The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mirela Sechi Moretti Annoni Notare: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joao Paulo Delgado Preti, Fernando M. B. M. de Castilho, João Bosco M. Sobral, Kathia Regina L. Jucá, Mirela Sechi Moretti Annoni Notare, Azzedine Boukerche
    On the Use of Fuzzy Logic to Enhance Mobile Agents in Distributed E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:525-528 [Conf]
  2. Azzedine Boukerche, Mirela Sechi Moretti Annoni Notare
    Neural Fraud Detection in Mobile Phone Operations. [Citation Graph (0, 0)][DBLP]
    IPDPS Workshops, 2000, pp:636-644 [Conf]
  3. Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare
    Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:146- [Conf]
  4. Renato B. Machado, Azzedine Boukerche, João Bosco M. Sobral, Kathia Regina L. Jucá, Mirela Sechi Moretti Annoni Notare
    A Hybrid Artificial Immune and Mobile Agent Intrusion Detection Based Model for Computer Network Operations. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  5. A. Boukerchet, R. Al-Shaikht, M. S. M. Notarett
    Towards building a highly-available cluster based model for high performance computing. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  6. Azzedine Boukerche, Mirela Sechi Moretti Annoni Notare
    Behavior-Based Intrusion Detection in Mobile Phone Systems. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2002, v:62, n:9, pp:1476-1490 [Journal]
  7. Azzedine Boukerche, Mirela Sechi Moretti Annoni Notare
    Routing in mobile and wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2003, v:63, n:2, pp:107-109 [Journal]
  8. Azzedine Boukerche, Kathia Regina L. Jucá, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare
    An artificial immune based intrusion detection model for computer and telecommunication systems. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 2004, v:30, n:5-6, pp:629-646 [Journal]
  9. Azzedine Boukerche, Mirela Sechi Moretti Annoni Notare
    Special issue: mobility management in wireless and mobile networks. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2004, v:4, n:6, pp:593-594 [Journal]
  10. Azzedine Boukerche, Renato B. Machado, Kathia Regina L. Jucá, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare
    An agent based and biological inspired real-time intrusion detection and security model for computer network operations. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:13, pp:2649-2660 [Journal]

  11. A performance evaluation of OLSR and AODV routing protocols using a self-configuration mechanism for heterogeneous wireless mesh networks. [Citation Graph (, )][DBLP]


  12. A Self-X Approach for OLSR Routing Protocol in Large-Scale Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  13. Guest Editorial: Distributed Simulation, Virtual Environments and Real-time Applications. [Citation Graph (, )][DBLP]


Search in 0.263secs, Finished in 0.264secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002