Networking

  1. A Calculus Approach to Minimum Energy Transmission Policies with Quality of Service Guarantees
  2. Lord of the Links: A Framework for Discovering Missing Links in the Internet Topology
  3. Energy–Robustness Tradeoff in Cellular Network Power Control
  4. Exploiting Clustering Techniques for Web User-session Inference
  5. Performance Analysis and Multi-channel Coordinated Access Points
  6. On the Time Synchronization of Distributed Log Files in Networks with Local Broadcast Media
  7. Swing: Realistic and Responsive Network Traffic Generation
  8. Residual-Based Measurement of Peer and Link Lifetimes in Gnutella Networks
  9. Secure and Policy-Compliant Source Routing
  10. A Multilayer Fault Localization Framework for IP over All-Optical Multilayer Networks
  11. Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks
  12. Multiple Routing Configurations for Fast IP Network Recovery
  13. A Traffic Engineering Approach for Placement and Selection of Network Services
  14. Large-Scale IP Trace back in High-Speed Internet: Practical Techniques and Theoretical Foundation
  15. Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning
  16. A Framework for Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
  17. Traffic Modeling and Proportional Partial Caching for Peer-to-Peer Systems
  18. Robust Synchronization of Absolute and Difference Clocks over Networks
  19. LargeScale Collection and Sanitization of Network Security Data: Risks and Challenges (position paper)
  20. Network Security Based On Pattern Matching: An Overview
  21. MagicNET: The Human Immune System and Network Security System
  22. Passive-Logging Attacks Against Anonymous Communications Systems
  23. Distributed Robust Optimization (DRO)
  24. Kinematics Analysis, Design, and Control of an Isoglide3 Parallel Robot (IG3PR)
  25. Controlling IP Spoofing through Interdomain Packet Filters
  26. A way to boost the data transfer speed in control and information systems
  27. A Dynamic Hidden-ID Authentication Scheme Based On 2-Dimensional Construction
  28. A Cross-Layer Approach for Per-Station Fairness in TCP over WLANs
  29. A Practical Password-Based Two-Server Authentication and Key Exchange System
  30. Key Agreement in Peer-to-Peer Wireless Networks
  31. Ajax Scope: A Platform for Remotely Monitoring the Client-Side Behavior of web 2.0 Applications
  32. The Design of a Generic TCP / IP Congestion Control
  33. Node Isolation Model and Age-Based Neighbor Selection in Unstructured P2P Networks
  34. A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection
  35. Monitoring the Application-Layer DDOS Attacks for Popular Websites
  36. DDOS-Shield: DDOS-Resilient Scheduling to Counter Application Layer Attacks
  37. Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search
  38. The Design Trade-Offs of Bit Torrent-Like File Sharing Protocols
  39. Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
  40. On Understanding Transient Inter domain Routing Failures
  41. Secure and Policy-Compliant Source Routing
  42. A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors
  43. Web User-Session Inference by Means of Clustering Techniques
  44. A Swarm Intelligence-Based P2P File Sharing Protocol Using Bee Algorithm
  45. An Implementation of Bluetooth Service Application on the Peer-to-Peer Based Virtual Home Platform
  46. Honey pot Scheme for Distributed Denial-of-Service Attack
  47. P2P File Sharing Software in IPv4/IPv6 Network
  48. Design and Implementation of Distributed Firewall System for IPv6
  49. Hybrid Classifier Systems for Intrusion Detection
  50. A New Data-Mining Based Approach for Network Intrusion Detection
  51. BotCop: An Online Botnet Traffic Classifier
  52. An Agent-based Model for the Evolution of the Internet Ecosystem
  53. Rateless Forward Error Correction forTopology-Transparent Scheduling

AD-HOC

  1. An Efficient Parallel Implementation of the Hidden Markov Methods for Genomic Sequence Search on a Massively Parallel System
  2. Security in Vehicular Ad Hoc Networks
  3. Boundary Mapping and Boundary State Routing (BSR) in Ad Hoc Networks
  4. A New, Efficient Coordinated Check pointing Protocol Combined with Selective Sender-Based Message Logging
  5. Service Discovery for Mobile Ad Hoc Networks: A Survey of Issues and Techniques
  6. On the Effect of Group Mobility to Data Replication in Ad Hoc Networks Design

DATA MINING

  1. Predictive Ensemble Pruning by Expectation Propagation
  2. Mining Projected Clusters in High-Dimensional Spaces
  3. Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
  4. Compression and Aggregation for Logistic Regression Analysis in Data Cubes
  5. Improving Personalization Solutions through Optimal Segmentation of Customer Bases
  6. Fast Query Point Movement Techniques for Large CBIR Systems
  7. Communities and Emerging Semantics in Semantic Link Network: Discovery and Learning
  8. A Generic Local Algorithm for Mining Data Streams in Large Distributed Systems
  9. System level Elements of network security systems Based on Data fusion
  10. Privacy-Preserving Queries on Encrypted Data
  11. Simultaneous matrix diagonalization based techniques for the estimation of the mixing matrix
  12. Range Nearest-Neighbor Query
  13. Privacy-Preserving Queries on Encrypted Data
  14. A Data-Mining-Based Perfecting Approach to Caching For Network Storage Systems
  15. Mining Sequential Patterns by Pattern-Growth

Web Services

  1. A Reference Architecture for Scientific Workflow Management Systems and the VIEW SOA Solution
  2. Fairness as a QoS Measure forWeb Services
  3. Towards a Unifying View of QoS-EnhancedWeb Service Description and Discovery Approaches
  4. Configurable Composition and Adaptive Provisioning of Web Services
  5. A QoS Control Mechanism to Provide Service Differentiation and Overload Protection to Internet Scalable Servers
  6. The Web Service Modeling Framework WSMF
  7. Web Service Derivatives
  8. Acquisition and Management of Semantic Web Service Descriptions
  9. Dynamic Web Service Composition: A New Approach in Building Reliable Web Service
  10. Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side
  11. Advanced Collage CAPTCHA
  12. Managing Primary Context through Web Services
  13. A Hybrid Integrated Architecture for Language Service Composition
  14. Autonomic Policy based Management using Web Services
  15. Robust Runtime Optimization of Data Transfer in Queries over Web Services
  16. An Adaptive Service Selection Approach to Service Composition
  17. A Semantic Search Agent Approach: Finding Appropriate Semantic Web Services Based On User Request Term(s)
  18. Personalized Ontology for Web Search Personalization
  19. PAWS Managing Primary Context through Web Services
  20. Coupling RDF/RSS, WSRP and AJAX for DynamicReusablePort lets: An Approach and a Use Case

NETWORK SECURITY

  1. Sequence-based localization in wireless sensor networks
  2. Sbk: a self-configuring framework for bootstrapping keys in sensor networks
  3. Controlling IP spoofing through inter domain packet filters
  4. A firewall for routers:protecting against routing misbehavior
  5. An efficient parallel implementation of the hidden mark or methods for genomic sequence search on a massively parallel system
  6. Robust lane detection and tracking in challenging scenarios
  7. A firewall for routers: protecting against routing misbehavior
  8. A generic framework for modeling MAC protocols in wireless broadband access networks
  9. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
  10. Probabilistic Packet Marking for Large-Scale IP Trace back
  11. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data

WEB SECURITY

  1. Security Conscious Web Services Composition With Semantic Web Support
  2. A Practical Approach to Secure Web Services
  3. Security Conscious Web Services Composition With Semantic Web Support
  4. A Practical Approach to Secure Web Services
  5. Integration of Bug Tracking System in Distributed Environments
  6. Web Based Content Management System
  7. A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks
  8. Security Analysis of The Louis Protocol for Location Privacy
  9. System level Security modeling using Attack trees
  10. Visual Similarity-based Phishing Detection without Victim Site Information
  11. Visualization of Security Events Using an Efficient Correlation Technique
  12. Towards Intrusion Detection for Encrypted Networks
  13. Network Coding Protocols Approach for Secret Key Distribution
  14. Defense against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks
  15. A Fault Attack on Pairing-Based Cryptography
  16. On the Performance Benefits of Multi homing Route Control
  17. Network Coding Protocols Approach for Secret Key Distribution
  18. An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers
  19. Experiences in Engineering Active Replication into a Traditional Three-tiered Client-server System
  20. A Self-Repairing Tree Topology Enabling Content-Based Routing in Mobile Ad Hoc Network
  21. Context based Application Level Intrusion Detection System
  22. Content-Based Web Medical Imaging Retrieval via Multi- Agent Architecture
  23. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis

Grid computing

  1. Hierarchical Replication Techniques to Ensure Checkpoint Storage Reliability in Grid Environment
  2. An Efficient Parallel Implementation of the Hidden Markov Methods for Genomic Sequence Search on a Massively Parallel System
  3. Distributed Generation Interface to the CERTS Micro grid
  4. Effective Prediction of Job Processing Times in a Large-Scale Grid Environment
  5. Green Cell Phones and Mobile Skype Finally Arrive
  6. On-Body Sensing Solutions for Automatic Dietary Monitoring
  7. Incentive-Based Scheduling for Market-Like Computational Grids

Wireless networking

  1. Wormhole-Based Antijamming Techniques in Sensor Networks
  2. QoS-Aware Routing in Emerging Heterogeneous Wireless Networks
  3. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
  4. E-Government wireless mesh networking (mp-to-mp)
  5. WLAN Traffic Visualizer
  6. An Efficient Mobile Authentication Scheme for Wireless Networks
  7. Contention-Aware Performance Analysis of Mobility- Assisted Routing
  8. Routing in Delay-Tolerant Networks Comprising Heterogeneous Node Populations
  9. Performance of VIP over Multiple Co-Located IEEE 802.11 Wireless LANS
  10. Wardrop Routing in Wireless Networks
  11. Rate Allocation and Network Lifetime Problems for Wireless Sensor Networks

MOBILE COMPUTING

  1. Analysis of Cross-layer Interaction in Multi-rate 802.11 WLANs
  2. Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks
  3. Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor Networks
  4. Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks
  5. An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols inWireless Sensor Networks
  6. Contention-Aware Performance Analysis of Mobility-Assisted Routing
  7. Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor Networks
  8. CAR: Context-aware Adaptive Routing for Delay Tolerant Mobile Networks
  9. Using Local Geometry for Tunable Topology Control in Sensor Networks
  10. Passive Online Detection of 802.11 Traffic Using Sequential Hypothesis Testing with TCP ACK-Pairs
  11. An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols inWireless Sensor Networks
  12. BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks
  13. Many-to-One Throughput Capacity of IEEE 802.11 Multi-hop Wireless Networks
  14. Cooperative Asynchronous Multi-Channel MAC: Design, Analysis, and Implementation
  15. Cost- and Collision-Minimizing Forwarding Schemes for Wireless Sensor Networks: Design, Analysis, and Experimental Validation
  16. RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks
  17. Filtering Short Message Spam of Group Sending Using CAPTCHA
  18. A way to boost the data transfer speed in control and information systems
  19. Bandwidth-Satisfied Multicast Trees in MANETs
  20. The Internal Value of Mobile Computing in Emergency Medical Services
  21. Design and Implementation with cart for b2b using mobile
  22. Network Resource Awareness and Control in Mobile Applications
  23. Implementation of SIP for Autonomous Mobile Peer to Peer Networking
  24. Mobile Payment Service
  25. Cell Breathing Techniques for Load Balancing in Wireless LANs
  26. Analysis of Cross-Layer Interaction in Multi rate 802.11 WLANS
  27. An Access Delay Model for IEEE 802.11e EDCA
  28. Efficient Broadcasting in Mobile Ad Hoc Networks
  29. A Decentralized Method for Scaling Up Genome Similarity Search Services

IMAGE PROCESSING

  1. Head Pose Estimation in Computer Vision: A Survey
  2. An Image Compression Method of Fractal Based on GSOFM Network
  3. CAPTCHA s: Humans vs. Bots
  4. New Solution for Password Key Transferring in Steganography Methods
  5. Advanced Collage CAPTCHA
  6. Blind Identification of Underdetermined Mixtures by Simultaneous Matrix Diagonalization
  7. Image Compression With Edge-Based In painting
  8. Graphical Password Authentication Using Cued Click Points
  9. Content Based Image Retrieval By Active Learning SVM techniques & their comparison
  10. Filtering of Skin Detection and EXIF Tags
  11. Automatic ASCII Art Conversion of Binary Images
  12. Fingerprint Identification System

CRYPTOGRAPHY

  1. A Cryptographic Approach to Securely Share and Query Genomic Sequences
  2. Network Based Secure Data Transfer using Stenographic Encryption
  3. Selective Encryption of Multimedia Content in Distribution Networks

DATA MINING

  1. SQL Injection
  2. E - Logistic Freight Forwarding System
  3. Data Mining In Credit Card Fraud Detection
  4. An Automatic Linker for Collaborative Web-Based Corpora
  5. Hierarchically Distributed Peer-to-Peer Document Clustering and Cluster Summarization
  6. Effective Collaboration with Information Sharing in Virtual Universities
  7. Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems
  8. Improving Personalization Solutions through Optimal Segmentation of Customer Bases
  9. Monitoring Online Tests through Data Visualization
  10. Evaluating the Effectiveness of Personalized Web Search
  11. Similarity-Profiled Temporal Association Mining
  12. A Relation-Based Page Rank Algorithm for Semantic Web Search Engines
  13. An Efficient Algorithm for Web Recommendation Systems
  14. A metamodel of WSDL Web services using SAWSDL semantic annotations
  15. Adaptive focused crawler based on tunneling and link analysis
  16. Effective Snippet Clustering with Domain Knowledge
  17. Effective Navigation on Query Results of Biomedical Databases
  18. An Intelligent Broker for Ontology Based Publish/Subscribe Systems
  19. Deriving Private Information from Association Rule Mining Results
  20. Dependable Performance Analysis for Fuzzy Clustering of Web Usage Data
  21. Automated Instantiation and Extraction of Web Service Choreographies
  22. Role-Based Access Control in Peer-to-Peer (P2P) Societies
  23. Crime Pattern Detection Using Data Mining
  24. Agent Based Web Service Composition in the Context of A Supply-Chain Based Workflow
  25. Visualization of Ontology’s to Specify Semantic Descriptions of Services
  26. Mining Weighted Association Rules without Pre assigned Weights
  27. Schema-Based Peer-to-Peer Data Integration
  28. Mining Non ambiguous Temporal Patterns for Interval- Based Events
  29. Discovery of Direct and Indirect Association Patterns in Large Transaction Databases
  30. RIC: Parameter-Free Noise-Robust Clustering
  31. Anonym zing Classification Data for Privacy Preservation
  32. WAP-Based Information Management System
  33. Building a Multiple-Criteria Negotiation Support System Send
  34. Parallel Web Mining for link prediction in Cluster Server

WEB MINING

  1. Web People Search via Connection Analysis
  2. Mining the Web to Create Specialized Glossaries
  3. Maximum Availability Server Selection Control System
  4. Distributed Metadata Management for Large Cluster-Based Storage Systems

PEER-TO-PEER

  1. Software Requirements Specification for Internetworking of Content Delivery Networks through Peering
  2. Managing a Peer-to-Peer Data Storage System in a Selfish Society
  3. Making Search Efficient on Gnutella-like P2P Systems
  4. Floodgate: A Micro payment Incentivized P2P Content Delivery Network
  5. On Localized Application-Driven Topology Control for Energy-Efficient Wireless Peer-to-Peer File Sharing