The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Transactions on Systems, Man, and Cybernetics, Part C
2003, volume: 33, number: 3

  1. Witold Pedrycz, Athanasios V. Vasilakos, Stamatis Karnouskos
    Special issue on computational intelligence in telecommunications networks and Internet services. I. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:294-296 [Journal]
  2. Athanasios V. Vasilakos, Marios P. Saltouros, A. F. Atlassis, Witold Pedrycz
    Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:297-312 [Journal]
  3. Giuseppe Di Fatta, F. Hoffmann, Giuseppe Lo Re, Alfonso Urso
    A genetic algorithm for the design of a fuzzy controller for active queue management. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:313-324 [Journal]
  4. Kay Chen Tan, Arthur Tay, Ji Cai
    Design and implementation of a distributed evolutionary computing software. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:325-338 [Journal]
  5. Vladan Devedzic
    Key issues in next-generation Web-based education. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:339-349 [Journal]
  6. Ichiro Satoh
    Building reusable mobile agents for network management. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:350-357 [Journal]
  7. Tilman Wolf, Sumi Choi
    Aggregated hierarchical multicast-a many-to-many communication paradigm using programmable networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:358-369 [Journal]
  8. Gilles Muller, Julia L. Lawall, Scott Thibault, R. E. Voel Jensen
    A domain-specific language approach to programmable networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:370-381 [Journal]
  9. Francesc Sebé, Josep Domingo-Ferrer
    Collusion-secure and cost-effective detection of unlawful multimedia redistribution. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:382-389 [Journal]
  10. Qilian Liang
    Designing power aware self-reconfiguring topology for mobile wireless personal area networks using fuzzy logic. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:390-394 [Journal]
  11. Giannis F. Marias, Nikolaos Frangiadakis, Stathes Hadjiefthymiades
    An enhanced intelligent DCA technique for unlicensed wLANs and PAWNs. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:395-402 [Journal]
  12. Zaijun Hu, Eckhard Kruse, L. Draws
    Intelligent binding in the engineering of automation systems using ontology and Web services. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:403-412 [Journal]
  13. Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith
    A secure PLAN. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:413-426 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002