IEEE DotNet


WIRELESS NETWORK TOPOLOGY

 

  1. Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation
  2. Power Control and Soft Topology Adaptations in Multihop Cellular Networks With Multi-Point Connectivity
  3. Statistical Dissemination Control in Large Machine-to-Machine Communication Networks
  4. Dynamic Openflow-Controlled Optical Packet Switching Network
  5. Toward Transparent Coexistence for Multihaop Secondary Cognitive Radio Networks
 
NETWORK SECURITY

 

  1. Privacy-Preserving Detection of Sensitive Data Exposure
  2. Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking
  3. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
  4. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
  5. Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques
  6. Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing
  7. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
  8. Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter
  9. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
  10. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
 
MOBILE COMPUTING

 

  1. Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks
  2. Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks
  3. Self-Organizing Resource Management Framework in OFDMA Femtocells
  4. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
  5. Max Contribution An Online Approximation of Optimal Resource Allocation in Delay Tolerant Networks
  6. Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks
  7. Game-Theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks
  8. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
  9. Friend book A Semantic-Based Friend Recommendation System for Social Networks
  10. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
  11. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
  12. A Hierarchical Account-Aided Reputation Management System for MANETs
  13. Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms: A Virtual Multichannel Approach
  14. On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications
  15. Multipath TCP: Analysis, Design, and Implementation
  16. Learning-Based Uplink Interference Management in 4G LTE Cellular Systems
  17. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
  18. Connectivity-Based Segmentation in Large-Scale 2-D/3-D Sensor Networks: Algorithm and Applications
  19. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
  20. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things
  21. Authenticated Key Exchange Protocols for Parallel Network File Systems
  22. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks
  23. Decentralized Computation Offloading Game for Mobile Cloud Computing
  24. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
  25. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
  26. Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm
  27. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
  28. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
 
PARALLEL & DISTRIBUTED

 

  1. A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks
  2. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
  3. Authenticated Key Exchange Protocols for Parallel Network File Systems
  4. Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs
  5. Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks
  6. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
  7. Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks
  8. Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs
  9. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
  10. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
 
CLOUD COMPUTING

 

  1. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
  2. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
  3. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
  4. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
  5. Identity-Based Encryption with Outsourced Revocation in Cloud Computing
  6. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
  7. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
  8. Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming
  9. T-broker A Trust-aware Service Brokering Scheme for Multiple Cloud Collaborative Services
  10. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
  11. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
  12. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
  13. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
  14. A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
  15. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
  16. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
  17. Application-Level Optimization of Big Data Transfers Through Pipelining, Parallelism and Concurrency
  18. Identity-Based Encryption with Outsourced Revocation in Cloud Computing
  19. Spatio-Temporal Load Balancing for Energy Cost Optimization in Distributed Internet Data Centers
  20. Proof of ownership in deduplicated cloud storage with mobile device efficiency
  21. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
 
WEB SERVICES

 

  1. Automatic Web Service Composition Based on Uncertainty Execution Effects
  2. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
  3. Data-Driven Composition for Service-Oriented Situational Web Applications
  4. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
  5. Diversifying Web Service Recommendation Results via Exploring Service Usage History
 
WEB MINING

 

  1. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction
  2. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
  3. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care
  4. Quality of Experience User’s Perception about Web Services
  5. Real-Time Detection of Traffic From Twitter Stream Analysis
  6. Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction
  7. Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
  8. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care
  9. Quality of Experience User’s Perception about Web Services
  10. Real-Time Detection of Traffic From Twitter Stream Analysis
 
DATA MINING OR DATA ENGINEERING

 

  1. Active Learning for Ranking through Expected Loss Optimization
  2. Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Itemsets
  3. Efficient Motif Discovery for Large-scale Time Series in Healthcare
  4. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
  5. Relational Collaborative Topic Regression for Recommender Systems
 
IMAGE PROCESSING

 

  1. Context-Aware Patch-Based Image Inpainting Using Markov Random Field Modeling
  2. Exemplar-Based Inpainting Technical Review and New Heuristics for Better Geometric Reconstructions
  3. Multi-task Pose-Invariant Face Recognition
  4. Real-World and Rapid Face Recognition Toward Pose and Expression Variations via Feature Library Matrix
  5. Blood Vessel Segmentation of Fundus Images by Major Vessel Extraction and Subimage Classification
  6. Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features
  7. EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval
  8. Query Specific Rank Fusion for Image Retrieval
  9. An AdaBoost-Based Face Detection System Using Parallel Configurable Architecture With Optimized Computation
  10. Face Spoof Detection With Image Distortion Analysis
  11. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT
 
NEURAL NETWORK

 

  1. A Two-Layer Recurrent Neural Network for Nonsmooth Convex Optimization Problems
  2. Self-Organizing Neural Networks Integrating Domain Knowledge and Reinforcement Learning
  3. Neural Network-Based Model Predictive Control: Fault Tolerance and Stability
  4. Learning Understandable Neural Networks With Nonnegative Weight Constraints
  5. Multitask Learning of Deep Neural Networks for Low-Resource Speech Recognition
  6. A Regression Approach to Speech Enhancement Based on Deep Neural Networks
  7. An Enhanced Fuzzy Min–Max Neural Network for Pattern Classification
  8. Neural Network-Based Model Design for Short-Term Load Forecast in Distribution Systems
  9. Ensemble of Adaptive Rule-Based Granular Neural Network Classifiers for Multispectral Remote Sensing Images
  10. State-Clustering Based Multiple Deep Neural Networks Modeling Approach for Speech Recognition
 
DATA MINING

 

  1. K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
  2. RANWAR: Rank-Based Weighted Association Rule Mining From Gene Expression and Methylation Data
  3. i2MapReduce: Incremental MapReduce for Mining Evolving Big Data
  4. A Ranking Approach on Large-Scale Graph With Multidimensional Heterogeneous Information
  5. An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques
  6. A decision-theoretic rough set approach for dynamic data mining
  7. Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support
  8. Data mining challenges and knowledge discovery in real life applications
  9. Efficient Motif Discovery for Large-scale Time Series in Healthcare
 
BIG DATA

 

  1. Real-Time Big Data Analytical Architecture for Remote Sensing Application
  2. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
  3. Research Directions for Engineering Big Data Analytics Software
  4. Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors
  5. Multilayer Big Data Architecture for Remote Sensing in Eolic Parks
  6. Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage
  7. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
  8. Stochastic Decision Making for Adaptive Crowd sourcing in Medical Big-Data Platforms
 
WIRLESS NETWORKING

 

  1. Multi-Node Wireless Energy Charging in Sensor Networks
  2. Mobile application security: malware threats and defenses
  3. VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks
  4. Massive hybrid antenna array for millimeter-wave cellular communications
  5. Communication challenges in high-density deployments of wearable wireless devices
  6. AIWAC: affective interaction through wearable computing and cloud technology
  7. Social on the road: enabling secure and efficient social networking on highways
  8. Wireless communications for vehicular safety
  9. Opportunistic communications in interference alignment networks with wireless power transfer

Whoops, looks like something went wrong.

(1/1) ErrorException

ob_end_flush(): failed to send buffer of zlib output compression (0)

in Response.php line 1286
at HandleExceptions->handleError(8, 'ob_end_flush(): failed to send buffer of zlib output compression (0)', '/home/iasetus/public_html/vendor/symfony/http-foundation/Response.php', 1286, array('targetLevel' => 0, 'flush' => true, 'status' => array(array('name' => 'zlib output compression', 'type' => 0, 'flags' => 112, 'level' => 0, 'chunk_size' => 16384, 'buffer_size' => 20480, 'buffer_used' => 0), array('name' => 'default output handler', 'type' => 0, 'flags' => 112, 'level' => 1, 'chunk_size' => 0, 'buffer_size' => 36864, 'buffer_used' => 34850)), 'level' => 0, 'flags' => 96, 's' => array('name' => 'zlib output compression', 'type' => 0, 'flags' => 112, 'level' => 0, 'chunk_size' => 16384, 'buffer_size' => 20480, 'buffer_used' => 0)))
at ob_end_flush()in Response.php line 1286
at Response::closeOutputBuffers(0, true)in Response.php line 379
at Response->send()in index.php line 56