A Cocktail Approach for Travel Package Recommendation
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices
A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
A Geometric Approach to Improving Active Packet Loss Measurement
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
A Memory Learning Framework for Effective Image Retrieval
A Near-Optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks
A Scalable and Reliable Matching Service for Content-Based Publish Subscribe Systems
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
A Study on False Channel Condition Reporting Attacks in Wireless Networks
A Super modularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
A Survey of XML Tree Patterns
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
A System to Filter Unwanted Messages from OSN User Walls
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs
An Adaptive Programming Model for Fault Tolerant Distributed Computing
An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Net
An Efficient Association Rule Mining Algorithm In Distributed Databases
An Efficient Certificateless Encryption for Secure Data Sharing In Public Cloud
Application of BPCS stenography to wavelet compressed video
Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking
Automatic Scaling of Internet Applications for Cloud Computing Services
Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology
Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
Behavioral Malware Detection in Delay Tolerant Networks
Benefit Based Data Caching In Ad Hoc Networks
BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
Building Families of Software Products for e-Learning Platforms A Case Study
CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
Cloud Service Negotiation in Internet of Things Environment A Mixed Approach
Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
CLOUDQUAL A Quality Model for Cloud Services
Clustering with Multiviewpoint-Based Similarity Measure
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
Congestion Aware Routing in Nonlinear Elastic Optical Networks
Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks
Covering Points of Interest with Mobile Sensors
Cross-Layer Approach for Minimizing Routing Disruption in IP Networks
Data Mining with Big Data
Data-Driven Composition for Service-Oriented Situational Web Applications
DCIM Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
Defeating Jamming With the Power of Silence A Game-Theoretic Analysis
Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation
Designing an Architecture for Monitoring Patients at Home Ontologies and Web Services for Clinical
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
Developing Vehicular Data Cloud Services in the IoT Environment
Discovering Emerging Topics in Social Streams via Link Anomaly Detection
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
Distance Bounding A Practical Security Solution for Real-Time Location Systems
Distributed cache updating for the Dynamic source routing protocol
Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
Distributed Web Systems Performance Forecasting Using Turning Bands Method
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
Dynamic Coverage of Mobile Sensor Networks
Dynamic Resource Allocation Using Virtual Machines For Cloud Computing Environment
EAACK – A Secure Intrusion-Detection System for MANETs
Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
Efficient Algorithms for Neighbor Discovery in Wireless Networks
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Efficient Ranking on Entity Graphs with Personalized Relationships
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
Enabling Smart Cloud Services Through Remote Sensing An Internet of Everything Enabler
Energy Efficient Virtual Network Embedding for Cloud Networks
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
Face Recognition Using Laplacian faces
Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm
Friendbook A Semantic-Based Friend Recommendation System for Social Networks
GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions
Group-Based Medium Access Control for IEEE 802.11n Wireless LANs
Homogeneous Network Control and Implementation
Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HID)
Identification of Humans Using Gait
Identity-Based Distributed Provable Data Possession in Multi cloud Storage
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
Image Transformation using Grid
Image Transport Protocol ITP
Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
Incremental Affinity Propagation Clustering Based on Message Passing
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Java Finger Print
Java Network File Sharing System
JAVA Productivity AIDS
A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
A Link-Analysis Extension Of Correspondence Analysis For Mining Relational Databases
A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
A Novel 3-D Color Histogram Equalization Method With Uniform 1-D Gray Scale Histogram
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
Adaptive Cluster Distance Bounding for High-Dimensional Indexing
Analysis on Credit Card Fraud Detection Methods
Anti-Forensics of Digital Image Compression
Buffer Sizing for 802.11 Based Networks
Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
Cloud Computing for Agent-Based Urban Transportation Systems
Clustering with Multi-Viewpoint based Similarity Measure
Decision Trees for Uncertain Data
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
Digital Image hiding using curve let transform
Discovering Conditional Functional Dependencies
Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
Effective Navigation of Query Results Based on Concept Hierarchies
Embedded Extended Visual Cryptography Schemes
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Extended XML Tree Pattern Matching Theories and Algorithms
Fast Simulation of services availability in mesh network with dynamic path restoration
Going Back and Forth Efficient Multi deployment and Multi snaps hotting on Clouds
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
Intrusion detection An Energy efficient approach in Heterogeneous WSN
Live Streaming With Receiver-Based Peer-Division Multiplexing
Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
Location Based Spatial Query Processing In Wireless Broadcast Environments
Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework
Minimizing File Download Time in Stochastic Peer-to-Peer Networks
Mining Statistically Significant Co-location and Segregation Patterns
Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
Mobile Agents In a Distributed Multimedia Database System
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
Modeling & Automated Containment of Worms
Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm
Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Multimedia Fusion With Mean-Covariance Analysis
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
Network Border Patrol Preventing Congestion Collapse
Network_Component_For_XML_Migration
NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Noise Reduction by Fuzzy Image Filtering
ODAM An Optimized Distributed Association Rule Mining Algorithm
On Traffic-Aware Partition and Aggregation in Map Reduce for Big Data Applications
Online Handwritten Script Recognition
Optimal Configuration of Network Coding in Ad Hoc Networks
Optimal Multi server Configuration for Profit Maximization in Cloud Computing
Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
Passive IP Trace back Disclosing the Locations of IP Spoofers From Path Back scatter
Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
Performance_Evaluation_Of_RMI
Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
Personal Authentication Using 3-D Finger Geometry
Personal Identification Based on Iris Texture Analysis
PMSE A Personalized Mobile Search Engine
Predicting Asthma-Related Emergency Department Visits Using Big Data
Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy-Enhanced Web Service Composition
Privacy-Preserving Detection of Sensitive Data Exposure
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
Proof of Ownership In Deduplicated Storage With Mobile Device Efficiency
Protection of Database Security via Collaborative Inference Detection
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
Public Key Validation for DNS security Extension
Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing
Quality-Differentiated Video Multicast in Multirate Wireless Networks
QUIVER Consistent Object Sharing For Edge Services
Ranking on Data Manifold with Sink Points
Real-Time Detection of Traffic From Twitter Stream Analysis
Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks
Region-Based Foldings in Process Discovery
Relationships between Diversity Classification Ensembles and Single-Class Performance Measures
Retrieving Files Using Content Based Searching
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attacker’s Impact
Secure De-duplication with Efficient and Reliable Convergent Key Management
Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
Securing User-Controlled Routing Infrastructures
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
Security Analysis of Handover Key Management in 4G LTESAE Networks
Security and Privacy-Enhancing Multi cloud Architectures
Security in large Mediator Protocols
Selective_Encryption of still Image
SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks
Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Networks
SPOC A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compress
Supporting Privacy Protection in Personalized Web Search
SybilDefender Defend Against Sybil Attacks in Large Social Networks
T-Drive Enhancing Driving Directions with Taxi Driver’s Intelligence
Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
Temporal Partitioning of Communication Resources in an Integrated Architecture
Toward a Statistical Framework for Source Anonymity in Sensor Networks
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
Truth Discovery with multiple Conflicting Information Providers on web
Two Techniques for Fast Computation of Constrained Shortest Paths
VeDi A Vehicular Crowd-Sourced Video Social Network for VANETs
Using the Using the Conceptual Cohesion of Classes for Fault Prediction in Object oriented System
Vampire Attacks Draining Life from Wireless Ad Hoc Sensor Networks
Video Dissemination over Hybrid Cellular and Ad Hoc Networks
Web-Based Traffic Sentiment Analysis Methods and Applications
XTC A Practical Topology Control Algorithm for Ad-Hoc Networks