The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kia Makki: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Niki Pissinou, Kia Makki, E. K. Park
    Towards the Design and Development of a New Model for Geographic Information Systems. [Citation Graph (1, 0)][DBLP]
    CIKM, 1993, pp:565-573 [Conf]
  2. Niki Pissinou, Ivan Radev, Kia Makki, William J. Campbell
    A Topological-Directional Model for the Apatio-Temporal Composition of Video Objects. [Citation Graph (1, 0)][DBLP]
    RIDE, 1998, pp:17-24 [Conf]
  3. Sivakumar Ravada, E. K. Park, Kia Makki
    Automatic Detection of Errors in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1995, pp:30-35 [Conf]
  4. Kia Makki, Niki Pissinou
    Detection and Resolution of Deadlocks in Distributed Database Systems. [Citation Graph (0, 23)][DBLP]
    CIKM, 1995, pp:411-416 [Conf]
  5. Niki Pissinou, Kia Makki
    A Framework for Temporal Object Databases. [Citation Graph (0, 0)][DBLP]
    CIKM, 1992, pp:86-97 [Conf]
  6. Niki Pissinou, Kia Makki
    Separating Semantics from Representation in a Temporal Object Database Domain. [Citation Graph (0, 0)][DBLP]
    CIKM, 1993, pp:295-304 [Conf]
  7. Niki Pissinou, Kia Makki, E. K. Park
    Towards a Framework for Integrating Multilevel Secure Models and Temporal Data Models. [Citation Graph (0, 0)][DBLP]
    CIKM, 1994, pp:280-287 [Conf]
  8. Ivan Radev, Niki Pissinou, Kia Makki, E. K. Park
    Graph-Based Object-Oriented Approach for Structural and Behavioral Representation of Multimedia Data. [Citation Graph (0, 0)][DBLP]
    CIKM, 1999, pp:522-530 [Conf]
  9. Luo Li, Birgitta König-Ries, Niki Pissinou, Kia Makki
    Strategies for Semantic Caching. [Citation Graph (0, 0)][DBLP]
    DEXA, 2001, pp:284-298 [Conf]
  10. Niki Pissinou, Kia Makki, Mei Hong, Lusheng Ji, Ashok Kumar
    An Agent-Based Mobile System. [Citation Graph (0, 2)][DBLP]
    ER, 1997, pp:361-374 [Conf]
  11. Xiaohua Jia, Niki Pissinou, Kia Makki
    A distributed algorithm of delay bounded multicast routing for multimedia applications. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1997, pp:208-213 [Conf]
  12. Xiaohua Jia, Yanchun Zhang, Niki Pissinou, Kia Makki
    An Efficient Admission Control Method of Real-Time Multicast Connections in Wide Area Networks. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:865-873 [Conf]
  13. W. Melody Moh, Dongming Yao, Kia Makki
    Wireless LAN: Study of Hidden-Terminal Effect and Multimedia Support. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:422-431 [Conf]
  14. Wuxu Peng, Kia Makki
    On Reachability Analysis of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1995, pp:58- [Conf]
  15. Wuxu Peng, Yalin Wang 0002, Kia Makki
    Dynamic Key Management for Secure Routing In LCMRMG. [Citation Graph (0, 0)][DBLP]
    ICCCN, 2004, pp:227-232 [Conf]
  16. Kia Makki, Ken Been, Niki Pissinou
    A Parallel Algorithm for the Steiner Tree Problem. [Citation Graph (0, 0)][DBLP]
    ICCI, 1993, pp:380-384 [Conf]
  17. Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou
    A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:56- [Conf]
  18. Kia Makki, Paul Banta, Ken Been, Roy Ogawa
    Two Algorithms for Mutual Exclusion in a Distributed System. [Citation Graph (0, 0)][DBLP]
    ICPP (1), 1991, pp:460-466 [Conf]
  19. Kia Makki, Paul Banta, Ken Been, Niki Pissinou
    On Algorithms for Mutual Exclusion in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICPP (2), 1992, pp:149-152 [Conf]
  20. Kia Makki, Niki Pissinou, E. K. Park
    An Efficient Solution To The Critical Section Problem In Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICPP, 1994, pp:77-80 [Conf]
  21. Niki Pissinou, Kia Makki, E. K. Park, Z. Hu, W. Wong
    An Efficient Distributed Mutual Exclusion Algorithm. [Citation Graph (0, 0)][DBLP]
    ICPP, Vol. 1, 1996, pp:196-203 [Conf]
  22. Niki Pissinou, B. K. Rajashekhar, Kia Makki, Kanonkluk Vanapipat
    A Framework for Building Distributed Dynamic Applications. [Citation Graph (0, 0)][DBLP]
    ICPP, Vol. 1, 1996, pp:275-278 [Conf]
  23. Hetal Jasani, Kang Yen, Kia Makki
    Performance Analysis of DSR using Cached Route Replies for Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICWN, 2005, pp:203-212 [Conf]
  24. Niki Pissinou, Kia Makki, Abhay Doshi
    Ad Hoc Wireless Network Fault/Configuration Management. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2003, pp:139-145 [Conf]
  25. Kia Makki, Niki Pissinou, Jaydeep Punde, Kang Yen
    Predictive Routing Extensions to AODV to Support Quality of Service. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2003, pp:343-349 [Conf]
  26. Edward W. Knightly, Kia Makki
    Message from the technical program co-chairs. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:- [Conf]
  27. Niki Pissinou, Bhagyavati, Kia Makki
    Mobile Agents to Automate Fault Management in Wireless and Mobile Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS Workshops, 2000, pp:1296-1300 [Conf]
  28. Jaydeep Punde, Niki Pissinou, Kia Makki
    On Quality Of Service Routing in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2003, pp:276-278 [Conf]
  29. Niki Pissinou, Tirthankar Ghosh, Kia Makki
    Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:1446-1451 [Conf]
  30. Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Alexander L. Wolf, Ouri Wolfson
    Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. [Citation Graph (0, 0)][DBLP]
    Infrastructure for Mobile and Wireless Systems, 2001, pp:1-37 [Conf]
  31. John Dell, Kia Makki, Niki Pissinou, Wuxu Peng
    Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1997, pp:1229-1238 [Conf]
  32. Niki Pissinou, Kia Makki, Birgitta König-Ries
    A Middleware-based Architecture to Support Transparent Data Access by Mobile Users in Heterogeneous Environments. [Citation Graph (0, 0)][DBLP]
    RIDE, 2000, pp:63-70 [Conf]
  33. Kia Makki, Paul Banta, Ken Been, Niki Pissinou, E. K. Park
    A Token Based Distributed K Mutual Exclusion Algorithm. [Citation Graph (0, 0)][DBLP]
    SPDP, 1992, pp:408-411 [Conf]
  34. Niki Pissinou, Kia Makki
    On the Representation of Temporal Object Roles in Object Oriented Databases. [Citation Graph (0, 0)][DBLP]
    TIME, 1994, pp:165-172 [Conf]
  35. Ivan Radev, George Paschos, Niki Pissinou, Kia Makki
    Video Content Representation Based on Texture and Lighting. [Citation Graph (0, 0)][DBLP]
    VISUAL, 2000, pp:457-466 [Conf]
  36. Abdur Chowdhury, Ophir Frieder, E. Burger, David A. Grossman, Kia Makki
    Dynamic Routing System (DRS): Fault Tolerance in Network Routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:1-2, pp:89-99 [Journal]
  37. Xiaohua Jia, Yanchun Zhang, Niki Pissinou, Kia Makki
    A Distributed Multicast Routing Protocol for Real-Time Multicast Applications. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:1-2, pp:101-110 [Journal]
  38. Xiaohua Jia, C. H. Lee, Kia Makki, Niki Pissinou
    Efficient multicast tree algorithm in ATM networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:8, pp:637-644 [Journal]
  39. Xiaohua Jia, Niki Pissinou, Kia Makki
    A real-time multicast routing algorithm for multimedia applications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:12, pp:1098-1106 [Journal]
  40. Wei Li, Kia Makki, Niki Pissinou
    Performance analysis of a PCS network with state dependent calls arrival processes and impatient calls. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:5, pp:507-515 [Journal]
  41. Kia Makki, J. Broussard, Niki Pissinou
    On optical communications networks and wideband network architecture. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:10, pp:901-911 [Journal]
  42. Kia Makki, Niki Pissinou
    Efficient detection and resolution of deadlocks in distributed databases. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:7, pp:637-643 [Journal]
  43. W. Melody Moh, Dongming Yao, Kia Makki
    Analyzing the hidden-terminal effects and multimedia support for wireless LAN. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:10, pp:998-1013 [Journal]
  44. Wuxu Peng, Kia Makki
    Reachability and reverse reachability analysis of CFSMs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:8, pp:668-674 [Journal]
  45. Wuxu Peng, Kia Makki
    A modular methodology to verify communication protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:12, pp:1069-1077 [Journal]
  46. Niki Pissinou, Catalin Dunu, Kia Makki
    A new framework for handling mobile clients in a client-server database system. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:10, pp:936-941 [Journal]
  47. Niki Pissinou, Kia Makki, William J. Campbell
    On the design of a location and query management strategy for mobile and wireless environments. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:7, pp:651-666 [Journal]
  48. Niki Pissinou, Kia Makki, Birgitta König-Ries
    Mobile users in heterogeneous environments with middleware platform. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:7, pp:700-707 [Journal]
  49. Jerrold F. Stach, Eun Kyo Park, Kia Makki
    Performance of an enhanced GSM protocol supporting non-repudiation of service. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:7, pp:675-680 [Journal]
  50. Niki Pissinou, Ivan Radev, Kia Makki
    Spatio-Temporal Modeling in Video and Multimedia Geographic Information Systems. [Citation Graph (0, 0)][DBLP]
    GeoInformatica, 2001, v:5, n:4, pp:375-409 [Journal]
  51. Niki Pissinou, Kia Makki
    A Unified Model and Methodology for Temporal Object Databases. [Citation Graph (0, 0)][DBLP]
    Int. J. Cooperative Inf. Syst., 1993, v:2, n:2, pp:201-224 [Journal]
  52. Kia Makki, Ken Been, Niki Pissinou
    A Simulation Study of Token-Based Mutual-Exlusion Algorithms in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Int. Journal in Computer Simulation, 1994, v:4, n:1, pp:65-88 [Journal]
  53. Kia Makki, Niki Pissinou, Yelena Yesha
    An O(sqr N) Token Based Distributed Mutual Exclusion Algorithm. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 1993, v:17, n:3, pp:- [Journal]
  54. Wuxu Peng, Kia Makki
    Petri Nets and Self-Stabilization of Communication Protocols. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 1996, v:20, n:1, pp:- [Journal]
  55. Xiaohua Jia, Kia Makki, Niki Pissinou, Weijia Jia
    Group Channel Routing for Conferencing Systems in Wide Area Networks. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1998, v:107, n:1-4, pp:217-232 [Journal]
  56. Niki Pissinou, Kia Makki, Ravi Krishnamurthy
    An ECA Object Service to Support Active Distributed Objects. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1997, v:100, n:1-4, pp:63-104 [Journal]
  57. Kia Makki, Niki Pissinou
    A new storage organization for temporal data bases. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1994, v:27, n:3, pp:159-169 [Journal]
  58. Niki Pissinou, Kia Makki
    A coherent architecture for a temporal object data base management system. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1994, v:27, n:3, pp:195-205 [Journal]
  59. Kia Makki, Niki Pissinou
    Protocols for Mobile Environments - Editorial. [Citation Graph (0, 0)][DBLP]
    MONET, 1997, v:2, n:3, pp:225-226 [Journal]
  60. Kia Makki, Niki Pissinou, Ophir Frieder
    Efficient Solutions to Multicast Routing in Communication Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 1996, v:1, n:2, pp:221-232 [Journal]
  61. Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Ouri Wolfson
    Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2002, v:31, n:2, pp:73-79 [Journal]
  62. Niki Pissinou, Kia Makki, Yelena Yesha
    On Temporal Modeling in the Context of Object Databases. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1993, v:22, n:3, pp:8-15 [Journal]
  63. Xiaohua Jia, Kia Makki, Niki Pissinou
    Modeling and Simulation of Multicast Routing Algorithms for Advanced Network Applications. [Citation Graph (0, 0)][DBLP]
    Simulation, 1997, v:68, n:1, pp:44-55 [Journal]
  64. Wuxu Peng, Kia Makki
    Lossy Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2004, v:25, n:3-4, pp:433-448 [Journal]
  65. Kia Makki, John Dell, Niki Pissinou, W. Melody Moh, Xiaohua Jia
    Using Logical Rings to Solve the Distributed Mutual Exclusion Problem with Fault Tolerance Issues. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2000, v:16, n:1-2, pp:117-132 [Journal]
  66. Niki Pissinou, Ivan Radev, Kia Makki, William J. Campbell
    Spatio-Temporal Composition of Video Objects: Representation and Querying in Video Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2001, v:13, n:6, pp:1033-1040 [Journal]
  67. Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris
    A context-aware prefetching strategy for mobile computing environments. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:1109-1116 [Conf]
  68. Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris
    A context-aware cache structure for mobile computing environments. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:7, pp:1102-1119 [Journal]

  69. Estimated replication of data in wireless sensor networks. [Citation Graph (, )][DBLP]


  70. Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks. [Citation Graph (, )][DBLP]


  71. Self-organized forensic support in MANETs. [Citation Graph (, )][DBLP]


  72. Thermal aware clock synthesis considering stochastic variation and correlations. [Citation Graph (, )][DBLP]


  73. Node Compromise Modeling and its Applications in Sensor Networks. [Citation Graph (, )][DBLP]


  74. Enabling Peer Cooperation in Private Local Area Networks using BitTorrent. [Citation Graph (, )][DBLP]


  75. Multicast-P2P content distribution in large-scale enterprise networks. [Citation Graph (, )][DBLP]


  76. A proactive secure routing algorithm defense against node compromise in sensor networks. [Citation Graph (, )][DBLP]


  77. Providing Performance Guarantees for Buffered Crossbar Switches without Speedup. [Citation Graph (, )][DBLP]


  78. Fuzzy belief pattern classification of incomplete data. [Citation Graph (, )][DBLP]


  79. Ensemble of Machine Learning Algorithms for Intrusion Detection. [Citation Graph (, )][DBLP]


  80. A Real-Time Wireless Route Guidance System for Urban Traffic Management and Its Performance Evaluation. [Citation Graph (, )][DBLP]


  81. Revisiting Global Time Synchronization. [Citation Graph (, )][DBLP]


  82. Inferring Internet Worm Temporal Characteristics. [Citation Graph (, )][DBLP]


  83. Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches. [Citation Graph (, )][DBLP]


  84. On Energy-Efficient and Low-Latency Medium Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  85. Mobility-Assisted Location Management for Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  86. Wireless Networked-Based Sensing for Protection and Decentralized Control of Critical Infrastructures. [Citation Graph (, )][DBLP]


Search in 0.027secs, Finished in 0.030secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002