2. Heterogeneous Resource Allocation under Degree Constraints
3. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
4. GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks
5. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
6. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
7. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
8. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
9. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks
10. A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization
11. A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks
12. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks.
13. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for MobileHealthcare Emergency.
14. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Walid
2. Privacy-Preserving Public Auditing for Secure Cloud Storage
3. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encrytion
4. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
5. CloudMoV: Cloud-based Mobile Social TV
6. Privacy Preserving Delegated Access Control in Public Clouds.
7. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks.
2. Secure Mining of Association Rules in Horizontally Distributed Databases.
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4. ELCA: Evaluation for Keyword Search on Probabilistic XML Data.
5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
7. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
8. Optimal Route Queries with Arbitrary Order Constraints
9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
2. EAACK—A Secure Intrusion-Detection System for MANETs
3. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
4. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
5. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
6. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
7. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
8. IP-Geolocation Mapping for Moderately Connected Internet Regions
9. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
2. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
3. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
4. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
5. Delay-Based Network Utility Maximization
6. Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
7. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
8. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
9. The Target Tracking in Mobile Sensor Networks.
2. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
3. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
4. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection