Java Java (IEEE) .Net .Net (IEEE)
The Dynamic Bloom Filters |
ViDE: A Vision-Based Approach for Deep Web Data Extraction |
Incremental Evaluation of Visible Nearest Neighbor Queries |
Logic-Based Pattern Discovery |
Towards an Effective XML Keyword Search |
Histogram-Based Global Load Balancing In Structured Peer-To-Peer Systems |
Predicting Missing Items In Shopping Carts |
Distributional Features For Text Categorization |
MABS: Multicast Authentication Based on Batch Signature |
Intrusion Detection In Homogeneous and Heterogeneous WSN |
PDCS: Security And Privacy Support For Data-Centric Sensor Networks |
Efficient Broadcasting In Mobile Ad Hoc Networks (MANETS) |
SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks |
A Dynamic En-route Filtering Scheme for Data Reporting in WSN |
Monitoring the Application-Layer DDoS Attacks for Popular Websites |
Capturing Router Congestion and Delay |
Multiple Routing Configuration For Fast IP Network Recovery |
Minimizing file downloading time in stochastic peer to peer networks |
Evaluating Vulnerability of Network Traffic Using Joint Security & Routing Analysis |
Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing |
Security In Open Source Web Content Management Systems |
Exception Handling Patterns for Process Modeling |
Discovering Services during Service-Based System Design Using UML |
NDT A Model-Driven Approach |
CHARMY: A Framework for Designing and Verifying Architectural Specifications |
Dynamic routing with security considerations |
FDPM: An IP Trace back system to find the real source of attacks |
Distributed algorithms for constructing approximate minimum spanning trees in WSN |
Building Small-World Peer-to-Peer Networks Based on Hierarchical Structures |
Detecting Malicious Packet Losses |
Dynamic Search Algorithm In Unstructured Peer-To-Peer Networks |
Medical Data Mining Using BGA & RGA For Weighting Of Features In Fuzzy K-NN Classification |
Information System Of Relay Protection For Fault Record Analysis |
Increasing Packet Delivery in Ad Hoc On-Demand Distance Vector Routing Protocol |
Protection of Database Security via Collaborative Inference Detection |
Applying Data Mining in Prediction and Classification of Urban Traffic |
A text clustering framework for information retrieval |
Enhancing Privacy & Authorization Control Scalability in the Grid Through Ontology |
A Hybrid Phish Detection Approach by Identity Discovery & Keywords Retrieval |
A Comparison of Machine Learning Techniques for Phishing Detection |
Digital Images tracking by Sequential Multiple Watermarking |
Multipath Routing in wireless Mesh networks |
Better Debugging via Output Tracing and Callstack-Sensitive Slicing |
Modeling and Detection of Camouflaging worm |
Worm hole attacks in wireless networks |
Detecting prospective infectious disease |
Improving Reliability for Application-Layer Multicast Overlays |
An empirical study with object relational databases metrics |
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities |
Analysis of the Effect of Java Software Faults on Security Vulnerabilities |
Design and Implementation of an XML-based Grid File Storage System With Security Features |
A Dynamic Performance Based Flow control method for High-speed Data transfer |
No comments:
Post a Comment