Java (IEEE)

Java      Java (IEEE)        .Net         .Net (IEEE)
The Dynamic Bloom Filters
ViDE: A Vision-Based Approach for Deep Web Data Extraction
Incremental Evaluation of Visible Nearest Neighbor Queries
Logic-Based Pattern Discovery
Towards an Effective XML Keyword Search
Histogram-Based Global Load Balancing In Structured Peer-To-Peer Systems
Predicting Missing Items In Shopping Carts
Distributional Features For Text Categorization
MABS: Multicast Authentication Based on Batch Signature
Intrusion Detection In Homogeneous and Heterogeneous WSN
PDCS: Security And Privacy Support For Data-Centric Sensor Networks
Efficient Broadcasting In Mobile Ad Hoc Networks (MANETS)
SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks
A Dynamic En-route Filtering Scheme for Data Reporting in WSN
Monitoring the Application-Layer DDoS Attacks for Popular Websites
Capturing Router Congestion and Delay
Multiple Routing Configuration For Fast IP Network Recovery
Minimizing file downloading time in stochastic peer to peer networks
Evaluating Vulnerability of Network Traffic Using Joint Security & Routing Analysis
Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
Security In Open Source Web Content Management Systems
Exception Handling Patterns for Process Modeling
Discovering Services during Service-Based System Design Using UML
NDT A Model-Driven Approach
CHARMY: A Framework for Designing and Verifying Architectural Specifications
Dynamic routing with security considerations
FDPM: An IP Trace back system to find the real source of attacks
Distributed algorithms for constructing approximate minimum spanning trees in WSN
Building Small-World Peer-to-Peer Networks Based on Hierarchical Structures
Detecting Malicious Packet Losses
Dynamic Search Algorithm In Unstructured Peer-To-Peer Networks
Medical Data Mining Using BGA & RGA For Weighting Of Features In Fuzzy K-NN Classification
Information System Of Relay Protection For Fault Record Analysis
Increasing Packet Delivery in Ad Hoc On-Demand Distance Vector Routing Protocol
Protection of Database Security via Collaborative Inference Detection
Applying Data Mining in Prediction and Classification of Urban Traffic
A text clustering framework for information retrieval
Enhancing Privacy & Authorization Control Scalability in the Grid Through Ontology
A Hybrid Phish Detection Approach by Identity Discovery & Keywords Retrieval
A Comparison of Machine Learning Techniques for Phishing Detection
Digital Images tracking by Sequential Multiple Watermarking
Multipath Routing in wireless Mesh networks
Better Debugging via Output Tracing and Callstack-Sensitive Slicing
Modeling and Detection of Camouflaging worm
Worm hole attacks in wireless networks
Detecting prospective infectious disease
Improving Reliability for Application-Layer Multicast Overlays
An empirical study with object relational databases metrics
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities
Analysis of the Effect of Java Software Faults on Security Vulnerabilities
Design and Implementation of an XML-based Grid File Storage System With Security Features
A Dynamic Performance Based Flow control method for High-speed Data transfer

No comments:

Post a Comment