Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks [Network] 2008/Java
QUIVER: Consistent Object Sharing For Edge Services [Network] 2008/Java
Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing 2008/Java
Geometric Approach to Improving Active Packet Loss Measurement 2008/Java
A Precise Termination Condition of the Probabilistic Packet Marking Algorithm 2008/Java
Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks 2008/Java
Benefit Based Data Caching In Ad Hoc Networks 2008/Java
Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks 2008/Java
Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction 2008/Java
Two Techniques for Fast Computation of Constrained Shortest Paths 2008/Java
Controlling IP Spoofing Through Inter Domain Packet Filters 2008/Java
A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns 2008/Java
Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems 2008/Java
Truth Discovery with Multiple Conflicting Information Providers on Web 2008/Java
Location Based Spatial Query Processing In Wireless Broadcast Environments 2008/Java
Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks 2008/Java
Modeling & Automated Containment of Worms 2008/Java
Security In Large Networks Using Mediator Protocols 2008/Java
An Efficient Association Rule Mining Algorithm In Distributed Databases 2008/Java
BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks 2008/Java
Scalable and Efficient End-To-End Network Topology Inference 2008/Java
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries 2008/Java
Protection of Database Security via Collaborative Inference Detection 2008/Java
Dual-Link Failure Resiliency through Backup Link Mutual Exclusion 2008/Java
Securing User-Controlled Routing Infrastructures 2008/Java
Online Index Recommendations for High-Dimensional Databases Using Query Workloads 2008/Java
Mitigating Performance Degradation in Congested Sensor Networks 2008/Java
Security in Large Networks Using Mediator Protocols 2008/Java
Temporal Partioning of Communication Resources in an Integrated Architecture
Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
Probabilistic Packet Marking For Large Scale IP Trace Back
Personal Authentication Using 3-D Finger Geometry
Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provisio
Credit Card Fraud Detection Using Hidden Markov Models
Active Queue Management For Fair Resource Allocation In Wireless Networks
A Memory Learning Framework for Effective Image Retrieval


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s