1. A Decentralized Service Discovery Approach on Peer-to-Peer Networks.2. A Distributed Control Law for Load Balancing in Content Delivery Networks
3. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data.
4. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia.
5. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks.
6. A Load Balancing Model Based on Cloud Partitioningfor the Public Cloud.
7. A New Algorithm for Inferring User Search Goals with Feedback Sessions
8. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
9. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
10. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
11. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
12. A System to Filter Unwanted Messages from OSN User Walls
13. Access Policy Consolidation for Event Processing Systems
14. AMES A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
15. Annotating Search Results from Web Databases
16. Attribute-Based Encryption With Verifiable Outsourced Decryption
17. Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
18. Beyond Text QA Multimedia
19. CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
20. CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
21. CloudMoV Cloud-based Mobile Social TV
22. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
23. Collaboration in Multicloud Computing Environments Framework and Security Issues
24. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
25. Comparable Entity Mining from Comparative Questions
26. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
27. Crowd sourcing Predictors of Behavioral Outcomes
28. Delay-Based Network Utility Maximization
29. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
30. Distributed Cooperative Caching in Social Wireless Networks
31. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
32. Document Clustering for Forensic Analysis An Approach for Improving Computer Inspection
33. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
34. EAACK—A Secure Intrusion-Detection System for MANETs
35. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
36. Extracting Spread-Spectrum Hidden Data from Digital Media
37. Facilitating Document Annotation using Content and Querying Value
38. Facilitating Effective User Navigation through Website Structure Improvement
39. Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm
40. Fault Node Recovery Algorithm for a Wireless Sensor Network
41. FoCUS Learning to Crawl Web Forums
42. Fully Anonymous Profile Matching in Mobile Social Networks
43. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
44. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
45. Identity-Based Secure Distributed Data Storage
46. Incentive Compatible Privacy-Preserving Data Analysis
47. IP-Geolocation Mapping for Moderately Connected Internet Regions
48. Load Rebalancing for Distributed File Systems in Clouds
49. Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
50. Mining contract s for business event and temporal constraints in service engagement
51. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
52. Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
53. Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
54. m-Privacy for Collaborative Data Publishing
55. NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
56. On the Node Clone Detection in Wireless Sensor Networks
57. Opportunistic MANETs Mobility Can Make Up for Low Transmission Power
58. Optimal Client-Server Assignment for Internet Distributed Systems
59. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
60. PACK Prediction-Based Cloud Bandwidth and Cost Reduction System
61. PMSE A Personalized Mobile Search Engine
62. Preventing Private Information Inference Attacks on Social Networks
63. Price Differentiation for Communication Networks
64. Privacy Preserving Data Sharing With Anonymous ID Assignment
65. Privacy Preserving Delegated Access Control
66. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
67. Privacy-Preserving Public Auditing for Secure Cloud Storage
68. Protecting Sensitive Labels in Social Network Data Anonymization
69. obust Module Based Data Management
70. Scalable and Secure Sharing of Personal Health Records
71. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
72. Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
73. Sensitive Label Privacy Protection on Social Network Data
74. SocialTube P2P-assisted Video Sharing in Online Social Networks
75. SORT A Self-ORganizing Trust Model for Peer-to-Peer Systems
76. Spatial Approximate String Search
77. Super-Resolution-based Inpainting
78. Towards a Statistical Framework for Source Anonymity in Sensor Networks
79. Towards Differential Query Services in Cost-Efficient Clouds
80. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
81. Twitsper Tweeting Privately
82. Two tales of privacy in online social networks
83. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
84. Utility-Privacy Tradeoff in Databases An Information-theoretic Approach
85. Vampire attacks Draining life from wireless ad-hoc sensor networks
86. WARNINGBIRD A Near Real-time Detection System for Suspicious URLs in Twitter Stream
87. Whole Test Suite Generation
88. Winds of Change from Vendor Lock-In to the Meta Cloud
89. Eefficient Rekeying Framework for Secure
90. Fast Nearest Neighbor Search
91. Mobi-Sync Efficient Time Synchronization
92. Super-Resolution-based Inpainting
93. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
94. Collaboration in Multicloud Computing Environments Framework and Security Issues
95. Price Differentiation for Communication Networks
96. Anomaly Detection via Online Over-Sampling
97. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System