The SCEAS System
Navigation Menu

Conferences in DBLP

(dasc)
2006 (conf/dasc/2006)


  1. Organizing Committees. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:- [Conf]

  2. Message from the General Co-Chairs. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:- [Conf]

  3. Referees. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:- [Conf]
  4. Yuan-Shun Dai, Michael G. Hinchey, Manish Madhusoodan, James L. Rash, Xukai Zou
    A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:3-10 [Conf]
  5. Ian A. Troxel, Alan D. George
    Adaptable and Autonomic Mission Manager for Dependable Aerospace Computing. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:11-18 [Conf]
  6. Joaquín Peña, Michael G. Hinchey, Roy Sterritt, Antonio Ruiz Cortés, Manuel Resinas
    A Model-Driven Architecture Approach for Modeling, Specifying and Deploying Policies in Autonomous and Autonomic Systems. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:19-30 [Conf]
  7. Li Bai
    A Reliable (k, n) Image Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:31-36 [Conf]
  8. Jong Youl Choi, Philippe Golle, Markus Jakobsson
    Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:37-44 [Conf]
  9. Na Guo, Laurence Tianruo Yang, Man Lin, John P. Quinn
    A Parallel GNFS Integrated with the Block Wiedemann's Algorithm for Integer Factorization. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:45-50 [Conf]
  10. Sining Liu, Brian King, Wei Wang
    A CRT-RSA Algorithm Secure against Hardware Fault Attacks. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:51-60 [Conf]
  11. Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog
    A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:61-68 [Conf]
  12. Tetsuya Masuishi, Koichi Shibata, Yasuyuki Oki, Kinji Mori
    Autonomous Decentralized Load Tracking Techniques and Evaluation. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:69-76 [Conf]
  13. Tadashi Dohi, Tatsuya Ozaki, Naoto Kaio
    Optimal Checkpoint Placement with Equality Constraints. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:77-84 [Conf]
  14. Ruiping Ma, Liudong Xing, Howard E. Michel
    Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:85-94 [Conf]
  15. Anil Bazaz, James D. Arthur, Joseph G. Tront
    Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:95-102 [Conf]
  16. Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiya
    Assessing Vulnerabilities in Apache and IIS HTTP Servers. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:103-110 [Conf]
  17. Takao Ando, Hiroyuki Okamura, Tadashi Dohi
    Estimating Markov Modulated Software Reliability Models via EM Algorithm. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:111-118 [Conf]
  18. Gustavo A. Chaparro-Baquero, Nayda G. Santiago, Wilson Rivera, Fernando Vega-Riveros
    Measuring Quantitative Dependability Attributes in Digital Publishing Using Petri Net Workflow Modeling. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:119-128 [Conf]
  19. Xuejun Yang, Xiangli Qu, Chunmei Gui
    Towards Reliable Rating Filtering in Grid Reputation Systems: A Pre-Evaluating Set Based Bias-Tuned Approach1. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:129-136 [Conf]
  20. Zhaoyu Liu, Dichao Peng
    A Security-Supportive Middleware Architecture for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:137-144 [Conf]
  21. Songqiao Han, Shensheng Zhang, Yong Zhang
    Self-Adaptive Pervasive Computing Application Based on Code Mobility. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:145-154 [Conf]
  22. T. Paul Parker, Shouhuai Xu
    Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:155-162 [Conf]
  23. Zhaoyu Liu, Roopesh Uppala
    A Dynamic Countermeasure Method for Large-Scale Network Attacks. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:163-170 [Conf]
  24. Ahmad Patooghy, Seyed Ghassem Miremadi, A. Javadtalab, Mahdi Fazeli, N. Farazmand
    A Solution to Single Point of Failure Using Voter Replication and Disagreement Detection. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:171-176 [Conf]
  25. Zijiang Yang, Shiyong Lu, Ping Yang
    Runtime Security Verification for Itinerary-Driven Mobile Agents. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:177-186 [Conf]
  26. Thanikesavan Sivanthi, Ulrich Killat
    A Satisficing MOMIP Framework for Reliable Real-time Application Scheduling. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:187-194 [Conf]
  27. Qinghui Tang, Sandeep K. S. Gupta, Daniel Stanzione, Phil Cayton
    Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:195-202 [Conf]
  28. Guoqing Yang, Hong Li, Zhaohui Wu
    SmartC: A Component-Based Hierarchical Modeling Language for Automotive Electronics. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:203-210 [Conf]
  29. Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham
    On Recognizing Virtual Honeypots and Countermeasures. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:211-218 [Conf]
  30. Naixue Xiong, Yanxiang He, Yan Yang, Laurence Tianruo Yang, Chao Peng
    A Self-Tuning Multicast Flow Control Scheme Based on Autonomic Technology. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:219-226 [Conf]
  31. Yuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou
    Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:227-234 [Conf]
  32. Emmanuel Hooper
    Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple Protocols. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:235-244 [Conf]
  33. M. Masadeh Bani Yassein, Mohamed Ould-Khaoua, Lewis M. Mackenzie, Stylianos Papanastasiou
    Performance Evaluation of Adjusted Probabilistic Broadcasting in MANETs. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:245-249 [Conf]
  34. Akhilesh Shrestha, Liudong Xing, Hong Liu
    Infrastructure Communication Reliability of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:250-257 [Conf]
  35. Hui Kang, Xiaolin Li, Patrick J. Moran
    Autonomic Sensor Networks: A New Paradigm for Collaborative Information Processing. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:258-268 [Conf]
  36. Xuehai Peng, Chuang Lin
    Architecture of Trustworthy Networks. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:269-276 [Conf]
  37. Avinash Srinivasan, Joshua Teitelbaum, Jie Wu
    DRBTS: Distributed Reputation-based Beacon Trust System. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:277-283 [Conf]
  38. Will Tao, Robert Steele
    Trusted Mobile Interaction via Extended Digital Certificates. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:284-292 [Conf]
  39. Andrew Prunicki, Tzilla Elrad
    Aclamate: An AOSD Security Framework for Access Control. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:293-300 [Conf]
  40. Omkar J. Tilak, Rajeev R. Raje, Xukai Zou
    Composing Access Control Policies of Distributed Components. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:301-307 [Conf]
  41. Junda Liu, Lin Ning, Yibo Xue, Dongsheng Wang
    PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:308-314 [Conf]
  42. Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao
    An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:315-324 [Conf]
  43. Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Governatori
    Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:325-332 [Conf]
  44. Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny Wong
    Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:333-340 [Conf]
  45. Philip K. McKinley, Farshad A. Samimi, Jonathan K. Shapiro, Chiping Tang
    Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:341-348 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002