-------------------------------------------------------------------
TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks
-------------------------------------------------------------------
Capacity Scaling of Wireless Ad Hoc Networks: Shannon Meets Maxwell
-------------------------------------------------------------------
CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks
-------------------------------------------------------------------
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
-------------------------------------------------------------------
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network
-------------------------------------------------------------------
Maximal Scheduling in Wireless Ad Hoc Networks with Hyper graph Interference Models
-------------------------------------------------------------------
Throughput and Energy Efficiency in Wireless Ad Hoc Networks with Gaussian Channels
-------------------------------------------------------------------
Routing Architecture for Vehicular Ad-Hoc Networks
-------------------------------------------------------------------
Evaluating Trust in Ad Hoc Network Routing by Induction of Decision Trees
-------------------------------------------------------------------
Consensus in Sparse, Mobile Ad Hoc Networks
-------------------------------------------------------------------
Connectivity of Multiple Cooperative Cognitive Radio Ad Hoc Networks
-------------------------------------------------------------------
Discovering Characterizations of the Behavior of Anomalous Sub-populations
-------------------------------------------------------------------
Outsourced Similarity Search on Metric Data Assets
-------------------------------------------------------------------
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
-------------------------------------------------------------------
Scalable Learning of Collective Behavior
-------------------------------------------------------------------
Slicing: A New Approach to Privacy Preserving
Data Publishing
-------------------------------------------------------------------
Efficient Extended Boolean Retrieval
-------------------------------------------------------------------
Ranking Model Adaptation for Domain-Specific Search
-------------------------------------------------------------------
Data Mining Techniques for Software Effort Estimation: A Comparative Study
-------------------------------------------------------------------
Data-mining experiments on a hydroelectric power plant
Fuzzy Modeling Built Through a Data Mining Process
-------------------------------------------------------------------
GA Guided Cluster Based Fuzzy Decision Tree for Reactive Ion Etching Modeling: A Data Mining Approach
-------------------------------------------------------------------
A Data-Mining Approach to Monitoring Wind Turbines
-------------------------------------------------------------------
A Low-Power Integrated x86–64 and Graphics Processor for Mobile Computing Devices
-------------------------------------------------------------------
Improving QoS in High-Speed Mobility Using Bandwidth Maps
-------------------------------------------------------------------
SenseLess: A Database-Driven White Spaces Network
-------------------------------------------------------------------
A Proxy-Based Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices
-------------------------------------------------------------------
Building Security into Off-the-Shelf Smartphones
From Context Awareness to Socially Aware Computing
-------------------------------------------------------------------
Location-Based Services on Mobile Phones: Minimizing Power Consumption
-------------------------------------------------------------------
Ubicomp Systems at 20: Progress, Opportunities, and Challenges
-------------------------------------------------------------------
Logical Data models for cloud computing architectures
-------------------------------------------------------------------
Moving 2 Mishap: M2M’s Impact on Privacy and Safety
-------------------------------------------------------------------
Imagining the Future: Thoughts on Computing
-------------------------------------------------------------------
Improving the Automation of Security Information Management: A Collaborative Approach
-------------------------------------------------------------------
Issues and Future Directions in Traffic Classification
-------------------------------------------------------------------
Moving 2 Mishap: M2M’s Impact on Privacy and Safety
Packet-Hiding Methods for Preventing Selective Jamming Attacks Power. Law.
-------------------------------------------------------------------
Security Challenges for the Public Cloud
-------------------------------------------------------------------
Silver Bullet Talks with Deborah Frincke
-------------------------------------------------------------------
Systematic Structural Testing of Firewall Policies
-------------------------------------------------------------------
Logical Data models for cloud computing architectures
-------------------------------------------------------------------
Radar Image Processing with Clusters of Computers.
-------------------------------------------------------------------
Reducing DRAM Image Data Access Energy Consumption in Video Processing.
-------------------------------------------------------------------
Run length-Based Processing Methods for Low Bit-depth Images.
-------------------------------------------------------------------
Select Trends in Image, Video, and Multidimensional Signal Processing.
-------------------------------------------------------------------
Shape-Based Hand Recognition.
-------------------------------------------------------------------
The Past, Present, and Future of Image and Multidimensional Signal Processing.
-------------------------------------------------------------------
Toward a Unified Color Space for Perception-Based Image Processing.
-------------------------------------------------------------------
Video Image Processing with the Sonic Architecture.
-------------------------------------------------------------------
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing
-------------------------------------------------------------------
Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
-------------------------------------------------------------------
Bounding the Impact of Unbounded Attacks in Stabilization
Cut Detection in Wireless Sensor Networks
-------------------------------------------------------------------
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
-------------------------------------------------------------------
Capacity of Data Collection in Arbitrary Wireless Sensor Networks
-------------------------------------------------------------------
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
-------------------------------------------------------------------
Scalable Learning of Collective Behavior
-------------------------------------------------------------------
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
-------------------------------------------------------------------
Cooperative Density Estimation in Random Wireless Ad Hoc Networks -------------------------------------------------------------------
Distributed Private Key Generation for Identity Based Cryptosystems in Ad Hoc Networks -------------------------------------------------------------------
DSDMAC: Dual Sensing Directional MAC Protocol for Ad Hoc Networks with Directional Antennas
Automatic Error Analysis Using Intervals.
-------------------------------------------------------------------
Focus on Your Job Search IEEE.
-------------------------------------------------------------------
CAP and Cloud Data Management .
Clouds Meet Agents toward intelligent cloud services
Digging Into Data.
-------------------------------------------------------------------
Environmental Modeling for Automated Cloud Application Testing.
-------------------------------------------------------------------
Logical Data Models For Cloud Computing Architectures.
-------------------------------------------------------------------
Payments For Outsourced Computations.
-------------------------------------------------------------------
Rise And Fall of the Peer-To-Peer Empire.
-------------------------------------------------------------------
Security Challenges For the Public Cloud.
-------------------------------------------------------------------
The Future of Authentication.
-------------------------------------------------------------------
Cloud Computing Security From Single to Multi-Clouds
-------------------------------------------------------------------
A Mining Technique Using n-Grams and Motion Transcripts for Body Sensor Network Data Repository
-------------------------------------------------------------------
Bridging Social and Data Networks
-------------------------------------------------------------------
Routing in pocket switched networks
-------------------------------------------------------------------
Guest Editorial Introduction to the Special Section: 4G Health—The Long-Term Evolution of m-Health
-------------------------------------------------------------------
Smooth Trade-Offs between Throughput and Delay in Mobile Ad Hoc Networks
-------------------------------------------------------------------
FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks
-------------------------------------------------------------------
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network
-------------------------------------------------------------------
Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols
-------------------------------------------------------------------
A Trigger Identification Service for Defending Reactive Jammers in WSN
-------------------------------------------------------------------
Cloud Data Protection for the Masses
-------------------------------------------------------------------
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
-------------------------------------------------------------------
Payments for Outsourced Computations
-------------------------------------------------------------------
Efficient Server Provisioning with Control for End-to-End Response Time Guarantee on Multitier Clusters
-------------------------------------------------------------------
Autonomic Placement of Mixed Batch and Transactional Workloads
-------------------------------------------------------------------
Efficient Master/Worker Parallel Discrete Event Simulation on Meta computing Systems
-------------------------------------------------------------------
Comparison-Based System- Level Fault Diagnosis: A Neural Network Approach
-------------------------------------------------------------------
A Symmetric Load Balancing Algorithm with Performance Guarantees for Distributed Hash Tables
-------------------------------------------------------------------
An Online Data Access Prediction and Optimization Approach for Distributed System
-------------------------------------------------------------------
Exploring Peer-to-Peer Locality in Multiple Torrent Environment
-------------------------------------------------------------------
Scalable Real-Time Monitoring Distributed Applications
-------------------------------------------------------------------
A Distributed Control Law for Load Balancing in Content Delivery Networks
-------------------------------------------------------------------
On Optimizing Overlay Unstructured Peer-to-Peer Networks
-------------------------------------------------------------------
Scalable Feedback Aggregating (SFA) Overlay for Large-scale P2P Trust Management
-------------------------------------------------------------------
Load Balance with Imperfect Information in Structured Peer-to-Peer Systems
-------------------------------------------------------------------
On the Robustness of BitTorrent Swarms to Greedy Peers
-------------------------------------------------------------------
Effective Delay-Controlled Load Distribution over Multipath Networks
-------------------------------------------------------------------
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
-------------------------------------------------------------------
Node Reclamation and Replacement for Long-lived Sensor Networks
-------------------------------------------------------------------
Energy Efficient Opportunistic Routing in Wireless Sensor Networks
-------------------------------------------------------------------
Efficient Fuzzy Type-Ahead Search in XML Data
-------------------------------------------------------------------
Creating Evolving User Behavior Profiles Automatically
-------------------------------------------------------------------
Incentive Compatible Privacy- Preserving Data Analysis
-------------------------------------------------------------------
Evaluating Path Queries over Frequently Updated Route collections.
-------------------------------------------------------------------
A User-friendly Patent Search Paradigm
-------------------------------------------------------------------
A Context based Word Indexing Model for Document Summarization
-------------------------------------------------------------------
Document Clustering in Correlation Similarity Measure Space
-------------------------------------------------------------------
Scalable Learning of Collective Behavior
-------------------------------------------------------------------
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
-------------------------------------------------------------------
Improving Aggregate Recommendation Diversity using Ranking Based Techniques
-------------------------------------------------------------------
Falcons Concept Search: A Practical Search Engine for Web Ontologies
-------------------------------------------------------------------
Privacy-Preserving Updates to Anonymous and Confidential Databases
-------------------------------------------------------------------
Intertemporal Discount Factors as a Measure of Trustworthiness in Electronic Commerce
-------------------------------------------------------------------
On the Security and Efficiency of Content Distribution via Network Coding
-------------------------------------------------------------------
Risk-Aware Mitigation for MANET Routing Attacks
-------------------------------------------------------------------
Detecting Anomalous Insiders in Collaborative Information Systems
-------------------------------------------------------------------
Remote Attestation with Domain-Based Integrity Model and Policy Analysis
-------------------------------------------------------------------
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals
-------------------------------------------------------------------
Secure Failure Detection and Consensus in Trusted Pals
-------------------------------------------------------------------
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
-------------------------------------------------------------------
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
-------------------------------------------------------------------
A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning
-------------------------------------------------------------------
Modeling and Detection of Camouflaging Worm
-------------------------------------------------------------------
Towards Situational Awareness of Large-Scale Botnet Probing Events
-------------------------------------------------------------------
A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments
-------------------------------------------------------------------
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
-------------------------------------------------------------------
THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
-------------------------------------------------------------------
Toward Secure and Dependable Storage Services in Cloud Computing
-------------------------------------------------------------------
Multicloud Deployment of Computing Clusters for Loosely Coupled MTC Applications
-------------------------------------------------------------------
Collaborative Writing Support Tools on the Cloud
-------------------------------------------------------------------
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
-------------------------------------------------------------------
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
-------------------------------------------------------------------
On the Cost of Knowledge of Mobility in Dynamic Networks:An Information-Theoretic Approach
-------------------------------------------------------------------
Approximation Algorithms for Data Broadcast in Wireless Networks
-------------------------------------------------------------------
Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
-------------------------------------------------------------------
Information Dissemination between Mobile Nodes for Collaborative Context Awareness
-------------------------------------------------------------------
Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
-------------------------------------------------------------------
Secured Trust: A Dynamic Trust Computation Model for Secured Communication in Multi agent Systems
-------------------------------------------------------------------
Online System for Grid Resource Monitoring and Machine Learning-Based Prediction
-------------------------------------------------------------------
Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme
-------------------------------------------------------------------
Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids
-------------------------------------------------------------------
Expanding Service Capacities and Increasing Service Reliabilities for the Grid-Based Utility Computing
-------------------------------------------------------------------
Efficient Genre-Specific Semantic Video Indexing
-------------------------------------------------------------------
Toward P2P-Based Multimedia Sharing in User Generated Contents
-------------------------------------------------------------------
Multiple Description of Coded Video for Path Diversity Streaming Adaptation
-------------------------------------------------------------------
Video Streaming Distribution in VANETs
-------------------------------------------------------------------
A Survey on Visual Content-Based Video Indexing and Retrieval
-------------------------------------------------------------------
Concept-Driven Multi-Modality Fusion for Video Search
-------------------------------------------------------------------
Dynamic Resource Allocation for Parallel Data Processing
in the Cloud
-------------------------------------------------------------------
Dynamic Search Algorithm In Unstructured P2P Networks
-------------------------------------------------------------------
Client-Server Communication Using Multi-Tasking Sockets.
-------------------------------------------------------------------
On-Line Data Transmission Based On Realistic Topologies.
-------------------------------------------------------------------
Efficient Data Transfer Using TCP/IP.
-------------------------------------------------------------------
Analyzing The TCP/IP Performance In Mix Networks
-------------------------------------------------------------------
Enterprise Hazard Management
-------------------------------------------------------------------
SMS Hiding Using Graphical Password
-------------------------------------------------------------------
Personal Expense tracker in android mobile
-------------------------------------------------------------------
GPS based location tracking in cell phone
-------------------------------------------------------------------
Mobile Payment using PayPal and Android
-------------------------------------------------------------------
Discriminating DDOS Attacks From Flash Crowds Using Flow Correlation Coefficient
-------------------------------------------------------------------
Precise, Scalable, And Online Request Tracing For Multitier Services Of Black Boxes
-------------------------------------------------------------------
Balancing The Trade-Offs Between Query Delay And Data between data Availability In Manets
-------------------------------------------------------------------
User-level implementations Of read-copy update
-------------------------------------------------------------------
Measurouting: A Framework For Routing Assisted Traffic Monitoring
-------------------------------------------------------------------
Optimal Construction Of All Shortest Node_Disjoint Paths In Hypercubes
-------------------------------------------------------------------
On Multicopy Opportunistic Forwarding Protocols In Nondeterministic Delay Tolerant Networks
-------------------------------------------------------------------
Ccd: A Distributed Publish/Subscribe Framework For Rich Content Formats
-------------------------------------------------------------------
Compression Of View On Anonymous Networks
-------------------------------------------------------------------
A Framework For Routing Performance Analysis In Delay Tolerant Networks With Application To Noncooperative Networks
-------------------------------------------------------------------
Receiving Buffer Adaptation For High-Speed Data Transfer
-------------------------------------------------------------------
Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks
-------------------------------------------------------------------
Toward Efficient and Simplified Distributed Data Intensive Computing
-------------------------------------------------------------------
Measuring Client-Perceived Page view Response Time of Internet Services
-------------------------------------------------------------------
A Distributed Algorithm for the Replica Placement Problem
-------------------------------------------------------------------
Quasi-Kautz Digraphs for Peer-to-Peer Networks
-------------------------------------------------------------------
The Small World of File Sharing
-------------------------------------------------------------------
Generalized probabilistic flooding in unstructured peer-to-peer networks
-------------------------------------------------------------------
Trace back of DDoS Attacks Using Entropy Variations
-------------------------------------------------------------------
On the Cost of Network Inference Mechanisms
-------------------------------------------------------------------
A Probabilistic Scheme For Keyword-Based Incremental Query Construction
-------------------------------------------------------------------
Continuous Top-K Dominating Queries
-------------------------------------------------------------------
A query formulation language For the data web
-------------------------------------------------------------------
A Unified Probabilistic Framework For Name Disambiguation In Digital Library
-------------------------------------------------------------------
Using Rule Ontology In Repeated Rule Acquisition From Similar Web Sites
-------------------------------------------------------------------
Scalable Scheduling Of Updates In Streaming Data Warehouses
-------------------------------------------------------------------
Achieving Data Privacy Through Secrecy Views And Null-Based Virtual Updates
-------------------------------------------------------------------
Multiparty Access Control For Online Social Networks: Model And Mechanisms
-------------------------------------------------------------------
Automatic Discovery of Personal Name Aliases from the Web
-------------------------------------------------------------------
Efficient Keyword-Based Search for Top-K Cells in Text Cube
-------------------------------------------------------------------
SPARK2: Top-k Keyword Query in Relational Databases
-------------------------------------------------------------------
Data mining for XML query- answering support
-------------------------------------------------------------------
On Computing Farthest Dominated Locations
-------------------------------------------------------------------
Performance Modeling And Analysis Of Network Firewalls
-------------------------------------------------------------------
Revisiting Defenses Against Large-Scale Online Password Guessing Attacks
-------------------------------------------------------------------
-------------------------------------------------------------------
M-Score: A Misuseability Weight Measure
-------------------------------------------------------------------
Recommendation Models For Open Authorization
-------------------------------------------------------------------
Improving Security and Efficiency in Attribute-Based Data Sharing
-------------------------------------------------------------------
A New Chaos-Based Crypto system for Secure Transmitted Images
-------------------------------------------------------------------
CASTLE: Continuously Anonymizing Data Streams
-------------------------------------------------------------------
Hasbe: A Hierarchical Attribute- Based Solution For Flexible And Scalable Access Control In Cloud Computing
-------------------------------------------------------------------
Enhanced privacy id: a direct Anonymous attestation scheme with enhanced revocation capabilities
-------------------------------------------------------------------
Secure Data Forwarding
-------------------------------------------------------------------
Trustworthy Coordination Of Web Services Atomic Transactions
-------------------------------------------------------------------
Optimization Of Resource Provisioning Cost In Cloud Computing
-------------------------------------------------------------------
EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science Course
-------------------------------------------------------------------
A Data Throughput Prediction and Optimization Service for Widely DistributedMany-Task Computing
-------------------------------------------------------------------
Optimal service pricing for a cloud cache
-------------------------------------------------------------------
Work Item Tagging: Communicating Concerns In Collaborative Software Development
-------------------------------------------------------------------
Resource Management For Complex, Dynamic Environments
-------------------------------------------------------------------
Exploiting The Essential Assumptions Of Analogy-Based Effort Estimation
-------------------------------------------------------------------
Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
-------------------------------------------------------------------
Removing Boundary Artifacts
For Real-Time Iterated Shrinkage Deconvolution
-------------------------------------------------------------------
Scalable Coding Of Encrypted Images
-------------------------------------------------------------------
Real time artifact-free image up scaling
-------------------------------------------------------------------
Fuzzy Random Impulse Noise Removal From Color Image Sequences
-------------------------------------------------------------------
On Reliable Broadcast In Low Duty-Cycle Wireless Sensor Networks
-------------------------------------------------------------------
Moderated Group Authoring System For Campus-Wide Workgroups
-------------------------------------------------------------------
Smooth Trade-Offs Between Throughput And Delay In Mobile Ad Hoc Networks
-------------------------------------------------------------------
Toward Reliable Data Delivery For Highly Dynamic Mobile Ad Hoc Networks
-------------------------------------------------------------------
Energy-Efficient Strategies for Cooperative Multi-Channel MAC Protocols
-------------------------------------------------------------------
Measurement-awaremonitor placement and routing: a joint optimization approach for Network-wide measurements
-------------------------------------------------------------------
Detecting And Resolving Firewall Policy Anomalies
-------------------------------------------------------------------
Efficiently Acquiring Communication Traces for Large -Scale Parallel Applications
-------------------------------------------------------------------
Prototype-Based Image Search Reranking
-------------------------------------------------------------------
Privacy Enabled Digital Rights I Management Without Trusted Third Party Assumption
-------------------------------------------------------------------
Aesthetics-Based Stereoscopic Photo Cropping For Heterogeneous Displays
-------------------------------------------------------------------
Tag Tagging: Towards More Descriptive Keywords of Image Content
-------------------------------------------------------------------
A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm
-------------------------------------------------------------------
No comments:
Post a Comment