Tuesday 26 June 2012

Packet-Hiding Methods for Preventing Selective Jamming Attacks

Packet-Hiding Methods for Preventing Selective Jamming Attacks

Fast Data Collection in Tree-Based Wireless Sensor Networks

Fast Data Collection in Tree-Based Wireless Sensor Networks

View-invariant action recognition based on Artificial Neural Networks

View-invariant action recognition based on Artificial Neural Networks

Towards Accurate Mobile Sensor Network Localization in Noisy Environments

Towards Accurate Mobile Sensor Network Localization in Noisy Environments

Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare Emergency

SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare Emergency

Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval

Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption

Risk-Aware Mitigation for MANET Routing Attacks

Risk-Aware Mitigation for MANET Routing Attacks

Ranking Model Adaptation for Domain-Specific Search

Ranking Model Adaptation for Domain-Specific Search

Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

Privacy- and Integrity-Preserving Range Queries in Sensor Networks

Privacy- and Integrity-Preserving Range Queries in Sensor Networks

Outsourced Similarity Search on Metric Data Assets

Outsourced Similarity Search on Metric Data Assets

Network Assisted Mobile Computing with Optimal Uplink Query Processing

Network Assisted Mobile Computing with Optimal Uplink Query Processing

Load Balancing Multipath Switching System with Flow Slice

Load Balancing Multipath Switching System with Flow Slice

Learn to Personalized Image Search from the Photo Sharing Websites

Learn to Personalized Image Search from the Photo Sharing Websites

FireCol A Collaborative Protection Network for the Detection of Flooding DDoS Attacks

FireCol A Collaborative Protection Network for the Detection of Flooding DDoS Attacks

Fast Matrix Embedding by Matrix Extending

Fast Matrix Embedding by Matrix Extending

Ensuring Distributed Accountability for Data Sharing in the Cloud

Ensuring Distributed Accountability for Data Sharing in the Cloud

Efficient Audit Service Outsourcing for Data Integrity in Clouds

Efficient Audit Service Outsourcing for Data Integrity in Clouds

Discovering Characterizations of the Behavior of Anomalous Sub-populations

Discovering Characterizations of the Behavior of Anomalous Sub-populations

Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs

Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs

Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points

Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points

Cooperative download in vehicular environments

Cooperative download in vehicular environments

Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks

An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks

AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

Active Visual Segmentation

Active Visual Segmentation

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group

A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group

A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

A Novel Data Embedding Method Using Adaptive Pixel Pair Matching