Professional Documents
Culture Documents
Practice 2 A New Reliable Broadcasting in Mobile Ad Hoc Networks . 3 A Novel Approach for Computation-Efficient Rekeying for Multicast Key . Distribution 4 Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and . Videos 5 Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with . Unknown Dead Zones and Control Directions 6 Agent Mining: The Synergy of Agents and Data Mining . 7 An Efficient Authentication Scheme for Digital Credentials . 8 Anonymity in Wireless Broadcast Networks . 9 Approximate Distributed K-Means Clustering over a Peer-to-Peer Network . 1 Capturing Router Congestion and Delay 0 . 1 Channel Access Protocols for Multihop Opportunistic Networks, Challenges 1 and Recent Developments . 1 CHARMY: A 2 Specifications . Framework for Designing and Verifying Architectural Mobile Computing Network Security Network Security Image Processing Neural Networks Intelligent Systems Network Security Network Security Knowledge and Data Engineering Networking 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009
Networking
2009
Software Engineering
2009
1 Coalition Games with Cooperative Transmission A Cure for the Curse of 3 Boundary . 1 Collusive piracy prevention in P2P content delivery network 4 . 1 Contention-Aware Performance Analysis of Mobility-Assisted Routing 5 . 1 Continuous Flow Wireless Data Broadcasting for High Speed Environments 6 . 1 Detecting Malicious Packet Losses 7 . 1 Dynamic Routing with Security Considerations 8 . 1 EARQ: Energy Aware Routing for Real-Time and Reliable Communication in 9 Wireless Industrial Sensor Networks . 2 Entropy Based Adaptive Flow Aggregation 0 .
Communications
2009
Computers
2009
Mobile Computing
2009
Broadcasting
2009
Parallel and Distributed Systems Parallel and Distributed Systems Industrial Informatics
2009
2009
2009
Networking
2009
2 Evaluating the Vulnerability of Network Traffic Using Joint 1 . 2 Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing 2 . 2 Generalized Sequence-Based 3 Broadcasting Hot Videos . and Reverse Sequence-Based Models for
2009
2009
2009
2 Hierarchical Bayesian sparse image reconstruction with application to MRFM 4 . 2 Measuring Capacity Bandwidth of Targeted Path Segments 5 . 2 Monitoring the Application-Layer DDoS Attacks for Popular Websites 6 . 2 Multiple Routing Configurations for Fast IP Network Recovery 7 . 2 Multi-Service Load Sharing for Resource Management in the CellularWLAN 8 Integrated Network . 2 Node Isolation model and age-based neighbor selection in unstructured P2P 9 networks . 3 Novel Packet-Level Resource Allocation with Effective QOS Provisioning for 0 Wireless Mesh Networks . 3 OLEX : Effective Rule Learning for Text Categorization 1 . 3 Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio 2 Networks . 3 RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc 3 Networks . 3 Robust cooperative routing protocol in mobile wireless sensor networks 4 . 3 Security Analysis of the SASI Protocol 5 . 3 SIMPS Using Sociology for Personal Mobility 6 . 3 Single-Symbol ML Decodable 7 Cooperative Networks . Distributed STBCs for Partially-Coherent
Image Processing
2009
Networking
2009
Networking
2009
Networking
2009
2009
2009
2009
2009
2009
Mobile Computing
2009
2009
2009
2009
2009
3 Spatio-Temporal Network Anomaly Detection by Assessing Deviations of 8 Empirical Measures . 3 SIR analysis and interference Cancellation in Uplink OFDMA with Large 9 Carrier Frequency Timing offsets . 4 A Distributed Stream Query 0 Planning and Deployment . Optimization Framework through Integrated
2009
2009
2009
2009
4 Energy Maps For Mobile Wireless networks coherence Time Versus Spreading 2 Period . 4 Energy-Efficient SINR-Based Routing for Multihop Wireless 3 . 4 Large Connectivity for Dynamic Random Geometric Graphs 4 . 4 Mitigation of Control Channel Jamming Under Node Capture Attacks 5 . 4 Mobility Management Approaches for Mobile IP Networks 6 . 4 Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks 7 . 4 A Geometric Approach to Improving Active Packet Loss Measurement 8 . 4 A Signature-Based Indexing Method for Efficient Content-Based Retrieval of 9 Relative Temporal Pattern . 5 A Survey of Learning-Based Techniques of Email Spam Filtering 0 . 5 A Tree-Based Peer-to-Peer Network with Quality Guarantees 1 . 5 An Efficient Association Rule Mining Algorithm In Distributed Databases 2 . 5 An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic 3 Analysis . 5 Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless 4 . 5 Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks 5 . 5 BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure6 Independent Botnet Detection . 5 Computation Efficient Multicast Key Distribution 7 . 5 Controlling IP Spoofing Through Inter Domain Packet Filters 8 . 5 Distributed Suffix Tree Overlay for Peer-to-Peer Search 9 . 6 Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion 0 . 6 Efficient and Secure Content Processing and Distribution by Cooperative 1 Intermediaries . 6 Enhanced Communal Global, Local 2 Performance of Cluster Computing Memory Management for Effective
Mobile Computing
2009
Mobile Computing
2009
Mobile Computing
2009
Mobile Computing
2009
Mobile Computing
2009
Network Computing
2009
Networking
2008
2008
2008
Parallel and Distributed Systems Knowledge Discovery and Data Mining Knowledge Discovery and Data Mining Mobile Computing
2008
2008
2008
2008
Mobile Computing
2008
Data Mining
2008
Parallel and Distributed Systems Dependable and Secure Computing Knowledge and Data Engineering Networking
2008
2008
2008
2008
2008
2008
6 High multiplicity scheduling of file transfers with divisible sizes of multiple 3 classes of paths . 6 Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing 4 protocol . 6 Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor 5 Networks . 6 Location-based Spatial Queries with Data Sharing in Wireless Broadcast 6 Environments . 6 Minimizing File Download Time in Stochastic Peer-to-Peer Networks 7 . 6 Packet caches on Routers the Implications of Universal Redundant Traffic 8 Elimination . 6 Peertalk a Peer-to-Peer Multi-Party Voice-Over-IP System 9 . 7 Performance of a Speculative Transmission Scheme for Scheduling-Latency 0 Reduction . 7 Probabilistic Group Nearest Neighbor Queries in Uncertain Databases 1 . 7 Protection of Database Security via Collaborative Inference Detection 2 . 7 Provable Protection against Web Application Vulnerabilities related to Session 3 Data Dependencies . 7 QUIVER Consistent Object Sharing For Edge Services 4 . 7 The Server Reassignment Problem for Load Balancing in Structured P2P 5 Systems . 7 Truth Discovery with multiple Conflicting Information Providers on web 6 . 7 BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc 7 Networks . 7 Modeling & Automated Containment of Worms 8 . 7 Online Index Recommendations for High-Dimensional Databases Using Query 9 Workloads . 8 Rate & Delay Guarantees Provided By Close Packet Switches with Load 0 Balancing . 8 Scalable and Efficient End-To-End Network Topology Inference 1 . 8 Securing User-Controlled Routing Infrastructures 2 . 8 Two Techniques for Fast Computation of Constrained Shortest Paths 3
Consumer Electronics
2008
2008
2008
Data Engineering
2008
Networking
2008
Networking
2008
2008
2008
Knowledge and Data Engineering Intelligence and Security Informatics Software Systems for Secure Systems Parallel and Distributed Systems Parallel and Distributed Systems Knowledge and Data Engineering Network Computing
2008
2008
2008
2008
2008
2008
2008
Secure Computing
2008
Data Mining
2008
Network Computing
2008
Network Computing
2008
Network Computing
2008
Network Computing
2008
8 A Fully Distributed Proactively Secure Threshold-Multisignature Scheme 4 . 8 A New Operational Transformation Framework for Real-Time Group Editors 5 . 8 A Self Repairing Tree Topology Enabling Content based Routing in Mobile Ad 6 Hoc Networks . 8 An Acknowledgment-based Approach for the Detection of Routing Misbehavior 7 in MANETs . 8 An Adaptive Programming Model for Fault Tolerant Distributed Computing 8 . 8 An Agent based Intrusion Detection, Response and Blocking using signature 9 Method in Active Net . 9 Elliptic Curve Cryptography based Threshold Cryptography Implementation for 0 MANETs . 9 Hybrid Intrusion Detection 1 Anomalous Internet Episodes . with Weighted Signature Generation over
Parallel and Distributed Systems Parallel and Distributed Systems Mobile Computing
2007
2007
2007
Mobile Computing
2007
Dependable and Secure Computing Machine Learning and Cybernetics Computer Science & Network Security Dependable and Secure Computing Intelligent and Advanced Systems
2007
2007
2007
2007
9 Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm 2 . 9 Retrieving Files using Content based Searching & Displaying them in a 3 Carousel View . 9 A near-optimal multicast scheme for mobile ad hoc networks using a hybrid 4 genetic algorithm . 9 A Wireless Distributed Intrusion Detection System and a New Attack Model 5 . 9 Image Transformation using Grid 6 . 9 Network Topology against Distributed Denial of Service Attacks DDOS 7 . 9 An Agent Based Intrusion Detection, Response and Blocking using signature 8 method in Active Networks . 9 A Location-Based Routing Method for Mobile Ad Hoc Networks 9 . 1 Benefit based Data Caching in Ad Hoc Networks 0 0 . 1 Building Intelligent Shopping Assistants Using Individual Consumer Models 0 1 . 1 Distributed Cache Updating for the Dynamic Source Routing Protocol 0 2
2007
2007
Networking
2006
2006
2006
2006
2006
Mobile Computing
2005
Mobile Computing
2005
Datamining
2005
Mobile Computing
2005
1 E-Secure Transactions - Secure Electronic Data Interchange over Internet 0 3 . 1 Face Recognition using Laplacian Faces 0 4 . 1 Location based Service Routing 0 5 . 1 A Memory Learning Framework for Effective Image Retrieval 0 6 . 1 GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web 0 Transactions 7 . 1 A Distributed Database Architecture for Global Roaming in Next-Generation 0 Mobile Networks 8 . 1 A Novel Secure Communication Protocol for Ad Hoc Networks [SCP] 0 9 . 1 Application of BPCS steganography to wavelet compressed video 1 0 . 1 Incremental deployment service of Hop by hop multicast routing protocol 1 1 . 1 Mobile Objects and Mobile Agents: The Future of Distributed Computing 1 2 . 1 Network Border Patrol For Congestion Collapse Preventing 1 3 . 1 ODAM An Optimized Distributed Association Rule Mining Algorithm 1 4 . 1 Online Handwritten Script Recognition 1 5 . 1 Scalable Wireless Adapt Network Simulator Using XTC 1 6 . 1 Slow Start Algorithm Improvement of TCP Performance 1 7 . 1 Identification of Humans Using Gait 1
Internet Computing
2005
2005
2005
Image Processing
2005
Data Mining
2005
Networking
2004
Mobile Computing
2004
Image Processing
2004
Networking
2004
Distributed Computing
2004
Networking
2004
Distributed Systems
2004
2004
Mobile Computing
2004
Mobile Computing
2004
Image Processing
2004
1 A Reputation based Trust Model for Peer to Peer E - Commerce Communities 1 9 . 1 Authenticating Network Attached Storage 2 0 . 1 Modeling Peer-Peer File Sharing Systems 2 1 . 1 Noise Reduction by Fuzzy Image Filtering 2 2 . 1 Structure & Texture Filling-In 2 Transmission & Compress 3 . of Missing Image Blocks in Wireless
E-Commerce Technology
2003
2003
Web Intelligence
2003
Fuzzy Systems
2003
Image Processing
2003
1 TCP-LP Low-Priority Service via End-Point Congestion Control 2 4 . 1 Unified Network Monitoring For Web Technology 2 5 . 1 Personal Identification Based On Iris Texture Analysis 2 6 . 1 AI NET - A network that integrates ATM and IP 2 7 . 1 Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups 2 8 . 1 Dynamic Parallel Access to Replicated Content in the Internet 2 9 . 1 ITP: An Image Transport Protocol for the Internet 3 0 . 1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks 3 1 . 1 A Software Defect Report and Tracking System in an Intranet 3 2 . 1 Distributed Data Mining in Credit Card Fraud Detection 3 3 .
Networking
2003
Web Technology
2003
Image Processing
2003
Networking
2002
Networking
2002
Networking
2002
Networking
2002
Wireless Networks
2000
1 E Logistics for Warehouse Management Implementation of Authenticated and 3 Dynamic Logistics Support System & Management 4 . 1 Secured Password Based Protocol For Downloading A Private Key 3 5 . 1 Towards Multimodal Interfaces for Intrusion Detection 3 6 .
Innovative Computing
Computer networks