1. Max-Weight Scheduling in Queuing Networks With Heavy-Tailed Traffic – Network and Communication Systems

  2. A Frequent Term Based Text Clustering Approach Using Novel Similarity Measure – Data Mining and Knowledge Discovery

  3. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage – Data Mining and Cloud Computing

  4. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage – Cloud Computing

  5. An Empirical Performance Evaluation of Relational Keyword Search Systems– Data Mining

  6. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage – Cloud Computing

  7. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks – Network and Mobile Computing

  8. Privacy-PreservingOptimalMeetingLocationDeterminationOnMobileDevices – Networking and Mobile Computing

  9. Control Flow-Based Malware Variant Detection – Network Security

  10. Content Based Image Retrieval Systems – Image Processing

  11. Secure Outsourced Attribute Based Signatures – Secure Computing and Cloud Computing

  12. Dealing with Concept Drifts in Process Mining – Process Mining and Data Mining

  13. Analysis, Modeling and Simulation of Workload Patterns in a Large-Scale Utility Cloud– Secure Computing and Cloud Computing

  14. A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks– Process Mining and Data Mining

  15. Supporting Privacy Protection in Personalized Web Search– Process Mining and Data Mining

  16. Data Mining With Big Data

  17. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

  18. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data

  19. Governing Software Process Improvements in Globally Distributed Product Development

  20. Exploiting Service Similarity for Privacy in Location-Based Search Queries

  21. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage Theory and Implementation

  22. Optimal Power Allocation for MIMO Fully Cooperative Relay Broadcast Channels

  23. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data

  24. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks

  25. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing

  26. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks

  27. Efficient Neighbour Discovery in Mobile Opportunistic Networking Using Mobility Awareness

  28. Building a Scalable System for Stealthy P2P-Botnet Detection

  29. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing

  30. Oruta Privacy- Preserving Public Auditing for Shared Data in the Cloud

  31. Defending Against Collaborative Attacks By Malicious Nodes In Manets A Cooperative Bait Detection Approach

  32. Toward Integrated Scene Text Reading

  33. OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage

    1. Online Contact

      Facebook | Twitter | Linked In | You Tube | Google+

      Our Other Project