Conferences in DBLP
S. Sitharama Iyengar The Distributed Sensor Networks - An Emerging Technology. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:1- [Conf ] Arunabha Sen Distribute Computing Track Chair's Message. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:2- [Conf ] Sun Ok Yang , SungSuk Kim , Chong-Sun Hwang Efficient Binding Lifetime Determination Schemes in HMIPv6. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:3-14 [Conf ] Jia Hou , Moon Ho Lee A Fast Search and Advanced Marking Scheme for Network IP Traceback Model. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:15-20 [Conf ] Li-Mei Peng , Young-Chul Kim , Kyoung-Min Yoo , Kyeong-Eun Han , Young-Chon Kim Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:21-26 [Conf ] Smruti Padhy , Diganta Goswami Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:27-38 [Conf ] Anand Prakash Ruhil , D. K. Lobiyal , Ivan Stojmenovic Position Based Gradient Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:39-49 [Conf ] B. Paul , S. V. Rao Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:50-55 [Conf ] Orhan Dagdeviren , Kayhan Erciyes , Deniz Cokuslu Merging Clustering Algorithms in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:56-61 [Conf ] K. Murugan , S. Shanmugavel Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:62-68 [Conf ] Mahesh Arumugam , Sandeep S. Kulkarni Self-stabilizing Deterministic TDMA for Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:69-81 [Conf ] Michihiro Inoue , Noriaki Yoshiura , Yoshikuni Onozato Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:82-92 [Conf ] Subhasis Bhattacharjee , Nabanita Das Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:93-104 [Conf ] Sasanka Roy , Debabrata Bardhan , Sandip Das Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:105-116 [Conf ] Anshuman Singh , Siddharth Barman , K. K. Shukla Secure Two-Party Context Free Language Recognition. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:117-124 [Conf ] Jaydip Sen , Indranil Sengupta Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:125-131 [Conf ] Paola Flocchini , Amiya Nayak , Arno Schulz Cleaning an Arbitrary Regular Network with Mobile Agents. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:132-142 [Conf ] Yon Dohn Chung , Ji Yeon Lee Multi-attribute Hashing of Wireless Data for Content-Based Queries. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:143-153 [Conf ] B. Nagaprabhanjan , Varsha Apte A Tool for Automated Resource Consumption Profiling of Distributed Transactions. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:154-165 [Conf ] JinHo Ahn An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:166-171 [Conf ] Rahul Agarwal , Mahender Bisht , S. N. Maheshwari , Sanjiva Prasad Divide and Concur: Employing Chandra and Toueg's Consensus Algorithm in a Multi-level Setting. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:172-183 [Conf ] Chandrashekhara Thejaswi P. S. , Ranjeet Patro Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:184-191 [Conf ] Paritosh Chandrapal , Padam Kumar A Scalable Multi-level Distributed System-Level Diagnosis. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:192-202 [Conf ] Punit Chandra , Ajay D. Kshemkalyani Analysis of Interval-Based Global State Detection. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:203-216 [Conf ] Junghee Lee , Dongsoo Han A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:217-228 [Conf ] Sarbani Roy , Nandini Mukherjee Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:229-234 [Conf ] D. Janakiram , M. Venkateswara Reddy , A. Vijay Srinivas , M. A. Maluk Mohamed , S. Santosh Kumar GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:235-241 [Conf ] Sanjay Kumar Madria Internet Technology Track Chair's Message. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:242- [Conf ] Huajun Chen Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:243-254 [Conf ] Kil Hong Joo , Jaeho Lee An Effective Searching Method Using the Example-Based Query. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:255-266 [Conf ] Rajat Shuvro Roy , Mohammad Sohel Rahman On Communicating with Agents on the Network. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:267-277 [Conf ] Yukun Cao , Yunfeng Li , Xiaofeng Liao Applying Fuzzy Logic to Recommend Consumer Electronics. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:278-289 [Conf ] V. Radha , S. Ramakrishna , N. Pradeep Kumar Generic XML Schema Definition (XSD) to GUI Translator. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:290-296 [Conf ] Xiaoling Dai , John C. Grundy Off-Line Micro-payment System for Content Sharing in P2P Networks. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:297-307 [Conf ] Debajyoti Mukhopadhyay , Pradipta Biswas FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:308-313 [Conf ] Atul Kumar , Anjali Bhargava , Bharat K. Bhargava , Sanjay Kumar Madria Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:314-320 [Conf ] Kil Hong Joo , Soojung Lee An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:321-332 [Conf ] Indrajit Ray System Security Track Chair's Message. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:333- [Conf ] Debapriyay Mukhopadhyay , Suman Roy A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:334-347 [Conf ] Tao Jiang , Wonil Kim , Kyung-suk Lhee , Manpyo Hong E-mail Worm Detection Using the Analysis of Behavior. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:348-356 [Conf ] M. Choudary Gorantla , Ashutosh Saxena Verifiably Encrypted Signature Scheme Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:357-363 [Conf ] S. Prasanna , V. Vetri Selvi An Improved Intrusion Detection Technique for Mobile Adhoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:364-376 [Conf ] Bezawada Bruhadeshwar , Sandeep S. Kulkarni User Revocation in Secure Adhoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:377-388 [Conf ] C. V. Raman , Atul Negi A Hybrid Method to Intrusion Detection Systems Using HMM. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:389-396 [Conf ] Suresh Reddy , Sukumar Nandi Enhanced Network Traffic Anomaly Detector. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:397-403 [Conf ] Jae-Min Seol , Seong-Whan Kim Statistically Secure Extension of Anti-collusion Code Fingerprinting. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:404-409 [Conf ] Hyun-Seong Sung , Seong-Whan Kim An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:410-419 [Conf ] Manachai Toahchoodee , Indrakshi Ray Validation of Policy Integration Using Alloy. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:420-431 [Conf ] Jifeng He Linking Theories of Concurrency by Retraction. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:432- [Conf ] Gopal Gupta Software Engineering Track Chair's Message. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:433- [Conf ] Qian Wang Integrating Architecture Description Languages: A Semantics-Based Approach. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:434-445 [Conf ] Zhijiang Dong , Yujian Fu , Yue Fu , Xudong He Automated Runtime Validation of Software Architecture Design. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:446-457 [Conf ] Abhik Roychoudhury , Tulika Mitra , Hemendra Singh Negi Analyzing Loop Paths for Execution Time Estimation. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:458-469 [Conf ] Rakesh Tripathi , Rajib Mall A Technique for Early Software Reliability Prediction. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:470-481 [Conf ] Bikram Sengupta , Rance Cleaveland Executable Requirements Specifications Using Triggered Message Sequence Charts. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:482-493 [Conf ] Mohammad Mahdi Jaghoori , Marjan Sirjani , Mohammad Reza Mousavi , Ali Movaghar Efficient Symmetry Reduction for an Actor-Based Model. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:494-507 [Conf ] A. K. Bhattacharjee , R. K. Shyamasundar Validated Code Generation for Activity Diagrams. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:508-521 [Conf ] Mukesh K. Mohania Data Mining Track Chair's Message. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:522- [Conf ] S. Roy , D. K. Bhattacharyya An Approach to Find Embedded Clusters Using Density Based Techniques. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:523-535 [Conf ] N. Pradeep Kumar , M. Venkateswara Rao , P. Radha Krishna , Raju S. Bapi Using Sub-sequence Information with kNN for Classification of Sequential Data. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:536-546 [Conf ] Girish Keshav Palshikar Distance-Based Outliers in Sequences. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:547-552 [Conf ] N. Pradeep Kumar , Tapati Bandopadhyay Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:553-560 [Conf ] Amir Ahmad , Lipika Dey Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:561-572 [Conf ] Ilias Michalarias , Hans-Joachim Lenz Dissemination of Multidimensional Data Using Broadcast Clusters. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:573-584 [Conf ] S. Vijayalakshmi , S. Suresh Raja Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:585-591 [Conf ] M. A. H. Zahid , Ankush Mittal , R. C. Joshi A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:592-603 [Conf ]