Java Java (IEEE) .Net .Net (IEEE)
Deriving Concept-Based User Profiles from Search Engine Logs |
Record Matching over Query Results from Multiple Web Databases |
Filtering Data Streams for Entity-Based Continuous Queries |
Interactive Correction & Recommendation for Computer Language Learning |
Learning Image-Text Associations |
A Relation Based Page Rank Algorithm For Semantic Web Search Engines |
English To Spanish Translation Of Signboard Images From Mobile |
Message Authentication In Computationally Constrained Environment |
Biased Random Walks in Uniform Wireless Networks |
Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period |
Greedy Routing with Anti-Void Traversal for WSN |
On the Security of Route Discovery in MANETs |
Route Stability in MANETs under the Random Direction Mobility Model |
Multicasting With Localized Control In Wireless Ad Hoc Networks |
A Flexible Privacy-Enhanced Location-Based Services System Framework &Practice |
Localized Sensor Area Coverage with Low Communication Overhead |
Efficient Resource Allocation For Wireless Multicast |
A Gen2 Based RFID Authentication Protocol for Security and Privacy |
The Design Trade-Offs Of Bit-torrent-Like File Sharing Protocols |
Multiple Routing Configurations For Fast IP Network Recovery |
Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services |
Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks |
Aggregation With Fragment Retransmission For Very High-Speed WLANS |
A Traffic Engineering Approach For Placement And Selection Of Network Services |
A Distributed and Scalable Routing Table Manager |
Efficient Routing in Intermittently Connected Mobile Networks The Multiple copy Case |
A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory |
A Survey on the Encryption of Converge cast Traffic with In-Network Processing |
Credit card fraud detection using hidden Markov model |
Trustworthy Computing under Resource Constraints with the DOWN Policy |
DECOR: A Method for the Specification and Detection of Code and Design Smells |
A Modified Model for Private Data Security Facing E-commerce |
Optimized Resource Allocation For Software Release Planning |
pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval |
Adaptive Multi versioning for Open MP parallelization via machine Learning |
Network Coding-Based Protection of Many-to-One Wireless Flows |
Scheduling Multisource Divisible Loads on Arbitrary Networks |
No comments:
Post a Comment