1.    A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
2.    A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
3.    A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4.    A Survey of XML Tree Patterns
5.    Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6.    Dynamic Personalized Recommendation on Sparse Data
7.    Mining User Queries with Markov Chains: Application to Online Image Retrieval
8.    Optimal Route Queries with Arbitrary Order Constraints
9.    Failure-Aware Cascaded Suppression in Wireless Sensor Networks
10. M-Privacy for Collaborative Data Publishing
11. Crowd sourcing Predictors of Behavioral Outcomes.
12. Spatial Approximate String Search
13. Facilitating Document Annotation Using Content and Querying Value
14. Privacy Preserving Delegated Access Control in Public Clouds
  1. IP-Geolocation Mapping for Moderately Connected Internet Regions
  2. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
  3. Analysis of Distance-Based Location Management in Wireless Communication Networks.
  4. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
  5. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
  6. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
  7. Towards Differential Query Services in Cost-Efficient Clouds.
  8. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.
  9. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems.
  10. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.



     1.    A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc               Networks.
  1. EAACK—A Secure Intrusion-Detection System for MANETs
  2. Vampire attacks:Draining life from wireless ad-hoc sensor networks.
  3. Towards a Statistical Framework for Source Anonymity in Sensor Networks
  4. Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
  5. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
  6. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
  7. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
  8. IP-Geolocation Mapping for Moderately Connected Internet Regions
  9. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
  10. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 
  11. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
  12. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
  13. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization


1.    PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 
2.    Novel Packet-Level Resource Allocation with Effective QoS  Provisioning for Wireless Mesh Networks 
3.    Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 
4.    Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems 
5.    Efficient Algorithms for Neighbor Discovery in Wireless Networks


1.    Privacy-Enhanced Web Service Composition 
2.    Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
3.  . NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
4.   Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
5.   Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
6.   Distributed Web Systems Performance Forecasting Using Turning Bands Method


1.    CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
2.    Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.
3.    Two tales of privacy in online social networks. 
4.    Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning 
5.    Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment                  Experience 
6.    An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks 
7.    An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks 
8.    A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
9.    Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.
10.  Participatory Privacy Enabling Privacy in Participatory Sensing.
11.  Modeling the Pair wise Key Predistribution Scheme in the  Presence of Unreliable Links
12.  Multiparty Access Control for Online Social Networks Model and Mechanisms
13.  Privacy and Integrity Preserving Range Queriesin Sensor Networks


No comments:

Post a Comment