Professional Documents
Culture Documents
N
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
26 27 28 29 30 31 32 33 34 35 36 37
Modeling And Detection Of Camouflaging Worm Monitoring Service Systems From A Language-Action Perspective One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases Nymble Blocking Misbehaving Users in Anonymizing Networks Data Integrity Proofs In Cloud Storage The World In A Nutshell: Concise Range Queries A Generic Multilevel Architecture For Time Series Prediction Intrusion detection: An Energy efficient approach in heterogeneous WSN NABS Novel Approaches for Biometric Systems A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification A Link Analysis Extension Of Correspondence
38 Analysis For Mining Relational Databases 39 40 41 42 43 44 45 46 47 48 49 50 A Dual Framework And Algorithms For Targeted Online Data Delivery Adaptive Cluster Distance Bounding For High-Dimensional Indexing Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Clustering with Multi- View Point Based Similarity Measure Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Going Back and Forth Efficient Multi deployment and Multi snap shutting on Clouds Secure and Practical Outsourcing of Linear Programming in Cloud Computing A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71
Extended XML Tree Pattern Matching: Theories and Algorithms Buffer Sizing for 802.11 Based Networks Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks Discovering Conditional Functional Dependencies Effective Navigation of Query Results Based on Concept Hierarchies Load Shedding in Mobile Systems with MobiQual Nymble: Blocking Misbehaving Users in Anonymizing Networks Ranking Spatial Data by Quality Preferences SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks Secure and Practical Outsourcing of Linear Programming in Cloud Computing Selfish Overlay Network Creation and Maintenance SPAF: Stateless FSA-based Packet Filters Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis A Query Formulation Language for the Data Web Automated Certification for Compliant Cloud-based Business Processes Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems The Geometric Efficient Matching Algorithm for Firewalls Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks Throughput Optimization in High Speed Downlink Packet Access
Year 2011/platform
JAVA .NET JAVA .NET JAVA .NET JAVA .NET JAVA .NET .NET JAVA .NET .NET JAVA .NET JAVA JAVA .NET JAVA .NET JAVA .NET .NET .NET
Domain
Networking Data Mining Networking Data Mining Networking Networking Networking Cloud Computing Networking Data Mining Data mining Networking Data mining Data Mining Network Security Secure Computing Network Network Data Mining Network Data Mining Data Mining Data Mining Data mining Data Mining
JAVA .NET .NET JAVA .NET .NET JAVA .NET .NET JAVA .NET .NET JAVA
Secure Computing Service Computing Data mining Network Software Engineering Data mining Data mining Network Security Secure Computing Data mining Data mining Data mining
Data mining JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA .NET JAVA Data mining Data mining Network Network Security Data mining Network Cloud Computing Cloud Computing Network Network Network MOBILE COMPUTING
JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA .NET .NET .NET .NET .NET .NET .NET JAVA JAVA
KNOWLEDGE AND DATA ENGINEERING NETWORKING NETWORKING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING SECURE COMPUTING KNOWLEDGE AND DATA ENGINEERING SECURE COMPUTING CLOUD COMPUTING NETWORKING NETWORKING Data Mining
Cloud Computing WIRELESS COMMUNICATIONS SECURE COMPUTING SECURE COMPUTING Network Network Network
S.N
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Year
2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net
22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
Effective Navigation of Query Results Based on Concept Hierarchies Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Integration Of Sound Signature In Graphical Password Authentication System Modeling And Detection Of Camouflaging Worm Monitoring Service Systems From A Language-Action Perspective One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases Nymble Blocking Misbehaving Users in Anonymizing Networks Data Integrity Proofs In Cloud Storage The World In A Nutshell: Concise Range Queries A Generic Multilevel Architecture For Time Series Prediction Intrusion detection: An Energy efficient approach in heterogeneous WSN NABS Novel Approaches for Biometric Systems A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification A Link Analysis Extension Of Correspondence
2011/J2EE 2011/ .Net 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net
38 Analysis For Mining Relational Databases 39 40 41 42 A Dual Framework And Algorithms For Targeted Online Data Delivery Adaptive Cluster Distance Bounding For High-Dimensional Indexing Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
2011/ Java
43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
Clustering with Multi- View Point Based Similarity Measure Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Going Back and Forth Efficient Multi deployment and Multi snap shutting on Clouds Secure and Practical Outsourcing of Linear Programming in Cloud Computing A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks Throughput Optimization in High Speed Downlink Packet Access Sketch4Match-Content Based Image Retrival System Using Sketches Embedded Extended Visual Cryptography Schemes A Competitive Study of Cryptography Techniques over Block Cipher Roboust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding Online Intrusion Alert Aggregation with Generative Data Stream Modeling A More Secure Steganography Method in Spatial Domain A User-oriented Image Retrieval System Based on Interactive Genetic Algorithm A Web Search Engine Based Approach to Measure Semantic Similarity Between Words Weighted Energy Detection for Noncoherent Ultra-Wideband Receiver Design Problems and Solutions of Web Search Engines Adaptive Cluster Distance Bounding for High Dimensional Indexing Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
2011/ Java
2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ .Net 2011/ .Net 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net
65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
Live Streaming with Receiver-based Peer-division Multiplex in Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection Secure High-Throughput Multicast Routing in Wireless Mesh Networks Optimal Stochastic Location Updates in Mobile Ad Hoc Network Throughput Optimization in Mobile Backbone Networks RITAS: Services for Randomized Intrusion Tolerance Selfish Overlay Network Creation and Maintenance Comparative Evaluation of Spoofing Defenses SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks Topological Transformation Approaches to TCAM-Based Packet Classification Ranking Spatial Data by Quality Preferences A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks Extended XML Tree Pattern Matching: Theories and Algorithms Buffer Sizing for 802.11 Based Networks Discovering Conditional Functional Dependencies Effective Navigation of Query Results Based on Concept Hierarchies Load Shedding in Mobile Systems with MobiQual SPAF: Stateless FSA-based Packet Filters Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis A Query Formulation Language for the Data Web Automated Certification for Compliant Cloud-based Business Processes Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
2011/ .Net 2011/ .Net 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/JAVA 2011/JAVA 2011/JAVA 2011/JAVA 2011/JAVA 2011/JAVA 2011/JAVA 2011/.NET 2011/.NET 2011/.NET 2011/.NET
87 88 89 90
The Geometric Efficient Matching Algorithm for Firewalls Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking Cloud Computing for Agent-Based Urban Transportation Systems ProgME: Towards Programmable Network Measurement
Domain
Networking Data Mining Networking Data Mining Networking Networking Networking Cloud Computing Networking Data Mining Data mining Networking Data mining Data Mining Network Security Secure Computing Network Network Data Mining Network Data Mining
Data Mining Data Mining Data mining Data Mining Secure Computing Service Computing Data mining Network Software Engineering Data mining Data mining Network Security Secure Computing Data mining Data mining Data mining
Data mining
Data mining Network Cloud Computing Cloud Computing Network Network Network Network Network Network Image Processing Secure Computing Secure Computing Multimedia Network Security Secure Computing Image Processing Data Mining Network Web Mining Data Mining Network
Network Network Mobile Computing Mobile Computing Mobile Computing Network Security Network Network Security Network Security Network Data Mining MOBILE COMPUTING KNOWLEDGE AND DATA ENGINEERING NETWORKING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING NETWORKING Data Mining