![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Kia Makki
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j48]Abdur R. Shahid
, Niki Pissinou, S. S. Iyengar
, Kia Makki:
Delay-aware privacy-preserving location-based services under spatiotemporal constraints. Int. J. Commun. Syst. 34(1) (2021)
2010 – 2019
- 2019
- [c82]Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Sheila Alemany, Ahmed Imteaj
, Kia Makki, Edwin Aguilar:
Quantifying location privacy in permissioned blockchain-based internet of things (IoT). MobiQuitous 2019: 116-125 - 2018
- [c81]Mingming Guo, Kianoosh G. Boroojeni, Niki Pissinou, Kia Makki, Jerry Miller, S. Sitharama Iyengar
:
Query-Aware User Privacy Protection for LBS over Query-Feature-based Attacks. ISCC 2018: 1-7 - [c80]Abdur R. Shahid, Niki Pissinou, S. S. Iyengar
, Kia Makki:
Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks. TrustCom/BigDataSE 2018: 1852-1857 - 2017
- [c79]Laurent Njilla, Harold N. Ouete, Niki Pissinou, Kia Makki:
Game theoretic analysis for resource allocation in dynamic multi-hop networks with arbitration. SysCon 2017: 1-8 - 2016
- [j47]Laurent Yamen Njilla, Niki Pissinou, Kia Makki:
Game theoretic modeling of security and trust relationship in cyberspace. Int. J. Commun. Syst. 29(9): 1500-1512 (2016) - [c78]Laurent Yamen Njilla, Patricia Echual, Niki Pissinou, Kia Makki:
A game-theoretic approach on resource allocation with colluding nodes in MANETs. SysCon 2016: 1-8 - 2015
- [j46]Hien Nguyen, Ebtissam Wahman, Niki Pissinou, S. S. Iyengar
, Kia Makki:
Mobile learning object authoring tool and management system for mobile ad hoc wireless networks. Int. J. Commun. Syst. 28(17): 2180-2196 (2015) - 2012
- [j45]Qutub Bakhtiar Ali, Niki Pissinou, Kia Makki:
Belief based data cleaning for wireless sensor networks. Wirel. Commun. Mob. Comput. 12(5): 406-419 (2012) - [c77]Charles A. Kamhoua, Niki Pissinou, Kia Makki, Kevin A. Kwiat, S. Sitharama Iyengar
:
Game theoretic analysis of users and providers behavior in network under scarce resources. ICNC 2012: 1149-1155 - 2011
- [j44]Kai Chen, Kia Makki, Niki Pissinou:
Machine Learning on Congestion Analysis Based Real-Time Navigation System. Int. J. Artif. Intell. Tools 20(4): 753-781 (2011) - [c76]Charles A. Kamhoua, Niki Pissinou, Kia Makki:
Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy. ICC 2011: 1-6 - [c75]Kai Chen, Niki Pissinou, Kia Makki:
Cellular network location estimation via RSS-based data clean enhanced scheme. ISCC 2011: 924-930 - [c74]Kai Chen, Niki Pissinou, Kia Makki:
Fast Normalized Cross-Correlation enhanced floating car data estimation. WOCC 2011: 1-6 - 2010
- [c73]Hao Jin, Deng Pan, Niki Pissinou, Kia Makki:
Achieving Flow Level Constant Performance Guarantees for CICQ Switches without Speedup. GLOBECOM 2010: 1-5 - [c72]Charles A. Kamhoua, Niki Pissinou, Alan Busovaca, Kia Makki:
Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring. IPCCC 2010: 315-324 - [c71]Deng Pan, Kia Makki, Niki Pissinou:
Achieve constant performance guarantees using asynchronous crossbar scheduling without speedup. IPDPS 2010: 1-12
2000 – 2009
- 2009
- [j43]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11(2): 52-73 (2009) - [j42]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou, Masoumeh Karimi:
On Peer-to-Peer Location Management in Vehicular Ad Hoc Networks. Int. J. Interdiscip. Telecommun. Netw. 1(2): 28-45 (2009) - [j41]Kia Makki:
A Message from the Incoming Editor-in-Chief. J. Commun. 4(1): 1-2 (2009) - [j40]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A future location-aware replacement policy for the cache management at the mobile terminal. Wirel. Commun. Mob. Comput. 9(5): 607-629 (2009) - [c70]Deng Pan, Kia Makki, Niki Pissinou:
Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches. GLOBECOM 2009: 1-6 - [c69]Deng Pan, Zhenyu Yang, Kia Makki, Niki Pissinou:
Providing Performance Guarantees for Buffered Crossbar Switches without Speedup. QSHINE 2009: 297-314 - [c68]Te-Shun Chou, Jeffrey Fan, Sharon Fan, Kia Makki:
Ensemble of Machine Learning Algorithms for Intrusion Detection. SMC 2009: 3976-3980 - [c67]Kai Chen, Kia Makki, Niki Pissinou:
A Real-Time Wireless Route Guidance System for Urban Traffic Management and Its Performance Evaluation. VTC Fall 2009 - 2008
- [j39]Xiangqian Chen, Kia Makki, Kang K. Yen, Niki Pissinou:
Attack Distribution Modeling and Its Applications in Sensor Network Security. EURASIP J. Wirel. Commun. Netw. 2008 (2008) - [c66]Abdallah El Moutia, Kia Makki:
Time and Power Based Positioning Scheme for Indoor Location Aware Services. CCNC 2008: 868-872 - [c65]Qutub Bakhtiar Ali, Niki Pissinou, Kia Makki:
Estimated replication of data in wireless sensor networks. COMSWARE 2008: 107-110 - [c64]Sharon Fan, Jeffrey Fan, Kia Makki, Niki Pissinou:
Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks. EUC (2) 2008: 549-552 - [c63]Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou, Chao Chen:
Inferring Internet Worm Temporal Characteristics. GLOBECOM 2008: 2007-2012 - [c62]Xiwei Zhao, Vinayak Ganapathy, Niki Pissinou, Kia Makki:
Self-organized forensic support in MANETs. IPDPS 2008: 1-8 - [c61]Chunchen Liu, Ruei-Xi Chen, Jichang Tan, Sharon Fan, Jeffrey Fan, Kia Makki:
Thermal aware clock synthesis considering stochastic variation and correlations. ISCAS 2008: 1204-1207 - [c60]Raime Bustos, Alberto Aguilar, Kia Makki, Raimund K. Ege:
Multicast-P2P content distribution in large-scale enterprise networks. ISCC 2008: 487-494 - [c59]Bakhtiar Qutub Ali, Niki Pissinou, Kia Makki:
Approximate replication of data using adaptive filters in Wireless Sensor Networks. ISWPC 2008: 365-369 - [c58]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou, Zhihua Liu:
A proactive secure routing algorithm defense against node compromise in sensor networks. LCN 2008: 557-559 - [c57]Zhiwen Wan, Jinsong Zhang, Hao Zhu, Kia Makki, Niki Pissinou:
On Energy-Efficient and Low-Latency Medium Access Control in Wireless Sensor Networks. WCNC 2008: 1905-1910 - [c56]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou:
Mobility-Assisted Location Management for Vehicular Ad Hoc Networks. WCNC 2008: 2224-2228 - 2007
- [j38]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A context-aware cache structure for mobile computing environments. J. Syst. Softw. 80(7): 1102-1119 (2007) - [j37]Wuxu Peng, Yalin Wang, E. K. Park, Kia Makki:
Dynamic key management for secure routing in MANET. Wirel. Commun. Mob. Comput. 7(10): 1233-1241 (2007) - [c55]Xiwei Zhao, Vinayak Ganapathy, Niki Pissinou, Kia Makki:
Revisiting Global Time Synchronization. GLOBECOM 2007: 1058-1063 - [c54]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model. ICN 2007: 56 - [c53]James D. Gadze, Niki Pissinou, Kia Makki:
Wireless Networked-Based Sensing for Protection and Decentralized Control of Critical Infrastructures. ICNSC 2007: 644-649 - [c52]Te-Shun Chou, Kang K. Yen, Niki Pissinou, Kia Makki:
Fuzzy Belief Reasoning for Intrusion Detection Design. IIH-MSP 2007: 621-624 - [c51]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
Node Compromise Modeling and its Applications in Sensor Networks. ISCC 2007: 575-582 - [c50]Alberto Aguilar, Raimund K. Ege, Kia Makki, Raime Bustos:
Enabling Peer Cooperation in Private Local Area Networks using BitTorrent. ISCC 2007: 615-622 - [c49]James D. Gadze, Niki Pissinou, Kia Makki, Garth V. Crosby:
On Optimal Slot Allocation for Reservation TDMA MAC Protocol in Shadow Fading Environment. ISWCS 2007: 809-813 - [c48]Te-Shun Chou, Kang K. Yen, Liwei An, Niki Pissinou, Kia Makki:
Fuzzy belief pattern classification of incomplete data. SMC 2007: 535-540 - [c47]Chunming Liu, Chi Zhou, Niki Pissinou, Kia Makki:
Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks. WCNC 2007: 3341-3346 - 2006
- [j36]Scott C.-H. Huang, Kia Makki, Niki Pissinou:
On Optimizing Compatible Security Policies in Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2006 (2006) - [c46]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A context-aware prefetching strategy for mobile computing environments. IWCMC 2006: 1109-1116 - [c45]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou:
MURU: A Multi-Hop Routing Protocol for Urban Vehicular Ad Hoc Networks. MobiQuitous 2006: 1-8 - [c44]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A future location-prediction replacement strategy for mobile computing environments. WCNC 2006: 2252-2260 - 2005
- [c43]Hetal Jasani, Kang Yen, Kia Makki:
Performance Analysis of DSR using Cached Route Replies for Multihop Wireless Networks. ICWN 2005: 203-212 - [c42]Edward W. Knightly, Kia Makki:
Message from the technical program co-chairs. INFOCOM 2005 - 2004
- [j35]Wuxu Peng, Kia Makki:
Lossy Communicating Finite State Machines. Telecommun. Syst. 25(3-4): 433-448 (2004) - [c41]Wuxu Peng, Yalin Wang, Kia Makki:
Dynamic Key Management for Secure Routing In LCMRMG. ICCCN 2004: 227-232 - [c40]Niki Pissinou, Tirthankar Ghosh, Kia Makki:
Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks. NETWORKING 2004: 1446-1451 - [c39]Chi Zhou, Dayou Qian, Niki Pissinou, Kia Makki:
Resource allocation based on pricing for wireless multimedia networks. WCNC 2004: 477-482 - 2003
- [j34]Niki Pissinou, Kia Makki, Birgitta König-Ries
:
Mobile users in heterogeneous environments with middleware platform. Comput. Commun. 26(7): 700-707 (2003) - [c38]Wuxu Peng, Xin Zhang, Kia Makki:
Locality caching multiroot multigeneration routing algorithm in mobile ad hoc networks. ICCCN 2003: 229-234 - [c37]Niki Pissinou, Kia Makki, Abhay Doshi:
Ad Hoc Wireless Network Fault/Configuration Management. International Conference on Wireless Networks 2003: 139-145 - [c36]Kia Makki, Niki Pissinou, Jaydeep Punde, Kang Yen:
Predictive Routing Extensions to AODV to Support Quality of Service. International Conference on Wireless Networks 2003: 343-349 - [c35]Jaydeep Punde, Niki Pissinou, Kia Makki:
On Quality Of Service Routing in Ad-Hoc Networks. LCN 2003: 276-278 - 2002
- [j33]Wei Wayne Li, Kia Makki, Niki Pissinou:
Performance analysis of a PCS network with state dependent calls arrival processes and impatient calls. Comput. Commun. 25(5): 507-515 (2002) - [j32]Gang Feng, Kia Makki, Niki Pissinou:
Efficient implementations of a delay-constrained least-cost multicast algorithm. J. Commun. Networks 4(3): 246-255 (2002) - [j31]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Ouri Wolfson
:
Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. SIGMOD Rec. 31(2): 73-79 (2002) - [e10]Ronald P. Luijten, W. Eric Wong, Kia Makki, E. K. Park:
Proceedings of the 11th International Conference on Computer Communications and Networks, ICCCN 2002, 14-16 October, 2002, Hyatt Regency Miami, Miami, Florida, USA. IEEE 2002, ISBN 0-7803-7553-X [contents] - [e9]Birgitta König-Ries
, Kia Makki, S. A. M. Makki, Niki Pissinou, Peter Scheuermann:
Developing an Infrastructure for Mobile and Wireless Systems, NSF Workshop IMWS 2001, Scottsdale, AZ, USA, October 15, 2001, Revised Papers. Lecture Notes in Computer Science 2538, Springer 2002, ISBN 3-540-00289-8 [contents] - 2001
- [j30]E. K. Park, Kia Makki, Niki Pissinou, Sujeet Bambawale:
Secure data networking for enterprises. ACIS Int. J. Comput. Inf. Sci. 2(1): 17-23 (2001) - [j29]Niki Pissinou, Ivan Radev, Kia Makki:
Spatio-Temporal Modeling in Video and Multimedia Geographic Information Systems. GeoInformatica 5(4): 375-409 (2001) - [j28]Niki Pissinou, Ivan Radev, Kia Makki, William J. Campbell:
Spatio-Temporal Composition of Video Objects: Representation and Querying in Video Database Systems. IEEE Trans. Knowl. Data Eng. 13(6): 1033-1040 (2001) - [c34]Luo Li, Birgitta König-Ries
, Niki Pissinou, Kia Makki:
Strategies for Semantic Caching. DEXA 2001: 284-298 - [c33]Gang Feng, Kia Makki, Niki Pissinou, Christos Douligeris:
An efficient approximate algorithm for delay-cost-constrained QoS routing. ICCCN 2001: 395-400 - [c32]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Alexander L. Wolf, Ouri Wolfson
:
Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. Infrastructure for Mobile and Wireless Systems 2001: 1-37 - 2000
- [j27]N. Pissionou, Md. Ismail Hossain, Kia Makki:
A system model for mobile and wireless networking. ACIS Int. J. Comput. Inf. Sci. 1(4): 165-171 (2000) - [j26]Kia Makki, J. Broussard, Niki Pissinou:
On optical communications networks and wideband network architecture. Comput. Commun. 23(10): 901-911 (2000) - [j25]Niki Pissinou, Catalin Dunu, Kia Makki:
A new framework for handling mobile clients in a client-server database system. Comput. Commun. 23(10): 936-941 (2000) - [j24]W. Melody Moh, Dongming Yao, Kia Makki:
Analyzing the hidden-terminal effects and multimedia support for wireless LAN. Comput. Commun. 23(10): 998-1013 (2000) - [j23]Kia Makki, John Dell, Niki Pissinou, W. Melody Moh, Xiaohua Jia:
Using Logical Rings to Solve the Distributed Mutual Exclusion Problem with Fault Tolerance Issues. J. Supercomput. 16(1-2): 117-132 (2000) - [c31]Kia Makki, Niki Pissinou, Sujeet Bambawale:
The secure model for enterprise connectivity. ICCCN 2000: 176-182 - [c30]Niki Pissinou, Bhagyavati, Kia Makki:
Mobile Agents to Automate Fault Management in Wireless and Mobile Networks. IPDPS Workshops 2000: 1296-1300 - [c29]Niki Pissinou, Kia Makki, Birgitta König-Ries:
A Middleware-based Architecture to Support Transparent Data Access by Mobile Users in Heterogeneous Environments. RIDE 2000: 63-70 - [c28]Ivan Radev, George Paschos, Niki Pissinou, Kia Makki:
Video Content Representation Based on Texture and Lighting. VISUAL 2000: 457-466 - [c27]Wei Li, Kia Makki, Niki Pissinou:
Waiting time of handoff calls for the wireless mobile networks with dependent calls arrival processes and impatient calls. WCNC 2000: 845-849 - [c26]Sam Makki, Kia Makki, Niki Pissinou, Ashwin Gumaste:
A hybrid method to cellular traffic using optic beam interconnects. WCNC 2000: 1303-1305 - [e8]Ki-Joune Li, Kia Makki, Niki Pissinou, Siva Ravada:
ACM-GIS 2000, Proceedings of the Eighth ACM Symposium on Advances in Geographic Information Systems, November 10-11, 2000, Washington D.C., USA. ACM 2000, ISBN 1-58113-319-7 [contents]
1990 – 1999
- 1999
- [j22]Abdur Chowdhury, Ophir Frieder, Eric William Burger, David A. Grossman, Kia Makki:
Dynamic Routing System (DRS): Fault Tolerance in Network Routing. Comput. Networks 31(1-2): 89-99 (1999) - [j21]Xiaohua Jia, Yanchun Zhang, Niki Pissinou, Kia Makki:
A Distributed Multicast Routing Protocol for Real-Time Multicast Applications. Comput. Networks 31(1-2): 101-110 (1999) - [j20]Kia Makki, Niki Pissinou:
Efficient detection and resolution of deadlocks in distributed databases. Comput. Commun. 22(7): 637-643 (1999) - [j19]Niki Pissinou, Kia Makki, William J. Campbell:
On the design of a location and query management strategy for mobile and wireless environments. Comput. Commun. 22(7): 651-666 (1999) - [j18]Jerrold F. Stach, Eun Kyo Park, Kia Makki:
Performance of an enhanced GSM protocol supporting non-repudiation of service. Comput. Commun. 22(7): 675-680 (1999) - [j17]Asha Dinesh, W. Melody Moh, Kia Makki:
Design and evaluation of an efficient traffic control scheme for integrated voice, video, and data over asynchronous transfer mode networks: Explicit allowed rate algorithm. Int. J. Commun. Syst. 12(4): 249-279 (1999) - [c25]Ivan Radev, Niki Pissinou, Kia Makki, E. K. Park:
Graph-Based Object-Oriented Approach for Structural and Behavioral Representation of Multimedia Data. CIKM 1999: 522-530 - [c24]Wei Li, Kia Makki, Niki Pissinou, Eun Kyo Park, Xiaohua Jia:
Performance analysis of a PCS network with state-dependent calls arrival processes and impatient calls. ICCCN 1999: 494-499 - 1998
- [j16]Xiaohua Jia, Kia Makki, Niki Pissinou, Weijia Jia:
Group Channel Routing for Conferencing Systems in Wide Area Networks. Inf. Sci. 107(1-4): 217-232 (1998) - [c23]W. Melody Moh, Dongming Yao, Kia Makki:
Wireless LAN: Study of Hidden-Terminal Effect and Multimedia Support. ICCCN 1998: 422-431 - [c22]Xiaohua Jia, Yanchun Zhang, Niki Pissinou, Kia Makki:
An Efficient Admission Control Method of Real-Time Multicast Connections in Wide Area Networks. ICCCN 1998: 865-873 - [c21]Niki Pissinou, Ivan Radev, Kia Makki, William J. Campbell:
A Topological-Directional Model for the Apatio-Temporal Composition of Video Objects. RIDE 1998: 17-24 - [e7]Georges Gardarin, James C. French, Niki Pissinou, Kia Makki, Luc Bouganim:
Proceedings of the 1998 ACM CIKM International Conference on Information and Knowledge Management, Bethesda, Maryland, USA, November 3-7, 1998. ACM 1998, ISBN 1-58113-061-9 [contents] - [e6]Robert Laurini, Kia Makki, Niki Pissinou:
ACM-GIS '98, Proceedings of the 6th international symposium on Advances in Geographic Information Systems, November 6-7, 1998, Washington, DC, USA. ACM 1998 [contents] - 1997
- [j15]Wuxu Peng, Kia Makki:
A modular methodology to verify communication protocols. Comput. Commun. 20(12): 1069-1077 (1997) - [j14]Xiaohua Jia, Niki Pissinou, Kia Makki:
A real-time multicast routing algorithm for multimedia applications. Comput. Commun. 20(12): 1098-1106 (1997) - [j13]Niki Pissinou, Kia Makki, Ravi Krishnamurthy:
An ECA Object Service to Support Active Distributed Objects. Inf. Sci. 100(1-4): 63-104 (1997) - [j12]Kia Makki, Niki Pissinou:
Protocols for Mobile Environments - Editorial. Mob. Networks Appl. 2(3): 225-226 (1997) - [j11]Xiaohua Jia, Kia Makki, Niki Pissinou:
Modeling and Simulation of Multicast Routing Algorithms for Advanced Network Applications. Simul. 68(1): 44-55 (1997) - [c20]Niki Pissinou, Kia Makki, Mei Hong, Lusheng Ji, Ashok Kumar:
An Agent-Based Mobile System. ER 1997: 361-374 - [c19]Xiaohua Jia, Niki Pissinou, Kia Makki:
A distributed algorithm of delay bounded multicast routing for multimedia applications. ICCCN 1997: 208-213 - [c18]John Dell, Kia Makki, Niki Pissinou, Wuxu Peng:
Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems. PDPTA 1997: 1229-1238 - [e5]Forouzan Golshani, Kia Makki:
Proceedings of the Sixth International Conference on Information and Knowledge Management (CIKM'97), Las Vegas, Nevada, USA, November 10-14, 1997. ACM 1997, ISBN 0-89791-970-X [contents] - 1996
- [j10]Xiaohua Jia
, C. H. Lee, Kia Makki, Niki Pissinou:
Efficient multicast tree algorithm in ATM networks. Comput. Commun. 19(8): 637-644 (1996) - [j9]Wuxu Peng, Kia Makki:
Reachability and reverse reachability analysis of CFSMs. Comput. Commun. 19(8): 668-674 (1996) - [j8]Wuxu Peng, Kia Makki:
Petri Nets and Self-Stabilization of Communication Protocols. Informatica (Slovenia) 20(1) (1996) - [j7]Kia Makki, Niki Pissinou, Ophir Frieder:
Efficient Solutions to Multicast Routing in Communication Networks. Mob. Networks Appl. 1(2): 221-232 (1996) - [c17]Niki Pissinou, Kia Makki, E. K. Park, Z. Hu, W. Wong:
An Efficient Distributed Mutual Exclusion Algorithm. ICPP, Vol. 1 1996: 196-203 - [c16]Niki Pissinou, B. K. Rajashekhar, Kia Makki, Kanonkluk Vanapipat:
A Framework for Building Distributed Dynamic Applications. ICPP, Vol. 1 1996: 275-278 - [c15]Niki Pissinou, Kanonkluk Vanapipat, Kia Makki, B. K. Rajashekhar, Eun Kyo Park, B. Wong, Xiaohua Jia:
A framework for modeling applications as distributed active objects. SPDP 1996: 68-72 - [e4]Robert Laurini, Patrick Bergougnoux, Kia Makki, Niki Pissinou:
GIS '96, Proceedings of the fourth ACM workshop on Advances on Advances in Geographic Information Systems, November 15-16, 1996, Rockville, Maryland, USA. ACM 1996, ISBN 0-89791-874-6 [contents] - 1995
- [c14]Sivakumar Ravada, E. K. Park, Kia Makki:
Automatic Detection of Errors in Distributed Systems. ACM Conference on Computer Science 1995: 30-35 - [c13]Kia Makki, Niki Pissinou:
Detection and Resolution of Deadlocks in Distributed Database Systems. CIKM 1995: 411-416 - [c12]Wuxu Peng, Kia Makki:
On Reachability Analysis of Communicating Finite State Machines. ICCCN 1995: 58 - [e3]Niki Pissinou, Avi Silberschatz, E. K. Park, Kia Makki:
CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28 - December 2, 1995, Baltimore, Maryland, USA. ACM 1995, ISBN 0-89791-812-6 [contents] - [e2]Patrick Bergougnoux, Kia Makki, Niki Pissinou:
Proceedings of the 3rd ACM International Workshop on Advances in Geographic Information Systems, Baltimore, Maryland, USA, December 1-2, 1995, in conjunction with CIKM 1995. ACM 1995 [contents] - 1994
- [j6]Kia Makki, Ken Been, Niki Pissinou:
A Simulation Study of Token-Based Mutual-Exlusion Algorithms in Distributed Systems. Int. J. Comput. Simul. 4(1): 65-88 (1994) - [j5]Kia Makki, Niki Pissinou:
A new storage organization for temporal data bases. J. Syst. Softw. 27(3): 159-169 (1994) - [j4]Niki Pissinou, Kia Makki:
A coherent architecture for a temporal object data base management system. J. Syst. Softw. 27(3): 195-205 (1994) - [c11]Niki Pissinou, Kia Makki, E. K. Park:
Towards a Framework for Integrating Multilevel Secure Models and Temporal Data Models. CIKM 1994: 280-287 - [c10]Kia Makki, Niki Pissinou, E. K. Park:
An Efficient Solution To The Critical Section Problem In Distributed Systems. ICPP (2) 1994: 77-80 - [c9]Niki Pissinou, Kia Makki:
On the Representation of Temporal Object Roles in Object Oriented Databases. TIME 1994: 165-172 - [e1]Niki Pissinou, Kia Makki:
Proceedings of the Second ACM Workshop on Advances in Geographic Information Systems, ACM-GIS 1994, Gaithersburg, MD, USA. ACM 1994, ISBN 0-89791-750-2 [contents] - 1993
- [j3]Niki Pissinou, Kia Makki:
A Unified Model and Methodology for Temporal Object Databases. Int. J. Cooperative Inf. Syst. 2(2): 201-224 (1993) - [j2]Kia Makki, Niki Pissinou, Yelena Yesha:
An O(sqr N) Token Based Distributed Mutual Exclusion Algorithm. Informatica (Slovenia) 17(3) (1993) - [j1]Niki Pissinou, Kia Makki, Yelena Yesha:
On Temporal Modeling in the Context of Object Databases. SIGMOD Rec. 22(3): 8-15 (1993) - [c8]Niki Pissinou, Kia Makki:
Separating Semantics from Representation in a Temporal Object Database Domain. CIKM 1993: 295-304 - [c7]Niki Pissinou, Kia Makki, E. K. Park:
Towards the Design and Development of a New Model for Geographic Information Systems. CIKM 1993: 565-573 - [c6]Kia Makki, Ken Been, Niki Pissinou:
A Parallel Algorithm for the Steiner Tree Problem. ICCI 1993: 380-384 - 1992
- [c5]Niki Pissinou, Kia Makki:
A Framework for Temporal Object Databases. CIKM 1992: 86-97 - [c4]Kia Makki, Niki Pissinou:
The Steiner tree problem with minimum number of vertices in graphs. Great Lakes Symposium on VLSI 1992: 204-206 - [c3]Kia Makki, Paul Banta, Ken Been, Niki Pissinou:
On Algorithms for Mutual Exclusion in Distributed Systems. ICPP (2) 1992: 149-152 - [c2]Kia Makki, Paul Banta, Ken Been, Niki Pissinou, E. K. Park:
A Token Based Distributed K Mutual Exclusion Algorithm. SPDP 1992: 408-411 - 1991
- [c1]Kia Makki, Paul Banta, Ken Been, Roy Ogawa:
Two Algorithms for Mutual Exclusion in a Distributed System. ICPP (1) 1991: 460-466
Coauthor Index
aka: Eun Kyo Park
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint