The SCEAS System
Navigation Menu

Conferences in DBLP

(conext)
2007 (conf/conext/2007)


  1. A hybrid finite automaton for practical deep packet inspection. [Citation Graph (, )][DBLP]


  2. Detecting worm variants using machine learning. [Citation Graph (, )][DBLP]


  3. Practical defenses against BGP prefix hijacking. [Citation Graph (, )][DBLP]


  4. Identifying dynamic IP address blocks serendipitously through background scanning traffic. [Citation Graph (, )][DBLP]


  5. Modeling the adoption of new network architectures. [Citation Graph (, )][DBLP]


  6. Internet economics: the use of Shapley value for ISP settlement. [Citation Graph (, )][DBLP]


  7. On the cost of caching locator/ID mappings. [Citation Graph (, )][DBLP]


  8. ER: efficient retransmission scheme for wireless LANs. [Citation Graph (, )][DBLP]


  9. Near-optimal co-ordinated coding in wireless multihop networks. [Citation Graph (, )][DBLP]


  10. Multipath code casting for wireless mesh networks. [Citation Graph (, )][DBLP]


  11. Multipath live streaming via TCP: scheme, performance and benefits. [Citation Graph (, )][DBLP]


  12. The diameter of opportunistic mobile networks. [Citation Graph (, )][DBLP]


  13. Fair and efficient scheduling in data ferrying networks. [Citation Graph (, )][DBLP]


  14. Otiy: locators tracking nodes. [Citation Graph (, )][DBLP]


  15. Router buffer sizing revisited: the role of the output/input capacity ratio. [Citation Graph (, )][DBLP]


  16. Improving service differentiation in IP networks through dual topology routing. [Citation Graph (, )][DBLP]


  17. Rethinking internet traffic management: from multiple decompositions to a practical protocol. [Citation Graph (, )][DBLP]


  18. NetDiagnoser: troubleshooting network unreachabilities using end-to-end probes and routing data. [Citation Graph (, )][DBLP]


  19. Joint MAC-aware routing and load balancing in mesh networks. [Citation Graph (, )][DBLP]


  20. Scalable real-time gateway assignment in mobile mesh networks. [Citation Graph (, )][DBLP]


  21. Practical service provisioning for wireless meshes. [Citation Graph (, )][DBLP]


  22. An energy-conscious transport protocol for multi-hop wireless networks. [Citation Graph (, )][DBLP]


  23. Backpressure multicast congestion control in mobile ad-hoc networks. [Citation Graph (, )][DBLP]


  24. Experience with an implementation of the Idle Sense wireless access method. [Citation Graph (, )][DBLP]


  25. Internet routing resilience to failures: analysis and implications. [Citation Graph (, )][DBLP]


  26. On improving the efficiency and manageability of NotVia. [Citation Graph (, )][DBLP]


  27. Proactive replication in distributed storage systems using machine availability estimation. [Citation Graph (, )][DBLP]


  28. Building a reliable P2P system out of unreliable P2P clients: the case of KAD. [Citation Graph (, )][DBLP]


  29. Promoting fluidity in the flow of packets of 802.11 wireless mesh networks. [Citation Graph (, )][DBLP]


  30. Fairness enhancement in wireless mesh networks. [Citation Graph (, )][DBLP]


  31. Towards the realization of a mobile grid. [Citation Graph (, )][DBLP]


  32. Do you know what you are generating? [Citation Graph (, )][DBLP]


  33. The BlueGame project: ad-hoc multilayer mobile game with social dimension. [Citation Graph (, )][DBLP]


  34. Reproducing opportunistic connectivity traces using connectivity models. [Citation Graph (, )][DBLP]


  35. An AS-level IP traceback system. [Citation Graph (, )][DBLP]


  36. BonSwing: A GUI framework for ad-hoc applications using service discovery. [Citation Graph (, )][DBLP]


  37. A quicker way to discover nearby peers. [Citation Graph (, )][DBLP]


  38. Molecular architecture for autonomic wireless mesh networks. [Citation Graph (, )][DBLP]


  39. Measuring P2P IPTV traffic on both sides of the world. [Citation Graph (, )][DBLP]


  40. Replacing channel scanning with multiple authentication for fast handoff in IEEE 802.11 wireless networks. [Citation Graph (, )][DBLP]


  41. Automating the iBGP organization in large IP networks. [Citation Graph (, )][DBLP]


  42. Can active tracking of inroamer location optimise a live GSM network? [Citation Graph (, )][DBLP]


  43. Towards next generation network requirements for next generation gaming. [Citation Graph (, )][DBLP]


  44. Multiplexing BGP sessions with BGP-Mux. [Citation Graph (, )][DBLP]


  45. Implementation and preliminary evaluation of an ISP-driven informed path selection. [Citation Graph (, )][DBLP]


  46. Resource-efficient software delivery using volunteer assistance. [Citation Graph (, )][DBLP]


  47. Can we reduce Wi-Fi energy consumption during VoIP calls? [Citation Graph (, )][DBLP]


  48. Probabilistic inference of lossy links using end-to-end data in sensor networks. [Citation Graph (, )][DBLP]


  49. Folksonomy-based reasoning in opportunistic networks. [Citation Graph (, )][DBLP]


  50. Capture-aware staggering for concurrent transmissions. [Citation Graph (, )][DBLP]


  51. Extending web browsers architectures to support HTTP session mobility. [Citation Graph (, )][DBLP]


  52. Securing BGP incrementally. [Citation Graph (, )][DBLP]


  53. SWARM: self-organization of community wireless mesh networks. [Citation Graph (, )][DBLP]


  54. Fairer TCP-friendly congestion control protocol for multimedia streaming applications. [Citation Graph (, )][DBLP]


  55. A secure role-based address allocation and distribution mechanism. [Citation Graph (, )][DBLP]


  56. Characterizing quality of content distribution from YouTube like portals. [Citation Graph (, )][DBLP]


  57. Towards a clustering based data diffusion protocol in delay tolerant networks. [Citation Graph (, )][DBLP]


  58. Origin of route explosion in virtual private networks. [Citation Graph (, )][DBLP]


  59. Characterizing network events and their impact on routing. [Citation Graph (, )][DBLP]


  60. A gateway for wireless broadcasting. [Citation Graph (, )][DBLP]


  61. A next generation internet architecture for mobility and multi-homing support. [Citation Graph (, )][DBLP]


  62. A novel approach for creating trust to reduce malicious behavior in MANET. [Citation Graph (, )][DBLP]


  63. Daily walks in Paris: a practical analysis of wi-fi access points. [Citation Graph (, )][DBLP]


  64. Exploring the routing complexity of mobile multicast: a semi-empirical study. [Citation Graph (, )][DBLP]


  65. Experimenting with real-life opportunistic communications using windows mobile devices. [Citation Graph (, )][DBLP]


  66. A networked virtual environment over KAD. [Citation Graph (, )][DBLP]


  67. Identifying statistically anomalous regions in time series of network traffic. [Citation Graph (, )][DBLP]


  68. Bootstrapping large-scale DHT networks. [Citation Graph (, )][DBLP]


  69. Is your IP address prefix well-served by internet routing? [Citation Graph (, )][DBLP]


  70. Energy-efficient MAC and routing design in distributed beamforming sensor networks. [Citation Graph (, )][DBLP]


  71. Robust routing in networks with time-varying links. [Citation Graph (, )][DBLP]


  72. A cross-layer load-independent link cost metric for wireless mesh networks. [Citation Graph (, )][DBLP]


  73. Enabling seamless internet mobility. [Citation Graph (, )][DBLP]


  74. mod_kaPoW: mitigating DoS with transparent proof-of-work. [Citation Graph (, )][DBLP]


  75. Application and desktop sharing. [Citation Graph (, )][DBLP]


  76. Enabling session initiation in the presence of middleboxes. [Citation Graph (, )][DBLP]


  77. A next generation internet state management framework. [Citation Graph (, )][DBLP]


  78. Understanding the effect of P2P overlay on the AS-level underlay. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002