20-06-2012, 03:27 AM
1. A Distributed Dynamic Routin[/quote]g With Security Considerations 2011
2. A Hybrid Neural Approach For Character Recognition System 2011
3. A More Secure Stegnography Method in Spatial Domain 2011
4. A Web Search Engine-Based Approach to Measure Semantic Similarity between Words 2011
5. Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks 2011
6. Adaptive Spectral Transform for Wavelet-Based Color Image Compression 2011
7. Compression-Free Checksum-Based Fault-Detection Schemes For Pipelined Processors 2011
8. Continuous Neighbor Discovery in Asynchronous Sensor Networks 2011
9. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks 2011
10. Design and Implementation of an FPGA-based Real-Time Face Recognition System 2011
11. Digit Recognition System Using Back Propagation Neural Network 2011
12. DWT based invisible image watermarking algorithm for color images 2011
13. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud 2011
14. Exploring Application-Level Semantics for Data Compression 2011
15. Face and Eye Detection on Hard Datasets 2011
16. Facial Expression Recognition Using Facial Movement Feature 2011
17. Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts 2011
18. Improved K-Mean Clustering with Steepest Ascent (Gradient) Method for Image Retrieval 2011
19. Inferring Web User Sessions By Clustering Techniques 2011
20. Integration Of Sound Signature In Graphical Password Authentication 2011
21. IR-Tree: An Efficient Index for Geographic Document Search 2011
22. Mining Web Graphs for Recommendations 2011
23. NABS: Novel Approaches for Biometric Systems 2011
24. Proportionally Fair Rate Allocation in Regular Wireless Sensor Networks 2011
25. Publishing Search Logs – A Comparative Study of Privacy Guarantees 2011
26. Resource Overbooking: Using Aggregation Profiling in large scale Resource Discovery 2011
27. The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor? 2011
28. The World in a Nutshell: Concise Range Queries 2011
29. A Salt & Pepper Noise Fast Filtering Algorithm for Grayscale Images Based on Neighborhood Correlation Detection 2010
30. A Variable Length Data Encryption Technique using Square Grid Transposition with Key Wrapping 2010
31. Adaptive Kernel-Based Image Denoising Employing Semi-Parametric Regularization 2010
32. Browsing Video Along Multiple Threads 2010
33. Closeness: A New Privacy Measure for Data Publishing 2010
34. Conditional Shortest Path Routing In Delay Tolerant Networks 2010
35. Data Leakage Detection 2010
36. Ensemble Rough Hypercuboid Approach for Classifying Cancers 2010
37. Fuzzy Keyword Search Over Encrypted Data In Cloud Computing 2010
38. Hiding Sequential and Spatiotemporal Patterns 2010
39. Inverted Lists String Matching Algorithms 2010
40. Pricing Under Constraints in Access Networks: Revenue Maximization and Congestion Management 2010
41. Service Overlay Network Capacity Adaptation For Profit Maximization 2010
42. SigFree A Signature-free Buffer Overflow Attack Blocker 2010
43. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks 2010
44. Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses 2010
45. A Parameterized Approach to Spam-Resilient Link Analysis of the Web 2009
46. A Secure Mobile Healthcare System using Trust-Based Multicast Scheme 2009
47. A Survey on Privacy Preserving Data Mining 2009
48. A TABU Search Algorithm for Cluster Building in Wireless Sensor Networks 2009
49. Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks 2009
50. Automatic Extraction of Heap Reference Properties in Object-Oriented Programs 2009
51. Automatic Performance Tuning for the Virtualized Cluster System 2009
52. Biased Random Walks in Uniform Wireless Networks 2009
53. BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks 2009
54. Cell Breathing Techniques for Load Balancing in Wireless LANs 2009
55. Compression and Aggregation for Logistic Regression Analysis in Data Cubes 2009
56. Connection-based scheduling for supporting real-time traffic in wireless mesh networks 2009
57. Continuous Glass Patterns for Painterly Rendering 2009
58. Data Hiding in Audio Signal A Review 2009
59. Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic 2009
60. Design and Evaluation of the iMed Intelligent Medical Search Engine 2009
61. Determining Attributes to Maximize Visibility of Objects 2009
62. Development of a Software Engineering Ontology for Multisite Software Development 2009
63. Distributed Algorithm for En Route Aggregation Decision in Wireless Sensor Networks 2009
64. Efficient Skyline Computation in Structured Peer-to-Peer Systems 2009
65. Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period 2009
66. Enforcing Minimum-Cost Multicast Routing against Shelfish Information Flows 2009
67. Enhanced Delegation-Based Authentication Protocol for PCSs 2009
68. Enhanced Security for Online Exams Using Group Cryptography 2009
69. Experimental Evaluation of Game Theoretic Power Allocation in MIMO Ad-hoc Networks 2009
70. Explicit Load Balancing Technique for NGEO Satellite IP Networks with On-Board Processing Capability 2009
71. Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing 2009
72. Greedy Routing with Anti Void Traversal for Wireless Sensor Networks 2009
73. Histogram-Based Global Load Balancing In Structured Peer-To-Peer Systems 2009
74. Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking 2009
75. Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc Networks 2009
76. Maintaining Colored Trees for Disjoint Multipath Routing Under Node Failures 2009
77. Message Authentication in Computationally Constrained Environments 2009
78. Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks 2009
79. On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint Routing and Coverage Constraint 2009
80. On the Time Synchronization of Distributed Log Files in Networks with Local Broadcast Media 2009
81. Optimized Resource Allocation for Software Release Planning 2009
82. Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise 2009
83. PRESTO Feedback-Driven Data Management in Sensor Networks 2009
84. Random Cast : An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks 2009
85. Re-sequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications 2009
86. Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services 2009
87. Route Stability in MANETs under the Random Direction Mobility Model 2009
88. Secure and Policy-Compliant Source Routing 2009
89. Security Requirements Engineering : A Framework for Representation and Analysis 2009
90. Self-Learning Disk Scheduling 2009
91. Shortest Path Tree Computation in Dynamic Graphs 2009
92. Similarity-Profiled Temporal Association Mining 2009
93. Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths 2009
94. SORD: A Fault-Resilient Service Overlay for Media Port Resource Discovery 2009
95. Spread-Spectrum Watermarking Security 2009
96. Subontology-Based Resource Management for Web-Based e-Learning 2009
97. The Effectiveness of Checksums for Embedded Control Networks 2009
98. The Viewpoint of E-Commerce Security in the Digital Economy 2009
99. Triple-A: Secure RGB Image Steganography Based on Randomization 2009
100. Two-Factor User Authentication in Wireless Sensor Networks 2009
101. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers 2008
102. A New Model For Dissemination Of Xml 2008
103. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video 2008
104. A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting 2008
105. Active Learning Methods for Interactive Image Retrieval 2008
106. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting 2008
107. Analyzing and Managing Role-Based Access Control Policies 2008
108. Compaction of Schedules and a Two-Stage Approach for Duplication 2008
109. Continuous Delivery Message Dissemination Problems under the Multicasting Communication Mode 2008
110. Credit Card Fraud Detection Using Hidden Markov Models 2008
111. Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization 2008
112. Effective Software Merging in the Presence of Object-Oriented Refactorings 2008
113. Efficient 2-D Grayscale Morphological Transformations With Arbitrary Flat Structuring Elements 2008
114. Efficient Broadcasting Using Network Coding 2008
115. Efficient Broadcasting with Guaranteed Coverage in Mobile AD-HOC Networks 2008
116. Efficient Resource Allocation for Wireless Multicast 2008
117. Efficient Routing In Intermittently Connected Mobile Networks the Multiple Copy Case 2008
118. Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common Interest 2008
119. Estimation of Defects Based on Defect Decay Model ED3M 2008
120. Fuzzy Control Model Optimization for Behavior-Constant Traffic Routing Under Information Provision 2008
121. Hardware enhanced association rule mining with Hashing and Pipelining 2008
122. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems 2008
123. Localized Sensor Area Coverage with Low Communication Overhead 2008
124. Location-Based Spatial Query Processing in Wireless Broadcast Environments 2008
125. On Guaranteed Smooth Switching for Buffered, Crossbar Switches 2008
126. On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 2008
127. On the Design of Distributed Object Placement and Load Balancing Strategies in Large-Scale Networked Multimedia Storage Systems 2008
128. Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High-Capacity Approach 2008
129. Probabilistic Packet Marking for Large-Scale IP Traceback 2008
130. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks 2008
131. Rate less Forward Error Correction for Topology-Transparent Scheduling 2008
132. Securing User-Controlled Routing Infrastructures 2008
133. Security Requirements Engineering: A Framework for Representation and Analysis 2008
134. Selecting the Best Spanning Tree in Metro Ethernet Networks using Genetic Algorithm 2008
135. Semantic Ideation Learning for Agent- Based E-Brainstorming 2008
136. Semantics Based Design for Secure Web Services 2008
137. Statistical Techniques for Detecting Traffic Anomalies Through Packet Header Data 2008
138. Temporal Portioning of Communication Resources in an Integrated Architecture 2008
139. The Effect of Pairs in Program Design Tasks 2008
140. Trustworthy Computing Under Resource Constraints With The Down Policy 2008
141. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light 2008
142. XML Database Migration 2008
143. A Coupled Statistical Model for Face Shape Recovery from Brightness Images 2007
144. A Formal Framework for Automated Round-trip Software Engineering in Static Aspect Weaving and Transformations 2007
145. An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers 2007
146. API-Based and Information-Theoretic Metrics for Measuring the Quality of Software Modularization 2007
147. Clustering and Sequential Pattern Mining of Online Collaborative Learning Data 2007
148. Detecting Wide Lines Using Isotropic Nonlinear Filtering 2007
149. Dual RSA and Its Security Analysis 2007
150. Efficient Approximate Query Processing In Peer Networks 2007
151. Efficient Retrieval of Files From Cluster Based Web Servers 2007
152. Hiding Sensitive Association Rules with Limited Side Effects 2007
153. Hierarchical Pattern-Based Clustering for Grouping Web Transactions 2007
154. High Resolution Animated Scenes from Stills 2007
155. Morphological Granulometric Features of Nucleus in Automatic Bone Marrow White Blood Cell Classification 2007
156. P-Fusion : A P2P Architecture for Internet-Scale Content-Based Search and Retrieval 2007
157. Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols 2007
158. Cryptanalysis of Simplified Data Encryption Standard via Optimization Heuristics 2006
159. Digital Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings 2006
160. Policies for Caching OLAP Queries 2006
161. Visual Web Mining of Organizational Web Sites 2006
162. A Multi-Clustering Fusion Scheme For Data Partitioning 2005
163. Cryptanalysis of Some Multimedia Encryption Schemes 2005
164. Workflow Mining: Discovering Process Models from Event Logs 2004