Iee 2011 Java
Iee 2011 Java
Mobile Computing 2. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks. View : Abstract Basepaper IEEE Transactions on Mobile Computing 3. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks. View : Abstract Basepaper IEEE Transactions on Mobile Computing 4. Throughput Optimization in Mobile Backbone Networks. View : Abstract Basepaper IEEE Transactions on Mobile Computing 5. Wireless Sensor Network Security model using Zero Knowledge Protocol. View : Abstract Basepaper IEEE Transactions on Mobile Computing 6. Secure High-Throughput Multicast Routing in Wireless Mesh Networks. View : Abstract Basepaper IEEE Transactions on Mobile Computing WIRELESS COMMUNICATIONS 7. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks. View : Abstract Basepaper IEEE Transactions on Wirel ess Communications 8. Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Desig n. View : Abstract Basepaper ss Communications Networking 9. Buffer Sizing for 802.11 Based Networks. IEEE Transactions on Wirele
View : Abstract Basepaper IEEE Transactions on Networ king 10. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks View : Abstract Basepaper IEEE Transactions on Networ king 11. Selfish Overlay Network Creation and Maintenance. View : Abstract Basepaper rking 12. SPAF: Stateless FSA-based Packet Filters. IEEE Transactions on Netwo
View : Abstract Basepaper IEEE Transactions on Networ king 13. ProgME: Towards Programmable Network Measurement . View : Abstract Basepaper IEEE Transactions on Networ king 14. Topological Transformation Approaches to TCAM-Based Packet Classification.
View : Abstract Basepaper IEEE Transactions on Networ king 15. Monitoring Service Systems from a Language-Action Perspective. View : Abstract Basepaper IEEE Transactions on Networ king Secure Computing 16. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireles sMesh Networks. View : Abstract Basepaper IEEE Transactions on Dependable and Sec ure Computing 17. Modeling and Detection of Camouflaging Worm . View : Abstract Basepaper IEEE Transactions on Dependable and Secu re Computing 18. Nymble: Blocking Misbehaving Users in Anonymizing Networks. View : Abstract Basepaper IEEE Transactions on Dependable and Secu re Computing 19. RITAS: Services for Randomized Intrusion Tolerance . View : Abstract Basepaper IEEE Transactions on Dependable and Secu re Computing 20. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum-Diamete r Spanning Tree. View : Abstract Basepaper IEEE Transactions on Dependable and Sec ure Computing 21. Comparative Evaluation of Spoofing Defenses . View : Abstract Basepaper IEEE Transactions on Dependable and Secu re Computing 22. Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET . View : Abstract Basepaper IEEE Transactions on Dependable and Sec ure Computing NetWork and Service MANAGEMENT 23. Locating Equivalent Servants over P2P Networks . View : Abstract Basepaper IEEE Transactions on Network and Serv ice Management KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) 24. Decision Trees for Uncertain Data . View : Abstract Basepaper Engineering 25. Data Leakage Detection . View :Abstract Basepaper IEEE Transactions on Knowledge and Da ta Engineering 26. Ranking Spatial Data by Quality Preferences . View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 27. Load Shedding in Mobile Systems with MobiQual . View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 28. Adaptive Cluster Distance Bounding for High Dimensional Indexing . IEEE Transactions on Knowledge and Data
View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 29. Effective Navigation of Query Results Based on Concept Hierarchies . View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 30. Discovering Conditional Functional Dependencies. View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 31. The CoQUOS Approach to Continuous Queries in Unstructured Overlays . View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 32. Extended XML Tree Pattern Matching: Theories and Algorithms . View : Abstract Basepaper Engineering 33. Group Enclosing Queries . IEEE Transactions on Knowledge and Data
View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 34. Making AggregationWork in Uncertain and Probabilistic Databases . View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 35. Learning Semi-Riemannian Metrics for Semisupervised Feature Extraction . View : Abstract Basepaper Engineering Software Engineering IEEE Transactions on Knowledge and Data
36. Semi-Proving: An Integrated Method for Program Proving, Testing, and Debuggi ng . View : Abstract Basepaper re Engineering Cloud Computing - (DATA MINING) 37. Improving Utilization of Infrastructure Clouds. View : Abstract Basepaper IEEE Transactions on Cloud Computing IEEE Transactions on Softwa
38. Secure and Practical Outsourcing of Linear Programming in Cloud Computing. View : Abstract Basepaper IEEE Transactions on Cloud Computing
39. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clo uds.