
2.
A
Distributed Control Law for Load Balancing in Content Delivery Networks
3.
A
Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional
Data.
4.
A
Generalized Flow-Based Method for Analysis of Implicit Relationships on
Wikipedia.
5.
A
Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks.
6.
A
Load Balancing Model Based on Cloud Partitioningfor the Public Cloud.
7.
A
New Algorithm for Inferring User Search Goals with Feedback Sessions
8.
A
Scalable Server Architecture for Mobile Presence Services in Social Network
Applications
9.
A
Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
10.
A
Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
11.
A
System for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis
12.
A
System to Filter Unwanted Messages from OSN User Walls
13.
Access
Policy Consolidation for Event Processing Systems
14.
AMES
A Framework of Adaptive Mobile Video Streaming and Efficient Social Video
Sharing in the Clouds
15.
Annotating
Search Results from Web Databases
16.
Attribute-Based
Encryption With Verifiable Outsourced Decryption
17.
Back-Pressure-Based
Packet-by-Packet Adaptive Routing in Communication Networks
18.
Beyond
Text QA Multimedia
19.
CAM
Cloud-Assisted Privacy Preserving Mobile Health Monitoring
20.
CAM
Cloud-Assisted Privacy Preserving Mobile Health Monitoring
21.
CloudMoV
Cloud-based Mobile Social TV
22.
Clustering
Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
23.
Collaboration
in Multicloud Computing Environments Framework and Security Issues
24.
Combining
Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
25.
Comparable
Entity Mining from Comparative Questions
26.
Cross-Domain
Privacy-Preserving Cooperative Firewall Optimization
27.
Crowd
sourcing Predictors of Behavioral Outcomes
28.
Delay-Based
Network Utility Maximization
29.
Discovery
and Verification of Neighbor Positions in Mobile Ad Hoc Networks
30.
Distributed
Cooperative Caching in Social Wireless Networks
31.
Distributed
Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
32.
Document
Clustering for Forensic Analysis An Approach for Improving Computer Inspection
33.
Dynamic
Resource Allocation using Virtual Machines for Cloud Computing Environment
34.
EAACK—A
Secure Intrusion-Detection System for MANETs
35.
Error-Tolerant
Resource Allocation and Payment Minimization for Cloud System
36.
Extracting
Spread-Spectrum Hidden Data from Digital Media
37.
Facilitating
Document Annotation using Content and Querying Value
38.
Facilitating
Effective User Navigation through Website Structure Improvement
39.
Fast
Transmission to Remote Cooperative Groups A New Key Management Paradigm
40.
Fault
Node Recovery Algorithm for a Wireless Sensor Network
41.
FoCUS
Learning to Crawl Web Forums
42.
Fully
Anonymous Profile Matching in Mobile Social Networks
43.
Geo-Community-Based
Broadcasting for Data Dissemination in Mobile Social Networks
44.
Harnessing
the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
45.
Identity-Based
Secure Distributed Data Storage
46.
Incentive
Compatible Privacy-Preserving Data Analysis
47.
IP-Geolocation
Mapping for Moderately Connected Internet Regions
48.
Load
Rebalancing for Distributed File Systems in Clouds
49.
Minimum
Cost Blocking Problem in Multi-path Wireless Routing Protocols
50.
Mining
contract s for business event and temporal constraints in service engagement
51.
Mobile
Relay Configuration in Data-intensive Wireless Sensor Networks
52.
Modeling
the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
53.
Mona
Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
54.
m-Privacy
for Collaborative Data Publishing
55.
NICE
Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems
56.
On
the Node Clone Detection in Wireless Sensor Networks
57.
Opportunistic
MANETs Mobility Can Make Up for Low Transmission Power
58.
Optimal
Client-Server Assignment for Internet Distributed Systems
59.
Optimizing
Cloud Resources for Delivering IPTV Services through Virtualization
60.
PACK
Prediction-Based Cloud Bandwidth and Cost Reduction System
61.
PMSE
A Personalized Mobile Search Engine
62.
Preventing
Private Information Inference Attacks on Social Networks
63.
Price
Differentiation for Communication Networks
64.
Privacy
Preserving Data Sharing With Anonymous ID Assignment
65.
Privacy
Preserving Delegated Access Control
66.
Privacy-Preserving
Distributed Profile Matching in Proximity-based Mobile Social Networks
67.
Privacy-Preserving
Public Auditing for Secure Cloud Storage
68.
Protecting
Sensitive Labels in Social Network Data Anonymization
69.
obust
Module Based Data Management
70.
Scalable
and Secure Sharing of Personal Health Records
71.
Scalable
Face Image Retrieval using Attribute-Enhanced Sparse Codewords
72.
Security
Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based
Encryption Scheme
73.
Sensitive
Label Privacy Protection on Social Network Data
74.
SocialTube
P2P-assisted Video Sharing in Online Social Networks
75.
SORT
A Self-ORganizing Trust Model for Peer-to-Peer Systems
76.
Spatial
Approximate String Search
77.
Super-Resolution-based
Inpainting
78.
Towards
a Statistical Framework for Source Anonymity in Sensor Networks
79.
Towards
Differential Query Services in Cost-Efficient Clouds
80.
Tweet
Analysis for Real-Time Event Detection and Earthquake Reporting System
Development
81.
Twitsper
Tweeting Privately
82.
Two
tales of privacy in online social networks
83.
Using
Fuzzy Logic Control to Provide Intelligent Traffic Management Service for
High-Speed Networks
84.
Utility-Privacy
Tradeoff in Databases An Information-theoretic Approach
85.
Vampire
attacks Draining life from wireless ad-hoc sensor networks
86.
WARNINGBIRD
A Near Real-time Detection System for Suspicious URLs in Twitter Stream
87.
Whole
Test Suite Generation
88.
Winds
of Change from Vendor Lock-In to the Meta Cloud
89.
Eefficient
Rekeying Framework for Secure
90.
Fast
Nearest Neighbor Search
91.
Mobi-Sync
Efficient Time Synchronization
92.
Super-Resolution-based
Inpainting
93.
Scalable
Face Image Retrieval using Attribute-Enhanced Sparse Codewords
94.
Collaboration
in Multicloud Computing Environments Framework and Security Issues
95.
Price
Differentiation for Communication Networks
96.
Anomaly
Detection via Online Over-Sampling
97.
Toward
Privacy Preserving and Collusion Resistance in a Location Proof Updating System