Search the dblp DataBase
Kia Makki :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Niki Pissinou , Kia Makki , E. K. Park Towards the Design and Development of a New Model for Geographic Information Systems. [Citation Graph (1, 0)][DBLP ] CIKM, 1993, pp:565-573 [Conf ] Niki Pissinou , Ivan Radev , Kia Makki , William J. Campbell A Topological-Directional Model for the Apatio-Temporal Composition of Video Objects. [Citation Graph (1, 0)][DBLP ] RIDE, 1998, pp:17-24 [Conf ] Sivakumar Ravada , E. K. Park , Kia Makki Automatic Detection of Errors in Distributed Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1995, pp:30-35 [Conf ] Kia Makki , Niki Pissinou Detection and Resolution of Deadlocks in Distributed Database Systems. [Citation Graph (0, 23)][DBLP ] CIKM, 1995, pp:411-416 [Conf ] Niki Pissinou , Kia Makki A Framework for Temporal Object Databases. [Citation Graph (0, 0)][DBLP ] CIKM, 1992, pp:86-97 [Conf ] Niki Pissinou , Kia Makki Separating Semantics from Representation in a Temporal Object Database Domain. [Citation Graph (0, 0)][DBLP ] CIKM, 1993, pp:295-304 [Conf ] Niki Pissinou , Kia Makki , E. K. Park Towards a Framework for Integrating Multilevel Secure Models and Temporal Data Models. [Citation Graph (0, 0)][DBLP ] CIKM, 1994, pp:280-287 [Conf ] Ivan Radev , Niki Pissinou , Kia Makki , E. K. Park Graph-Based Object-Oriented Approach for Structural and Behavioral Representation of Multimedia Data. [Citation Graph (0, 0)][DBLP ] CIKM, 1999, pp:522-530 [Conf ] Luo Li , Birgitta König-Ries , Niki Pissinou , Kia Makki Strategies for Semantic Caching. [Citation Graph (0, 0)][DBLP ] DEXA, 2001, pp:284-298 [Conf ] Niki Pissinou , Kia Makki , Mei Hong , Lusheng Ji , Ashok Kumar An Agent-Based Mobile System. [Citation Graph (0, 2)][DBLP ] ER, 1997, pp:361-374 [Conf ] Xiaohua Jia , Niki Pissinou , Kia Makki A distributed algorithm of delay bounded multicast routing for multimedia applications. [Citation Graph (0, 0)][DBLP ] ICCCN, 1997, pp:208-213 [Conf ] Xiaohua Jia , Yanchun Zhang , Niki Pissinou , Kia Makki An Efficient Admission Control Method of Real-Time Multicast Connections in Wide Area Networks. [Citation Graph (0, 0)][DBLP ] ICCCN, 1998, pp:865-873 [Conf ] W. Melody Moh , Dongming Yao , Kia Makki Wireless LAN: Study of Hidden-Terminal Effect and Multimedia Support. [Citation Graph (0, 0)][DBLP ] ICCCN, 1998, pp:422-431 [Conf ] Wuxu Peng , Kia Makki On Reachability Analysis of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] ICCCN, 1995, pp:58- [Conf ] Wuxu Peng , Yalin Wang 0002 , Kia Makki Dynamic Key Management for Secure Routing In LCMRMG. [Citation Graph (0, 0)][DBLP ] ICCCN, 2004, pp:227-232 [Conf ] Kia Makki , Ken Been , Niki Pissinou A Parallel Algorithm for the Steiner Tree Problem. [Citation Graph (0, 0)][DBLP ] ICCI, 1993, pp:380-384 [Conf ] Xiangqian Chen , Kia Makki , Kang Yen , Niki Pissinou A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model. [Citation Graph (0, 0)][DBLP ] ICN, 2007, pp:56- [Conf ] Kia Makki , Paul Banta , Ken Been , Roy Ogawa Two Algorithms for Mutual Exclusion in a Distributed System. [Citation Graph (0, 0)][DBLP ] ICPP (1), 1991, pp:460-466 [Conf ] Kia Makki , Paul Banta , Ken Been , Niki Pissinou On Algorithms for Mutual Exclusion in Distributed Systems. [Citation Graph (0, 0)][DBLP ] ICPP (2), 1992, pp:149-152 [Conf ] Kia Makki , Niki Pissinou , E. K. Park An Efficient Solution To The Critical Section Problem In Distributed Systems. [Citation Graph (0, 0)][DBLP ] ICPP, 1994, pp:77-80 [Conf ] Niki Pissinou , Kia Makki , E. K. Park , Z. Hu , W. Wong An Efficient Distributed Mutual Exclusion Algorithm. [Citation Graph (0, 0)][DBLP ] ICPP, Vol. 1, 1996, pp:196-203 [Conf ] Niki Pissinou , B. K. Rajashekhar , Kia Makki , Kanonkluk Vanapipat A Framework for Building Distributed Dynamic Applications. [Citation Graph (0, 0)][DBLP ] ICPP, Vol. 1, 1996, pp:275-278 [Conf ] Hetal Jasani , Kang Yen , Kia Makki Performance Analysis of DSR using Cached Route Replies for Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICWN, 2005, pp:203-212 [Conf ] Niki Pissinou , Kia Makki , Abhay Doshi Ad Hoc Wireless Network Fault/Configuration Management. [Citation Graph (0, 0)][DBLP ] International Conference on Wireless Networks, 2003, pp:139-145 [Conf ] Kia Makki , Niki Pissinou , Jaydeep Punde , Kang Yen Predictive Routing Extensions to AODV to Support Quality of Service. [Citation Graph (0, 0)][DBLP ] International Conference on Wireless Networks, 2003, pp:343-349 [Conf ] Edward W. Knightly , Kia Makki Message from the technical program co-chairs. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:- [Conf ] Niki Pissinou , Bhagyavati , Kia Makki Mobile Agents to Automate Fault Management in Wireless and Mobile Networks. [Citation Graph (0, 0)][DBLP ] IPDPS Workshops, 2000, pp:1296-1300 [Conf ] Jaydeep Punde , Niki Pissinou , Kia Makki On Quality Of Service Routing in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2003, pp:276-278 [Conf ] Niki Pissinou , Tirthankar Ghosh , Kia Makki Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2004, pp:1446-1451 [Conf ] Birgitta König-Ries , Kia Makki , S. A. M. Makki , Charles E. Perkins , Niki Pissinou , Peter L. Reiher , Peter Scheuermann , Jari Veijalainen , Alexander L. Wolf , Ouri Wolfson Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. [Citation Graph (0, 0)][DBLP ] Infrastructure for Mobile and Wireless Systems, 2001, pp:1-37 [Conf ] John Dell , Kia Makki , Niki Pissinou , Wuxu Peng Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems. [Citation Graph (0, 0)][DBLP ] PDPTA, 1997, pp:1229-1238 [Conf ] Niki Pissinou , Kia Makki , Birgitta König-Ries A Middleware-based Architecture to Support Transparent Data Access by Mobile Users in Heterogeneous Environments. [Citation Graph (0, 0)][DBLP ] RIDE, 2000, pp:63-70 [Conf ] Kia Makki , Paul Banta , Ken Been , Niki Pissinou , E. K. Park A Token Based Distributed K Mutual Exclusion Algorithm. [Citation Graph (0, 0)][DBLP ] SPDP, 1992, pp:408-411 [Conf ] Niki Pissinou , Kia Makki On the Representation of Temporal Object Roles in Object Oriented Databases. [Citation Graph (0, 0)][DBLP ] TIME, 1994, pp:165-172 [Conf ] Ivan Radev , George Paschos , Niki Pissinou , Kia Makki Video Content Representation Based on Texture and Lighting. [Citation Graph (0, 0)][DBLP ] VISUAL, 2000, pp:457-466 [Conf ] Abdur Chowdhury , Ophir Frieder , E. Burger , David A. Grossman , Kia Makki Dynamic Routing System (DRS): Fault Tolerance in Network Routing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:1-2, pp:89-99 [Journal ] Xiaohua Jia , Yanchun Zhang , Niki Pissinou , Kia Makki A Distributed Multicast Routing Protocol for Real-Time Multicast Applications. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:1-2, pp:101-110 [Journal ] Xiaohua Jia , C. H. Lee , Kia Makki , Niki Pissinou Efficient multicast tree algorithm in ATM networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:8, pp:637-644 [Journal ] Xiaohua Jia , Niki Pissinou , Kia Makki A real-time multicast routing algorithm for multimedia applications. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1997, v:20, n:12, pp:1098-1106 [Journal ] Wei Li , Kia Makki , Niki Pissinou Performance analysis of a PCS network with state dependent calls arrival processes and impatient calls. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2002, v:25, n:5, pp:507-515 [Journal ] Kia Makki , J. Broussard , Niki Pissinou On optical communications networks and wideband network architecture. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:10, pp:901-911 [Journal ] Kia Makki , Niki Pissinou Efficient detection and resolution of deadlocks in distributed databases. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:7, pp:637-643 [Journal ] W. Melody Moh , Dongming Yao , Kia Makki Analyzing the hidden-terminal effects and multimedia support for wireless LAN. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:10, pp:998-1013 [Journal ] Wuxu Peng , Kia Makki Reachability and reverse reachability analysis of CFSMs. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:8, pp:668-674 [Journal ] Wuxu Peng , Kia Makki A modular methodology to verify communication protocols. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1997, v:20, n:12, pp:1069-1077 [Journal ] Niki Pissinou , Catalin Dunu , Kia Makki A new framework for handling mobile clients in a client-server database system. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:10, pp:936-941 [Journal ] Niki Pissinou , Kia Makki , William J. Campbell On the design of a location and query management strategy for mobile and wireless environments. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:7, pp:651-666 [Journal ] Niki Pissinou , Kia Makki , Birgitta König-Ries Mobile users in heterogeneous environments with middleware platform. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2003, v:26, n:7, pp:700-707 [Journal ] Jerrold F. Stach , Eun Kyo Park , Kia Makki Performance of an enhanced GSM protocol supporting non-repudiation of service. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:7, pp:675-680 [Journal ] Niki Pissinou , Ivan Radev , Kia Makki Spatio-Temporal Modeling in Video and Multimedia Geographic Information Systems. [Citation Graph (0, 0)][DBLP ] GeoInformatica, 2001, v:5, n:4, pp:375-409 [Journal ] Niki Pissinou , Kia Makki A Unified Model and Methodology for Temporal Object Databases. [Citation Graph (0, 0)][DBLP ] Int. J. Cooperative Inf. Syst., 1993, v:2, n:2, pp:201-224 [Journal ] Kia Makki , Ken Been , Niki Pissinou A Simulation Study of Token-Based Mutual-Exlusion Algorithms in Distributed Systems. [Citation Graph (0, 0)][DBLP ] Int. Journal in Computer Simulation, 1994, v:4, n:1, pp:65-88 [Journal ] Kia Makki , Niki Pissinou , Yelena Yesha An O(sqr N) Token Based Distributed Mutual Exclusion Algorithm. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 1993, v:17, n:3, pp:- [Journal ] Wuxu Peng , Kia Makki Petri Nets and Self-Stabilization of Communication Protocols. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 1996, v:20, n:1, pp:- [Journal ] Xiaohua Jia , Kia Makki , Niki Pissinou , Weijia Jia Group Channel Routing for Conferencing Systems in Wide Area Networks. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1998, v:107, n:1-4, pp:217-232 [Journal ] Niki Pissinou , Kia Makki , Ravi Krishnamurthy An ECA Object Service to Support Active Distributed Objects. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1997, v:100, n:1-4, pp:63-104 [Journal ] Kia Makki , Niki Pissinou A new storage organization for temporal data bases. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1994, v:27, n:3, pp:159-169 [Journal ] Niki Pissinou , Kia Makki A coherent architecture for a temporal object data base management system. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1994, v:27, n:3, pp:195-205 [Journal ] Kia Makki , Niki Pissinou Protocols for Mobile Environments - Editorial. [Citation Graph (0, 0)][DBLP ] MONET, 1997, v:2, n:3, pp:225-226 [Journal ] Kia Makki , Niki Pissinou , Ophir Frieder Efficient Solutions to Multicast Routing in Communication Networks. [Citation Graph (0, 0)][DBLP ] MONET, 1996, v:1, n:2, pp:221-232 [Journal ] Birgitta König-Ries , Kia Makki , S. A. M. Makki , Charles E. Perkins , Niki Pissinou , Peter L. Reiher , Peter Scheuermann , Jari Veijalainen , Ouri Wolfson Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2002, v:31, n:2, pp:73-79 [Journal ] Niki Pissinou , Kia Makki , Yelena Yesha On Temporal Modeling in the Context of Object Databases. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1993, v:22, n:3, pp:8-15 [Journal ] Xiaohua Jia , Kia Makki , Niki Pissinou Modeling and Simulation of Multicast Routing Algorithms for Advanced Network Applications. [Citation Graph (0, 0)][DBLP ] Simulation, 1997, v:68, n:1, pp:44-55 [Journal ] Wuxu Peng , Kia Makki Lossy Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2004, v:25, n:3-4, pp:433-448 [Journal ] Kia Makki , John Dell , Niki Pissinou , W. Melody Moh , Xiaohua Jia Using Logical Rings to Solve the Distributed Mutual Exclusion Problem with Fault Tolerance Issues. [Citation Graph (0, 0)][DBLP ] The Journal of Supercomputing, 2000, v:16, n:1-2, pp:117-132 [Journal ] Niki Pissinou , Ivan Radev , Kia Makki , William J. Campbell Spatio-Temporal Composition of Video Objects: Representation and Querying in Video Database Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2001, v:13, n:6, pp:1033-1040 [Journal ] Stylianos Drakatos , Niki Pissinou , Kia Makki , Christos Douligeris A context-aware prefetching strategy for mobile computing environments. [Citation Graph (0, 0)][DBLP ] IWCMC, 2006, pp:1109-1116 [Conf ] Stylianos Drakatos , Niki Pissinou , Kia Makki , Christos Douligeris A context-aware cache structure for mobile computing environments. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:7, pp:1102-1119 [Journal ] Estimated replication of data in wireless sensor networks. [Citation Graph (, )][DBLP ] Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks. [Citation Graph (, )][DBLP ] Self-organized forensic support in MANETs. [Citation Graph (, )][DBLP ] Thermal aware clock synthesis considering stochastic variation and correlations. [Citation Graph (, )][DBLP ] Node Compromise Modeling and its Applications in Sensor Networks. [Citation Graph (, )][DBLP ] Enabling Peer Cooperation in Private Local Area Networks using BitTorrent. [Citation Graph (, )][DBLP ] Multicast-P2P content distribution in large-scale enterprise networks. [Citation Graph (, )][DBLP ] A proactive secure routing algorithm defense against node compromise in sensor networks. [Citation Graph (, )][DBLP ] Providing Performance Guarantees for Buffered Crossbar Switches without Speedup. [Citation Graph (, )][DBLP ] Fuzzy belief pattern classification of incomplete data. [Citation Graph (, )][DBLP ] Ensemble of Machine Learning Algorithms for Intrusion Detection. [Citation Graph (, )][DBLP ] A Real-Time Wireless Route Guidance System for Urban Traffic Management and Its Performance Evaluation. [Citation Graph (, )][DBLP ] Revisiting Global Time Synchronization. [Citation Graph (, )][DBLP ] Inferring Internet Worm Temporal Characteristics. [Citation Graph (, )][DBLP ] Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches. [Citation Graph (, )][DBLP ] On Energy-Efficient and Low-Latency Medium Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Mobility-Assisted Location Management for Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP ] Wireless Networked-Based Sensing for Protection and Decentralized Control of Critical Infrastructures. [Citation Graph (, )][DBLP ] Search in 0.040secs, Finished in 0.044secs