S No
AMES-Cloud: A Framework of Adaptive Mobile Video 3 Streaming and Efficient Social Video Sharing in the Clouds A Load Balancing Model Based on Cloud Partitioning for 4 the Public Cloud Development Privacy Preserving Delegated Access Control in Public 5 Clouds CAM: Cloud-Assisted Privacy Preserving Mobile Health 6 Monitoring. Extracting Spread-Spectrum Hidden Data from Digital 7 Media
8 Two tales of privacy in online social networks
Cloud Computing
2013
Cloud Computing
2013
Secure Computing
2013
Utility-Privacy Tradeoff in Databases An Information9 theoretic Approach. A Fast Clustering-Based Feature Subset Selection algorithm 10 for High Dimensional Data A System to Filter Unwanted Messages from OSN User 11 Walls CloudMoV: Cloud-based Mobile Social TV
12
Data Mining
2013
Data Mining Data Mining Data Mining Data Mining Data Mining Data Mining Data Mining Data Mining
Mobile Relay Configuration in Data-intensive Wireless 22 Sensor Networks. Vampire attacks: Draining life from wireless ad-hoc sensor 23 networks. Towards a Statistical Framework for Source Anonymity in 24 Sensor Networks A Scalable Server Architecture for Mobile Presence Services 25 in Social Network Applications Privacy-Preserving Distributed Profile Matching in 26 Proximity-based Mobile Social Networks Distributed Cooperative Caching in Social Wireless 27 Networks Optimizing Cloud Resources for Delivering IPTV Services 28 through Virtualization
29 Access Policy Consolidation for Event Processing Systems
Mobile Computing
2013
Mobile Computing
2013
Mobile Computing
2013
Mobile Computing
2013
Mobile Computing
2013
Mining Contracts for Business Events and Temporal 30 Constraints in Service Engagements Fully Anonymous Profile Matching in Mobile Social 31 Networks
32 Price Differentiation for Communication Networks
Networking Networking Parallel and Distributed Systems Parallel and Distributed Systems Cloud Computing Cloud & Parallel And Distributed Knowledge & Data Engineering
Dynamic Resource Allocation using Virtual Machines for 33 Cloud Computing Environment Scalable and Secure Sharing of Personal Health Records in 34 Cloud Computing Using Attribute-Based Encryption
35 Cloud Data Protection for the Masses 36
Ensuring distributed accountability for data sharing in the 38 cloud Fast Data Collection in Tree-Based Wireless Sensor
39 Networks
Secure Computing
2012
Mobile Computing
2012
Footprint Detecting Sybil Attacks in Urban Vehicular 40 Networks Handwritten Chinese Text Recognition by Integrating 41 Multiple Contexts Learn to Personalized Image Search from the Photo Sharing 42 Websites Multiparty access control for online social networks: model 43 and mechanisms On Optimizing Overlay Topologies for Search in
44 Unstructured Peer-to-Peer Networks
Parallel And Distributed Pattern Analysis & Machine Intelligence Multimedia & Image Processing Knowledge & Data Engineering Parallel And Distributed Network security
2012
2012
2012
2012
2012 2012
Secure Computing Knowledge & Data Engineering Secure Computing Knowledge & Data Engineering Image Processing Networking Mobile Computing Networking Image Processing
2012
Mobile Computing
2012
56
Organizing User Search Histories A Network Coding Equivalent Content Distribution Scheme
2012 2012
Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co58 occurrences 59 Packet Loss Control Using Tokens at the Network Edge
Computer Application
2012
2012 Data Mining 2012 Cloud computing 2012 Cloud computing 2012 Cloud computing 2012 Mobile Computing 2012 Image processing Cloud Computing Networks 2012 2012
2012 Parallel And Distributed Data Mining Service Computing 2012 2012
Mobile Computing
2012
2012 Cloud Computing Cloud Computing network computing Data Mining Data Mining Data Mining Secure Computing Networking Cloud computing Networking 2012 2012 2012 2012 2012 2011 2011 2011 2011 2011 2011 2011 2011 2011 2012 2012 2012 2012 2012 2012
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication 82 Mechanism An Efficient Caching Scheme and Consistency Maintenance 83 in Hybrid P2P System
84 Efficient audit service outsourcing for data integrity in clouds 85 Detecting Targeted Malicious Email 86
Monitoring and Detecting Abnormal Behavior in Mobile Cloud computing Cloud Infrastructure Protecting Location Privacy in Sensor Networks against a 87 Mobile Computing Global Eavesdropper Secure And Practical Outsourcing Of Linear Programming In 88 Cloud Computing Cloud Computing multi-clouds
89 Improving Utilization of Infrastructure Clouds
Cloud Computing Cloud Computing Image Processing & Secure Computing Image Processing & Secure Computing Image Processing & Secure Computing Knowledge & Data Engineering Image Processing & Knowledge & Data Engineering IEEE Journal
Cloud Computing for Agent-Based Urban Transportation Systems Nymble-Blocking Misbehaving Users In Anonym Zing 91 Networks Robust Video Data Hiding Using Forbidden Data Hiding 92 And Selective Embedding
90 93 Embedded Extended Visual Crypto Graph Schemes 94 Extended xml tree pattern matching: theories and algorithms
Databases Advanced Routing Technology For Fast Internet Protocol Network Recovery Denial Of Service Attacks In Wireless Networks : The Case 98 Of Jammers
97 99 Data Leakage Detection
IEEE Journal IEEE Journal Knowledge & Data Engineering Knowledge & Data Engineering
2011
Knowledge & Data Engineering Data Mining Data Mining Data Mining Data Mining Networking Networking + Knowledge & Data Engineering Networking Networking Networking Networking Networking Networking Networking Networking
2011
2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011
103 Clustering With Multi View Point Based Similarity Measure 104
Resource Management Using Dynamical Load Prediction & Multi Processor Cooperation Load Shedding In Mobile Systems In Mobiqual A Study on Certificate Revocation in Mobile Ad Hoc Networks A permutation-based algorithm to optimally reschedule trains in a railway traffic network Design Of P-Cycles For Full Node Protection In WDM Mesh Networks Dynamic Channel Allocation For Wireless Zone-Based Multicast & Broadcast Service A Foundation For Stochastic Bandwidth Estimation Of Networks With Random Service A New Approach For FEC Decoding Based On The Bp Algorithm In LTE And Wi-Max Systems Voronai-Based Continuous Query Processing For Mobile Users Geographical Routing With Location Service In Intermittently Connected MANETS
107 108
An Efficient Paging Scheme For Terminal Mobility Using Personal Mobility Management Information In Inter Worked 116 Fixed And Mobile Networks
117 Selective Data Stream Blocking Mechanism For Networks
Networking Networking Networking Wireless Communication Networking Networking Networking Wireless Communication Wireless Communication Wireless Communication Wireless Communication Mobile Computing Mobile Computing Secure Computing Secure Computing Secure Computing Secure Computing Secure Computing Secure Computing Software Engineering
Design And Performance Analysis Of Mobility Management Schemes Based On Pointer Forwarding For Wireless Mesh 118 Networks Secure Communications Over Wireless Broadcast Networks: 119 Stability And Utility Maximization
120 Selfish Overlay Network Creation and Maintenance 121 Buffer Sizing for 802.11 Based Networks 122 Locating Equivalent Servants over P2P Networks
The CoQUOS Approach to Continuous Queries in 123 Unstructured Overlays SAT: A Security Architecture Achieving Anonymity and 124 Traceability in Wireless Mesh Networks Wireless Sensor Network Security model using Zero 125 Knowledge Protocol Caching Strategies Based on Information Density Estimation 126 in Wireless Ad Hoc Networks A Privacy Preserving Location Monitoring System For Wireless Sensor Networks Supporting Efficient And Scalable Multicasting Over Mobile 128 Ad-Hoc Networks
127 129 Analysis Of Credit Card Fraud Detection Methods 130
2011
2011
2011 2011 2011 2011 2011 2011 2011 2011 2011 2011
Dynamics Of Malware Spread In Decentralized Peer-To-Peer Networks On The Effectiveness Of Monitoring For Intrusion Detection 133 In Mobile Ad Hoc Networks Online Intrusion Alert Aggregation with Generative Data 134 Stream Modeling Analysis Of Quality Of Object Oriented Systems Using 135 Object Oriented Metrics
132