Jean-Dominique Decotignie WiseMAC: an ultra low power MAC protocol for the downlink of infrastructure wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:244-251 [Conf ] Esa Hyytiä , L. Nieminen Linear program formulation for routing problem in OBS networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:252-257 [Conf ] T. Komine , M. Nakagawa Performance evaluation of visible-light wireless communication system using white LED lightings. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:258-263 [Conf ] Ayman Kaheel , Hussein M. Alnuweiri , Fayez Gebali A new analytical model for computing blocking probability in optical burst switching networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:264-269 [Conf ] N. Elfaramawy , A. Awad All-optical logic circuits based on the nonlinear properties of the semiconductor optical amplifier. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:270-275 [Conf ] Ahmad Khalil , Chadi Assi , Antonis M. Hadjiantonis , Georgios Ellinas , Mohamed A. Ali On multicast traffic grooming in WDM networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:282-287 [Conf ] Stamatis Stefanakos , Thomas Erlebach Routing in all-optical ring networks revisited. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:288-293 [Conf ] Nasir Ghani , Chadi Assi , Abdallah Shami , Mohamed A. Ali Integrated traffic grooming in converged data-optical networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:294-299 [Conf ] M. R. Ahmadi Restoration techniques and delay analysis for fault recovery in WDM networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:300-305 [Conf ] T. M. Barakat , I. I. Ismail , I. A. Ali , N. Abdrabouh Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:306-311 [Conf ] S. Ray , K. Kwiat , D. Zhang Energy-efficient placement/activation algorithms for authorization servers in sensor network. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:312-317 [Conf ] Bin Xie , A. Kumar A framework for integrated Internet and ad hoc network security. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:318-324 [Conf ] O. M. Erdem EDKM: efficient distributed key management for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:325-330 [Conf ] Ricardo Staciarini Puttini , Jean-Marc Percher , Ludovic Mé , Rafael de Sousa A fully distributed IDS for MANET. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:331-338 [Conf ] Christos Siaterlis , Basil S. Maglaris Detecting DDoS attacks with passive measurement based heuristics. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:339-344 [Conf ] Guang Yang , Mario Gerla , M. Y. Sanadidi Defense against low-rate TCP-targeted denial-of-service attacks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:345-350 [Conf ] Bao-Tung Wang , Henning Schulzrinne A denial-of-service-resistant IP traceback approach. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:351-356 [Conf ] Fangyong Hou , Zhiying Wang , Yuhua Tang , Zhen Liu Protecting integrity and confidentiality for data communication. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:357-362 [Conf ] Yacine Challal , Hatem Bettahar , Abdelmadjid Bouabdallah A2 cast: an adaptive source authentication protocol for multicast streams. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:363-368 [Conf ] Zhengyou Xia , Yichuan Jiang , YiPing Zhong , Shiyong Zhang An access control policy for active networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:369-374 [Conf ] Zhide Chen , Hong Zhu Quantum m-out-of-n oblivious transfer. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:375-380 [Conf ] A. M. Allam , I. I. Ibrahim , I. A. Ali , A. E. H. Elsawy Provably secure entity authentication the three party case. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:381-385 [Conf ] D. Critchlow , Ning Zhang Revocation invocation for accountable anonymous PKI certificate trees. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:386-392 [Conf ] Cássio Ditzel Kropiwiec , Edgard Jamhour , Carlos Maziero A framework for protecting Web services with IPsec. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:393-398 [Conf ] Omaima Bamasak , Ning Zhang A secure proxy signature protocol for agent-based M-commerce applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:399-406 [Conf ] Weimin Lang , Yunmeng Tan , Zongkai Yang , Gan Liu , Bing Peng A new efficient ID-based proxy blind signature scheme. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:407-411 [Conf ] Aleksandra Nenadic , Ning Zhang , Stephen Barton A secure and fair DSA-based signature exchange protocol. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:412-417 [Conf ] A. G. Bafghi , B. Sadeghiyan Finding suitable differential characteristics for block ciphers with Ant colony technique. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:418-423 [Conf ] Wenqing Cheng , Weimin Lang , Zongkai Yang , Gan Liu , Yunmeng Tan An identity-based proxy ring signature scheme from bilinear pairings. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:424-429 [Conf ] Mohamed F. Tolba , M. A.-S. Ghonemy , I. A.-H. Taha , Amal S. Khalifa High capacity image steganography using wavelet-based fusion. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:430-435 [Conf ] M. Shabany , K. Navaie , Elvino S. Sousa Downlink resource allocation for data traffic in heterogenous cellular CDMA networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:436-441 [Conf ] M. Shabany , Elvino S. Sousa Joint rate allocation and routing scheme in multihop cellular CDMA networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:442-447 [Conf ] José Ramón Gállego , A. Hernandez-Solaria , María Canales , Antonio Valdovinos Adaptive multimedia traffic multiplexing for dedicated channels in the UMTS system. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:448-453 [Conf ] Gan Liu , Weimin Lang , Weimin Wu , Youlin Ruan , Xiaofeng Shen , Guangxi Zhu QoS-guaranteed call admission scheme for broadband multiservices mobile wireless networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:454-459 [Conf ] Dario Bruneo , Luca Paladina , Maurizio Paone , Antonio Puliafito Resource reservation in mobile wireless networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:460-465 [Conf ] Giuseppe Anastasi , Marco Conti , Enrico Gregori , Andrea Passarella Experimental analysis of an application-independent energy management policy for Wi-Fi hotspots. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:466-471 [Conf ] Wei Wang , Soung C. Liew , Qixiang Pang , V. O. K. Li A multiplex-multicast scheme that improves system capacity of voice-over-IP on wireless LAN by 100%. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:472-477 [Conf ] Seongkwan Kim , Sangwook Kang , Sunshin An Enhanced service differentiation extensions for the IEEE 802.11a wireless network. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:478-483 [Conf ] Enrique Costa-Montenegro , Francisco J. González-Castaño , Ubaldo M. García-Palomares , M. Vilas-Paz , Pedro S. Rodríguez-Hernández Distributed and centralized algorithms for large-scale IEEE 802.11b infrastructure planning. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:484-491 [Conf ] Z. G. Zhou , Aruna Seneviratne Improving wireless connectivity for mobile computing environments. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:492-497 [Conf ] Paolo Bellavista , Antonio Corradi , Luca Foschini MUM: a middleware for the provisioning of continuous services to mobile users. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:498-505 [Conf ] Georgios Leoleis , Lila Dimopoulou , Vaggelis Nikas , Iakovos S. Venieris Mobility management for multicast sessions in a UMTS-IP converged environment. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:506-511 [Conf ] Azzedine Boukerche , Trivikram Dash , Maria Cristina Pinotti Performance analysis of a hybrid push-pull algorithm with QoS adaptations in wireless networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:512-524 [Conf ] S. M. S. Masajedian , H. Khoshbin Cooperative location management method in next generation cellular networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:525-530 [Conf ] Paolo Bellavista , Antonio Corradi A QoS management middleware based on mobility prediction for multimedia service continuity in the wireless Internet. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:531-538 [Conf ] Ling-Jyh Chen , Tony Sun , M. Y. Sanadidi , Mario Gerla Improving wireless link throughput via interleaved FEC. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:539-544 [Conf ] Kui-Fai Leung , K. L. Yeung G-Snoop: enhancing TCP performance over wireless networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:545-550 [Conf ] Kui-Fai Leung , K. L. Yeung TCP-swift: an end-host enhancement scheme for TCP over satellite IP networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:551-555 [Conf ] Jenn-Wei Lin An efficient fault-tolerant multicast approach for wireless mobile systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:556-561 [Conf ] Anup Kumar , Mostafa M. El-Said , Adel Said Elmaghraby Base station assisted search approach for mitigation of pilot pollution interference. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:562-567 [Conf ] Sayaka Harada , Hiroaki Higaki Wireless sporadic communication protocol for supporting cluster-to-base station communication. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:568-573 [Conf ] Yuan-Pei Lin , See-May Phoong DFT based transceivers with-windowing. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:574-579 [Conf ] See-May Phoong , G. Quenot , E. Castelli Recognizing emotions for the audio-visual document indexing. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:580-584 [Conf ] B. Aoued Accelerating fractal image compression by domain pool reduction adaptive partitioning and structural block classification. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:585-589 [Conf ] Hong Wen , Fei Hu , Fan Jin Design of odd-periodic complementary binary signal set. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:590-593 [Conf ] Mohamed A. S. Hassan , Bayan S. Sharif , Wai Lok Woo , S. Jimaa Semiblind estimation of time varying STFBC-OFDM channels using Kalman filter and CMA. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:594-599 [Conf ] Hung-Chang Yang , Hsiang-Fu Yu , Li-Ming Tseng , Yi-Ming Chen Interleaving harmonic broadcasting and receiving scheme with loss-anticipation delivery. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:600-605 [Conf ] Reza Danesfahani , Tony Jeans A heuristic approach to optimization of the decision-directed maximum-likelihood feedforward carrier phase error detection algorithm. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:606-609 [Conf ] A. M. Hmidat , Bayan S. Sharif , Wai Lok Woo , S. A. Jimma Nonlinear space-time multiuser detector for non-Gaussian channels. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:610-614 [Conf ] Imed Bouazizi , Mesut Günes Distortion-optimized FEC for unequal error protection in MPEG-4 video delivery. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:615-620 [Conf ] M. A. A. Mohamed , Hossam M. H. Shalaby , E.-S. A. El-Badawy Optical CDMA protocol with selective retransmission. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:621-626 [Conf ] C. Khemapatapan , W. Benjapolakul Performance analyses of DPSK-FFHSS and DPSK-FFH-SSMA systems over Nakagami fading channels. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:627-632 [Conf ] P. Sharma Time-series model for wireless fading channels in isotropic and non-isotropic scattering environments. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:633-638 [Conf ] João H. Kleinschmidt , Marcelo Eduardo Pellenz , Luiz A. Paula Lima Jr. Evaluating and improving Bluetooth piconet performance over Nakagami-m fading channels. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:639-644 [Conf ] Lingzhi Cao , Norman C. Beaulieu Closed-form results for the BER of maximal ratio combining with channel estimation errors in Ricean fading channels. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:645-650 [Conf ] Yuling Zhang , Dongfeng Yuan , Haigang Zhang Adaptive LDPC for Rayleigh fading channel. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:651-656 [Conf ] I. Popescu , P. Constantinou , M. Nafornita , I. Nafornita Generalized regression neural network prediction model for indoor environment. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:657-661 [Conf ] Tak-Chung Fu , Fu-Lai Chung , Robert Wing Pong Luk , Chak-man Ng Progressive time series visualization in a mobile environment. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:662-667 [Conf ] Hua Jing-Yu , You Xiao-Hu , Sheng Bin , W. Martin , S. Egon A fast convergent scheme for the Doppler shift estimation in mobile communication systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:668-671 [Conf ] Min-Xiou Chen , Ben-Jye Chang , Ren-Hung Hwang , Jun-Fan Juang MDP-based OVSF code assignment scheme and call admission control for wideband-CDMA communications. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:672-677 [Conf ] L. Harju , J. Nurmi A baseband receiver architecture for UMTS-WLAN interworking applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:678-685 [Conf ] Weijun Cheng , Laibo Zheng , Jiandong Hu Performance analysis of cooperative macro-diversity in mobile cellular networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:686-689 [Conf ] N. E. Rittas , A. G. Asimakopoulos , D. G. Xenikos Path loss model for TETRA networks in metropolitan areas. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:690-695 [Conf ] Tao Wang , Yong Wang Capacity of M-ary PAM impulse radio with various derivatives of Gaussian pulse subject to FCC spectral masks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:696-701 [Conf ] Chang-Jun Ahn , K. Kamio , Satoshi Takahashi , Hiroshi Harada Reverse link performance improvement for an wideband OFDM using Alamouti coded heterogeneous polarization antennas. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:702-707 [Conf ] K. Sathananthan , C. R. N. Athaudage , B. Qiu A novel ICI cancellation scheme to reduce both frequency offset and IQ imbalance effects in OFDM. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:708-713 [Conf ] N. Papanikolaou , A. Spanakis , D. Apostolakis , P. Constantinou Radio coverage measurements into tunnel with leaky section radiating cable. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:714-719 [Conf ] A. Mirzaee , H. Aghaeinia Design of a new class of spreading sequence using chaotic dynamical systems for asynchronous DS-CDMA applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:720-724 [Conf ] S. Ruangsuthinarupap , K. M. Ahmed , W. A. C. Fernando , M. E. R. Khan PAPR reduction by combining selected mapping and selected spreading code in MC-CDMA systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:725-729 [Conf ] Ayse Karaman , Hossam S. Hassanein Extended framework for delay-constrained multipoint-to-multipoint communication. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:730-735 [Conf ] Juan A. Almendral , Luis L. Fernández , Vicent Cholvi , Miguel A. F. Sanjuan Oblivious router policies and Nash equilibrium. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:736-741 [Conf ] Miao Zhang , Fengyuan Ren , Jianping Wu , Ke Xu Using fuzzy-PI controller in active queue management. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:742-747 [Conf ] Fengyuan Ren , Chuang Lin , Bo Wei Design a robust controller for active queue management in large delay networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:748-754 [Conf ] A. Delenda , Patrick Maillé , Bruno Tuffin Reserve price in progressive second price auctions. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:755-759 [Conf ] Mina Guirguis , Azer Bestavros , Ibrahim Matta , N. Riga , G. Diamant , Yuting Zhang Providing soft bandwidth guarantees using elastic TCP-based tunnels. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:760-765 [Conf ] Hakki C. Cankaya , A. Lardies , G. W. Ester Availability aware cost modeling of mesh architectures for long-haul networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:766-771 [Conf ] Paolo Lollini , Andrea Bondavalli , Felicita Di Giandomenico , Stefano Porcarelli Congestion analysis during outage, congestion treatment and outage recovery for simple GPRS networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:772-778 [Conf ] Hassan Naser , Hussein T. Mouftah Availability analysis and simulation of mesh restoration networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:779-785 [Conf ] S. Ghani , M. Schwartz A hierarchical analysis of access multiplexers with multimedia traffic. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:786-791 [Conf ] Chul Geun Park , Ho Suk Jung , Dong Hwan Han , Yutae Lee Performance analysis of DBA scheme with interleaved polling algorithm in an Ethernet PON. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:792-797 [Conf ] Kai-Chien Chang , Wanjiun Liao Modeling the contention mechanism of DOCSIS in HFC networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:798-803 [Conf ] Hideyuki Shimonishi , M. Y. Sanadidi , Mario Gerla Service differentiation at transport layer via TCP Westwood low-priority (TCPW-LP). [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:804-809 [Conf ] Jianping Zou , M. Ümit Uyar , Mariusz A. Fecko , Sunil Samtani Preferential treatment of SCTP subflows: analysis and simulation. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:810-815 [Conf ] Stylianos Georgoulas , Panos Trimintzios , George Pavlou Admission control placement in differentiated services networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:816-821 [Conf ] Tsang-Ling Sheu , Bing-Chi Kuo End-to-end jitter minimization with TCM for real-time multimedia traffic in DiffServ networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:822-827 [Conf ] Naveen K. Chilamkurti , Ben Soh , A. Aitham SPLIT: A priority based TCP-friendly video protocol. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:828-833 [Conf ] Jie Lian , S. Naik , Gordon B. Agnew Optimal solution of total routing table size for hierarchical networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:834-839 [Conf ] Haibin Lu , Sartaj K. Sahni A B-tree dynamic router-table design. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:840-845 [Conf ] K. M. Elsayed HCASP: A hop-constrained adaptive shortest-path algorithm for routing bandwidth-guaranteed tunnels in MPLS networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:846-851 [Conf ] Hanan H. Elazhary , Swapna S. Gokhale Integrating path computation and precomputation for quality-of-service provisioning. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:852-857 [Conf ] Haibin Lu , Sartaj K. Sahni Dynamic IP router-tables using highest-priority matching. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:858-863 [Conf ] Hossam S. Hassanein , Jian Zhao Supporting service differentiation through end-to-end QoS routing. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:864-869 [Conf ] Yanxing Zheng , Jing Tian , Zhifeng Liu , Wenhua Dou A limited path unicast QoS routing algorithm. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:870-875 [Conf ] Alexander A. Kist , Richard J. Harris Cost efficient overflow routing for outbound ISP traffic. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:876-882 [Conf ] Michael Menth , Jens Milbrandt , Stefan Kopf Impact of routing and traffic distribution on the performance of network admission control. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:883-890 [Conf ] Sudip Misra , B. John Oommen Generalized pursuit learning algorithms for shortest path routing tree computation. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:891-896 [Conf ] Tiziano Inzerilli , E. Paone , Antonio Pietrabissa , G. Tarquini QoS support for interactive communication with DVB/RCS satellites. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:897-902 [Conf ] Michael Menth , Jens Milbrandt , Simon Oechsner Experience-based admission control (EBAC). [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:903-910 [Conf ] Yan Bai , Mabo Robert Ito FDDT+: improving fairness for video transmission over IP networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:911-914 [Conf ] József Bíró , András Gulyás , T. Szenasi , Zalán Heszberger Distribution-free conservative bounds for QoS measures. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:915-920 [Conf ] S. Shah-Heydari , W. Mardini , O. Yang Theoretical analysis of restorability of Hamiltonian protection cycles in random mesh networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:921-926 [Conf ] Mohammad Hossien Yaghmaee , H. S. Farmad Improving the loss performance of random early detection gateway using fuzzy logic control. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:927-932 [Conf ] J. L. Martinez , I. G. Munoz , J. F. Navajas QoS estimators for client-side dynamic server selection: limitations and keys. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:933-938 [Conf ] Eugenia G. Nikolouzou , Sotirios Maniatis , Iakovos S. Venieris Resource allocation algorithms for intra-domain quality of service provisioning. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:939-944 [Conf ] Sanaa Sharafeddine , Zaher Dawy A capacity margin for IP networks with QoS constraints and uncertain demands. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:945-950 [Conf ] Jinwu Wei , Jiangxing Wu , Shuqiao Chen Joint multifractal network traffic generator and characteristics analysis. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:951-956 [Conf ] Gábor Rétvári , József Bíró , Tibor Cinkler A novel Lagrangian-relaxation to the minimum cost multicommodity flow problem and its application to OSPF traffic engineering. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:957-962 [Conf ] N. Sadek , Alireza Khotanzad K-factor Gegenbauer ARMA process for network traffic simulation. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:963-968 [Conf ] Miikka Lundan Streaming over EGPRS. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:969-974 [Conf ] Ahmed Abd El Al , Tarek N. Saadawi , Myung J. Lee Bandwidth aggregation in stream control transmission protocol. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:975-980 [Conf ] Pere Vilà , José-Luis Marzo , Eusebi Calle , Liliana Carrillo Lightweight monitoring of label switched paths for bandwidth management. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:981-986 [Conf ] Khaled Ragab , Yuji Horikoshi , Hisayuki Kuriyama , Kinji Mori Multi-layer autonomous community overlay network for enhancing communication delay. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:987-992 [Conf ] Rui Prior , Susana Sargento , Pedro Brandão , Sérgio Crisóstomo Evaluation of a scalable reservation-based QoS architecture. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:993-999 [Conf ] Sérgio Crisóstomo , Farzad Safaei , Don Platt On the provision of immersive audio communication to massively multi-player online games. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1000-1005 [Conf ] Masakazu Ono , T. Hirakawa , Hiroaki Higaki Hybrid checkpoint protocol for cell-dependent infrastructured networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1006-1011 [Conf ] Ali Boudani , Alexandre Guitton , Bernard Cousin GXcast: generalized explicit multicast routing protocol. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1012-1017 [Conf ] Yezid Donoso , Ramón Fabregat , José-Luis Marzo Multi-objective optimization scheme for dynamic multicast groups. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1018-1023 [Conf ] ZhengQuan Xu , Lin Chen An effective heuristic algorithm for dynamic multicast routing with delay-constrained. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1024-1031 [Conf ] Lin Chen , K. L. Yeung Fast-response receiver-driven layered multicast. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1032-1037 [Conf ] T. Takahashi , M. Tammi , Heikki Vatiainen , Rami Lehtonen , J. Hatju Implementation and performance evaluation of multicast control protocol. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1038-1043 [Conf ] Pilar Manzanares-Lopez , Juan Carlos Sanchez-Aarnoutse , J. J. Sanchez-Manzanares , Josemaria Malgosa-Sanahuja , Joan García-Haro Multicast synchronous transfer protocol: a complete study of packet delay and packet loss behavior. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1044-1050 [Conf ] Emad Eldin Mohamed , Hussein M. Abdel-Wahab Multicast error control for multimedia collaborative applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1051-1056 [Conf ] Ayman El-Sayed , Vincent Roca On robustness in application-level multicast: the case of HBM. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1057-1062 [Conf ] Mozafar Bag Mohammadi , Siavash Samadian-Barzoki , M. Nikoopour , Nasser Yazdani , Nasser Rezaee A case for dense-mode multicast support in MPLS. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1063-1070 [Conf ] Baitao Long , Lifeng Sun , Wenping Chen , Yuzhuo Zhong Improving the stability of spanning trees for application-layer multicast. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1071-1076 [Conf ] U. T. Nguyen Evaluation of flow control algorithms for ABR multipoint services. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1077-1084 [Conf ] Rohit Kapoor , Ling-Jyh Chen , M. Y. Sanadidi , Mario Gerla Accuracy of link capacity estimates using passive and active approaches with CapProbe. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1085-1090 [Conf ] Mario Gerla , Zahir Tari , Peter Bertók An analytical study of object relocation strategies for wireless environments. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1091-1097 [Conf ] Swapna S. Gokhale Software application design based on architecture, reliability and cost. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1098-1103 [Conf ] Habib Bakour , Nadia Boukhatem Provisioning virtual active networks for dynamic active service deployment. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1104-1109 [Conf ] Sanaa Sharafeddine Implementation of the almost guaranteed dimensioning strategy in integrated IP networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1110-1116 [Conf ] Vassilios M. Stathopoulos , Iakovos S. Venieris A middleware-based service for employing resource management algorithms at distributed networks and evaluating their performance. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1117-1122 [Conf ] J. Back , J.-F. Paris A heuristic buffer management scheme for tree-based reliable multicast. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1123-1128 [Conf ] Antonella Di Stefano , Giuseppe Pappalardo , Emiliano Tramontana An infrastructure for runtime evolution of software systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1129-1135 [Conf ] Rodrigo Sanger Alves , Clarissa Cassales Marquezan , Lisandro Zambenedetti Granville Experiences in the implementation of an SNMP-based high performance cluster management system. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1136-1141 [Conf ] Stamatios V. Kartalopoulos Terabit/s data communication in distributed computer cluster networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1142-1147 [Conf ]