default search action
5th IDCS 2012: Wuyishan, Fujian, China
- Yang Xiang, Mukaddim Pathan, Xiaohui Tao, Hua Wang:
Internet and Distributed Computing Systems - 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7646, Springer 2012, ISBN 978-3-642-34882-2
IDCS: Ad-Hoc and Sensor Networks
- Shapla Khanam, Habibullah Yusuf Saleem, Al-Sakib Khan Pathan:
An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks. 1-14 - Teerapat Sanguankotchakorn, Shradha Shrestha, Nobuhiko Sugino:
Effective Ad Hoc Social Networking on OLSR MANET Using Similarity of Interest Approach. 15-28 - Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin:
Distributed Algorithms for the Creation of a New Distributed IDS in MANETs. 29-42 - Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks. 43-56
IDCS: Internet and Web Technologies
- Zhenyun Zhuang, Shun Kwok:
Optimizing Streaming Server Selection for CDN-Delivered Live Streaming. 57-70 - Tomoyuki Karasawa, Masakazu Soshi, Atsuko Miyaji:
A Novel Hybrid IP Traceback Scheme with Packet Counters. 71-84 - Kun Peng, Yuexin Zhang:
A Secure Mix Network with an Efficient Validity Verification Mechanism. 85-96 - Mina Ghashami, Hoda Mashayekhi, Jafar Habibi:
DLPR: A Distributed Locality Preserving Dimension Reduction Algorithm. 97-110
IDCS: Network Operations and Management
- Muhammad Khalil Afzal, Byung-Seo Kim, Sung Won Kim:
A Leader-Based Reliable Multicast MAC Protocol for MPEG-4 Traffic. 111-119 - Zhenguo Yang, Farong Zhong, Jinfang Zhang, Tiantian Song:
On Action Permutation and Progress for Partially Commutative Asynchronous Binary Sessions. 120-133 - Guang Cheng, Hua Wu:
A NetFlow v9 Measurement System with Network Performance Function. 134-145 - Xiaohui Li, Dawu Gu, Yanli Ren, Ning Ding, Kan Yuan:
Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy. 146-159
IDCS: Information Infrastructure
- Jianyu Yang, Jun Han, Xu Wang, Hailong Sun:
MashStudio: An On-the-fly Environment for Rapid Mashup Development. 160-173 - Xianglin Wei, Guomin Zhang, Jianhua Fan, Ming Chen:
BSU: A Biased Seed Unchoking Algorithm for P2P Systems. 174-187 - Maryam Tanha, Fazirulhisyam Hashim:
Towards a Secure and Available Smart Grid Using Intrusion Tolerance. 188-201 - Hongda Li, Yang Liu, Qihua Niu:
A Note on Constant-Round Concurrent Zero-Knowledge Arguments of Knowledge for NP. 202-216 - Dongping Wang, Bin Gong:
On the Checkpointing Strategy in Desktop Grids. 217-226
IDCS: Resilience, Fault Tolerance, and Availability
- Jongtae Lim, Yonghun Park, Kyoungsoo Bok, Jaesoo Yoo:
A Continuous Reverse Skyline Query Processing Considering the Mobility of Query Objects. 227-237 - Khalid Nasr, Anas Abou El Kalam, Christian Fraboul:
Performance Analysis of Wireless Intrusion Detection Systems. 238-252 - Wei Gao, Kefei Chen, Guilin Wang, Xueli Wang:
Designated Condition One-Time Signatures. 253-263 - Yi Wang, Zhoujun Li:
SQL Injection Detection via Program Tracing and Machine Learning. 264-274 - Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda:
Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall. 275-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.