The SCEAS System
Navigation Menu

Conferences in DBLP

Network Computing and Applications (nca)
2005 (conf/nca/2005)


  1. NCA 2005 Program Committee. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:- [Conf]

  2. Message from the NCA 2005 Program Committee. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:- [Conf]

  3. NCA 2005 Symposium Referees. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:- [Conf]

  4. Fourth IEEE International Symposium on Network Computing and Applications - Copyright. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:- [Conf]

  5. Fourth IEEE International Symposium on Network Computing and Applications - Title Page. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:- [Conf]
  6. T. Elmer
    Opening Address. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:1- [Conf]
  7. Jean-Claude Laprie
    Resilience for the Scalability of Dependability. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:5-6 [Conf]
  8. Wei Zhao
    Effectiveness of Traffic Camouflaging over Computer Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:7- [Conf]
  9. Robert W. Taylor
    New Generation Scalable and Dependable Servers. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:8- [Conf]
  10. A. Ghosh
    Challenges in Mobile Networking and Information Assurance. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:9- [Conf]
  11. William Sears, Zhen Yu, Yong Guan
    An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:13-20 [Conf]
  12. Arnab Paul, Rajnish Kumar, Umakishore Ramachandran
    LAWN: A Protocol for Remote Authentication overWireless Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:21-28 [Conf]
  13. Carlos Aguilar Melchor, Yves Deswarte
    pMIX: Untraceability for Small Hiding Groups. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:29-40 [Conf]
  14. Dionysios Kostoulas, Dimitrios Psaltoulis, Indranil Gupta, Ken Birman, Alan J. Demers
    Decentralized Schemes for Size Estimation in Large and Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:41-48 [Conf]
  15. Stephen Frechette, Dimiter R. Avresky
    Method for Task Migration in Grid Environments. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:49-58 [Conf]
  16. Peng Wang, David L. Mills
    A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:59-66 [Conf]
  17. Chin-Ling Chen, Jia-Chun Yu
    Supporting Rate-based Control in DiffServ Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:67-72 [Conf]
  18. Joel Sing, Ben Soh
    TCP New Vegas: Improving the Performance of TCP Vegas Over High Latency Links. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:73-82 [Conf]
  19. Giscard Wepiwé, Plamen L. Simeonov
    A Concentric Multi-ring Overlay for Highly Reliable P2P Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:83-90 [Conf]
  20. Roberto Baldoni, Leonardo Querzoni, Antonino Virgillito, Ricardo Jiménez-Peris, Marta Patiño-Martínez
    Dynamic Quorums for DHT-based P2P Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:91-100 [Conf]
  21. Nuno Carvalho, Filipe Araújo, Luís Rodrigues
    Scalable QoS-Based Event Routing in Publish-Subscribe Systems. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:101-108 [Conf]
  22. Marc Schiely, Lars Renfer, Pascal Felber
    Self-organization in Cooperative Content Distribution Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:109-118 [Conf]
  23. Malika Boulkenafed, Barbara Hughes, René Meier, Gregory Biegel, Vinny Cahill
    Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:119-127 [Conf]
  24. Sarah Tasneem, Lester Lipsky, Reda A. Ammar, Howard A. Sholl
    Using Residual Times to Meet Deadlines in M/G/C Queues. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:128-138 [Conf]
  25. Arnas Kupsys, Richard Ekwall
    Architectural Issues of JMS Compliant Group Communication. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:139-148 [Conf]
  26. Chryssis Georgiou, Peter M. Musial, Alexander A. Shvartsman
    Developing a Consistent Domain-Oriented Distributed Object Service. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:149-158 [Conf]
  27. Roger Khazan, Sophia Yuditskaya
    A Wide Area Network Simulation of Single-Round Group Membership Algorithms. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:159-170 [Conf]
  28. Sanjay Kumar, Ada Gavrilovska, Karsten Schwan, Srikanth Sundaragopalan
    C-CORE: Using Communication Cores for High Performance Network Services. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:171-178 [Conf]
  29. Hao Che, Chethan Kumar, Basavaraj Menasinahal
    Fundamental Network Processor Performance Bounds. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:179-185 [Conf]
  30. Florina M. Ciorba, Theodore Andronikos, Ioannis Drositis, George K. Papakonstantinou, Panayotis Tsanakas
    Reducing the Communication Cost via Chain Pattern Scheduling. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:186-196 [Conf]
  31. Milena Janic, Novi Ineke, Cempaka Wangi, Xiaoming Zhou, Piet Van Mieghem
    Hopcount in Application Layer Multicast Schemes. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:197-204 [Conf]
  32. Mahesh Balakrishnan, Stefan Pleisch, Ken Birman
    Slingshot: Time-Critical Multicast for Clustered Applications. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:205-214 [Conf]
  33. Ye Zhu, Xinwen Fu, Riccardo Bettati
    On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:215-218 [Conf]
  34. Michael Atighetchi, Paul Rubel, Partha Pratim Pal, Jennifer Chong, Lyle Sudin
    Networking Aspects in the DPASA Survivability Architecture: An Experience Report. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:219-222 [Conf]
  35. Romain Laborde, François Barrère, Abdelmalek Benzekri
    A formal framework (Expression + Analysis) for network security. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:223-227 [Conf]
  36. Tzu-Chi Huang, Ce-Kuen Shieh, Wen-Huang Lai, Yu-Ben Miao
    Smart Tunnel Union for NAT Traversal. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:227-231 [Conf]
  37. Constantine Katsinis
    Block Migration in Broadcast-based Multiprocessor Architectures. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:231-234 [Conf]
  38. Gunnar Gaubatz, Berk Sunar
    Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:235-238 [Conf]
  39. Jiazheng Zhou, Xuan-Yi Lin, Chun-Hsien Wu, Yeh-Ching Chung
    Multicast in Fat-Tree-Based InfiniBand Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:239-242 [Conf]
  40. Daniel C. Bünzli, Sergio Mena, Uwe Nestmann
    Protocol Composition Frameworks A Header-Driven Model. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:243-246 [Conf]
  41. Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Hideyuki Tan, Kazuhiro Goto
    SFS-KNOPPIX. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:247-250 [Conf]
  42. Onur Demir, Kanad Ghose
    Improving Transaction Server Performance under Heavy Loads with Differentiated Service and Active Network Interfaces. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:251-254 [Conf]
  43. Chetan Shiva Shankar, Roy H. Campbell
    A Policy-based Management Framework for Pervasive Systems using Axiomatized Rule-Actions. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:255-258 [Conf]
  44. Giorgia Lodi, Fabio Panzieri, Davide Rossi, Elisa Turrini
    Experimental Evaluation of a QoS-aware Application Server. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:259-262 [Conf]
  45. Danilo Ardagna, Marco Trubian, Li Zhang
    SLA Based Profit Optimization in Multi-tier Systems. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:263-266 [Conf]
  46. Bhavin Gandhi, Sameer Tilak, Michael J. Lewis, Nael B. Abu-Ghazaleh
    Controlling the Coverage of Grid Information Dissemination Protocols. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:267-270 [Conf]
  47. Michel Charpentier, Gérard Padiou, Philippe Quéinnec
    Cooperative Mobile Agents to Gather Global Information. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:271-274 [Conf]
  48. Peng-Jun Wan, Chih-Wei Yi
    Coverage by Randomly Deployed Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:275-278 [Conf]
  49. Patrick Th. Eugster, Benoît Garbinato, Adrian Holzer
    Location-based Publish/Subscribe. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:279-282 [Conf]
  50. Alexandros G. Fragkiadakis, David J. Parish
    Performance Evaluation of a PC-based Active Router and Analysis of an Active Secure FTP Application. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:283-286 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002