Escolar Documentos
Profissional Documentos
Cultura Documentos
19.A Generic Local Algorithm for Mining Data Streams in Large Distributed
Systems
2.A Solution Model and Tool for Supporting the Negotiation of Security
Decisions in E-Business Collaborations
11.A Solution Model and Tool for Supporting the Negotiation of Security
Decisions in E-Business Collaborations
11. A Mobile Biometric Systemon- Token System for Signing Digital Transactions
12. Designing Host and Network Sensors to Mitigate the Insider Threat
19. A Semantic Search Agent Approach: Finding Appropriate Semantic Web Services Based On
User Request Term(s)
NETWORKING TOPICS
5. Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference
Constraints
9. Pitcher: Enabling Distributed Parallel Computing with Automatic Thread and Data Assignments
10. Minimizing Execution Costs when using Globally Distributed Cloud Services
14. Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission
15.AjaxScope: A Platform for Remotely Monitoring the Client-Side Behavior of web 2.0
Applications
22. Cloud Analyst: A CloudSim-based Visual Modeller for Analyzing Cloud Computing
Environments and Applications
25. Probabilistic proactive routing with active route trace-back for highly mobile Ad Hoc Networks
29.A Novel Cache Management Using Geographically Partial Matching for Location-based Services
30. AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection
Enhancement
36. Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
42. Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing
Schemes
46. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
51. Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
52. Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-
oriented Middleware
54. Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
55. A hybrid technique for efficient Medium Access Control in Wireless Sensor Networks
56. Tradeoffs among Delay, Energy and Accuracy of Partial Data Aggregation in Wireless Sensor
Networks
59. Environmental Sustainability and Improved Quality of Life Through Service Convergence
Technologies
61. Towards more Trustable Log Files for Digital Forensics by Means of “Trusted Computing”
62. Controlling File Distribution in The Share Network Through Content Poisoning
64. A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
66. Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber
75. Analyzing Human Behavior using Case-Based Reasoning with the help of Forensic Questions
76. Using Ontology for Personalized Mobile Message Computation
80. Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote
Collaboration
84. Deadline Aware Virtual Machine Scheduler for Grid and Cloud Computing
85. Generating Optimum Number of Clusters using Median Search and Projection Algorithms
90. Security Verification for Authentication and Key Exchange Protocols, Revisited
95. Tsunami Early Alert and Evacuation Support System for Fishery Workers by Mobile Phones
96. SAGe: Sensor Advanced Gateway for Integrating Wireless Sensor Networks and Internet
106. Peer-to-Peer Overlay Gateway Services for Home Automation and Management
108. Improvement and Its Evaluation of Worker’s Motion Monitor System in Automobile Assembly
Factory
112. Performance Study on Location-assisted and Bluetooth-assisted Session Transfer for VoIP
Application
1.A Better Approximation Algorithm for Computing Connected Dominating Sets in Unit Ball
Graphs
5.Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks
7.Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data
Streams
10.Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
12.SAMAC A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas
13.Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Route
14.VEBEK Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
IEEE Transactions Papers 2010
15.Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks
16. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
18. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
21. Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking
23. SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas
25. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
IEEE Transactions Papers 2010
27. Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic
Data Streams
28. SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile
Environments
32. Optimal Accounting Policies for AAA Systems in Mobile Telecommunications Networks
CRYPTOGRAPHY TOPICS
NS2 TOPICS
1. Weight based DSR for Mobile Ad Hoc Networks
2. Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous
Traffic
3. On the Security of Route Discovery in MANETs
4. ZMAC : A Hybrid MAC for Wireless Sensor Networks
5. Multipoint Relay
6. Cost Minimization Planning for Greenfield PON Network
7. FPGA-Based Channel Simulator for a Wireless Network Emulator
8. NCTUns 5.0 Network Simulator for Advanced Wireless Vehicular Network Researches
10. Visual Network Simulator (VNS): A GUI to QoS simulation for the ns-2 simulator
11. Implementation Architecture of Proxy Mobile IPv6 Protocol for NS2 Simulator Software
12. End-to-end network simulator for conversational quality measurements
13. Improving Video Streaming over IEEE 802.11 Mesh Networks through a Cross-Layer Design
Technique
14. Designing and Implementing an IEEE 802.16 Network Simulator for Performance Evaluation of
Bandwidth Allocation Algorithms
15. A Case Study of Networks Simulation Tools for Wireless Networks
16. Robust and Efficient Stream Delivery for Application Layer Multicasting in Heterogeneous
Networks
17. A Cautionary View of Mobility and Connectivity Modeling in Vehicular Ad-Hoc Networks
18. Security Solution for Mobile Ad Hoc Network of Networks (MANoN )
19. Mesh-based Data Delivery over Multiple Tree-Shaped Routes in P2P Overlay Network
3. A Theoretical and Empirical Study of Search-Based Testing Local, Global, and Hybrid Search
6. DECOR A Method for the Specification and Detection of Code and Design Smells
7. Directed Explicit State-Space Search in the Generation of Counterexamples for Stochastic Model
Checking
14. How Developers’ Experience and Ability Influence Web Application Comprehension Tasks
Supported by UML Stereotypes A Series of Four Experiments
19. Providing Architectural Languages and Tools Interoperability through Model Transformation
Technologies
23. Verification and Trade-Off Analysis of Security Properties in UML System Models
CYBERNETICS TOPICS
INTERN
COMPU
TOPICS
2. Dealing with Transient Faults in the Interconnection Network of CMPs at the Cache Coherence
Level
8. Resource Bundles Using Aggregation for Statistical Large-Scale Resource Discovery and
Management
13. SocioNet: A Social-Based Multimedia Access System for Unstructured P2P Networks
14. A Cross-Layer Approach-Based Gnutella for Collaborative Virtual Environments over Mobile
Ad Hoc Networks
18. Coupling-Based Internal Clock Synchronization for Large-Scale Dynamic Distributed Systems
20. PowerPack: Energy Profiling and Analysis of High-Performance Systems and Applications
26. A Queuing Model for Evaluating the Transfer Latency of Peer-to-Peer Systems
27. Configurable Middleware for Distributed Real-Time Systems with Aperiodic and Periodic Tasks
1 A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis
10. A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis
12. Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
15. A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory
16. Layered Approach Using Conditional Random Fields for Intrusion Detection
MULTIMEDIA TOPICS
7. Practical Realization of Ad hoc Network based on DSR Protocol Considering QOS for
Multimedia Services
13. PID Parameters Tuning Method by Particle Swarm Optimization with Chaotic Disturbance
14. Geometric Distortions Correction Scheme based on Hausdorff Distance for Digital
Watermarking Image
22. Effects of sonar shape distortion on time delay estimation method for left/right discrimination
25. The analysis for the attack on the wireless bridge monitoring system
26. Study on the Real time Log-domain Conversion for Detecting the Transient Feeble Optical
Signal
37. Dynamic Attack Tree and Its Applications on Trojan Horse Detection
42. A Platform for Context-Aware and Digital Rights Management-Enabled Content Adaptation
47. Landscaping Future Interaction Special issue on Mobile and Ubiquitous Multimedia
48. Local Wavelet Features for Statistical Object Classification and Localization
51. Optimal Rate Allocation for Video Transmission over Wireless Ad Hoc Networks
2 A Distance Measure Approach to Exploring the Rough Set Boundary Region for Attribute
Reduction
3 A Game Theoretic Approach for Simultaneous Compaction and Equipartitioning of Spatial Data
Sets
21 Continuous Subgraph Pattern Search over Certain and Uncertain Graph Streams
47 Learning to Adapt Web Information Extraction Knowledge and Discovering New Attributes via a
Bayesian Approach
54 PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
56 Performance Comparison of the Tree and the Quadtree for kNN and Distance Join Queries
70 The Impact of Diversity on Online Ensemble Learning in the Presence of Concept Drift
73 Uninterpreted Schema Matching with Embedded Value Mapping under Opaque Column Names
and Data Values
11. An Efficient Resource Management System for On-line Virtual Cluster Provision
12. The Method and Tool of Cost Analysis for Cloud Computing
16. Policy-based Event-driven Services-oriented Architecture for Cloud Services Operation &
Management
20. Service Oriented Architecture for Cloud based Travel Reservation Software as a Service
23. Ranking Mortgage Origination Applications using Customer, Product, Environment and
Workflow Attributes
31. Expanding the Cloud: A component-based architecture to application deployment on the Internet
33. SLA-Driven Dynamic Resource Management for Multi-tier Web Applications in a Cloud
MOBILE TECHNOLOGY
1. A User-Centered Context-sensitive Privacy Model in Pervasive Systems
6. Enhancing Emerging Learning Objects with Contextual Metadata Using the Linked Data
Approach
8. Integrating Mobile, Web and Sensory Technologies to Support Inquiry-Based Science Learning