You are on page 1of 8

Domain 1 A Flexible Privacy-Enhanced Location-Based Services System Framework and .

Practice 2 A New Reliable Broadcasting in Mobile Ad Hoc Networks . 3 A Novel Approach for Computation-Efficient Rekeying for Multicast Key . Distribution 4 Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and . Videos 5 Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with . Unknown Dead Zones and Control Directions 6 Agent Mining: The Synergy of Agents and Data Mining . 7 An Efficient Authentication Scheme for Digital Credentials . 8 Anonymity in Wireless Broadcast Networks . 9 Approximate Distributed K-Means Clustering over a Peer-to-Peer Network . 1 Capturing Router Congestion and Delay 0 . 1 Channel Access Protocols for Multihop Opportunistic Networks, Challenges 1 and Recent Developments . 1 CHARMY: A 2 Specifications . Framework for Designing and Verifying Architectural Mobile Computing Network Security Network Security Image Processing Neural Networks Intelligent Systems Network Security Network Security Knowledge and Data Engineering Networking 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009

Networking

2009

Software Engineering

2009

1 Coalition Games with Cooperative Transmission A Cure for the Curse of 3 Boundary . 1 Collusive piracy prevention in P2P content delivery network 4 . 1 Contention-Aware Performance Analysis of Mobility-Assisted Routing 5 . 1 Continuous Flow Wireless Data Broadcasting for High Speed Environments 6 . 1 Detecting Malicious Packet Losses 7 . 1 Dynamic Routing with Security Considerations 8 . 1 EARQ: Energy Aware Routing for Real-Time and Reliable Communication in 9 Wireless Industrial Sensor Networks . 2 Entropy Based Adaptive Flow Aggregation 0 .

Communications

2009

Computers

2009

Mobile Computing

2009

Broadcasting

2009

Parallel and Distributed Systems Parallel and Distributed Systems Industrial Informatics

2009

2009

2009

Networking

2009

2 Evaluating the Vulnerability of Network Traffic Using Joint 1 . 2 Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing 2 . 2 Generalized Sequence-Based 3 Broadcasting Hot Videos . and Reverse Sequence-Based Models for

Dependable and Secure Computing Dependable and Secure Computing Multimedia

2009

2009

2009

2 Hierarchical Bayesian sparse image reconstruction with application to MRFM 4 . 2 Measuring Capacity Bandwidth of Targeted Path Segments 5 . 2 Monitoring the Application-Layer DDoS Attacks for Popular Websites 6 . 2 Multiple Routing Configurations for Fast IP Network Recovery 7 . 2 Multi-Service Load Sharing for Resource Management in the CellularWLAN 8 Integrated Network . 2 Node Isolation model and age-based neighbor selection in unstructured P2P 9 networks . 3 Novel Packet-Level Resource Allocation with Effective QOS Provisioning for 0 Wireless Mesh Networks . 3 OLEX : Effective Rule Learning for Text Categorization 1 . 3 Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio 2 Networks . 3 RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc 3 Networks . 3 Robust cooperative routing protocol in mobile wireless sensor networks 4 . 3 Security Analysis of the SASI Protocol 5 . 3 SIMPS Using Sociology for Personal Mobility 6 . 3 Single-Symbol ML Decodable 7 Cooperative Networks . Distributed STBCs for Partially-Coherent

Image Processing

2009

Networking

2009

Networking

2009

Networking

2009

Wireless Communications Networking

2009

2009

Wireless Communications Knowledge and Data Engineering Mobile Computing

2009

2009

2009

Mobile Computing

2009

Wireless Communications Dependable and Secure Computing Networking

2009

2009

2009

Wireless Communications Networking

2009

3 Spatio-Temporal Network Anomaly Detection by Assessing Deviations of 8 Empirical Measures . 3 SIR analysis and interference Cancellation in Uplink OFDMA with Large 9 Carrier Frequency Timing offsets . 4 A Distributed Stream Query 0 Planning and Deployment . Optimization Framework through Integrated

2009

Wireless Communications Distributed Computing Mobile Computing

2009

2009

4 Continuous Monitoring of Spatial Queries in Wireless Broadcast

2009

4 Energy Maps For Mobile Wireless networks coherence Time Versus Spreading 2 Period . 4 Energy-Efficient SINR-Based Routing for Multihop Wireless 3 . 4 Large Connectivity for Dynamic Random Geometric Graphs 4 . 4 Mitigation of Control Channel Jamming Under Node Capture Attacks 5 . 4 Mobility Management Approaches for Mobile IP Networks 6 . 4 Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks 7 . 4 A Geometric Approach to Improving Active Packet Loss Measurement 8 . 4 A Signature-Based Indexing Method for Efficient Content-Based Retrieval of 9 Relative Temporal Pattern . 5 A Survey of Learning-Based Techniques of Email Spam Filtering 0 . 5 A Tree-Based Peer-to-Peer Network with Quality Guarantees 1 . 5 An Efficient Association Rule Mining Algorithm In Distributed Databases 2 . 5 An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic 3 Analysis . 5 Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless 4 . 5 Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks 5 . 5 BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure6 Independent Botnet Detection . 5 Computation Efficient Multicast Key Distribution 7 . 5 Controlling IP Spoofing Through Inter Domain Packet Filters 8 . 5 Distributed Suffix Tree Overlay for Peer-to-Peer Search 9 . 6 Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion 0 . 6 Efficient and Secure Content Processing and Distribution by Cooperative 1 Intermediaries . 6 Enhanced Communal Global, Local 2 Performance of Cluster Computing Memory Management for Effective

Mobile Computing

2009

Mobile Computing

2009

Mobile Computing

2009

Mobile Computing

2009

Mobile Computing

2009

Network Computing

2009

Networking

2008

Knowledge and Data Engineering Neural Networks

2008

2008

Parallel and Distributed Systems Knowledge Discovery and Data Mining Knowledge Discovery and Data Mining Mobile Computing

2008

2008

2008

2008

Mobile Computing

2008

Data Mining

2008

Parallel and Distributed Systems Dependable and Secure Computing Knowledge and Data Engineering Networking

2008

2008

2008

2008

Parallel and Distributed Systems Network Security

2008

2008

6 High multiplicity scheduling of file transfers with divisible sizes of multiple 3 classes of paths . 6 Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing 4 protocol . 6 Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor 5 Networks . 6 Location-based Spatial Queries with Data Sharing in Wireless Broadcast 6 Environments . 6 Minimizing File Download Time in Stochastic Peer-to-Peer Networks 7 . 6 Packet caches on Routers the Implications of Universal Redundant Traffic 8 Elimination . 6 Peertalk a Peer-to-Peer Multi-Party Voice-Over-IP System 9 . 7 Performance of a Speculative Transmission Scheme for Scheduling-Latency 0 Reduction . 7 Probabilistic Group Nearest Neighbor Queries in Uncertain Databases 1 . 7 Protection of Database Security via Collaborative Inference Detection 2 . 7 Provable Protection against Web Application Vulnerabilities related to Session 3 Data Dependencies . 7 QUIVER Consistent Object Sharing For Edge Services 4 . 7 The Server Reassignment Problem for Load Balancing in Structured P2P 5 Systems . 7 Truth Discovery with multiple Conflicting Information Providers on web 6 . 7 BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc 7 Networks . 7 Modeling & Automated Containment of Worms 8 . 7 Online Index Recommendations for High-Dimensional Databases Using Query 9 Workloads . 8 Rate & Delay Guarantees Provided By Close Packet Switches with Load 0 Balancing . 8 Scalable and Efficient End-To-End Network Topology Inference 1 . 8 Securing User-Controlled Routing Infrastructures 2 . 8 Two Techniques for Fast Computation of Constrained Shortest Paths 3

Consumer Electronics

2008

Computer and Communication Engineering Mobile Computing

2008

2008

Data Engineering

2008

Networking

2008

Networking

2008

Parallel and Distributed Systems Networking

2008

2008

Knowledge and Data Engineering Intelligence and Security Informatics Software Systems for Secure Systems Parallel and Distributed Systems Parallel and Distributed Systems Knowledge and Data Engineering Network Computing

2008

2008

2008

2008

2008

2008

2008

Secure Computing

2008

Data Mining

2008

Network Computing

2008

Network Computing

2008

Network Computing

2008

Network Computing

2008

8 A Fully Distributed Proactively Secure Threshold-Multisignature Scheme 4 . 8 A New Operational Transformation Framework for Real-Time Group Editors 5 . 8 A Self Repairing Tree Topology Enabling Content based Routing in Mobile Ad 6 Hoc Networks . 8 An Acknowledgment-based Approach for the Detection of Routing Misbehavior 7 in MANETs . 8 An Adaptive Programming Model for Fault Tolerant Distributed Computing 8 . 8 An Agent based Intrusion Detection, Response and Blocking using signature 9 Method in Active Net . 9 Elliptic Curve Cryptography based Threshold Cryptography Implementation for 0 MANETs . 9 Hybrid Intrusion Detection 1 Anomalous Internet Episodes . with Weighted Signature Generation over

Parallel and Distributed Systems Parallel and Distributed Systems Mobile Computing

2007

2007

2007

Mobile Computing

2007

Dependable and Secure Computing Machine Learning and Cybernetics Computer Science & Network Security Dependable and Secure Computing Intelligent and Advanced Systems

2007

2007

2007

2007

9 Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm 2 . 9 Retrieving Files using Content based Searching & Displaying them in a 3 Carousel View . 9 A near-optimal multicast scheme for mobile ad hoc networks using a hybrid 4 genetic algorithm . 9 A Wireless Distributed Intrusion Detection System and a New Attack Model 5 . 9 Image Transformation using Grid 6 . 9 Network Topology against Distributed Denial of Service Attacks DDOS 7 . 9 An Agent Based Intrusion Detection, Response and Blocking using signature 8 method in Active Networks . 9 A Location-Based Routing Method for Mobile Ad Hoc Networks 9 . 1 Benefit based Data Caching in Ad Hoc Networks 0 0 . 1 Building Intelligent Shopping Assistants Using Individual Consumer Models 0 1 . 1 Distributed Cache Updating for the Dynamic Source Routing Protocol 0 2

2007

2007

Networking

2006

Computers and Communications Image Processing

2006

2006

Information Forensics and Security Network Computing

2006

2006

Mobile Computing

2005

Mobile Computing

2005

Datamining

2005

Mobile Computing

2005

1 E-Secure Transactions - Secure Electronic Data Interchange over Internet 0 3 . 1 Face Recognition using Laplacian Faces 0 4 . 1 Location based Service Routing 0 5 . 1 A Memory Learning Framework for Effective Image Retrieval 0 6 . 1 GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web 0 Transactions 7 . 1 A Distributed Database Architecture for Global Roaming in Next-Generation 0 Mobile Networks 8 . 1 A Novel Secure Communication Protocol for Ad Hoc Networks [SCP] 0 9 . 1 Application of BPCS steganography to wavelet compressed video 1 0 . 1 Incremental deployment service of Hop by hop multicast routing protocol 1 1 . 1 Mobile Objects and Mobile Agents: The Future of Distributed Computing 1 2 . 1 Network Border Patrol For Congestion Collapse Preventing 1 3 . 1 ODAM An Optimized Distributed Association Rule Mining Algorithm 1 4 . 1 Online Handwritten Script Recognition 1 5 . 1 Scalable Wireless Adapt Network Simulator Using XTC 1 6 . 1 Slow Start Algorithm Improvement of TCP Performance 1 7 . 1 Identification of Humans Using Gait 1

Internet Computing

2005

Pattern Analysis and Machine Intelligence

2005

2005

Image Processing

2005

Data Mining

2005

Networking

2004

Mobile Computing

2004

Image Processing

2004

Networking

2004

Distributed Computing

2004

Networking

2004

Distributed Systems

2004

Pattern Analysis and Machine Intelligence

2004

Mobile Computing

2004

Mobile Computing

2004

Image Processing

2004

1 A Reputation based Trust Model for Peer to Peer E - Commerce Communities 1 9 . 1 Authenticating Network Attached Storage 2 0 . 1 Modeling Peer-Peer File Sharing Systems 2 1 . 1 Noise Reduction by Fuzzy Image Filtering 2 2 . 1 Structure & Texture Filling-In 2 Transmission & Compress 3 . of Missing Image Blocks in Wireless

E-Commerce Technology

2003

Network & Distributed System

2003

Web Intelligence

2003

Fuzzy Systems

2003

Image Processing

2003

1 TCP-LP Low-Priority Service via End-Point Congestion Control 2 4 . 1 Unified Network Monitoring For Web Technology 2 5 . 1 Personal Identification Based On Iris Texture Analysis 2 6 . 1 AI NET - A network that integrates ATM and IP 2 7 . 1 Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups 2 8 . 1 Dynamic Parallel Access to Replicated Content in the Internet 2 9 . 1 ITP: An Image Transport Protocol for the Internet 3 0 . 1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks 3 1 . 1 A Software Defect Report and Tracking System in an Intranet 3 2 . 1 Distributed Data Mining in Credit Card Fraud Detection 3 3 .

Networking

2003

Web Technology

2003

Image Processing

2003

Networking

2002

Networking

2002

Networking

2002

Networking

2002

Wireless Networks

2000

Software Maintenance and Reengineering

Datamining & Intelligent Systems

1 E Logistics for Warehouse Management Implementation of Authenticated and 3 Dynamic Logistics Support System & Management 4 . 1 Secured Password Based Protocol For Downloading A Private Key 3 5 . 1 Towards Multimodal Interfaces for Intrusion Detection 3 6 .

Innovative Computing

Network and Distributed System

Computer networks

You might also like