


default search action
5th IDCS 2012: Wuyishan, Fujian, China
- Yang Xiang, Mukaddim Pathan, Xiaohui Tao, Hua Wang:

Internet and Distributed Computing Systems - 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7646, Springer 2012, ISBN 978-3-642-34882-2
IDCS: Ad-Hoc and Sensor Networks
- Shapla Khanam

, Habibullah Yusuf Saleem, Al-Sakib Khan Pathan
:
An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks. 1-14 - Teerapat Sanguankotchakorn, Shradha Shrestha, Nobuhiko Sugino:

Effective Ad Hoc Social Networking on OLSR MANET Using Similarity of Interest Approach. 15-28 - Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin:

Distributed Algorithms for the Creation of a New Distributed IDS in MANETs. 29-42 - Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer

:
Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks. 43-56
IDCS: Internet and Web Technologies
- Zhenyun Zhuang, Shun Kwok:

Optimizing Streaming Server Selection for CDN-Delivered Live Streaming. 57-70 - Tomoyuki Karasawa, Masakazu Soshi, Atsuko Miyaji

:
A Novel Hybrid IP Traceback Scheme with Packet Counters. 71-84 - Kun Peng, Yuexin Zhang:

A Secure Mix Network with an Efficient Validity Verification Mechanism. 85-96 - Mina Ghashami, Hoda Mashayekhi

, Jafar Habibi:
DLPR: A Distributed Locality Preserving Dimension Reduction Algorithm. 97-110
IDCS: Network Operations and Management
- Muhammad Khalil Afzal, Byung-Seo Kim, Sung Won Kim:

A Leader-Based Reliable Multicast MAC Protocol for MPEG-4 Traffic. 111-119 - Zhenguo Yang, Farong Zhong, Jinfang Zhang, Tiantian Song:

On Action Permutation and Progress for Partially Commutative Asynchronous Binary Sessions. 120-133 - Guang Cheng, Hua Wu

:
A NetFlow v9 Measurement System with Network Performance Function. 134-145 - Xiaohui Li, Dawu Gu, Yanli Ren, Ning Ding, Kan Yuan:

Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy. 146-159
IDCS: Information Infrastructure
- Jianyu Yang, Jun Han, Xu Wang, Hailong Sun:

MashStudio: An On-the-fly Environment for Rapid Mashup Development. 160-173 - Xianglin Wei, Guomin Zhang, Jianhua Fan, Ming Chen:

BSU: A Biased Seed Unchoking Algorithm for P2P Systems. 174-187 - Maryam Tanha, Fazirulhisyam Hashim:

Towards a Secure and Available Smart Grid Using Intrusion Tolerance. 188-201 - Hongda Li, Yang Liu, Qihua Niu:

A Note on Constant-Round Concurrent Zero-Knowledge Arguments of Knowledge for NP. 202-216 - Dongping Wang, Bin Gong:

On the Checkpointing Strategy in Desktop Grids. 217-226
IDCS: Resilience, Fault Tolerance, and Availability
- Jongtae Lim, Yonghun Park, Kyoungsoo Bok, Jaesoo Yoo:

A Continuous Reverse Skyline Query Processing Considering the Mobility of Query Objects. 227-237 - Khalid Nasr, Anas Abou El Kalam, Christian Fraboul:

Performance Analysis of Wireless Intrusion Detection Systems. 238-252 - Wei Gao, Kefei Chen, Guilin Wang, Xueli Wang:

Designated Condition One-Time Signatures. 253-263 - Yi Wang, Zhoujun Li:

SQL Injection Detection via Program Tracing and Machine Learning. 264-274 - Thawatchai Chomsiri, Xiangjian He

, Priyadarsi Nanda:
Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall. 275-287

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














