A Cocktail Approach for Travel Package Recommendation
2. A Cross Layer Architecture for Multicast and Unicast Video Transmission in Mobile Broadband Networks 3. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree 4. A Dual Framework and Algorithms for Targeted Online Data Delivery 5. A Level Set Method for Image Segmentation in the Presence of Intensity in homogeneities with Application to MRI 6. A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX SystemsA New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems 7. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks 8. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding 9. A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks 10. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 11. A Study on Certificate Revocation in Mobile Ad Hoc Networks 12. A System to Filter Unwanted Messages from OSN User Walls 13. Advanced Routing Technology for Fast Internet Protocol Network Recovery 14. Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks 15. Always Acyclic Distributed Path Computation 16. AMES Cloud A Framework Of Adaptive Mobile Video Streaming And Efficient Social Video Sharing 17. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System 18. An Efficient Self-Organized Authentication and Key Management Scheme for Distributed Multihop Relay- Based IEEE 802.16 Networks 19. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences 20. Automatic Test Packet Generation 21. Autonomy Oriented Self-Equilibrium Routing Model in Traffic Networks 22. Bandwidth Estimation for IEEE 802-11-Based Ad Hoc Networks 23. BGP Churn Evolution A Perspective from the Core 24. BinRank Scaling Dynamic Authority-Based Search Using Materialized Subgraphs 25. BloomCast Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks 26. Catch Me If You Can Evaluating Android Anti Malware Against Transformation Attacks 27. Catching Packet Droppers and Modifiers in Wireless Sensor Networks 28. Closeness A New Privacy Measure for Data Publishing 29. CloudMoV Cloud based Mobile Social TV (2013) 30. 31. Clustering With Multi-Viewpoint Based Similarity Measure 31. Clustering With Multi-Viewpoint Based Similarity Measure 32. Collaborative Sensing to Improve Information Quality for Target Tracking in Wireless Sensor Networks 33. Comparable Entity Mining from Comparative Questions 34. Confucius A Tool Supporting Collaborative Scientific Workflow Composition 35. Cooperative Caching in Wireless P2P Networks Design, Implementation, and Evaluation 36. Cross Domain Privacy-Preserving Cooperative Firewall Optimization 37. Crowdsourcing Predictors of Behavioral Outcomes 38. Data Leakage Detection 39. Decision Trees for Uncertain Data 40. Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs 41. Design, Implementation, and Performance of a Load Balancer for SIP Server Clus 42. Detecting And Resolving Firewall Policy Anomalies 43. Detecting Malicious Packet Losses 44. Detecting Spam Zombies by Monitoring Outgoing Messages 45. Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ 46. Discovering Conditional Functional Dependencies 47. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 48. Distributed Cooperative Caching in Social Wireless Networks 49. Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems 50. Distributed Packet Buffers for High-Bandwidth Switches and Routers 51. Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service 52. Dynamic Routing with Security Considerations 53. Efficient and Privacy Aware Data Aggregation in Mobile Sensing 54. Efficient Broadcasting in Mobile Ad Hoc Networks 55. Efficient Public Key Certificate Management for Mobile Ad Hoc Networks 56. Energy Efficient Cooperative Videodistribution With Statistical Qosprovisions Over Wireless Networks 57. Ensuring Data Storage Security in Cloud Computing 58. Organizing User Search Histories 59. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains 60. Packet-Hiding Methods for Preventing Selective Jamming Attacks 61. Particle Swarm Optimization Technique, System and Challenges 62. Portable Cloud Services Using TOSCA 63. Privacy Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks 64. ProgME Towards Programmable Network Measurement 65. Providing Rate Guarantees for Internet Application Traffic across ATM Networks 66. Random Access Transport Capacity 67. RIHT A Novel Hybrid IP Traceback Scheme 68. Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding 69. Secure and Practical Outsourcing of Linear Programming in Cloud Computing 70. Security Analysis of the SASI Protocol 71. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks 72. Spatial Approximate String Search 73. Temporal Data Clustering Via Weighted Clustering Ensemble with Different Representations 74. Top k Query Result Completeness Verification in Tiered Sensor Networks 75. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks 76. Towards a Statistical Framework for Source Anonymity in Sensor Networks 77. Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks 78. Vampire attacks Draining life from wireless ad-hoc sensor networks 79. Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks 80. Wardrop Routing in Wireless Networks 81. Winds of Change From Vendor Lock-In to the Meta Cloud 82. XLP A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks 83. Sanskrit as a Programming Language and Natural Language Processing 84. An Approach for Recognizing Modi Lipi using Ostus Binarization Algorithm and Kohenen Neural Network 85. A group recommender for movies based on content similarity and popularity 86. A Cocktail Approach for Travel Package Recommendation 87.