JV0 |
The Perils of Unauthenticated Encryption: Kerberos Version 4 |
Java |
Kerberos |
2016 |
|
JV1 |
Reliable Re-Encryption in Unreliable Clouds |
Java |
Cloud Computing |
2013 |
|
JV2 |
Costing of Cloud Computing Services: A Total Cost of Ownership Approach |
Java |
Cloud Computing |
2013 |
|
JV3 |
Ensuring Distributed Accountability for Data Sharing in the Cloud |
Java |
Cloud Computing |
2013 |
|
JV4 |
Cloud Data Production for Masses |
Java |
Cloud Computing |
2013 |
|
JV6 |
A secure erasure code based cloud storage system with secure data forwarding |
Java |
Secure Computing |
2013 |
|
JV8 |
Policy-by-Example for Online Social Networks |
Java |
Networking |
2013 |
|
JV10 |
Packet-Hiding Methods for Preventing Selective Jamming Attacks |
Java |
Secure Computing |
2013 |
|
JV11 |
FADE: Secure Overlay Cloud Storage with File Assured Deletion |
Java |
Secure Computing |
2013 |
|
JV12 |
Risk-Aware Mitigation for MANET Routing Attacks |
Java |
Secure Computing |
2013 |
|
JV13 |
Learn to Personalized Image Search from the Photo Sharing Websites |
Java |
Multimedia |
2013 |
|
JV14 |
Organizing User Search Histories |
Java |
Knowledge and Data Engineering |
2013 |
|
JV15 |
Slicing A New Approach to Privacy Preserving+C39Data Publishing |
Java |
Knowledge and Data Engineering |
2013 |
|
JV16 |
Ranking Model Adaptation FOR DOMAIN-SPECIFIC SEARCH |
Java |
Knowledge and Data Engineering |
2013 |
|
JV17 |
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud |
Java |
Parallel and Distributed Systems
|
2013 |
|
JV18 |
Trust modeling in social tagging of multimedia content |
Java |
Multimedia
|
2013 |
|
JV19 |
RIHT: A novel hybrid IP trace back scheme |
Java |
Multimedia
|
2013 |
|
JV20 |
An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks |
Java |
Wireless Communications
|
2013 |
|
JV21 |
Cut Detection in Wireless Sensor Networks |
Java |
Wireless Communications
|
2013 |
|
JV22 |
Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences |
Java |
International Conference (science)
|
2013 |
|
JV23 |
Efficient Computation of Range Aggregates against Uncertain Location Based Queries |
Java |
International Conference
|
2013 |
|
JV24 |
Statistical Entity Extraction from Web |
Java |
International Conference
|
2013 |
|
JV25 |
Efficient Similarity Search over Encrypted Data |
Java |
International Conference (science)
|
2013 |
|
JV26 |
Scalable and cost-effective interconnection of data-center servers using dual server ports |
Java |
Networking
|
2013 |
|
JV27 |
Caching Strategies Based on Information Density Estimation in Wireless Adhoc Networks |
Java |
Networking
|
2013 |
|
JV28 |
Modeling and Detection of Camouflaging Worm |
Java |
Networking
|
2013 |
|
JV29 |
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks |
Java |
Networking
|
2013 |
|
JV30 |
Clustering with Multi-Viewpoint based Similarity Measure |
Java |
Networking
|
2013 |
|
JV31 |
Sketch4Match Content-based Image Retrieval system using sketches |
Java |
Image Processing
|
2013 |
|
JV32 |
Embedded Extended Visual Cryptography Schemes |
Java |
Secure Computing |
2013 |
|
JV33 |
Competitive Study of Cryptography techniques over block Cipher |
Java |
Secure Computing |
2013 |
|
JV34 |
Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations |
Java |
Knowledge and Data Engineering |
2013 |
|
JV35 |
Architecting a secure enterprise data sharing Environment to the edge |
Java |
Secure Computing |
2013 |
|
JV36 |
Analysis on Credit Card Fraud Detection Methods |
Java |
Secure Computing |
2013 |
|
JV37 |
Subspace-Based Striping Noise Reduction in Hyper spectral Images |
Java |
Image Processing |
2013 |
|
JV38 |
Intrusion detection An Energy efficient approach in Heterogeneous WSN |
Java |
Secure Computing |
2013 |
|
JV39 |
Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service |
Java |
Networking |
2013 |
|
JV40 |
Geographical Routing With Location Service in Intermittently Connected MANETs |
Java |
Networking |
2013 |
|
JV41 |
Resource Management Using Dynamical Load Prediction and Multiprocessor Cooperation |
Java |
Networking |
2013 |
|
JV42 |
On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents |
Java |
Networking |
2013 |
|
JV43 |
Mobile Sampling of Sensor Field Data Using Controlled Broadcast |
Java |
Networking |
2013 |
|
JV44 |
Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization |
Java |
Networking |
2013 |
|
JV45 |
Enabling Public Audit ability and Data Dynamics for Storage Security in Cloud Computing |
Java |
Cloud Computing |
2013 |
|
DN1 |
Robust Face-Name Graph Matching for Movie Character Identification |
Dot Net |
Multimedia |
2013 |
|
DN3 |
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding |
Dot Net |
Cloud Computing
|
2013 |
|
DN5 |
Topology Control in Mobile Ad Hoc Networks with Cooperative Communications |
Dot Net |
Wireless Communications
|
2013 |
|
DN6 |
AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies |
Dot Net |
Wireless Communications
|
2013 |
|
DN7 |
Efficient Audit Service Outsourcing for Data Integrity in Clouds |
Dot Net |
Cloud Computing |
2013 |
|
DN9 |
View-invariant action recognition based on Artificial Neural Networks |
Dot Net |
Neural Networks |
2013 |
|
DN10 |
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks |
Dot Net |
Image Processing |
2013 |
|
DN11 |
Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing |
Dot Net |
Cloud Computing |
2013 |
|
DN12 |
Scalable Scheduling of Updates in Streaming Data Warehouses |
Dot Net |
Knowledge and Data Engineering (DM) |
2013 |
|
DN13 |
Efficient and Discovery of Patterns in Sequence Data Sets |
Dot Net |
Knowledge and Data Engineering (DM) |
2013 |
|
DN16 |
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms. |
Dot Net |
Networking |
2013 |
|
DN18 |
Investigation and Analysis of New Approach of Intelligent Semantic Web Search engines. |
Dot Net |
Parallel and Distributed Systems
|
2013 |
|
DN19 |
Data Integrity Proofs In Cloud Storage |
Dot Net |
Cloud Computing
|
2013 |
|
DN20 |
A Personalized Ontology Model For Web Information Gathering |
Dot Net |
Data Mining
|
2013 |
|
DN21 |
A Query Formulation Language for the Data Web |
Dot Net |
Data Mining
|
2013 |
|
DN22 |
A Web Search Engine Based Approach to Measure Semantic Similarity Between Words |
Dot Net |
Data Mining
|
2013 |
|
DN23 |
Adaptive Provisioning Of Human Expertise In Service-Oriented Systems |
Dot Net |
Data Mining
|
2013 |
|
DN24 |
Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems |
Dot Net |
Data Mining
|
2013 |
|
DN25 |
Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud |
Dot Net |
Data Mining
|
2013 |
|
DN26 |
Exploring Application-Level Semantics For Data Compression |
Dot Net |
Data Mining
|
2013 |
|
DN27 |
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques |
Dot Net |
Data Mining
|
2013 |
|
DN29 |
One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases |
Dot Net |
Data Mining
|
2013 |
|
DN30 |
Optimal Service Pricing For A Cloud Cache |
Dot Net |
Data Mining
|
2013 |
|
DN31 |
Publishing Search Logs A Comparative Study Of Privacy Guarantees |
Dot Net |
Data Mining
|
2013 |
|
DN32 |
Fuzzy-Zoning-Based Classification for Handwritten Characters |
Dot Net |
Fuzzy Systems
|
2013 |
|
DN33 |
Adaptive Spectral Transform for Wavelet-Based Color Image Compression |
Dot Net |
Image Processing
|
2013 |
|
DN34 |
Blind Image Watermarking Using a Sample Projection Approach |
Dot Net |
Information forensics And Security
|
2013 |
|
DN35 |
Histogram Specification: A Fast and Flexible Method to Process Digital Images |
Dot Net |
Instrumentation And Measurement
|
2013 |
|
DN36 |
Mining Web Graphs for Recommendations |
Dot Net |
Knowledge And Data Engineering
|
2013 |
|
DN37 |
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
|
Dot Net |
Knowledge And Data Engineering
|
2013 |
|
DN38 |
Scalable Learning of Collective Behavior
|
Dot Net |
Knowledge And Data Engineering
|
2013 |
|
DN39 |
Bridging Socially-Enhanced Virtual Communities
|
Dot Net |
Networking
|
2013 |
|
DN40 |
Unified Approach To Optimizing Performance in Networks Serving Heterogeneous Flows
|
Dot Net |
Networking
|
2013 |
|
DN41 |
A More Secure Steganography Method in Spatial Domain
|
Dot Net |
Secure Computing
|
2013 |
|
DN42 |
NABS Novel Approaches for Biometric Systems
|
Dot Net |
Secure Computing
|
2013 |
|