The SCEAS System
Navigation Menu

Conferences in DBLP

Symposium on Applications and the Internet (saint)
2005 (conf/saint/2005)

  1. Dong Zhou, Min-Te Sun, Ten-Hwang Lai
    A Timer-based Protocol for Connected Dominating Set Construction in IEEE 802.11 Multihop Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:2-8 [Conf]
  2. Yusuke Doi
    DNS Meets DHT: Treating Massive ID Resolution Using DNS Over DHT. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:9-15 [Conf]
  3. Wang-Cho Cheng, Chee-Wei Ang, Kim-Sing Wong
    A DNS-Based Host Portability Solution With Localized Location Updating. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:16-22 [Conf]
  4. Nikolaos Papadakis, Dimitrios Skoutas, Konstantinos Raftopoulos, Theodora A. Varvarigou
    An Automatic Web Wrapper for Extracting Information from Web Sources, Using Clustering Techniques. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:24-30 [Conf]
  5. Oscar Díaz, Iñaki Paz
    Turning Web Applications into Portlets: Raising the Issues. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:31-37 [Conf]
  6. Takeru Miki, Saeko Nomura, Toru Ishida
    Semantic Web Link Analysis to Discover Social Relationships in Academic Communities. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:38-45 [Conf]
  7. Ladislav Sobr, Petr Tuma
    SOFAnet: Middleware for Software Distribution over Internet. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:48-53 [Conf]
  8. Daniela Bourges-Waldegg, Yann Duponchel, Marcel Graf, Michael Moser
    The Fluid Computing Middleware: Bringing Application Fluidity to the Mobile Internet. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:54-63 [Conf]
  9. Sean Rooney, Daniel Bauer, Paolo Scotton
    Edge Server Software Architecture For Sensor Applications. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:64-71 [Conf]
  10. Pavan Verma, Atul Prakash
    FACE: A Firewall Analysis and Configuration Engine. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:74-81 [Conf]
  11. Takashi Horie, Toshiharu Harada, Kazuo Tanaka
    Adaptive Access Policy for the Linux Kernel. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:82-88 [Conf]
  12. Sadanori Aoyagi, Makoto Takizawa, Masato Saito, Hiroto Aida, Hideyuki Tokuda
    ELA: A Fully Distributed VPN System over Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:89-92 [Conf]
  13. Luis M. Camarinha-Matos, Hamideh Afsarmanesh
    Infrastructures for Collaborative Networks - An Application in Elderly Care. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:94-101 [Conf]
  14. Norihito Fujita, Yuichi Ishikawa, Toshio Koide, Akira Tsukamoto
    Scalable Overlay Network Deployment for Dynamic Collaborative Groups. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:102-109 [Conf]
  15. Jun-Jang Jeng, Henry Chang, Kumar Bhaskaran
    On Architecting Business Performance Management Grid for Adaptive Enterprises. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:110-116 [Conf]
  16. Xiaoyu Zhang, GuangZhao Zhang
    A Multicast Routing Algorithm for Overlay Network Built on Leased Lines. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:118-124 [Conf]
  17. Paolo Romano, Francesco Quaglia, Bruno Ciciani
    Design and Analysis of an e-Transaction Protocol Tailored for OCC. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:125-131 [Conf]
  18. Claudia Canali, Valeria Cardellini, Michele Colajanni, Riccardo Lancellotti, Philip S. Yu
    A Two-Level Distributed Architecture for Efficient Web Content Adaptation and Delivery. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:132-139 [Conf]
  19. Shigeki Takeuchi, Hiroyuki Koga, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi
    Performance Evaluations of DCCP for Bursty Traffic in Real-Time Applications. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:142-149 [Conf]
  20. Norio Yamagaki, Hideki Tode, Koso Murakami
    Dual Metrics Fair Queueing: Improving Fairness and File Transfer Time. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:150-156 [Conf]
  21. Carlo Blundo, Stelvio Cimato, Roberto De Prisco
    A Lightweight Approach to Authenticated Web Caching. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:157-163 [Conf]
  22. Kento Aida, Tomotaka Osumi
    A Case Study in Running a Parallel Branch and Bound Application on the Grid. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:164-173 [Conf]
  23. Zakaria Maamar, Emad Bataineh, Ghazi AlKhatib
    On Coordinating Personalized Web Services Using CooPS. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:176-182 [Conf]
  24. Seyyed Vahid Hashemian, Farhad Mavaddat
    A Graph-Based Approach to Web Services Composition. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:183-189 [Conf]
  25. Manshan Lin, Heqing Guo, Jianfei Yin
    Goal Description Language for Semantic Web Service Automatic Composition. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:190-196 [Conf]
  26. Tatsuya Matsukawa, Takashi Satake, Jiro Yamada
    Metrics for Detection of QoS Degradation over Wireless LAN. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:198-203 [Conf]
  27. Niwat Thepvilojanapong, Yoshito Tobe, Kaoru Sezaki
    HAR: Hierarchy-Based Anycast Routing Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:204-212 [Conf]
  28. Jun-Zhao Sun, Jukka Riekki, Marko Jurmu, Jaakko Sauvola
    Channel-Based Connectivity Management Middleware for Seamless Integration of Heterogeneous Wireless Networks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:213-219 [Conf]
  29. Hiroyuki Tarumi, Seiko Tokuda, Tomohiro Yasui, Kazuya Matsubara, Fusako Kusunoki
    Design and Evaluation of a Location-Based Virtual City System for Mobile Phones. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:222-228 [Conf]
  30. Péter Surányi, Hirotake Abe, Toshio Hirotsu, Yasushi Shinjo, Kazuhiko Kato
    General Virtual Hosting via Lightweight User-Level Virtualization. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:229-236 [Conf]
  31. Bogdan-Florin Marin, Axel Hunger, Stefan Werner, Sorin Meila, Christian Schuetz
    Roles of an Intelligent Tutor Agent in a Virtual Society. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:237-244 [Conf]
  32. Hiroaki Kobayashi, Hiroyuki Takizawa, Tsutomu Inaba, Yasuaki Takizawa
    A Self-Organizing Overlay Network to Exploit the Locality of Interests for Effective Resource Discovery in P2P Systems. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:246-255 [Conf]
  33. Leonardo Mariani
    Fault-Tolerant Routing for P2P Systems with Unstructured Topology. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:256-263 [Conf]
  34. Hiroshi Yamamoto, Daisuke Maruta, Yuji Oie
    Replication Methods for Load Balancing on Distributed Storages in P2P Networks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:264-271 [Conf]
  35. Hsiao-Hong Tsai, Fang-Yie Leu, Wen-Kui Chang
    Mobile Agent Communication Using SIP. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:274-279 [Conf]
  36. Hideo Kamada, Kazuhiko Kinoshita, Nariyoshi Yamai, Hideki Tode, Koso Murakami
    An Efficient Agent Control Method for Time Constraint Applications. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:280-286 [Conf]
  37. Peng Xu, Ralph Deters
    Fault-Management for Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:287-293 [Conf]
  38. Nobuaki Yoshida, Yoshio Hayashi, Yutaka Tamagaki, Shoji Urashita, Makoto Kakuta, Masahiro Watanabe, Jacques Garrigue, Reiji Nakajima
    SOBA Framework: An Application Framework for Broadband Network Environment. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:296-303 [Conf]
  39. Hideki Tode, Makoto Wada, Kazuhiko Kinoshita, Toshihiro Masaki, Koso Murakami
    Enhanced Flooding Control Methods based on Biotic Growth. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:304-310 [Conf]
  40. Hiroyuki Oouchi, Ken Takahashi, Hiromichi Nagata, Kouichi Kamasawa
    Multi-Rate Control Method Using Layered Content. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:311-317 [Conf]
  41. Abhishek Gupta, Divyakant Agrawal, Amr El Abbadi
    Distributed Resource Discovery in Large Scale Computing Systems. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:320-326 [Conf]
  42. Pascal Francq, Alain Delchambre
    Using Documents Assessments to Build Communities of Interests. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:327-333 [Conf]
  43. Hiroshi Uehara, Kenichi Yoshida
    Annotating TV Drama based on Viewer Dialogue - Analysis of Viewers' Attention Generated on an Internet Bulletin Board -. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:334-340 [Conf]
  44. Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Masato Tsuru, Yuji Oie
    Empirical Study on Locating Congested Segments over the Internet Based on Multiple End-to-End Path Measurements. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:342-351 [Conf]
  45. Shinji Motegi, Kiyohito Yoshihara, Hiroki Horiuchi
    Implementation and Evaluation of On-demand Address Allocation for Event-Driven Sensor Network. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:352-360 [Conf]
  46. Hiroyuki Ohsaki, Juñya Ujiie, Makoto Imase
    On Scalable Modeling of TCP Congestion Control Mechanism for Large-Scale IP Networks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:361-368 [Conf]
  47. Kenichi Yoshida, Fuminori Adachi, Takashi Washio, Hiroshi Motoda, Teruaki Homma, Akihiro Nakashima, Hiromitsu Fujikawa, Katsuyuki Yamazaki
    Memory Management of Density-Based Spam Detector. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:370-376 [Conf]
  48. P. Deepak, Sandeep Parameswaran
    Spam Filtering using Spam Mail Communities. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:377-383 [Conf]
  49. Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita, Shin Maruyama, Motonori Nakamura
    A Protection Method Against Massive Error Mails Caused by Sender Spoofed Spam Mails. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:384-390 [Conf]
  50. Saneyasu Yamaguchi, Masato Oguchi, Masaru Kitsuregawa
    Trace System of iSCSI Storage Access. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:392-398 [Conf]
  51. Michal Szymaniak, Guillaume Pierre, Maarten van Steen
    Latency-Driven Replica Placement. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:399-405 [Conf]
  52. Shi-Cho Cha, Yuh-Jzer Joung
    On Derived Data Services in Cyberspace. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:406-412 [Conf]
  53. Nobuo Okabe, Shoichi Sakane, Kazunori Miyazawa, Kenichi Kamada, Atsushi Inoue, Masahiro Ishiyama
    Security Architecture for Control Networks using IPsec and KINK. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:414-420 [Conf]
  54. Antonio Corradi, Rebecca Montanari, Daniela Tibaldi, Alessandra Toninelli
    A Context-centric Security Middleware for Service Provisioning in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:421-429 [Conf]
  55. Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang
    D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:430-436 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002