Conferences in DBLP
(atc) 2006 (conf/atc/2006)
Christian Müller-Schloer , Bernhard Sick Emergence in Organic Computing Systems: Discussion of a Controversial Concept. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:1-16 [Conf ] Stephen S. Yau Managing Trust in Distributed Agent Systems. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:17-25 [Conf ] Jadwiga Indulska , Karen Henricksen , Peizhao Hu Towards a Standards-Based Autonomic Context Management System. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:26-37 [Conf ] Matthias Güdemann , Frank Ortmeier , Wolfgang Reif Formal Modeling and Verification of Systems with Self-x Properties. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:38-47 [Conf ] Junaid Ahsenali Chaudhry , Seungkyu Park A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:48-56 [Conf ] Yong Cui , Hao Che , Constantino M. Lagoa , ZhiMei Zheng Autonomic Interference Avoidance with Extended Shortest Path Algorithm. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:57-66 [Conf ] A. Reza Haydarlou , Benno J. Overeinder , M. A. Oey , Frances M. T. Brazier Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:67-77 [Conf ] Hervé Chang , Philippe Collet , Alain Ozanne , Nicolas Rivierre From Components to Autonomic Elements Using Negotiable Contracts. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:78-89 [Conf ] Wolfgang Trumler , Robert Klaus , Theo Ungerer Self-configuration Via Cooperative Social Behavior. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:90-99 [Conf ] G. Mahmoudi , Christian Müller-Schloer Towards Ontology-Based Embedded Services. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:100-112 [Conf ] Sirui Yang , Hai Jin , Xuping Tu TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:113-122 [Conf ] Yanxiang He , Jun Xiao , Naixue Xiong , Laurence Tianruo Yang Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:123-132 [Conf ] Lai Tu , Furong Wang , Fan Zhang , Jian Zhang Autonomic Group Location Update for Mobile Networks. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:133-142 [Conf ] Xiaolin Li , Hui Kang , Patrick Harrington , Johnson Thomas Autonomic and Trusted Computing Paradigms. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:143-152 [Conf ] Khaled Ragab , Akinori Yonezawa Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:153-162 [Conf ] Lawrence Y. Deng , Dong-liang Lee Self Awareness and Adaptive Traffic Signal Control System for Smart World. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:163-172 [Conf ] Stephen S. Yau , Yisheng Yao , Min Yan Development and Runtime Support for Situation-Aware Security in Autonomic Computing. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:173-182 [Conf ] Yu Zhang , Huajun Chen , Zhaohui Wu A Social Network-Based Trust Model for the Semantic Web. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:183-192 [Conf ] Zhenwei Yu , Jeffrey J. P. Tsai Fuzzy Model Tuning for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:193-204 [Conf ] Ayman Tajeddine , Ayman I. Kayssi , Ali Chehab , Hassan Artail PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:205-216 [Conf ] Yonghwan Lee , Dugki Min An Integration Framework for Trustworthy Transactions. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:217-226 [Conf ] Fei Yan , Weizhong Qiang , Zhi-Dong Shen , Chunrun Chen , Huanguo Zhang , Deqing Zou Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:227-235 [Conf ] Yuan Wang , Feng Xu , Ye Tao , Chun Cao , Jian Lü Toward Trust Management in Autonomic and Coordination Applications. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:236-245 [Conf ] Yong Wang , Vinny Cahill , Elizabeth Gray , Colin Harris , Lejian Liao Bayesian Network Based Trust Management. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:246-257 [Conf ] Fajiang Yu , Huanguo Zhang , Fei Yan , Song Gao An Improved Global Trust Value Computing Method in P2P System. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:258-267 [Conf ] Noriaki Yoshikai Trusted Priority Control Design for Information Networks Based on Sociotechnology. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:268-278 [Conf ] Zheng Yan , Ronan MacLaverty Autonomic Trust Management in a Component Based Software System. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:279-292 [Conf ] Fu-Hong Yang , Chi-Hung Chi , Lin Liu A Risk Assessment Model for Enterprise Network Security. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:293-301 [Conf ] Minsoo Lee , Sehyun Park , Sungik Jun A Security Management Framework with Roaming Coordinator for Pervasive Services. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:302-311 [Conf ] Chenlin Huang , Huaping Hu , Zhiying Wang A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:312-321 [Conf ] Marc Lelarge , Zhen Liu , Anton Riabov Automatic Composition of Secure Workflows. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:322-331 [Conf ] Yun Tang , Lifeng Sun , Jian-Guang Luo , Shiqiang Yang , Yuzhuo Zhong TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:332-341 [Conf ] Huirong Tian , Shihong Zou , Wendong Wang , Shiduan Cheng A Group Based Reputation System for P2P Networks. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:342-351 [Conf ] Yuqing Sun , Peng Pan , Xiangxu Meng An Approach for Trusted Interoperation in a Multidomain Environment. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:352-361 [Conf ] Pierpaolo Dondio , Stephen Barrett , Stefan Weber , Jean-Marc Seigneur Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:362-373 [Conf ] Suphithat Songsiri MTrust: A Reputation-Based Trust Model for a Mobile Agent System. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:374-385 [Conf ] Jianhua Ma , Qiangfu Zhao , Vipin Chaudhary , Jingde Cheng , Laurence Tianruo Yang , Runhe Huang , Qun Jin Ubisafe Computing: Vision and Challenges (I). [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:386-397 [Conf ] Zhitang Li , Weidong Wang , Yejiang Zhang , Weiming Li Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:398-407 [Conf ] Xiaowen Chu , Yixin Jiang , Chuang Lin , Fujun Feng Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:408-417 [Conf ] Zhenchuan Chai , Zhenfu Cao , Rongxing Lu Remote Authentication with Forward Security. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:418-427 [Conf ] Laurence Tianruo Yang , Li Xu , Man Lin , John P. Quinn A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:428-438 [Conf ] Hong Zhu , Sujuan Duan , Fan Hong , Kevin Lü An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:439-448 [Conf ] Qianhong Wu , Yi Mu , Willy Susilo , Fangguo Zhang Efficient Signcryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:449-458 [Conf ] Hanping Hu , Yi Wang , Lingfei Wang , Wenxuan Guo , Mingyue Ding Two Novel Packet Marking Schemes for IP Traceback. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:459-466 [Conf ] Yinan Jing , Xueping Wang , Xiaochun Xiao , Gendu Zhang A Novel Rate Limit Algorithm Against Meek DDoS Attacks. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:467-476 [Conf ] Yongzhong Zhang , Jianhua Yang , Chunming Ye Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:477-486 [Conf ] Chen Yang , Xiangguo Cheng , Wenping Ma , Xinmei Wang A New ID-Based Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:487-492 [Conf ] Andrei Doncescu , Katsumi Inoue Automated Abduction for Computer Forensics. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:493-499 [Conf ] Stephen S. Yau , Zhaoji Chen A Framework for Specifying and Managing Security Requirements in Collaborative Systems. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:500-510 [Conf ] Won Jay Song , Im Sook Há , Mun Kee Choi System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:511-520 [Conf ] Christian Veigner , Chunming Rong On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:521-530 [Conf ] Bo Qin , Qianhong Wu , Willy Susilo , Yi Mu , Yumin Wang Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:531-540 [Conf ] Ming Li , Shengquan Wang , Wei Zhao A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:541-550 [Conf ] Yun-Long Sie , Te-Hua Wang , Hsuan-Pu Chang , Shu-Nu Chang , Timothy K. Shih A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:551-560 [Conf ] Jae-Woo Chang , Young-Chang Kim FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:561-570 [Conf ] Wei Luo , Fumin Yang , Liping Pang , Xiao Qin Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:571-580 [Conf ] Rodrigo Lanka , Kentaro Oda , Takaichi Yoshida Active Fault-Tolerant System for Open Distributed Computing. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:581-590 [Conf ] Yingyuan Xiao , Yunsheng Liu , Xiangyang Chen , Xiaofeng Liu A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:591-600 [Conf ] Iuon-Chang Lin , Chin-Chen Chang An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:601-610 [Conf ]