Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Niki Pissinou
2010 – today
- 2013
[j43]Hao Jin, Deng Pan, Jason Liu, Niki Pissinou: OpenFlow-Based Flow-Level Bandwidth Provisioning for CICQ Switches. IEEE Trans. Computers 62(9): 1799-1812 (2013)
[c85]Hao Jin, Tosmate Cheocherngngarn, Dmita Levy, Alex Smith, Deng Pan, Jason Liu, Niki Pissinou: Joint Host-Network Optimization for Energy-Efficient Data Center Networking. IPDPS 2013: 623-634
[c84]Vasanth Iyer, S. Sitharama Iyengar, Niki Pissinou, Shaolei Ren: SPOTLESS: Similarity patterns of trajectories in label-less sensor streams. PerCom Workshops 2013: 487-492- 2012
[j42]Vinayak Ganapathy, Niki Pissinou, S. Kami Makki, Qutub Bakhtiar Ali: An epistemic event-based correlation approach for managing pervasive networks. Int. Journal of Network Management 22(1): 81-94 (2012)
[j41]Qutub Bakhtiar Ali, Niki Pissinou, Kia Makki: Belief based data cleaning for wireless sensor networks. Wireless Communications and Mobile Computing 12(5): 406-419 (2012)
[c83]Hao Jin, Deng Pan, Jing Xu, Niki Pissinou: Efficient VM placement with multiple deterministic and stochastic resources in data centers. GLOBECOM 2012: 2505-2510
[c82]Sitthapon Pumpichet, Niki Pissinou, Xinyu Jin, Deng Pan: Belief-based cleaning in trajectory sensor streams. ICC 2012: 208-212
[c81]Xinyu Jin, Niki Pissinou, Cody Chesneau, Sitthapon Pumpichet, Deng Pan: Hiding trajectory on the fly. ICC 2012: 403-407
[e10]Tai-Hoon Kim, Hojjat Adeli, William I. Grosky, Niki Pissinou, Timothy K. Shih, Edward J. Rothwell, Byeong Ho Kang, Seung-Jung Shin (Eds.): Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part I. Communications in Computer and Information Science 262, Springer 2012, ISBN 978-3-642-27203-5- 2011
[j40]Kai Chen, Kia Makki, Niki Pissinou: Machine Learning on Congestion Analysis Based Real-Time Navigation System. International Journal on Artificial Intelligence Tools 20(4): 753-781 (2011)
[j39]Garth V. Crosby, Lance Hester, Niki Pissinou: Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. I. J. Network Security 12(2): 107-117 (2011)
[c80]Hao Jin, Deng Pan, Niki Pissinou: Parallel Packet Switch without Segmentation-and-Reassembly. GLOBECOM 2011: 1-5
[c79]Charles A. Kamhoua, Niki Pissinou, Kia Makki: Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy. ICC 2011: 1-6
[c78]Hao Jin, Deng Pan, Jason Liu, Niki Pissinou: OpenFlow based flow level bandwidth provisioning for CICQ switches. INFOCOM 2011: 476-480
[c77]
[c76]
[e9]Tai-Hoon Kim, Hojjat Adeli, William I. Grosky, Niki Pissinou, Timothy K. Shih, Edward J. Rothwell, Byeong Ho Kang, Seung-Jung Shin (Eds.): Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part II. Communications in Computer and Information Science 263, Springer 2011, ISBN 978-3-642-27185-4- 2010
[c75]Hao Jin, Deng Pan, Niki Pissinou, Kia Makki: Achieving Flow Level Constant Performance Guarantees for CICQ Switches without Speedup. GLOBECOM 2010: 1-5
[c74]Sitthapon Pumpichet, Niki Pissinou: Virtual Sensor for Mobile Sensor Data Cleaning. GLOBECOM 2010: 1-5
[c73]Zhuo Sun, Masoumeh Karimi, Deng Pan, Zhenyu Yang, Niki Pissinou: Buffered Crossbar Based Parallel Packet Switch. GLOBECOM 2010: 1-5
[c72]Qian Wang, Zesheng Chen, Chao Chen, Niki Pissinou: On the Robustness of the Botnet Topology Formed by Worm Infection. GLOBECOM 2010: 1-6
[c71]Charles A. Kamhoua, Niki Pissinou, Alan Busovaca, Kia Makki: Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring. IPCCC 2010: 315-324
[c70]Deng Pan, Kia Makki, Niki Pissinou: Achieve constant performance guarantees using asynchronous crossbar scheduling without speedup. IPDPS 2010: 1-12
[c69]Charles A. Kamhoua, Niki Pissinou: Mitigating selfish misbehavior in multi-hop networks using stochastic game theory. LCN 2010: 232-235
[e8]Tai-Hoon Kim, Sankar K. Pal, William I. Grosky, Niki Pissinou, Timothy K. Shih, Dominik Slezak (Eds.): Signal Processing and Multimedia - International Conferences, SIP and MulGraB 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 123, Springer 2010, ISBN 978-3-642-17640-1
2000 – 2009
- 2009
[j38]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou: Sensor network security: a survey. IEEE Communications Surveys and Tutorials 11(2): 52-73 (2009)
[j37]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou, Masoumeh Karimi: On Peer-to-Peer Location Management in Vehicular Ad Hoc Networks. IJITN 1(2): 28-45 (2009)
[j36]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris: A future location-aware replacement policy for the cache management at the mobile terminal. Wireless Communications and Mobile Computing 9(5): 607-629 (2009)
[c68]Deng Pan, Kia Makki, Niki Pissinou: Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches. GLOBECOM 2009: 1-6
[c67]Deng Pan, Zhenyu Yang, Kia Makki, Niki Pissinou: Providing Performance Guarantees for Buffered Crossbar Switches without Speedup. QSHINE 2009: 297-314
[c66]Kai Chen, Kia Makki, Niki Pissinou: A Real-Time Wireless Route Guidance System for Urban Traffic Management and Its Performance Evaluation. VTC Fall 2009: 0-- 2008
[j35]Xiangqian Chen, Kia Makki, Kang K. Yen, Niki Pissinou: Attack Distribution Modeling and Its Applications in Sensor Network Security. EURASIP J. Wireless Comm. and Networking 2008 (2008)
[c65]Qutub Bakhtiar Ali, Niki Pissinou, Kia Makki: Estimated replication of data in wireless sensor networks. COMSWARE 2008: 107-110
[c64]Sharon Fan, Jeffrey Fan, Kia Makki, Niki Pissinou: Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks. EUC (2) 2008: 549-552
[c63]Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou, Chao Chen: Inferring Internet Worm Temporal Characteristics. GLOBECOM 2008: 2007-2012
[c62]Xiwei Zhao, Vinayak Ganapathy, Niki Pissinou, Kia Makki: Self-organized forensic support in MANETs. IPDPS 2008: 1-8
[c61]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou, Zhihua Liu: A proactive secure routing algorithm defense against node compromise in sensor networks. LCN 2008: 557-559
[c60]Zhiwen Wan, Jinsong Zhang, Hao Zhu, Kia Makki, Niki Pissinou: On Energy-Efficient and Low-Latency Medium Access Control in Wireless Sensor Networks. WCNC 2008: 1905-1910
[c59]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou: Mobility-Assisted Location Management for Vehicular Ad Hoc Networks. WCNC 2008: 2224-2228- 2007
[j34]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris: A context-aware cache structure for mobile computing environments. Journal of Systems and Software 80(7): 1102-1119 (2007)
[j33]Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih-Wei Yi, S. Kami Makki, Niki Pissinou: Maximizing lifetime of sensor surveillance systems. IEEE/ACM Trans. Netw. 15(2): 334-345 (2007)
[c58]
[c57]Xiwei Zhao, Vinayak Ganapathy, Niki Pissinou, Kia Makki: Revisiting Global Time Synchronization. GLOBECOM 2007: 1058-1063
[c56]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou: A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model. ICN 2007: 56
[c55]James D. Gadze, Niki Pissinou, Kia Makki: Wireless Networked-Based Sensing for Protection and Decentralized Control of Critical Infrastructures. ICNSC 2007: 644-649
[c54]Te-Shun Chou, Kang K. Yen, Niki Pissinou, Kia Makki: Fuzzy Belief Reasoning for Intrusion Detection Design. IIH-MSP 2007: 621-624
[c53]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou: Node Compromise Modeling and its Applications in Sensor Networks. ISCC 2007: 575-582
[c52]Garth V. Crosby, Niki Pissinou: Evolution of Cooperation in Multi-Class Wireless Sensor Networks. LCN 2007: 489-495
[c51]Te-Shun Chou, Kang K. Yen, Liwei An, Niki Pissinou, Kia Makki: Fuzzy belief pattern classification of incomplete data. SMC 2007: 535-540
[c50]Chunming Liu, Chi Zhou, Niki Pissinou, Kia Makki: Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks. WCNC 2007: 3341-3346- 2006
[j32]Scott C.-H. Huang, Kia Makki, Niki Pissinou: On Optimizing Compatible Security Policies in Wireless Networks. EURASIP J. Wireless Comm. and Networking 2006 (2006)
[c49]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris: A context-aware prefetching strategy for mobile computing environments. IWCMC 2006: 1109-1116
[c48]Xiwei Zhao, S. Kami Makki, Niki Pissinou: An Efficient and Robust Routing Protocol for Data Aggregation. WASA 2006: 175-186
[c47]Scott C.-H. Huang, Shamila Makki, Niki Pissinou: Accusation Resolution Using Security Metrology. WASA 2006: 435-444
[c46]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris: A future location-prediction replacement strategy for mobile computing environments. WCNC 2006: 2252-2260- 2005
[j31]Tirthankar Ghosh, Niki Pissinou, S. Kami Makki: Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. MONET 10(6): 985-995 (2005)
[c45]Hai Liu, Peng-Jun Wan, Chih-Wei Yi, Xiaohua Jia, S. A. M. Makki, Niki Pissinou: Maximal lifetime scheduling in sensor surveillance networks. INFOCOM 2005: 2482-2491- 2004
[c44]Shamila Makki, Niki Pissinou, Hui Huang: The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV). Security and Management 2004: 427-
[c43]Shamila Makki, Niki Pissinou, Tirthankar Bhowmick: LEACH Protocol for Assigning Cluster-Heads Using a Deterministic and Stochastic Approach for Wireless Sensor Networks. International Conference on Wireless Networks 2004: 963-968
[c42]S. A. M. Makki, Niki Pissinou, Saurabh D. Agrawal: A Framework For Policy Based Coordinated Adaptation in Mobile Systems. International Conference on Wireless Networks 2004: 969-974
[c41]Shamila Makki, Niki Pissinou, Sachin Vitthal Khare: Simulation of Wireless Sensor Networks Based on Energy Aware Routing Approach. International Conference on Wireless Networks 2004: 982-
[c40]Niki Pissinou, Tirthankar Ghosh, Kia Makki: Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks. NETWORKING 2004: 1446-1451
[c39]Chi Zhou, Dayou Qian, Niki Pissinou, Kia Makki: Resource allocation based on pricing for wireless multimedia networks. WCNC 2004: 477-482- 2003
[j30]Niki Pissinou, Kia Makki, Birgitta König-Ries: Mobile users in heterogeneous environments with middleware platform. Computer Communications 26(7): 700-707 (2003)
[j29]S. A. M. Makki, Niki Pissinou, Philippe Daroux: Mobile and wireless Internet access. Computer Communications 26(7): 734-746 (2003)
[j28]S. A. M. Makki, Niki Pissinou, Philippe Daroux: LEO satellite communication networks - a routing approach. Wireless Communications and Mobile Computing 3(3): 385-395 (2003)
[c38]S. A. M. Makki, Niki Pissinou, Ravi Kailat: Optimal Wavelength Conversion Degree in an All-Optical Network. Communications in Computing 2003: 176-180
[c37]S. A. M. Makki, Niki Pissinou, Tirthankar Ghosh, Amit Deshpande: Study of Network Performance in a Simulated Network for Optimized Node Degree and Network Cost. International Conference on Internet Computing 2003: 747-752
[c36]Niki Pissinou, Kia Makki, Abhay Doshi: Ad Hoc Wireless Network Fault/Configuration Management. International Conference on Wireless Networks 2003: 139-145
[c35]Niki Pissinou, Ramon B. Mejia, S. A. M. Makki: Provisioning an Interactive DVB Satellite Return Channel. International Conference on Wireless Networks 2003: 262-268
[c34]Kia Makki, Niki Pissinou, Jaydeep Punde, Kang Yen: Predictive Routing Extensions to AODV to Support Quality of Service. International Conference on Wireless Networks 2003: 343-349
[c33]Jaydeep Punde, Niki Pissinou, Kia Makki: On Quality Of Service Routing in Ad-Hoc Networks. LCN 2003: 276-278- 2002
[j27]Wei Wayne Li, Kia Makki, Niki Pissinou: Performance analysis of a PCS network with state dependent calls arrival processes and impatient calls. Computer Communications 25(5): 507-515 (2002)
[j26]Gang Feng, Kia Makki, Niki Pissinou: Efficient implementations of a delay-constrained least-cost multicast algorithm. Journal of Communications and Networks 4(3): 246-255 (2002)
[j25]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Ouri Wolfson: Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. SIGMOD Record 31(2): 73-79 (2002)
[c32]S. A. M. Makki, Niki Pissinou, S. Kouzalis: On Routing algorithms in Ad-hoc Networks. International Conference on Internet Computing 2002: 983-990
[c31]Gang Feng, Christos Douligeris, Sam Kami Makki, Niki Pissinou: Performance evaluation of delay-constrained least-cost QoS routing algorithms based on linear and nonlinear Lagrange relaxation. ICC 2002: 2273-2278
[e7]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Niki Pissinou, Peter Scheuermann (Eds.): Developing an Infrastructure for Mobile and Wireless Systems, NSF Workshop IMWS 2001, Scottsdale, AZ, October 15, 2001, Revised Papers. Lecture Notes in Computer Science 2538, Springer 2002, ISBN 3-540-00289-8- 2001
[j24]Niki Pissinou, Ivan Radev, Kia Makki: Spatio-Temporal Modeling in Video and Multimedia Geographic Information Systems. GeoInformatica 5(4): 375-409 (2001)
[j23]Niki Pissinou, Ivan Radev, Kia Makki, William J. Campbell: Spatio-Temporal Composition of Video Objects: Representation and Querying in Video Database Systems. IEEE Trans. Knowl. Data Eng. 13(6): 1033-1040 (2001)
[c30]Luo Li, Birgitta König-Ries, Niki Pissinou, Kia Makki: Strategies for Semantic Caching. DEXA 2001: 284-298
[c29]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Alexander L. Wolf, Ouri Wolfson: Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. Infrastructure for Mobile and Wireless Systems 2001: 1-37- 2000
[j22]Kia Makki, J. Broussard, Niki Pissinou: On optical communications networks and wideband network architecture. Computer Communications 23(10): 901-911 (2000)
[j21]Niki Pissinou, Catalin Dunu, Kia Makki: A new framework for handling mobile clients in a client-server database system. Computer Communications 23(10): 936-941 (2000)
[j20]Kia Makki, John Dell, Niki Pissinou, W. Melody Moh, Xiaohua Jia: Using Logical Rings to Solve the Distributed Mutual Exclusion Problem with Fault Tolerance Issues. The Journal of Supercomputing 16(1-2): 117-132 (2000)
[c28]Niki Pissinou, Bhagyavati, Kia Makki: Mobile Agents to Automate Fault Management in Wireless and Mobile Networks. IPDPS Workshops 2000: 1296-1300
[c27]Niki Pissinou, Kia Makki, Birgitta König-Ries: A Middleware-based Architecture to Support Transparent Data Access by Mobile Users in Heterogeneous Environments. RIDE 2000: 63-70
[c26]Ivan Radev, George Paschos, Niki Pissinou, Kia Makki: Video Content Representation Based on Texture and Lighting. VISUAL 2000: 457-466
[c25]
[c24]Lionel Robert, Niki Pissinou, Sam Makki: Third generation wireless network: the integration of GSM and Mobile IP. WCNC 2000: 1291-1296
[c23]Sam Makki, Niki Pissinou, Philippe Daroux, E. Sardaby: On fundamental issues in mobile and wireless Internet. WCNC 2000: 1297-1302
[c22]Sam Makki, Kia Makki, Niki Pissinou, Ashwin Gumaste: A hybrid method to cellular traffic using optic beam interconnects. WCNC 2000: 1303-1305
[e6]Ki-Joune Li, Kia Makki, Niki Pissinou, Siva Ravada (Eds.): ACM-GIS 2000, Proceedings of the Eighth ACM Symposium on Advances in Geographic Information Systems, November 10-11, 2000, Washington D.C., USA. ACM 2000, ISBN 1-58113-319-7
1990 – 1999
- 1999
[j19]Xiaohua Jia, Yanchun Zhang, Niki Pissinou, Kia Makki: A Distributed Multicast Routing Protocol for Real-Time Multicast Applications. Computer Networks 31(1-2): 101-110 (1999)
[j18]Kia Makki, Niki Pissinou: Efficient detection and resolution of deadlocks in distributed databases. Computer Communications 22(7): 637-643 (1999)
[j17]Niki Pissinou, Kia Makki, William J. Campbell: On the design of a location and query management strategy for mobile and wireless environments. Computer Communications 22(7): 651-666 (1999)
[c21]Ivan Radev, Niki Pissinou, Kia Makki, E. K. Park: Graph-Based Object-Oriented Approach for Structural and Behavioral Representation of Multimedia Data. CIKM 1999: 522-530- 1998
[j16]Xiaohua Jia, Kia Makki, Niki Pissinou, Weijia Jia: Group Channel Routing for Conferencing Systems in Wide Area Networks. Inf. Sci. 107(1-4): 217-232 (1998)
[c20]Caroline St. Clair, Chengwen Liu, Niki Pissinou: Attribute Weighting: A Method of Applying Domain Knowledge in the Decision Tree Process. CIKM 1998: 259-266
[c19]Xiaohua Jia, Yanchun Zhang, Niki Pissinou, Kia Makki: An Efficient Admission Control Method of Real-Time Multicast Connections in Wide Area Networks. ICCCN 1998: 865-873
[c18]Niki Pissinou, Ivan Radev, Kia Makki, William J. Campbell: A Topological-Directional Model for the Apatio-Temporal Composition of Video Objects. RIDE 1998: 17-24
[e5]Georges Gardarin, James C. French, Niki Pissinou, Kia Makki, Luc Bouganim (Eds.): Proceedings of the 1998 ACM CIKM International Conference on Information and Knowledge Management, Bethesda, Maryland, USA, November 3-7, 1998. ACM 1998, ISBN 1-58113-061-9
[e4]Robert Laurini, Kia Makki, Niki Pissinou (Eds.): ACM-GIS '98, Proceedings of the 6th international symposium on Advances in Geographic Information Systems, November 6-7, 1998, Washington, DC, USA. ACM 1998- 1997
[j15]Xiaohua Jia, Niki Pissinou, Kia Makki: A real-time multicast routing algorithm for multimedia applications. Computer Communications 20(12): 1098-1106 (1997)
[j14]Niki Pissinou, Kia Makki, Ravi Krishnamurthy: An ECA Object Service to Support Active Distributed Objects. Inf. Sci. 100(1-4): 63-104 (1997)
[j13]
[j12]Xiaohua Jia, Kia Makki, Niki Pissinou: Modeling and Simulation of Multicast Routing Algorithms for Advanced Network Applications. Simulation 68(1): 44-55 (1997)
[c17]Niki Pissinou, Kia Makki, Mei Hong, Lusheng Ji, Ashok Kumar: An Agent-Based Mobile System. ER 1997: 361-374
[c16]Xiaohua Jia, Niki Pissinou, Kia Makki: A distributed algorithm of delay bounded multicast routing for multimedia applications. ICCCN 1997: 208-213
[c15]John Dell, Kia Makki, Niki Pissinou, Wuxu Peng: Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems. PDPTA 1997: 1229-1238- 1996
[j11]Wei Liu, E. K. Park, Niki Pissinou: Encapsulation of ATM cell connections. Computer Communications 19(8): 623-627 (1996)
[j10]Xiaohua Jia, C. H. Lee, Kia Makki, Niki Pissinou: Efficient multicast tree algorithm in ATM networks. Computer Communications 19(8): 637-644 (1996)
[j9]Kia Makki, Niki Pissinou, Ophir Frieder: Efficient Solutions to Multicast Routing in Communication Networks. MONET 1(2): 221-232 (1996)
[c14]Niki Pissinou, Kia Makki, E. K. Park, Z. Hu, W. Wong: An Efficient Distributed Mutual Exclusion Algorithm. ICPP, Vol. 1 1996: 196-203
[c13]Niki Pissinou, B. K. Rajashekhar, Kia Makki, Kanonkluk Vanapipat: A Framework for Building Distributed Dynamic Applications. ICPP, Vol. 1 1996: 275-278
[e3]Robert Laurini, Patrick Bergougnoux, Kia Makki, Niki Pissinou (Eds.): GIS '96, Proceedings of the fourth ACM workshop on Advances on Advances in Geographic Information Systems, November 15-16, 1996, Rockville, Maryland, USA. ACM 1996, ISBN 1-58113-017-2- 1995
[j8]Niki Pissinou, Vijay V. Raghavan, Kanonkluk Vanapipat: RIMM: A Reactive Integration Multidatabase Model. Informatica (Slovenia) 19(2) (1995)
[c12]
[c11]Kanonkluk Vanapipat, Niki Pissinou, Vijay V. Raghavan: A Dynamic Framework to Actively Support Interoperability in Multidatabase Systems. RIDE-DOM 1995: 148-153
[e2]Niki Pissinou, Avi Silberschatz, E. K. Park, Kia Makki (Eds.): CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28 - December 2, 1995, Baltimore, Maryland, USA. ACM 1995, ISBN 0-89791-812-6
[e1]Patrick Bergougnoux, Kia Makki, Niki Pissinou (Eds.): Proceedings of the 3rd ACM International Workshop on Advances in Geographic Information Systems, Baltimore, Maryland, December 1-2, 1995, in conjunction with CIKM 1995. ACM 1995- 1994
[j7]Kia Makki, Ken Been, Niki Pissinou: A Simulation Study of Token-Based Mutual-Exlusion Algorithms in Distributed Systems. Int. Journal in Computer Simulation 4(1): 65-88 (1994)
[j6]Kia Makki, Niki Pissinou: A new storage organization for temporal data bases. Journal of Systems and Software 27(3): 159-169 (1994)
[j5]Niki Pissinou, Kia Makki: A coherent architecture for a temporal object data base management system. Journal of Systems and Software 27(3): 195-205 (1994)
[j4]Niki Pissinou, Richard T. Snodgrass, Ramez Elmasri, Inderpal Singh Mumick, M. Tamer Özsu, Barbara Pernici, Arie Segev, Babis Theodoulidis, Umeshwar Dayal: Towards an Infrastructure for Temporal Databases: Report of an Invitational ARPA/NSF Workshop. SIGMOD Record 23(1): 35-51 (1994)
[c10]Niki Pissinou, Kia Makki, E. K. Park: Towards a Framework for Integrating Multilevel Secure Models and Temporal Data Models. CIKM 1994: 280-287
[c9]Kia Makki, Niki Pissinou, E. K. Park: An Efficient Solution To The Critical Section Problem In Distributed Systems. ICPP 1994: 77-80
[c8]Suresh K. Damodaran-Kamal, Joan M. Francioni, Niki Pissinou: A Modeling Paradigm for Multidatabases. ICPP (3) 1994: 247-250
[c7]- 1993
[j3]Niki Pissinou, Kia Makki: A Unified Model and Methodology for Temporal Object Databases. Int. J. Cooperative Inf. Syst. 2(2): 201-224 (1993)
[j2]Kia Makki, Niki Pissinou, Yelena Yesha: An O(sqr N) Token Based Distributed Mutual Exclusion Algorithm. Informatica (Slovenia) 17(3) (1993)
[j1]Niki Pissinou, Kia Makki, Yelena Yesha: On Temporal Modeling in the Context of Object Databases. SIGMOD Record 22(3): 8-15 (1993)
[c6]
[c5]Niki Pissinou, Kia Makki, E. K. Park: Towards the Design and Development of a New Model for Geographic Information Systems. CIKM 1993: 565-573
[c4]- 1992
[c3]
[c2]Kia Makki, Paul Banta, Ken Been, Niki Pissinou: On Algorithms for Mutual Exclusion in Distributed Systems. ICPP (2) 1992: 149-152
[c1]Kia Makki, Paul Banta, Ken Been, Niki Pissinou, E. K. Park: A Token Based Distributed K Mutual Exclusion Algorithm. SPDP 1992: 408-411
Coauthor Index
[j41] [j40] [c79] [c77] [c76] [c75] [c71] [c70] [j38] [j37] [j36] [c68] [c67] [c66] [j35] [c65] [c64] [c63] [c62] [c61] [c60] [c59] [j34] [c57] [c56] [c55] [c54] [c53] [c51] [c50] [j32] [c49] [c46] [c40] [c39] [j30] [c36] [c34] [c33] [j27] [j26] [j25] [e7] [j24] [j23] [c30] [c29] [j22] [j21] [j20] [c28] [c27] [c26] [c25] [c22] [e6] [j19] [j18] [j17] [c21] [j16] [c19] [c18] [e5] [e4] [j15] [j14] [j13] [j12] [c17] [c16] [c15] [j10] [j9] [c14] [c13] [e3] [c12] [e2] [e1] [j7] [j6] [j5] [c10] [c9] [c7] [j3] [j2] [j1] [c6] [c5] [c4] [c3] [c2] [c1]
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-12 23:40 CEST by the dblp team



