CLOUD COMPUTING
Data integrity proofs in cloud storage - .Net
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud - .Net
Optimal service pricing for a cloud cache - .Net
Fuzzy Keyword Search over Encrypted Data - .Net
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing - .Net
An economic approach for scalable and highly-available distributed applications - .Net
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing - .Net
Secure and Practical Outsourcing of Linear Programming in Cloud Computing - JAVA
Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds - JAVA
Improving Utilization of Infrastructure Clouds - JAVA
Agent-Based Urban Transportation Systems - JAVA
Ensuring Data Storage Security in Cloud Computing - JAVA
Client-side Load Balancer using Cloud - JAVA
DEPENDABLE AND SECURED COMPUTING
The Geometric Efficient Matching Algorithm for Firewalls - .Net
A Policy Enforcing Mechanism for Trusted Ad Hoc Network - .Net
Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks - .Net
Detecting Kernel-Level Root kits Using Data Structure Invariants - .Net
Architecting a Secure Enterprise Data Sharing - .Net
Fingerprint Matching Incorporating Ridge Features With Minutiae - .Net
Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Flow Watermarking - .Net
SigFree A Signature-free Buffer - .Net
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks - JAVA
Nymble Blocking Misbehaving Users in Anonymizing Networks - JAVA
Modeling and Detection of Camouflaging Worm. - JAVA
RITAS: Services for Randomized Intrusion Tolerance - JAVA
Online Intrusion Alert Aggregation with Generative Data Stream Modeling - JAVA
Towards Situational Awareness of Large-Scale Botnet Probing Events - JAVA
Analysis on Credit Card Fraud Detection Methods - JAVA
Layered Approach Using Conditional Random Fields for Intrusion Detection IMAGE PROCESSING - JAVA
KNOWLEDGE AND DATA ENGINEERING / DATA MINING
IR-Tree: An Efficient Index for Geographic Document Search - .Net
Studies and Evaluation on Meta Search Engines - .Net
Mining Web Graphs for Recommendations - .Net
Monitoring Service Systems from a Language-Action Perspective - .Net
Integration of Sound Signature in Graphical Password Authentication System - .Net
Exploring Application-Level Semantics for Data Compression - .Net
A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases - .Net
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators - .Net
Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis - .Net
A Personalized Ontology Model for Web Information Gathering - .Net
Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems - .Net
Efficient Computation of Range Aggregates against uncertain location based queries - .Net
Scalable Learning of Collective Behavior - .Net
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques - .Net
One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases - .Net
Publishing Search Logs – A Comparative Study of Privacy Guarantees - .Net
The World in a Nutshell Concise Range Queries - .Net
Adaptive Join Operators for Result Rate Optimization on Streaming Inputs - .Net
AI AND OPINION MINING - .Net
ANONYMOUS QUERY PROCESSING IN ROAD NETWORKS - .Net
Data Leakage Detection Abstract - .Net
Extended XML Tree Pattern Matching: Theories and Algorithms - JAVA
Load Shedding in Mobile Systems with MobiQual - JAVA
The CoQUOS Approach to Continuous Queries in Unstructured Overlays - JAVA
Ranking Spatial Data by Quality Preferences - JAVA
Effective Navigation of Query Results Based on Concept Hierarchies - JAVA
NETWORKING
Live Streaming with Receiver-based Peer-division Multiplexing - .Net
Continuous Neighbor Discovery in Asynchronous Sensor Networks - .Net
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection - .Net
Self-Reconfigurable Wireless Mesh Networks - .Net
Conditional Shortest Path Routing in Delay Tolerant Networks - .Net
Slow Adaptive OFDMA Systems Through Chance Constrained Programming - .Net
Pricing under Constraints in Access Networks Revenue Maximization and Congestion Management - .Net
Selfish Overlay Network Creation and Maintenance - JAVA
SPAF: Stateless FSA-based Packet Filters - JAVA
ProgME: Towards Programmable Network Measurement - JAVA
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks - JAVA
Buffer Sizing for 802.11 Based Networks - JAVA
Model-Based Identification of Dominant Congested Links - JAVA
Channel Allocation in Wireless Data Center Networks - JAVA
Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems - JAVA
A new approach for FEC decoding based on the BP algorithm in LTE and Wi-MAX systems - JAVA
On Modeling, Analysis, and Optimization of Packet Aggregation Systems - Network Communication - JAVA
A Distributed Explicit Rate Schemes in Multi-Input–Multi-Output Network Systems - JAVA
Always Acyclic Distributed Path Computation - JAVA