1. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding CLOUD COMPUTING 2012/JAVA

2. Cloud Computing Security: From Single to Multi-Clouds CLOUD COMPUTING 2012/JAVA

3. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage CLOUD COMPUTING 2012/JAVA

4. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing CLOUD COMPUTING 2012/JAVA

5. Outsourced Similarity Search on Metric Data Assets CLOUD COMPUTING 2012/JAVA

6. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption CLOUD COMPUTING 2012/JAVA

7. Toward Secure and Dependable Storage Services in Cloud Computing CLOUD COMPUTING 2012/JAVA

8. Clustering with Multi-viewpoint-Based Similarity Measure KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

9. Efficient Extended Boolean Retrieval KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

10. Ranking Model Adaptation for Domain-Specific Search KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

11. Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

12. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA

13. Payments for Outsourced Computations PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA

14. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks NETWORKING 2012/JAVA

15. Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters NETWORKING 2012/JAVA

16. Independent Directed Acyclic Graphs for Resilient Multipath Routing NETWORKING 2012/JAVA

17. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring NETWORKING 2012/JAVA

18. Privacy- and Integrity-Preserving Range Queries in Sensor Networks NETWORKING 2012/JAVA

19. RIHT: A Novel Hybrid IP Traceback Scheme NETWORKING 2012/JAVA

20. Router Support for Fine-Grained Latency Measurements NETWORKING 2012/JAVA

21. A Stochastic Model of Multi-virus Dynamics SECURE COMPUTING 2012/JAVA

22. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING 2012/JAVA

23. Detecting and Resolving Firewall Policy Anomalies SECURE COMPUTING 2012/JAVA

24. Detecting Spam Zombies by Monitoring Outgoing Messages SECURE COMPUTING 2012/JAVA

25. On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks SECURE COMPUTING 2012/JAVA

26. Online Modeling of Proactive Moderation System for Auction Fraud Detection SECURE COMPUTING 2012/JAVA

27. Packet-Hiding Methods for Preventing Selective Jamming Attacks SECURE COMPUTING 2012/JAVA

28. Risk-Aware Mitigation for MANET Routing Attacks SECURE COMPUTING 2012/JAVA

29. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/JAVA

30. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers IMAGE PROCESSING 2012/JAVA

31. Scalable Coding of Encrypted Images IMAGE PROCESSING 2012/JAVA

32. Learn to Personalized Image Search from the Photo Sharing Websites MULTIMEDIA 2012/JAVA

33. Fast Data Collection in Tree-Based Wireless Sensor Networks MOBILE COMPUTING 2012/JAVA

34. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper MOBILE COMPUTING 2012/JAVA

35. Bootstrapping Ontologies for Web Services SERVICE COMPUTING (WEB SERVICE) 2012/JAVA

36. Handwritten Chinese Text Recognition by Integrating Multiple Contexts IMAGE PROCESSING 2012/JAVA

37. Adaptive Membership Functions for Hand-Written Character Recognition by Voronoi-based Image Zoning IMAGE PROCESSING 2012/JAVA

38. Semantics-Based Automated Service Discovery WEB SERVICE (SOA) 2012/JAVA

39. Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

40. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/JAVA

41. Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks MOBILE COMPUTING 2012/JAVA



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s