Professional Documents
Culture Documents
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Improving QoS in High-Speed Mobility Using Bandwidth Maps Channel Estimation for Opportunistic Spectrum Access Uniform and Random Sensing
Cloud Computing Security From Single to Multi-Clouds Cloud Chamber A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants Design and Implementation of a Secure Healthcare Social Cloud System Enhanced Energy-efficient Scheduling for Parallel Applications in Cloud Optical Networks for Grid and Cloud Computing Applications Revenue Management for Cloud Providers - A Policy-based Approach under Stochastic Demand SLA-based Optimization of Power and Migration Cost in Cloud Computing
Packet Hiding Method For Preventing Selective Jamming Attacks DoubleGuard: Detecting Intrusions in Multitier Web Applications Risk-Aware Mitigation for MANET Routing Attacks Ensuring Distributed Accountability for Data Sharing in the Cloud A Learning-Based Approach to Reactive Security Automated Security Test Generation with Formal Threat Models DoubleGuard Detecting Intrusions in Multitier Web Applications Enforcing Mandatory Access Control in Commodity OS to Disable Malware Large Margin Gaussian Mixture Models with Differential Privacy Secure Failure Detection and Consensus in TrustedPals
Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems Ranking Model Adaptation for Domain-Specific Search A Knowledge-Driven Approach to Activity Recognition in Smart Homes Data Mining for XML Query-Answering Support A Performance Anomaly Detection and Analysis Framework for DBMS Development
On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling Trustworthy Coordination of Web Services Atomic Transactions