The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christos Douligeris: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hany I. Fahmy, Christos Douligeris
    NAMS: Network Automated Modeler and Simulator. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 1996, pp:65-70 [Conf]
  2. Zuji Mao, Christos Douligeris
    Performance Evaluation of Location Information Distribution Strategies for Mobility Tracking. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2000, pp:429-436 [Conf]
  3. B. Meneklis, Alexandros Kaliontzoglou, Christos Douligeris, Despina Polemi
    Engineering and Technology Aspects of an e-Government Architecture Based on Web Services. [Citation Graph (0, 0)][DBLP]
    ECOWS, 2005, pp:118-129 [Conf]
  4. Gang Feng, Christos Douligeris
    Using Hopfield Networks to Solve Traveling Salesman Problems Based on Stable State Analysis Technique. [Citation Graph (0, 0)][DBLP]
    IJCNN (6), 2000, pp:521-528 [Conf]
  5. Christos Douligeris
    Multiobjective Flow Control in Telecommunication Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1992, pp:303-312 [Conf]
  6. Lakshmana N. Kumar, Christos Douligeris
    Fairness by Demand and Service Pattern Match: The Alpha Tuning Mechanism for DQDB MANs. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1995, pp:1172-1179 [Conf]
  7. Zuji Mao, Christos Douligeris
    High Throughput Database Structures for Location Management in PCS Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:785-794 [Conf]
  8. Zhensheng Zhang, Christos Douligeris
    Convergence of Synchronous and Asynchronous Algorithms in Multiclass Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1991, pp:939-943 [Conf]
  9. Emad Aboelela, Christos Douligeris
    Switching Theory Approach to Alarm Correlation in Network Management. [Citation Graph (0, 0)][DBLP]
    LCN, 2000, pp:452-461 [Conf]
  10. Emad Aboelela, Christos Douligeris
    Fuzzy Optimization Model for Routing in B-ISDN. [Citation Graph (0, 0)][DBLP]
    LCN, 1997, pp:89-98 [Conf]
  11. Emad Aboelela, Christos Douligeris
    Fuzzy Temporal Reasoning Model for Event Correlation in Network Management. [Citation Graph (0, 0)][DBLP]
    LCN, 1999, pp:150-159 [Conf]
  12. Lakshmana N. Kumar, Christos Douligeris
    The Dynamic 3-Tier Protocol: An Access Remedial Scheme to Control Unfairness in DQDB MANs. [Citation Graph (0, 0)][DBLP]
    LCN, 1994, pp:92-101 [Conf]
  13. Zuji Mao, Christos Douligeris
    Group Registration for Reducing Signaling Traffic in Location Tracking. [Citation Graph (0, 0)][DBLP]
    LCN, 2003, pp:239-0 [Conf]
  14. Armando García-Rodríguez, Ramón M. Rodríguez-Dagnino, Christos Douligeris
    Extending the Prediction Horizon in Dynamic Bandwidth Allocation for VBR Video Transport. [Citation Graph (0, 0)][DBLP]
    MICAI, 2000, pp:365-375 [Conf]
  15. Agapios Avramidis, Ioannis Papadakis, Christos Douligeris
    LUGrid: A Semantic-Capable Grid for University Data. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2005, pp:276-281 [Conf]
  16. George Kastaniotis, Nick Z. Zacharis, Themis Panayiotopoulos, Christos Douligeris
    Intelligent Web Prefetching Based upon User Profiles - The WebNaut Case. [Citation Graph (0, 0)][DBLP]
    SETN, 2004, pp:54-62 [Conf]
  17. Christos Douligeris, Gang Feng
    Using Hopfield Networks to Solve Assignment Problem and N-Queen Problem: An Application of Guided Trial and Error Technique. [Citation Graph (0, 0)][DBLP]
    SETN, 2002, pp:325-336 [Conf]
  18. Aikaterini Mitrokotsa, Christos Douligeris
    Intrusion Detection Using Emergent Self-organizing Maps. [Citation Graph (0, 0)][DBLP]
    SETN, 2006, pp:559-562 [Conf]
  19. B. Meneklis, Alexandros Kaliontzoglou, Despina Polemi, Christos Douligeris
    Applying the ISO RM-ODP Standard in E-Government. [Citation Graph (0, 0)][DBLP]
    TCGOV, 2005, pp:213-224 [Conf]
  20. Rosa Mavropodi, Christos Douligeris
    Multipath Routing Protocols for Mobile Ad Hoc Networks: Security Issues and Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    WAC, 2005, pp:165-176 [Conf]
  21. Dimitris Glynos, Panayiotis Kotzanikolaou, Christos Douligeris
    Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. [Citation Graph (0, 0)][DBLP]
    WiOpt, 2005, pp:59-64 [Conf]
  22. Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos Douligeris
    Secure Multipath Routing for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    WONS, 2005, pp:89-96 [Conf]
  23. Panayiotis Kotzanikolaou, Emmanouil Magkos, Christos Douligeris, Vassilios Chrissikopoulos
    Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2005, pp:581-587 [Conf]
  24. Rosa Mavropodi, Panayiotis Kotzanikolaou, Christos Douligeris
    Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    WWIC, 2005, pp:269-278 [Conf]
  25. Rosa Mavropodi, Panayiotis Kotzanikolaou, Christos Douligeris
    SecMR - a secure multipath routing protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:87-99 [Journal]
  26. Christos Douligeris, Aikaterini Mitrokotsa
    DDoS attacks and defense mechanisms: classification and state-of-the-art. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:44, n:5, pp:643-666 [Journal]
  27. Emad Aboelela, Christos Douligeris
    Fuzzy multiobjective routing model in B-ISDN. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:17, pp:1571-1584 [Journal]
  28. Christos Douligeris, Lakshmana N. Kumar
    Fairness Issues in the Networking Environment. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:4, pp:288-299 [Journal]
  29. Christos Douligeris, Andreas Pitsillides, Daniela Panno
    Computational intelligence in telecommunications networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:16, pp:1413-1414 [Journal]
  30. Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos Douligeris, Vassilios Chrissikopoulos
    Secure distributed intelligent networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:325-336 [Journal]
  31. Lakshmana N. Kumar, Christos Douligeris
    The dynamic three-tier protocol: an access remedial scheme for DQDB Metropolitan Area Networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:7, pp:624-643 [Journal]
  32. Lakshmana N. Kumar, Christos Douligeris, George Develekos
    Implementation of a decentralized Pareto optimal algorithm. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:8, pp:600-610 [Journal]
  33. Zuji Mao, Christos Douligeris
    A location-based mobility tracking scheme for PCS networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:18, pp:1729-1739 [Journal]
  34. Nikos Komninos, Dimitris Vergados, Christos Douligeris
    Layered security design for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:2, pp:121-130 [Journal]
  35. Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris
    On Incident Handling and Response: A state-of-the-art approach. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:351-370 [Journal]
  36. Emad Aboelela, Christos Douligeris
    Fuzzy reasoning approach for QoS routing in B-ISDN. [Citation Graph (0, 0)][DBLP]
    Journal of Intelligent and Fuzzy Systems, 2000, v:9, n:1-2, pp:11-27 [Journal]
  37. Hany I. Fahmy, George Develekos, Christos Douligeris
    Application of Neural Networks and Machine Learning in Network Design. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:2, pp:226-237 [Journal]
  38. Yao-Chinb Liu, Christos Douligeris
    Rate Regulation with Feedback Controller in ATM Networks - A Neural Network Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:2, pp:200-208 [Journal]
  39. John Papadakis, Christos Douligeris
    Design and architecture of a digital music library on the web (Technical note). [Citation Graph (0, 0)][DBLP]
    The New Review of Hypermedia and Multimedia, 2002, v:7, n:, pp:- [Journal]
  40. Christos Douligeris
    Computer networks design using hybrid fuzzy expert systems. [Citation Graph (0, 0)][DBLP]
    Soft Comput., 2001, v:5, n:4, pp:272-286 [Journal]
  41. Emad Aboelela, Christos Douligeris
    Fuzzy generalized network approach for solving an optimization model for routing in B-ISDN. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 1999, v:12, n:2-3, pp:237-263 [Journal]
  42. Zuji Mao, Christos Douligeris
    Group Registration with Local Anchor for Location Tracking in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:5, pp:583-595 [Journal]
  43. Zuji Mao, Christos Douligeris
    A distributed database architecture for global roaming in next-generation mobile networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:1, pp:146-160 [Journal]
  44. Agapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris
    Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:354-361 [Conf]
  45. Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris
    A context-aware prefetching strategy for mobile computing environments. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:1109-1116 [Conf]
  46. Nikos Komninos, Dimitris Vergados, Christos Douligeris
    Detecting unauthorized and compromised nodes in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:3, pp:289-298 [Journal]
  47. Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris
    A context-aware cache structure for mobile computing environments. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:7, pp:1102-1119 [Journal]
  48. Christos Tselikis, Sarandis Mitropoulos, Christos Douligeris
    An evaluation of the middleware's impact on the performance of object oriented distributed systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:7, pp:1169-1181 [Journal]

  49. Web Proxy CachingObject Replacement: Frontier Analysis to Discover the Good-Enough Algorithms. [Citation Graph (, )][DBLP]


  50. A cache management object oriented simulation for mobile environments. [Citation Graph (, )][DBLP]


  51. A Novel Power-Efficient Middleware Scheme for Sensor Grid Applications. [Citation Graph (, )][DBLP]


  52. TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments. [Citation Graph (, )][DBLP]


  53. Enhancing the design of e-government: identifying structures and modelling concepts in contemporary platforms. [Citation Graph (, )][DBLP]


  54. Technological integration: evidence of processes of structuring in governmental organizations. [Citation Graph (, )][DBLP]


  55. A secure ubiquitous healthcare system based on IMS and the HL7 standards. [Citation Graph (, )][DBLP]


  56. Ontology-based tools for the management of customers' portfolios in a deregulated electricity market environment. [Citation Graph (, )][DBLP]


  57. Topological Dependence and Fault Tolerance in TDMA Based Power Conservation for WSNs. [Citation Graph (, )][DBLP]


  58. Energy efficiency in wireless sensor networks using sleep mode TDMA scheduling. [Citation Graph (, )][DBLP]


  59. LIDF: Layered intrusion detection framework for ad-hoc networks. [Citation Graph (, )][DBLP]


  60. Solving coverage problems in wireless sensor networks using cover sets. [Citation Graph (, )][DBLP]


  61. Group registration with distributed databases for location tracking in 3G wireless networks. [Citation Graph (, )][DBLP]


  62. Authentication in a layered security approach for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  63. Intrusion Detection Using Cost-Sensitive Classification [Citation Graph (, )][DBLP]


  64. Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms [Citation Graph (, )][DBLP]


  65. Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks [Citation Graph (, )][DBLP]


Search in 0.026secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002