Professional Documents
Culture Documents
3. A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
6. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
8. Attribute Based Access Control With Based Access Control With Constant Size Cipher Text in Cloud
Computing
10. Authenticated Key Exchange Protocols for Parallel Network File Systems
11. Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images
12. Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
14. BRACER A Distributed Broadcast Protocol in Multi-Hop Cognitive Radio Ad Hoc Networks
16. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment
Model
17. Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization
18. Continuous and Transparent User Identity Verification for Secure Internet Services
23. DROPS Division and Replication of Data in Cloud for Optimal Performance and Security
26. EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval
28. Face Recognition Across NonUniform Motion Blur, Illumination, and Pose
32. Head Pose Estimation From a 2D Face Image Using 3D Face Morphing With Depth Parameters
34. IncreSTS Towards Real-Time Incremental Short Text Summarization on Comment Streams from Social
Network Services
35. Integrated Foreground Segmentation and Boundary Matting for Live Videos
36. Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography
38. Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor
Networks
39. OPoR Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
41. Passive IP Traceback Disclosing the Locations of IP Spoofers from Path Backscatter
42. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
50. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
1. A Scalable and Reliable Matching Service for Content-Based Publish Subscribe Systems
3. Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features
4. Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid A
Feasibility Study
5. Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless
Networks
6. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind
Storage
8. Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File
Sharing
11. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
12. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
13. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
15. A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
16. A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
18. Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization
19. Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks
21. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks
22. Authenticated Key Exchange Protocols for Parallel Network File Systems
25. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
27. EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval
28. Face Recognition Across NonUniform Motion Blur, Illumination, and Pose
31. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
38. DROPS Division and Replication of Data in Cloud for Optimal Performance and Security
39. Energy-aware Load Balancing and Application scaling for the Cloud Ecosystem
40. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment
Model
41. Towards Effective Bug Triage with Software Data Reduction Techniques
42. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
43. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
47. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
49. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
50. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
51. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
52. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained
Traffics