The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Georg Carle: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Georg Carle, Stefan Dresler, Jochen H. Schiller
    Multipath FEC scheme for the ATM adaptation layer AAL5. [Citation Graph (0, 0)][DBLP]
    Broadband Communications, 1998, pp:234-246 [Conf]
  2. Felix Hartanto, Georg Carle
    Policy-Based Billing Architecture for Internet Differentiated Services. [Citation Graph (0, 0)][DBLP]
    Broadband Communications, 1999, pp:163-174 [Conf]
  3. Georg Carle, Jochen H. Schiller, Claudia Schmidt
    Support for High-Performance Multipoint Multimedia Services. [Citation Graph (0, 0)][DBLP]
    COST 237 Workshop, 1994, pp:219-240 [Conf]
  4. Matthias Bossardt, Georg Carle, David Hutchison, Hermann de Meer, Bernhard Plattner
    04411 Preface - Service Management and Self-Organization in IP-based Networks. [Citation Graph (0, 0)][DBLP]
    Service Management and Self-Organization in IP-based Networks, 2005, pp:- [Conf]
  5. Matthias Bossardt, Georg Carle, David Hutchison, Hermann de Meer, Bernhard Plattner
    04411 Abtracts Collection -- Service Management and Self-Organization in IP-based Networks. [Citation Graph (0, 0)][DBLP]
    Service Management and Self-Organization in IP-based Networks, 2005, pp:- [Conf]
  6. Georg Carle, Stefan Dresler
    High performance group communication services in ATM networks. [Citation Graph (0, 0)][DBLP]
    High-Speed Networking for Multimedia Applications, 1995, pp:199-223 [Conf]
  7. Georg Carle, Jochen H. Schiller
    Enabling High Bandwidth Applications By High-Performance Multicast Transfer Protocol Processing. [Citation Graph (0, 0)][DBLP]
    Data Communications and their Performance, 1995, pp:82-96 [Conf]
  8. Jochen H. Schiller, Georg Carle
    Semi-Automated Design of High-Performance Communication Subsystems. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:273-282 [Conf]
  9. Georg Carle, Jörg Ottensmeyer
    RTMC: An Error Control Protocol for IP-based Audio-Visual Multicast Applications. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:566-573 [Conf]
  10. Jörg Nonnenmacher, Martin S. Lacher, Matthias Jung, Ernst Biersack, Georg Carle
    How Bad is Reliable Multicast without Local Recovery? [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:972-979 [Conf]
  11. Georg Carle
    Adaption Layer and Group Communication Server for Reliable Multipoint Services in ATM Networks. [Citation Graph (0, 0)][DBLP]
    IWACA, 1994, pp:124-138 [Conf]
  12. Long Le, Henning Sanneck, Georg Carle, Tohru Hoshi
    Active Concealment for Internet Speech Transmission. [Citation Graph (0, 0)][DBLP]
    IWAN, 2000, pp:239-248 [Conf]
  13. Georg Carle, Henning Sanneck, Sebastian Zander, Long Le
    Deploying an Active Voice Application on a Three-Level Active Network Node Architecture. [Citation Graph (0, 0)][DBLP]
    IWAN, 2001, pp:65-83 [Conf]
  14. Georg Carle, Jochen H. Schiller
    Hochleistungsfähige Implementierung von Protokollen mit zellenbasierten Fehlerkontrollmechanismen für ATM-Netze. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1997, pp:124-138 [Conf]
  15. Georg Carle, Tanja Zseby, Adam Wolisz
    Lastabhängige Tarifierung von IP Multicast-Diensten mit Dienstgüteunterstützung. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1999, pp:58-71 [Conf]
  16. Georg Carle, Sebastian Zander, Tanja Zseby
    Policy-basiertes Metering für IP-Netze. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 2001, pp:21-34 [Conf]
  17. Heiko Niedermayer, Simon Rieche, Klaus Wehrle, Georg Carle
    On the Distribution of Nodes in Distributed Hash Tables. [Citation Graph (0, 0)][DBLP]
    KiVS Kurzbeiträge und Workshop, 2005, pp:193-196 [Conf]
  18. Ketan Mayer-Patel, Long Le, Georg Carle
    An MPEG performance model and its application to adaptive forward error correction. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2002, pp:1-10 [Conf]
  19. Henning Sanneck, Nguyen Tuong, Long Le, Adam Wolisz, Georg Carle
    Intra-flow loss recovery and control for VoIP. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2001, pp:441-454 [Conf]
  20. Georg Carle
    Framework with Scalable Error Control for Reliable Multipoint Services in ATM Networks. [Citation Graph (0, 0)][DBLP]
    MMNET, 1995, pp:49-58 [Conf]
  21. Georg Carle, Felix Hartanto, M. Smirnov, Tanja Zseby
    Charging and Accounting for QoS-Enhanced IP Multicast. [Citation Graph (0, 0)][DBLP]
    Protocols for High-Speed Networks, 1999, pp:151-168 [Conf]
  22. Georg Carle
    Panel: Charging for QoS. [Citation Graph (0, 0)][DBLP]
    QofIS, 2000, pp:361-365 [Conf]
  23. Georg Carle, Henning Sanneck, Mirko Schramm
    Adaptive Hybrid Error Control for IP-Based Continuous Media Multicast Services. [Citation Graph (0, 0)][DBLP]
    QofIS, 2000, pp:245-258 [Conf]
  24. Sebastian Zander, Georg Carle
    High Quality IP Video Streaming with Adaptive Packet Marking. [Citation Graph (0, 0)][DBLP]
    QofIS, 2002, pp:68-77 [Conf]
  25. Torsten Braun, Georg Carle, Yevgeni Koucheryavy, Vassilis Tsaoussidis
    Wired/wireless Internet communications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:13-14, pp:2599-2600 [Journal]
  26. Gerhard Munz, Georg Carle
    Real-time Analysis of Flow Data for Network Attack Detection. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:100-108 [Conf]
  27. Michael Kleis, Kai Büttner, Sanaa Elmoumouhi, Georg Carle, Mikaël Salaün
    CSP, Cooperative Service Provisioning Using Peer-to-Peer Principles. [Citation Graph (0, 0)][DBLP]
    IWSOS, 2007, pp:73-87 [Conf]
  28. Andreas Klenk, Frank Petri, Benoit Radier, Mikaël Salaün, Georg Carle
    Automated Trust Negotiation in Autonomic Environments. [Citation Graph (0, 0)][DBLP]
    IWSOS, 2007, pp:272-279 [Conf]
  29. Torsten Braun, Georg Carle, Sonia Fahmy, Yevgeni Koucheryavy
    Wired/wireless internet communications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:7, pp:1441-1442 [Journal]

  30. 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]


  31. 08102 Working Group -- Measurement Requirements. [Citation Graph (, )][DBLP]


  32. 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]


  33. Trust-Rated Authentication for Domain-Structured Distributed Systems. [Citation Graph (, )][DBLP]


  34. Gathering Sensor Data in Home Networks with IPFIX. [Citation Graph (, )][DBLP]


  35. Towards Autonomic Service Control in Next Generation Networks. [Citation Graph (, )][DBLP]


  36. Collecting sensor data using compressed IPFIX. [Citation Graph (, )][DBLP]


  37. Pluggable Authorization and Distributed Enforcement with pam_xacml. [Citation Graph (, )][DBLP]


  38. The networking perspective of security performance - A measurement study. [Citation Graph (, )][DBLP]


  39. On the Applicability of Knowledge Based NAT-Traversal for Home Networks. [Citation Graph (, )][DBLP]


  40. Automated Real Time Performance Management for Mobile Networks. [Citation Graph (, )][DBLP]


  41. Adaptive encryption for the realization of real-time transmission of sensitive medical video streams. [Citation Graph (, )][DBLP]


  42. Graph coloring based physical-cell-ID assignment for LTE networks. [Citation Graph (, )][DBLP]


  43. Policy-driven workflows for mobile network management automation. [Citation Graph (, )][DBLP]


  44. Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks. [Citation Graph (, )][DBLP]


  45. ANTS - A Framework for Knowledge Based NAT Traversal. [Citation Graph (, )][DBLP]


  46. Using Netconf for Configuring Monitoring Probes. [Citation Graph (, )][DBLP]


  47. Packet sampling for worm and botnet detection in TCP connections. [Citation Graph (, )][DBLP]


  48. Optimized network configuration parameter assignment based on graph coloring. [Citation Graph (, )][DBLP]


  49. On Using Home Networks and Cloud Computing for a Future Internet of Things. [Citation Graph (, )][DBLP]


  50. Preventing identity theft with electronic identity cards and the trusted platform module. [Citation Graph (, )][DBLP]


  51. TCP Traffic Classification Using Markov Models. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002