DOTNET 2012 TITLES

2012

  1. An Access Control Model based on Multi-factors Trust

  2. New user Access Control For Web Service Using Web Server Log

  3. Online Modeling of Proactive Moderation System for Auction Fraud Detection

  4. Authentication Schemes for Session passwords Using Color and Images

  5. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

  6. Cloud Computing Security From Single to Multi-Clouds

  7. Efficient audit service outsourcing for data integrity in clouds

  8. Ensuring Distributed Accountability for Data Sharing in the Cloud

  9. Reliable Re-encryption in Unreliable Clouds

  10. Personalized image search

  11. Privacy- and Integrity-Preserving Range Queries in Sensor Networks

  12. Towards Secure and Dependable Storage Services in Cloud Computing

  13. Ranking Model Adaptation for Domain-Specific Search

  14. Probalistic model of (tn) Visual Cryptography scheme with Dynamic group

  15. A Discriminative Model of Motion and Cross Ratio for View-Invariant Action Recognition

  16. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

  17. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

  18. A Secure Erasure Code-Based Cloud Storage System withSecure Data Forwarding

  19. Ensuring Distributed Accountability

  20. Persuasive cued-click points Design implementation and evaluation of knowledge based authentication mechanism

  21. Probalistic model of (tn) Visual Cryptography scheme with Dynamic group

  22. Discovering Characterizations of the Behavior of Anomalous Sub-populations

  23. Outsourced Similarity Search on Metric Data Assets

  24. Active Visual Segmentation

  25. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

  26. Optimal Source-Based Filtering of Malicious Traffic

  27. Record Matching Over Query Result in Multiple Web Database

  28. Defenses Against Large Scale Online Password Guessing Attacks By using Persuasive Click Points

  29. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

  30. Cooperative Download in Vehicular Environments

  31. Mining Web Graphs for Recommendations

  32. Privacy- and Integrity-Preserving Range Queries in Sensor Networks

  33. A New Spatial Object Search Framework for Road Networks

  34. Continuous Top-k Dominating Queries

  35. Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems

  36. An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks

  37. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

  38. Discovering Characterizations of the Behavior of Anomalous Sub-populations

  39. Efficient Audit Service Outsourcing for Data Integrity in Clouds

  40. Ensuring Distributed Accountability for Data Sharing in the Cloud

  41. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

  42. Personalized image search

  43. Privacy- and Integrity-Preserving Range Queries in Sensor Networks

  44. Outsourced Similarity Search on Metric Data Assets

  45. FairTorrent: A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems

  46. An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks

  47. Ranking Model Adaptation for Domain-Specific Search

  48. Reliable Re-encryption in Unreliable Clouds

  49. Scalable and Secure Sharing of Personal Health Records in Cloud Computing document

  50. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

  51. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

  52. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

  53. Cooperative Download in Vehicular Environments

  54. Mining Web Graphs for Recommendations

  55. Personlizing-Web directories_Last

  56. Continuous Top-k Dominating Queries

  57. ROAD A New Spatial Object Search

  58. A secure erasure code based system

  59. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining AnalysisE

  60. Mininig web grap

  61. Optimal source based filtering malacion

  62. Probalistic model of (tn) Visual Cryptography scheme with Dynamic group

  63. ROAD A New Spatial Object Search

  64. SPOC A Secure and Privacy-preserving

  65. View invariant action

  66. Double Guard Detecting Intrusions in Multi tier Web Application

  67. Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions

  68. Over Wireless Networks

  69. Ranking Model Adaptation for Domain-Specific Search

  70. Slicing: A New Approach to Privacy Preserving Data Publishing

  71. Organizing User Search Histories

  72. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

  73. Cooperative download in vehicular environments

  74. Learn to Personalized Image Search from the Photo Sharing Websites

  75. Fast Object Search on Road Networks

  76. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

  77. Privacy- and Integrity-Preserving Range Queries in Sensor Networks

  78. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

  79. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using

  80. Catching Packet Droppers and Modifiers in Wireless Sensor Networks

  81. ES-MPICH2: A Message Passing Interface with Enhanced Security

  82. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

  83. Ensuring Distributed Accountability for Data Sharing inthe Cloud

  84. Topology Control in Mobile Ad hoc Networks with Cooperative Communications


    1. Online Contact

      Facebook | Twitter | Linked In | You Tube | Google+

      Our Other Project