The SCEAS System
Navigation Menu

Conferences in DBLP

Distributed Computing and Internet Technology (icdcit)
2005 (conf/icdcit/2005)

  1. S. Sitharama Iyengar
    The Distributed Sensor Networks - An Emerging Technology. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:1- [Conf]
  2. Arunabha Sen
    Distribute Computing Track Chair's Message. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:2- [Conf]
  3. Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang
    Efficient Binding Lifetime Determination Schemes in HMIPv6. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:3-14 [Conf]
  4. Jia Hou, Moon Ho Lee
    A Fast Search and Advanced Marking Scheme for Network IP Traceback Model. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:15-20 [Conf]
  5. Li-Mei Peng, Young-Chul Kim, Kyoung-Min Yoo, Kyeong-Eun Han, Young-Chon Kim
    Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:21-26 [Conf]
  6. Smruti Padhy, Diganta Goswami
    Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:27-38 [Conf]
  7. Anand Prakash Ruhil, D. K. Lobiyal, Ivan Stojmenovic
    Position Based Gradient Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:39-49 [Conf]
  8. B. Paul, S. V. Rao
    Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:50-55 [Conf]
  9. Orhan Dagdeviren, Kayhan Erciyes, Deniz Cokuslu
    Merging Clustering Algorithms in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:56-61 [Conf]
  10. K. Murugan, S. Shanmugavel
    Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:62-68 [Conf]
  11. Mahesh Arumugam, Sandeep S. Kulkarni
    Self-stabilizing Deterministic TDMA for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:69-81 [Conf]
  12. Michihiro Inoue, Noriaki Yoshiura, Yoshikuni Onozato
    Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:82-92 [Conf]
  13. Subhasis Bhattacharjee, Nabanita Das
    Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:93-104 [Conf]
  14. Sasanka Roy, Debabrata Bardhan, Sandip Das
    Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:105-116 [Conf]
  15. Anshuman Singh, Siddharth Barman, K. K. Shukla
    Secure Two-Party Context Free Language Recognition. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:117-124 [Conf]
  16. Jaydip Sen, Indranil Sengupta
    Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:125-131 [Conf]
  17. Paola Flocchini, Amiya Nayak, Arno Schulz
    Cleaning an Arbitrary Regular Network with Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:132-142 [Conf]
  18. Yon Dohn Chung, Ji Yeon Lee
    Multi-attribute Hashing of Wireless Data for Content-Based Queries. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:143-153 [Conf]
  19. B. Nagaprabhanjan, Varsha Apte
    A Tool for Automated Resource Consumption Profiling of Distributed Transactions. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:154-165 [Conf]
  20. JinHo Ahn
    An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:166-171 [Conf]
  21. Rahul Agarwal, Mahender Bisht, S. N. Maheshwari, Sanjiva Prasad
    Divide and Concur: Employing Chandra and Toueg's Consensus Algorithm in a Multi-level Setting. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:172-183 [Conf]
  22. Chandrashekhara Thejaswi P. S., Ranjeet Patro
    Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:184-191 [Conf]
  23. Paritosh Chandrapal, Padam Kumar
    A Scalable Multi-level Distributed System-Level Diagnosis. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:192-202 [Conf]
  24. Punit Chandra, Ajay D. Kshemkalyani
    Analysis of Interval-Based Global State Detection. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:203-216 [Conf]
  25. Junghee Lee, Dongsoo Han
    A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:217-228 [Conf]
  26. Sarbani Roy, Nandini Mukherjee
    Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:229-234 [Conf]
  27. D. Janakiram, M. Venkateswara Reddy, A. Vijay Srinivas, M. A. Maluk Mohamed, S. Santosh Kumar
    GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:235-241 [Conf]
  28. Sanjay Kumar Madria
    Internet Technology Track Chair's Message. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:242- [Conf]
  29. Huajun Chen
    Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:243-254 [Conf]
  30. Kil Hong Joo, Jaeho Lee
    An Effective Searching Method Using the Example-Based Query. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:255-266 [Conf]
  31. Rajat Shuvro Roy, Mohammad Sohel Rahman
    On Communicating with Agents on the Network. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:267-277 [Conf]
  32. Yukun Cao, Yunfeng Li, Xiaofeng Liao
    Applying Fuzzy Logic to Recommend Consumer Electronics. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:278-289 [Conf]
  33. V. Radha, S. Ramakrishna, N. Pradeep Kumar
    Generic XML Schema Definition (XSD) to GUI Translator. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:290-296 [Conf]
  34. Xiaoling Dai, John C. Grundy
    Off-Line Micro-payment System for Content Sharing in P2P Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:297-307 [Conf]
  35. Debajyoti Mukhopadhyay, Pradipta Biswas
    FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:308-313 [Conf]
  36. Atul Kumar, Anjali Bhargava, Bharat K. Bhargava, Sanjay Kumar Madria
    Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:314-320 [Conf]
  37. Kil Hong Joo, Soojung Lee
    An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:321-332 [Conf]
  38. Indrajit Ray
    System Security Track Chair's Message. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:333- [Conf]
  39. Debapriyay Mukhopadhyay, Suman Roy
    A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:334-347 [Conf]
  40. Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong
    E-mail Worm Detection Using the Analysis of Behavior. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:348-356 [Conf]
  41. M. Choudary Gorantla, Ashutosh Saxena
    Verifiably Encrypted Signature Scheme Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:357-363 [Conf]
  42. S. Prasanna, V. Vetri Selvi
    An Improved Intrusion Detection Technique for Mobile Adhoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:364-376 [Conf]
  43. Bezawada Bruhadeshwar, Sandeep S. Kulkarni
    User Revocation in Secure Adhoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:377-388 [Conf]
  44. C. V. Raman, Atul Negi
    A Hybrid Method to Intrusion Detection Systems Using HMM. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:389-396 [Conf]
  45. Suresh Reddy, Sukumar Nandi
    Enhanced Network Traffic Anomaly Detector. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:397-403 [Conf]
  46. Jae-Min Seol, Seong-Whan Kim
    Statistically Secure Extension of Anti-collusion Code Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:404-409 [Conf]
  47. Hyun-Seong Sung, Seong-Whan Kim
    An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:410-419 [Conf]
  48. Manachai Toahchoodee, Indrakshi Ray
    Validation of Policy Integration Using Alloy. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:420-431 [Conf]
  49. Jifeng He
    Linking Theories of Concurrency by Retraction. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:432- [Conf]
  50. Gopal Gupta
    Software Engineering Track Chair's Message. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:433- [Conf]
  51. Qian Wang
    Integrating Architecture Description Languages: A Semantics-Based Approach. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:434-445 [Conf]
  52. Zhijiang Dong, Yujian Fu, Yue Fu, Xudong He
    Automated Runtime Validation of Software Architecture Design. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:446-457 [Conf]
  53. Abhik Roychoudhury, Tulika Mitra, Hemendra Singh Negi
    Analyzing Loop Paths for Execution Time Estimation. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:458-469 [Conf]
  54. Rakesh Tripathi, Rajib Mall
    A Technique for Early Software Reliability Prediction. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:470-481 [Conf]
  55. Bikram Sengupta, Rance Cleaveland
    Executable Requirements Specifications Using Triggered Message Sequence Charts. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:482-493 [Conf]
  56. Mohammad Mahdi Jaghoori, Marjan Sirjani, Mohammad Reza Mousavi, Ali Movaghar
    Efficient Symmetry Reduction for an Actor-Based Model. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:494-507 [Conf]
  57. A. K. Bhattacharjee, R. K. Shyamasundar
    Validated Code Generation for Activity Diagrams. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:508-521 [Conf]
  58. Mukesh K. Mohania
    Data Mining Track Chair's Message. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:522- [Conf]
  59. S. Roy, D. K. Bhattacharyya
    An Approach to Find Embedded Clusters Using Density Based Techniques. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:523-535 [Conf]
  60. N. Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi
    Using Sub-sequence Information with kNN for Classification of Sequential Data. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:536-546 [Conf]
  61. Girish Keshav Palshikar
    Distance-Based Outliers in Sequences. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:547-552 [Conf]
  62. N. Pradeep Kumar, Tapati Bandopadhyay
    Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:553-560 [Conf]
  63. Amir Ahmad, Lipika Dey
    Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:561-572 [Conf]
  64. Ilias Michalarias, Hans-Joachim Lenz
    Dissemination of Multidimensional Data Using Broadcast Clusters. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:573-584 [Conf]
  65. S. Vijayalakshmi, S. Suresh Raja
    Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:585-591 [Conf]
  66. M. A. H. Zahid, Ankush Mittal, R. C. Joshi
    A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:592-603 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002