Networking
- A Calculus Approach to Minimum Energy Transmission Policies with Quality of Service Guarantees
- Lord of the Links: A Framework for Discovering Missing Links in the Internet Topology
- Energy–Robustness Tradeoff in Cellular Network Power Control
- Exploiting Clustering Techniques for Web User-session Inference
- Performance Analysis and Multi-channel Coordinated Access Points
- On the Time Synchronization of Distributed Log Files in Networks with Local Broadcast Media
- Swing: Realistic and Responsive Network Traffic Generation
- Residual-Based Measurement of Peer and Link Lifetimes in Gnutella Networks
- Secure and Policy-Compliant Source Routing
- A Multilayer Fault Localization Framework for IP over All-Optical Multilayer Networks
- Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks
- Multiple Routing Configurations for Fast IP Network Recovery
- A Traffic Engineering Approach for Placement and Selection of Network Services
- Large-Scale IP Trace back in High-Speed Internet: Practical Techniques and Theoretical Foundation
- Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning
- A Framework for Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
- Traffic Modeling and Proportional Partial Caching for Peer-to-Peer Systems
- Robust Synchronization of Absolute and Difference Clocks over Networks
- LargeScale Collection and Sanitization of Network Security Data: Risks and Challenges (position paper)
- Network Security Based On Pattern Matching: An Overview
- MagicNET: The Human Immune System and Network Security System
- Passive-Logging Attacks Against Anonymous Communications Systems
- Distributed Robust Optimization (DRO)
- Kinematics Analysis, Design, and Control of an Isoglide3 Parallel Robot (IG3PR)
- Controlling IP Spoofing through Interdomain Packet Filters
- A way to boost the data transfer speed in control and information systems
- A Dynamic Hidden-ID Authentication Scheme Based On 2-Dimensional Construction
- A Cross-Layer Approach for Per-Station Fairness in TCP over WLANs
- A Practical Password-Based Two-Server Authentication and Key Exchange System
- Key Agreement in Peer-to-Peer Wireless Networks
- Ajax Scope: A Platform for Remotely Monitoring the Client-Side Behavior of web 2.0 Applications
- The Design of a Generic TCP / IP Congestion Control
- Node Isolation Model and Age-Based Neighbor Selection in Unstructured P2P Networks
- A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection
- Monitoring the Application-Layer DDOS Attacks for Popular Websites
- DDOS-Shield: DDOS-Resilient Scheduling to Counter Application Layer Attacks
- Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search
- The Design Trade-Offs of Bit Torrent-Like File Sharing Protocols
- Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
- On Understanding Transient Inter domain Routing Failures
- Secure and Policy-Compliant Source Routing
- A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors
- Web User-Session Inference by Means of Clustering Techniques
- A Swarm Intelligence-Based P2P File Sharing Protocol Using Bee Algorithm
- An Implementation of Bluetooth Service Application on the Peer-to-Peer Based Virtual Home Platform
- Honey pot Scheme for Distributed Denial-of-Service Attack
- P2P File Sharing Software in IPv4/IPv6 Network
- Design and Implementation of Distributed Firewall System for IPv6
- Hybrid Classifier Systems for Intrusion Detection
- A New Data-Mining Based Approach for Network Intrusion Detection
- BotCop: An Online Botnet Traffic Classifier
- An Agent-based Model for the Evolution of the Internet Ecosystem
- Rateless Forward Error Correction forTopology-Transparent Scheduling
AD-HOC
- An Efficient Parallel Implementation of the Hidden Markov Methods for Genomic Sequence Search on a Massively Parallel System
- Security in Vehicular Ad Hoc Networks
- Boundary Mapping and Boundary State Routing (BSR) in Ad Hoc Networks
- A New, Efficient Coordinated Check pointing Protocol Combined with Selective Sender-Based Message Logging
- Service Discovery for Mobile Ad Hoc Networks: A Survey of Issues and Techniques
- On the Effect of Group Mobility to Data Replication in Ad Hoc Networks Design
DATA MINING
- Predictive Ensemble Pruning by Expectation Propagation
- Mining Projected Clusters in High-Dimensional Spaces
- Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
- Compression and Aggregation for Logistic Regression Analysis in Data Cubes
- Improving Personalization Solutions through Optimal Segmentation of Customer Bases
- Fast Query Point Movement Techniques for Large CBIR Systems
- Communities and Emerging Semantics in Semantic Link Network: Discovery and Learning
- A Generic Local Algorithm for Mining Data Streams in Large Distributed Systems
- System level Elements of network security systems Based on Data fusion
- Privacy-Preserving Queries on Encrypted Data
- Simultaneous matrix diagonalization based techniques for the estimation of the mixing matrix
- Range Nearest-Neighbor Query
- Privacy-Preserving Queries on Encrypted Data
- A Data-Mining-Based Perfecting Approach to Caching For Network Storage Systems
- Mining Sequential Patterns by Pattern-Growth
Web Services
- A Reference Architecture for Scientific Workflow Management Systems and the VIEW SOA Solution
- Fairness as a QoS Measure forWeb Services
- Towards a Unifying View of QoS-EnhancedWeb Service Description and Discovery Approaches
- Configurable Composition and Adaptive Provisioning of Web Services
- A QoS Control Mechanism to Provide Service Differentiation and Overload Protection to Internet Scalable Servers
- The Web Service Modeling Framework WSMF
- Web Service Derivatives
- Acquisition and Management of Semantic Web Service Descriptions
- Dynamic Web Service Composition: A New Approach in Building Reliable Web Service
- Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side
- Advanced Collage CAPTCHA
- Managing Primary Context through Web Services
- A Hybrid Integrated Architecture for Language Service Composition
- Autonomic Policy based Management using Web Services
- Robust Runtime Optimization of Data Transfer in Queries over Web Services
- An Adaptive Service Selection Approach to Service Composition
- A Semantic Search Agent Approach: Finding Appropriate Semantic Web Services Based On User Request Term(s)
- Personalized Ontology for Web Search Personalization
- PAWS Managing Primary Context through Web Services
- Coupling RDF/RSS, WSRP and AJAX for DynamicReusablePort lets: An Approach and a Use Case
NETWORK SECURITY
- Sequence-based localization in wireless sensor networks
- Sbk: a self-configuring framework for bootstrapping keys in sensor networks
- Controlling IP spoofing through inter domain packet filters
- A firewall for routers:protecting against routing misbehavior
- An efficient parallel implementation of the hidden mark or methods for genomic sequence search on a massively parallel system
- Robust lane detection and tracking in challenging scenarios
- A firewall for routers: protecting against routing misbehavior
- A generic framework for modeling MAC protocols in wireless broadband access networks
- The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
- Probabilistic Packet Marking for Large-Scale IP Trace back
- Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
WEB SECURITY
- Security Conscious Web Services Composition With Semantic Web Support
- A Practical Approach to Secure Web Services
- Security Conscious Web Services Composition With Semantic Web Support
- A Practical Approach to Secure Web Services
- Integration of Bug Tracking System in Distributed Environments
- Web Based Content Management System
- A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks
- Security Analysis of The Louis Protocol for Location Privacy
- System level Security modeling using Attack trees
- Visual Similarity-based Phishing Detection without Victim Site Information
- Visualization of Security Events Using an Efficient Correlation Technique
- Towards Intrusion Detection for Encrypted Networks
- Network Coding Protocols Approach for Secret Key Distribution
- Defense against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks
- A Fault Attack on Pairing-Based Cryptography
- On the Performance Benefits of Multi homing Route Control
- Network Coding Protocols Approach for Secret Key Distribution
- An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers
- Experiences in Engineering Active Replication into a Traditional Three-tiered Client-server System
- A Self-Repairing Tree Topology Enabling Content-Based Routing in Mobile Ad Hoc Network
- Context based Application Level Intrusion Detection System
- Content-Based Web Medical Imaging Retrieval via Multi- Agent Architecture
- Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
Grid computing
- Hierarchical Replication Techniques to Ensure Checkpoint Storage Reliability in Grid Environment
- An Efficient Parallel Implementation of the Hidden Markov Methods for Genomic Sequence Search on a Massively Parallel System
- Distributed Generation Interface to the CERTS Micro grid
- Effective Prediction of Job Processing Times in a Large-Scale Grid Environment
- Green Cell Phones and Mobile Skype Finally Arrive
- On-Body Sensing Solutions for Automatic Dietary Monitoring
- Incentive-Based Scheduling for Market-Like Computational Grids
Wireless networking
- Wormhole-Based Antijamming Techniques in Sensor Networks
- QoS-Aware Routing in Emerging Heterogeneous Wireless Networks
- The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
- E-Government wireless mesh networking (mp-to-mp)
- WLAN Traffic Visualizer
- An Efficient Mobile Authentication Scheme for Wireless Networks
- Contention-Aware Performance Analysis of Mobility- Assisted Routing
- Routing in Delay-Tolerant Networks Comprising Heterogeneous Node Populations
- Performance of VIP over Multiple Co-Located IEEE 802.11 Wireless LANS
- Wardrop Routing in Wireless Networks
- Rate Allocation and Network Lifetime Problems for Wireless Sensor Networks
MOBILE COMPUTING
- Analysis of Cross-layer Interaction in Multi-rate 802.11 WLANs
- Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks
- Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor Networks
- Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks
- An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols inWireless Sensor Networks
- Contention-Aware Performance Analysis of Mobility-Assisted Routing
- Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor Networks
- CAR: Context-aware Adaptive Routing for Delay Tolerant Mobile Networks
- Using Local Geometry for Tunable Topology Control in Sensor Networks
- Passive Online Detection of 802.11 Traffic Using Sequential Hypothesis Testing with TCP ACK-Pairs
- An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols inWireless Sensor Networks
- BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks
- Many-to-One Throughput Capacity of IEEE 802.11 Multi-hop Wireless Networks
- Cooperative Asynchronous Multi-Channel MAC: Design, Analysis, and Implementation
- Cost- and Collision-Minimizing Forwarding Schemes for Wireless Sensor Networks: Design, Analysis, and Experimental Validation
- RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks
- Filtering Short Message Spam of Group Sending Using CAPTCHA
- A way to boost the data transfer speed in control and information systems
- Bandwidth-Satisfied Multicast Trees in MANETs
- The Internal Value of Mobile Computing in Emergency Medical Services
- Design and Implementation with cart for b2b using mobile
- Network Resource Awareness and Control in Mobile Applications
- Implementation of SIP for Autonomous Mobile Peer to Peer Networking
- Mobile Payment Service
- Cell Breathing Techniques for Load Balancing in Wireless LANs
- Analysis of Cross-Layer Interaction in Multi rate 802.11 WLANS
- An Access Delay Model for IEEE 802.11e EDCA
- Efficient Broadcasting in Mobile Ad Hoc Networks
- A Decentralized Method for Scaling Up Genome Similarity Search Services
IMAGE PROCESSING
- Head Pose Estimation in Computer Vision: A Survey
- An Image Compression Method of Fractal Based on GSOFM Network
- CAPTCHA s: Humans vs. Bots
- New Solution for Password Key Transferring in Steganography Methods
- Advanced Collage CAPTCHA
- Blind Identification of Underdetermined Mixtures by Simultaneous Matrix Diagonalization
- Image Compression With Edge-Based In painting
- Graphical Password Authentication Using Cued Click Points
- Content Based Image Retrieval By Active Learning SVM techniques & their comparison
- Filtering of Skin Detection and EXIF Tags
- Automatic ASCII Art Conversion of Binary Images
- Fingerprint Identification System
CRYPTOGRAPHY
- A Cryptographic Approach to Securely Share and Query Genomic Sequences
- Network Based Secure Data Transfer using Stenographic Encryption
- Selective Encryption of Multimedia Content in Distribution Networks
DATA MINING
- SQL Injection
- E - Logistic Freight Forwarding System
- Data Mining In Credit Card Fraud Detection
- An Automatic Linker for Collaborative Web-Based Corpora
- Hierarchically Distributed Peer-to-Peer Document Clustering and Cluster Summarization
- Effective Collaboration with Information Sharing in Virtual Universities
- Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems
- Improving Personalization Solutions through Optimal Segmentation of Customer Bases
- Monitoring Online Tests through Data Visualization
- Evaluating the Effectiveness of Personalized Web Search
- Similarity-Profiled Temporal Association Mining
- A Relation-Based Page Rank Algorithm for Semantic Web Search Engines
- An Efficient Algorithm for Web Recommendation Systems
- A metamodel of WSDL Web services using SAWSDL semantic annotations
- Adaptive focused crawler based on tunneling and link analysis
- Effective Snippet Clustering with Domain Knowledge
- Effective Navigation on Query Results of Biomedical Databases
- An Intelligent Broker for Ontology Based Publish/Subscribe Systems
- Deriving Private Information from Association Rule Mining Results
- Dependable Performance Analysis for Fuzzy Clustering of Web Usage Data
- Automated Instantiation and Extraction of Web Service Choreographies
- Role-Based Access Control in Peer-to-Peer (P2P) Societies
- Crime Pattern Detection Using Data Mining
- Agent Based Web Service Composition in the Context of A Supply-Chain Based Workflow
- Visualization of Ontology’s to Specify Semantic Descriptions of Services
- Mining Weighted Association Rules without Pre assigned Weights
- Schema-Based Peer-to-Peer Data Integration
- Mining Non ambiguous Temporal Patterns for Interval- Based Events
- Discovery of Direct and Indirect Association Patterns in Large Transaction Databases
- RIC: Parameter-Free Noise-Robust Clustering
- Anonym zing Classification Data for Privacy Preservation
- WAP-Based Information Management System
- Building a Multiple-Criteria Negotiation Support System Send
- Parallel Web Mining for link prediction in Cluster Server
WEB MINING
- Web People Search via Connection Analysis
- Mining the Web to Create Specialized Glossaries
- Maximum Availability Server Selection Control System
- Distributed Metadata Management for Large Cluster-Based Storage Systems
PEER-TO-PEER
- Software Requirements Specification for Internetworking of Content Delivery Networks through Peering
- Managing a Peer-to-Peer Data Storage System in a Selfish Society
- Making Search Efficient on Gnutella-like P2P Systems
- Floodgate: A Micro payment Incentivized P2P Content Delivery Network
- On Localized Application-Driven Topology Control for Energy-Efficient Wireless Peer-to-Peer File Sharing