The SCEAS System
Navigation Menu

Conferences in DBLP

(icuimc)
2009 (conf/icuimc/2009)


  1. Performance enhancement for IEEE 802.11e networks by adaptive adjustment of the HCCA/EDCA ratio. [Citation Graph (, )][DBLP]


  2. Machanisms for the maintenance of MP proxy tables in IEEE 802.11s mesh networks. [Citation Graph (, )][DBLP]


  3. Wi-Fi based radio map for location sensing by hypothesizing existence of barriers. [Citation Graph (, )][DBLP]


  4. Proposal and evaluation of multiple gateways distribution method for wireless mesh network. [Citation Graph (, )][DBLP]


  5. ARP-like direct link transmission scheme in WLAN. [Citation Graph (, )][DBLP]


  6. Two-phase mobile transaction validation in wireless broadcast environments. [Citation Graph (, )][DBLP]


  7. Web search and information credibility analysis: bridging the gap between Web1.0 and Web2.0. [Citation Graph (, )][DBLP]


  8. An efficient hash-based searching for specimens in the museum's exhibit. [Citation Graph (, )][DBLP]


  9. Towards an integrated framework for querying collection of heterogeneous data. [Citation Graph (, )][DBLP]


  10. Pivoted table index for querying product-property-value information. [Citation Graph (, )][DBLP]


  11. Object-name search by visual appearance and spatio-temporal descriptions. [Citation Graph (, )][DBLP]


  12. Concept vector extraction from Wikipedia category network. [Citation Graph (, )][DBLP]


  13. Web services provision: solutions, challenges and opportunities (invited paper). [Citation Graph (, )][DBLP]


  14. A multi-stage collaborative filtering approach for mobile recommendation. [Citation Graph (, )][DBLP]


  15. Dynamic load balancing in RCAN content addressable network. [Citation Graph (, )][DBLP]


  16. COS: client oriented scheduling for multi-channel on-demand broadcast. [Citation Graph (, )][DBLP]


  17. Small knowledge: a concept of enhanced bookmarks with personal context. [Citation Graph (, )][DBLP]


  18. Metadata management for integration and analysis of earth observation data. [Citation Graph (, )][DBLP]


  19. Efficient valid scope computation for location-dependent spatial queries in mobile and wireless environments. [Citation Graph (, )][DBLP]


  20. A fuzzy quantization approach to image retrieval based on color and texture. [Citation Graph (, )][DBLP]


  21. The effects of personality factors on participation in online learning. [Citation Graph (, )][DBLP]


  22. The design and implementation of an extensible network backup system in realtime. [Citation Graph (, )][DBLP]


  23. Quantitative evaluation between rival planning systems with dosimetric indices. [Citation Graph (, )][DBLP]


  24. Automatic vehicle parking system using gyroscope. [Citation Graph (, )][DBLP]


  25. Implementation of hierarchical GAF, a cooperative power saving scheme for sensor networks. [Citation Graph (, )][DBLP]


  26. ATMOS: A middleware for Transparent MObile ad-hoc networking Systems. [Citation Graph (, )][DBLP]


  27. Message routing on potential-fields in forwarding-based DTNs. [Citation Graph (, )][DBLP]


  28. Efficient location-aided flooding scheme initiated by receiver for MANETs. [Citation Graph (, )][DBLP]


  29. Connectivity-based clustering with stretching technique in MANETs. [Citation Graph (, )][DBLP]


  30. Robustness-set in watermarking embedding systems using codebook classifications. [Citation Graph (, )][DBLP]


  31. Counteract SYN flooding using second chance packet filtering. [Citation Graph (, )][DBLP]


  32. Secure RFID authentication scheme for EPC class Gen2. [Citation Graph (, )][DBLP]


  33. A reversible data hiding scheme based on dual steganographic images. [Citation Graph (, )][DBLP]


  34. A new method for intrusion detection on hierarchical wireless sensor networks. [Citation Graph (, )][DBLP]


  35. An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited. [Citation Graph (, )][DBLP]


  36. Enhancement of the RFID security method with ownership transfer. [Citation Graph (, )][DBLP]


  37. RBAC-based access control for privacy protection in pervasive environments. [Citation Graph (, )][DBLP]


  38. An effective approach to adaptive bandwidth allocation with QoS enhanced on IP networks. [Citation Graph (, )][DBLP]


  39. New synchronization schemes for UWB systems. [Citation Graph (, )][DBLP]


  40. Performance of double binary turbo coded UWB systems with antenna diversity. [Citation Graph (, )][DBLP]


  41. A preliminary study on common radio resource management in heterogeneous wireless networks. [Citation Graph (, )][DBLP]


  42. Performance analysis of STBC-UWB systems with double binary turbo code. [Citation Graph (, )][DBLP]


  43. An anonymous communication model for privacy-enhanced location based service using an echo agent. [Citation Graph (, )][DBLP]


  44. Resource allocation algorithm considering a priority of service classes for WiMedia UWB system. [Citation Graph (, )][DBLP]


  45. Simplified sum-product algorithm using piecewise linear function approximation for low complexity LDPC decoding. [Citation Graph (, )][DBLP]


  46. The design of e-traveler's check with efficiency and mutual authentication. [Citation Graph (, )][DBLP]


  47. The triple-watermarking algorithm with multiple description coding over lossy communication networks. [Citation Graph (, )][DBLP]


  48. DCT-based reversible data hiding scheme. [Citation Graph (, )][DBLP]


  49. Embedding secret messages based on chaotic map and Huffman coding. [Citation Graph (, )][DBLP]


  50. An efficient block-based lossless information hiding technique. [Citation Graph (, )][DBLP]


  51. Merging element fuzzy cognitive maps. [Citation Graph (, )][DBLP]


  52. Bilinear-pairing-based remote user authentication schemes using smart cards. [Citation Graph (, )][DBLP]


  53. Evaluation of the expressions of robotic emotions of the emotional robot, "Mung". [Citation Graph (, )][DBLP]


  54. Research works on cluster computing and storage area network. [Citation Graph (, )][DBLP]


  55. A modeling method based on CCS for workflow. [Citation Graph (, )][DBLP]


  56. A high-efficient inter-domain data transferring system for virtual machines. [Citation Graph (, )][DBLP]


  57. VMFence: a customized intrusion prevention system in distributed virtual computing environment. [Citation Graph (, )][DBLP]


  58. Host-based traceback; tracking bot and C&C server. [Citation Graph (, )][DBLP]


  59. Scalable server system based on virtual machine duplication in wide area. [Citation Graph (, )][DBLP]


  60. A multimodality image registration framework for synchronous visualization of radiotherapy plans with longitudinal imaging studies. [Citation Graph (, )][DBLP]


  61. The plasma free space optical model for ubiquitous systems. [Citation Graph (, )][DBLP]


  62. A new data structure for asynchronous periodic pattern mining. [Citation Graph (, )][DBLP]


  63. Keyword search considering user's preference in P2P networks. [Citation Graph (, )][DBLP]


  64. Real time extraction of related terms by bi-directional lexico-syntactic patterns from the web. [Citation Graph (, )][DBLP]


  65. An efficient clustering framework for relevant web information. [Citation Graph (, )][DBLP]


  66. Efficient serial episode mining with minimal occurrences. [Citation Graph (, )][DBLP]


  67. A recommendation method considering users' time series contexts. [Citation Graph (, )][DBLP]


  68. XML data partitioning strategies to improve parallelism in parallel holistic twig joins. [Citation Graph (, )][DBLP]


  69. Cyclic delay diversity for V-BLAST OFDM system. [Citation Graph (, )][DBLP]


  70. Noise insensitive sampling frequency offset estimation methods for DVB-T/H systems. [Citation Graph (, )][DBLP]


  71. New schemes of carrier frequency offset estimation for DVB systems. [Citation Graph (, )][DBLP]


  72. An enhanced ECCM method using OFCDM in WiBro system. [Citation Graph (, )][DBLP]


  73. An area reduction method for digital filter using redundancy of SD number system. [Citation Graph (, )][DBLP]


  74. A new filtering method for chirp spread spectrum. [Citation Graph (, )][DBLP]


  75. Peak power control algorithm for multi-processor SoC. [Citation Graph (, )][DBLP]


  76. Representative slice method for viscous fluid registration of three-dimensional whole-body human images. [Citation Graph (, )][DBLP]


  77. Developing embodied agent-based user interface by using interactive drama markup language. [Citation Graph (, )][DBLP]


  78. Exploiting idle CPU cores to improve file access performance. [Citation Graph (, )][DBLP]


  79. A credibility analyzing method of geographical objects from digital maps. [Citation Graph (, )][DBLP]


  80. MDS: a novel method for class imbalance learning. [Citation Graph (, )][DBLP]


  81. Real-valued feature indexing for music databases. [Citation Graph (, )][DBLP]


  82. A lightweight key renewal scheme for clustered sensor networks. [Citation Graph (, )][DBLP]


  83. Reporter node determination of replicated node detection in wireless sensor networks. [Citation Graph (, )][DBLP]


  84. Localization of the mobile agent using indirect Kalman filter in distributed sensor networks. [Citation Graph (, )][DBLP]


  85. Energy efficient filtering method in sensor networks. [Citation Graph (, )][DBLP]


  86. An m-EVBT algorithm for energy efficient routing in wireless sensor networks. [Citation Graph (, )][DBLP]


  87. An anti-collision algorithm without idle cycle using 4-ary tree in RFID system. [Citation Graph (, )][DBLP]


  88. Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic. [Citation Graph (, )][DBLP]


  89. Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks. [Citation Graph (, )][DBLP]


  90. An efficient method of image identification by combining image features. [Citation Graph (, )][DBLP]


  91. Performance testing based on test-driven development for mobile applications. [Citation Graph (, )][DBLP]


  92. A framework of sensor-cloud integration opportunities and challenges. [Citation Graph (, )][DBLP]


  93. Analysis on quantum-based fixed priority scheduling of real-time tasks. [Citation Graph (, )][DBLP]


  94. An e-learning framework supporting personalization and collaboration. [Citation Graph (, )][DBLP]


  95. Virtual community 101: know your virtual community and members. [Citation Graph (, )][DBLP]


  96. A statistical analysis of relation degree of compound pair on online biological pathway databases. [Citation Graph (, )][DBLP]


  97. PicAChoo: a tool for customizable feature extraction utilizing characteristics of textual data. [Citation Graph (, )][DBLP]


  98. Mining high utility patterns in incremental databases. [Citation Graph (, )][DBLP]


  99. A clustering algorithm using particle swarm optimization for DNA chip data analysis. [Citation Graph (, )][DBLP]


  100. Activity recognition with the aid of unlabeled samples. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002