* A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks
Domains - Mobile Computing, Year - 2010
* Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService
Domains - Mobile Computing, Year - 2010
* Energy-Optimal Scheduling with Dynamic Channel Acquisition in Wireless Downlinks
Domains - Mobile Computing, Year - 2010
* On Multihop Distances in Wireless Sensor Networks with Random Node Locations
Domains - Mobile Computing, Year - 2010
* Optimal Accounting Policies for AAA Systems in Mobile Telecommunications Networks
Domains - Mobile Computing, Year - 2010
* VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
Domains - Mobile Computing, Year - 2010
* Improving TLS Security by Quantum Cryptography
Domains - Network Security & Its Applications, Year - 2010
* Conditional Shortest Path Routing in Delay Tolerant Networks
Domains - Networking, Year - 2010
* Constrained Relay Node Placement in Wireless Sensor Networks Formulation and Approximations
Domains - Networking, Year - 2010
* Demand-Aware Content Distribution on the Internet
Domains - Networking, Year - 2010
* On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow
Domains - Networking, Year - 2010
* Privacy Aware Role Based Access Control
Domains - Networking, Year - 2010
* S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks
Domains - Networking, Year - 2010
* Service Overlay Network Capacity Adaptation for Profit Maximization
Domains - Network and Service Management, Year - 2010
* A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
Domains - Parallel and Distributed Systems, Year - 2010
* Resource Bundles Using Aggregation for Statistical Large-Scale Resource Discovery and Management
Domains - Parallel and Distributed Systems, Year - 2010
* Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Domains - Signal Processing, Year - 2010
* Clustering and Cluster-Based Routing Protocol for Delay-Tolerant Mobile Networks
Domains - Wireless Communications, Year - 2010
* Fast Algorithms for Joint Power Control and Scheduling in Wireless Networks
Domains - Wireless Communications, Year - 2010
* Enhancing Cell-Edge Performance A Downlink Dynamic Interference Avoidance Scheme with Inter-Cell Coordination
Domains - Wireless Communications, Year - 2010
* Fairness-Aware Radio Resource Management in Downlink OFDMA Cellular Relay Networks
Domains - Wireless Communications, Year - 2010
* Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks
Domains - Wireless Communications, Year - 2010
* Checkpoint-based Fault-tolerant Infrastructure for Virtualized Service Providers
Domains - Cloud Computing, Year - 2010
* Dynamic Auction Mechanism for Cloud Resource Allocation
Domains - Cloud Computing, Year - 2010
* Elastic Site - Using Clouds to Elastically Extend Site Resources
Domains - Cloud Computing, Year - 2010
* Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Domains - Cloud Computing, Year - 2010
* Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Domains - Cloud Computing, Year - 2010
* Multicast Multipath Power Efficient Routing in Mobile Adhoc
Domains - Computer Science and Network Security, Year - 2010
* Layered Approach Using Conditional Random Fields for Intrusion Detection
Domains - Dependable and Secure Computing, Year - 2010
* Edge Adaptive Image Steganography Based on LSB Matching Revisited
Domains - Information Forensics and Security, Year - 2010
* Anonymous Query processing in Road Networks
Domains - Knowledge and Data Engineering, Year - 2010
* Automated classification of customer e mails via association rule mining
Domains - Knowledge and Data Engineering, Year - 2010
* Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor Networks
Domains - Knowledge and Data Engineering, Year - 2010
* LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs
Domains - Knowledge and Data Engineering, Year - 2010
* Record Matching over Query Results from Multiple Web Databases
Domains - Knowledge and Data Engineering, Year - 2010
* ViDE A Vision Based Approach for Deep Web Data Extraction
Domains - Knowledge and Data Engineering, Year - 2010
* Bridging Domains Using World Wide Knowledge for Transfer Learning
Domains - Knowledge and Data Engineering, Year - 2010
* Closeness - A New Privacy Measure for Data Publishing
Domains - Knowledge and Data Engineering, Year - 2010
* Data Mining for Risk Management in Hospital Information Systems
Domains - Medical Engineering, Year - 2010
* A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice
Domains - Mobile Computing, Year - 2009
* A Tabu Searching Algorithm For Cluster Building in Wireless Sensor Networks
Domains - Mobile Computing, Year - 2009
* An gen3 based Authentication Protocol
Domains - Mobile Computing, Year - 2009
* Biased Random Walks in Uniform Wireless Networks
Domains - Mobile Computing, Year - 2009
* Cell Breathing Techniques for Load Balancing in Wireless LANs
Domains - Mobile Computing, Year - 2009
* Contention-Aware Performance Analysis of Mobility-Assisted Routing
Domains - Mobile Computing, Year - 2009
* Energy Maps For Mobile Wireless Networks
Domains - Mobile Computing, Year - 2009
* Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks
Domains - Mobile Computing, Year - 2009
* Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking
Domains - Mobile Computing, Year - 2009
* Minimizing Recovery State in Geographic Ad Hoc Routing
Domains - Mobile Computing, Year - 2009
* On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint Route
Domains - Mobile Computing, Year - 2009
* On the Security of Route Discovery in MANETs
Domains - Mobile Computing, Year - 2009
* Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks
Domains - Mobile Computing, Year - 2009
* Random Cast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks
Domains - Mobile Computing, Year - 2009
* Route Stability in MANETs under the Random Direction Mobility Model
Domains - Mobile Computing, Year - 2009
* Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc Networks
Domains - Mobile Computing, Year - 2009
* Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks
Domains - Networking, Year - 2009
* Explicit Load Balancing Technique for NGEO Satellite Ip Networks With On-Board Processing Capabilities
Domains - Networking, Year - 2009
* Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications
Domains - Networking, Year - 2009
* Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services
Domains - Networking, Year - 2009
* Secure and Policy-Complaint Source Routing
Domains - Networking, Year - 2009
* Single-Link Failure Detection in All-Optical Networks
Domains - Networking, Year - 2009
* Two Blocking Algorithm on Adaptive Binary Splitting Single and Pair Resolutions for RFID Tag Identification
Domains - Networking, Year - 2009
* PRESTO Feedback-Driven Data Management in Sensor Networks
Domains - Network Computing, Year - 2009
* Virus Spread in Networks
Domains - Network Computing, Year - 2009
* Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic
Domains - Network Computing, Year - 2009
* Enforcing Minimum-Cost Multicast Routing against Shellfish Information Flows
Domains - Parallel and Distributed Systems, Year - 2009
* Movement-Assisted Connectivity Restoration in Wireless Sensor and
Domains - Parallel and Distributed Systems, Year - 2009
* Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks A Game-Theoretic Modeling Approach
Domains - Computer Theory and Engineering, Year - 2009
* The Effectiveness of Checksums for Embedded Control Networks
Domains - Dependable and Secure Computing, Year - 2009
* Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling
Domains - Distributed Computing, Year - 2009
* Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise
Domains - Secure Computing, Year - 2009
* Spread-Spectrum Watermarking Security
Domains - Secure Computing, Year - 2009
* A Relation-Based Page Rank Algorithm for Semantic Web Search Engines
Domains - Knowledge and Data Engineering, Year - 2009
* Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
Domains - Knowledge and Data Engineering, Year - 2009
* Evaluating the Generation of Domain Ontologies in the Knowledge Puzzle Project
Domains - Knowledge and Data Engineering, Year - 2009
* Online Scheduling Sequential Objects with Periodicity for dynamic Information Dissemination
Domains - Knowledge and Data Engineering, Year - 2009
* SORD A Fault-Resilient Service Overlay for Media Port Resource Discovery
Domains - Parallel and Distributed Systems, Year - 2009
* Localized Sensor Area Coverage With Low Communication Overhead – 2008
Domains - Mobile Computing, Year - 2008
* A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video
Domains - Multimedia, Year - 2008
* Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High-Capacity Approach
Domains - Multimedia Computing, Year - 2008
* Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
Domains - Network Computing, Year - 2008
* Probabilistic Packet Marking For Large Scale IP Trace Back
Domains - Network Computing, Year - 2008
* Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
Domains - Network Computing, Year - 2008
* A Distributed And Scalable Routing Table Manager For The Next Generation Of IP Routers
Domains - Networking, Year - 2008
* Efficient Broadcasting Using Network Coding
Domains - Networking, Year - 2008
* Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case
Domains - Networking, Year - 2008
* Quiver On the Edge Consistent Scalable Edge Services
Domains - Parallel and Distributed Systems, Year - 2008
* Trustworthy Computing Under Resource Constraints With The Down Policy
Domains - Secure Computing, Year - 2008
* Estimation of Defects Based On Defect Decay Model ED3M
Domains - Software Engineering, Year - 2008
* Provable Protection Against Web Application Vulnerabilities Related to Session Data Dependencies
Domains - Software Engineering for Secure Systems, Year - 2008
* Effective Software Merging in the Presence of Object-Oriented Refactorings
Domains - Software Engineering, Year - 2008
* A New Model For Dissemination Of XML Content
Domains - Systems, Man, and Cybernetics, Year - 2008
* Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision
Domains - Transportation System, Year - 2008
* Hardware enhanced association rule mining with Hashing and Pipelining
Domains - Data Mining, Year - 2008
* Credit Card Fraud Detection Using Hidden Markov Models
Domains - Dependable and Secure Computing, Year - 2008
* Temporal Portioning of Communication Resources in an Integrated Architecture
Domains - Dependable and Secure Computing, Year - 2008
* HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
Domains - Distributed Computing, Year - 2008
* Efficient 2-D Grayscale Morphological Transformations With Arbitrary Flat Structuring Elements
Domains - Image Processing, Year - 2008
* Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light
Domains - Image Processing, Year - 2008
* Active Learning Methods for Interactive Image Retrieval
Domains - Image Processing, Year - 2008
* Location-Based Spatial Queries with Data Sharing in Wireless Broadcast Environments
Domains - Knowledge and Data Engineering, Year - 2008
* Watermarking Relational Databases Using Optimization Based Techniques
Domains - Knowledge and Data Engineering, Year - 2008
* DRYADEPARENT An Efficient and Robust Closed Attribute Tree Mining Algorithm
Domains - Knowledge and Data Engineering, Year - 2008
* Long-Term Cross-Session Relevance Feedback Using Virtual Features
Domains - Knowledge and Data Engineering, Year - 2008
* Efficient Resource Allocation For Wireless Multicast
Domains - Mobile Computing, Year - 2008
* Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols
Domains - Dependable and Secure Computing, Year - 2007
* Schema Conversion from Relation to XML with Semantic Constraints
Domains - Fuzzy Systems and Knowledge Discovery, Year - 2007
* Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
Domains - Image Processing, Year - 2006
* Neural Networks for Unicode Optical Character Recognition
Domains - Image Processing, Year - 2005
* Credit Card Fraud Detection
Domains - Intelligent Systems
* E-Secure Transactions - Secure Electronic Data Interchange over Internet
Domains - Internet Computing, Year - 2005
* Efficient Approximate Query Processing in Peer-to-Peer Networks
Domains - Knowledge and Data Engineering, Year - 2007
* Approximating Aggregation Queries in Peer-to-Peer Networks
Domains - Knowledge and Data Engineering, Year - 2006
* Benefit Based Data Caching in Adhoc Networks
Domains - Mobile Computing, Year - 2006
* On the Computational Complexity and Effectiveness of N-Hub Shortest-Path Routing
Domains - Networking, Year - 2006
* Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
Domains - Network Computing, Year - 2005
* An SSL Back-End Forwarding Scheme in Cluster-based Web Servers
Domains - Parallel and Distributed Systems, Year - 2007
* pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
Domains - Parallel and Distributed Systems, Year - 2007
* Defect Tracking - A Software Defect Report and Tracking System in an Intranet
Domains - Software Maintenance and Re-Engineering
* E Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management
* Efficient Retrieval of Files From Cluster Based Web Servers
* Spamine Algorithm for Similarity-Profiled Temporal Association Mining