The SCEAS System
Navigation Menu

Conferences in DBLP

(atc)
2006 (conf/atc/2006)

  1. Christian Müller-Schloer, Bernhard Sick
    Emergence in Organic Computing Systems: Discussion of a Controversial Concept. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:1-16 [Conf]
  2. Stephen S. Yau
    Managing Trust in Distributed Agent Systems. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:17-25 [Conf]
  3. Jadwiga Indulska, Karen Henricksen, Peizhao Hu
    Towards a Standards-Based Autonomic Context Management System. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:26-37 [Conf]
  4. Matthias Güdemann, Frank Ortmeier, Wolfgang Reif
    Formal Modeling and Verification of Systems with Self-x Properties. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:38-47 [Conf]
  5. Junaid Ahsenali Chaudhry, Seungkyu Park
    A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:48-56 [Conf]
  6. Yong Cui, Hao Che, Constantino M. Lagoa, ZhiMei Zheng
    Autonomic Interference Avoidance with Extended Shortest Path Algorithm. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:57-66 [Conf]
  7. A. Reza Haydarlou, Benno J. Overeinder, M. A. Oey, Frances M. T. Brazier
    Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:67-77 [Conf]
  8. Hervé Chang, Philippe Collet, Alain Ozanne, Nicolas Rivierre
    From Components to Autonomic Elements Using Negotiable Contracts. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:78-89 [Conf]
  9. Wolfgang Trumler, Robert Klaus, Theo Ungerer
    Self-configuration Via Cooperative Social Behavior. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:90-99 [Conf]
  10. G. Mahmoudi, Christian Müller-Schloer
    Towards Ontology-Based Embedded Services. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:100-112 [Conf]
  11. Sirui Yang, Hai Jin, Xuping Tu
    TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:113-122 [Conf]
  12. Yanxiang He, Jun Xiao, Naixue Xiong, Laurence Tianruo Yang
    Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:123-132 [Conf]
  13. Lai Tu, Furong Wang, Fan Zhang, Jian Zhang
    Autonomic Group Location Update for Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:133-142 [Conf]
  14. Xiaolin Li, Hui Kang, Patrick Harrington, Johnson Thomas
    Autonomic and Trusted Computing Paradigms. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:143-152 [Conf]
  15. Khaled Ragab, Akinori Yonezawa
    Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:153-162 [Conf]
  16. Lawrence Y. Deng, Dong-liang Lee
    Self Awareness and Adaptive Traffic Signal Control System for Smart World. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:163-172 [Conf]
  17. Stephen S. Yau, Yisheng Yao, Min Yan
    Development and Runtime Support for Situation-Aware Security in Autonomic Computing. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:173-182 [Conf]
  18. Yu Zhang, Huajun Chen, Zhaohui Wu
    A Social Network-Based Trust Model for the Semantic Web. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:183-192 [Conf]
  19. Zhenwei Yu, Jeffrey J. P. Tsai
    Fuzzy Model Tuning for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:193-204 [Conf]
  20. Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Hassan Artail
    PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:205-216 [Conf]
  21. Yonghwan Lee, Dugki Min
    An Integration Framework for Trustworthy Transactions. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:217-226 [Conf]
  22. Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou
    Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:227-235 [Conf]
  23. Yuan Wang, Feng Xu, Ye Tao, Chun Cao, Jian Lü
    Toward Trust Management in Autonomic and Coordination Applications. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:236-245 [Conf]
  24. Yong Wang, Vinny Cahill, Elizabeth Gray, Colin Harris, Lejian Liao
    Bayesian Network Based Trust Management. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:246-257 [Conf]
  25. Fajiang Yu, Huanguo Zhang, Fei Yan, Song Gao
    An Improved Global Trust Value Computing Method in P2P System. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:258-267 [Conf]
  26. Noriaki Yoshikai
    Trusted Priority Control Design for Information Networks Based on Sociotechnology. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:268-278 [Conf]
  27. Zheng Yan, Ronan MacLaverty
    Autonomic Trust Management in a Component Based Software System. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:279-292 [Conf]
  28. Fu-Hong Yang, Chi-Hung Chi, Lin Liu
    A Risk Assessment Model for Enterprise Network Security. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:293-301 [Conf]
  29. Minsoo Lee, Sehyun Park, Sungik Jun
    A Security Management Framework with Roaming Coordinator for Pervasive Services. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:302-311 [Conf]
  30. Chenlin Huang, Huaping Hu, Zhiying Wang
    A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:312-321 [Conf]
  31. Marc Lelarge, Zhen Liu, Anton Riabov
    Automatic Composition of Secure Workflows. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:322-331 [Conf]
  32. Yun Tang, Lifeng Sun, Jian-Guang Luo, Shiqiang Yang, Yuzhuo Zhong
    TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:332-341 [Conf]
  33. Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng
    A Group Based Reputation System for P2P Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:342-351 [Conf]
  34. Yuqing Sun, Peng Pan, Xiangxu Meng
    An Approach for Trusted Interoperation in a Multidomain Environment. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:352-361 [Conf]
  35. Pierpaolo Dondio, Stephen Barrett, Stefan Weber, Jean-Marc Seigneur
    Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:362-373 [Conf]
  36. Suphithat Songsiri
    MTrust: A Reputation-Based Trust Model for a Mobile Agent System. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:374-385 [Conf]
  37. Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde Cheng, Laurence Tianruo Yang, Runhe Huang, Qun Jin
    Ubisafe Computing: Vision and Challenges (I). [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:386-397 [Conf]
  38. Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li
    Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:398-407 [Conf]
  39. Xiaowen Chu, Yixin Jiang, Chuang Lin, Fujun Feng
    Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:408-417 [Conf]
  40. Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
    Remote Authentication with Forward Security. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:418-427 [Conf]
  41. Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn
    A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:428-438 [Conf]
  42. Hong Zhu, Sujuan Duan, Fan Hong, Kevin Lü
    An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:439-448 [Conf]
  43. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
    Efficient Signcryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:449-458 [Conf]
  44. Hanping Hu, Yi Wang, Lingfei Wang, Wenxuan Guo, Mingyue Ding
    Two Novel Packet Marking Schemes for IP Traceback. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:459-466 [Conf]
  45. Yinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang
    A Novel Rate Limit Algorithm Against Meek DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:467-476 [Conf]
  46. Yongzhong Zhang, Jianhua Yang, Chunming Ye
    Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:477-486 [Conf]
  47. Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang
    A New ID-Based Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:487-492 [Conf]
  48. Andrei Doncescu, Katsumi Inoue
    Automated Abduction for Computer Forensics. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:493-499 [Conf]
  49. Stephen S. Yau, Zhaoji Chen
    A Framework for Specifying and Managing Security Requirements in Collaborative Systems. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:500-510 [Conf]
  50. Won Jay Song, Im Sook Há, Mun Kee Choi
    System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:511-520 [Conf]
  51. Christian Veigner, Chunming Rong
    On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:521-530 [Conf]
  52. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
    Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:531-540 [Conf]
  53. Ming Li, Shengquan Wang, Wei Zhao
    A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:541-550 [Conf]
  54. Yun-Long Sie, Te-Hua Wang, Hsuan-Pu Chang, Shu-Nu Chang, Timothy K. Shih
    A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:551-560 [Conf]
  55. Jae-Woo Chang, Young-Chang Kim
    FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:561-570 [Conf]
  56. Wei Luo, Fumin Yang, Liping Pang, Xiao Qin
    Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:571-580 [Conf]
  57. Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida
    Active Fault-Tolerant System for Open Distributed Computing. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:581-590 [Conf]
  58. Yingyuan Xiao, Yunsheng Liu, Xiangyang Chen, Xiaofeng Liu
    A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:591-600 [Conf]
  59. Iuon-Chang Lin, Chin-Chen Chang
    An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:601-610 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002