1. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding CLOUD COMPUTING 2012/JAVA
2. Cloud Computing Security: From Single to Multi-Clouds CLOUD COMPUTING 2012/JAVA
3. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage CLOUD COMPUTING 2012/JAVA
4. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing CLOUD COMPUTING 2012/JAVA
5. Outsourced Similarity Search on Metric Data Assets CLOUD COMPUTING 2012/JAVA
6. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption CLOUD COMPUTING 2012/JAVA
7. Toward Secure and Dependable Storage Services in Cloud Computing CLOUD COMPUTING 2012/JAVA
8. Clustering with Multi-viewpoint-Based Similarity Measure KNOWLEDGE AND DATA ENGINEERING 2012/JAVA
9. Efficient Extended Boolean Retrieval KNOWLEDGE AND DATA ENGINEERING 2012/JAVA
10. Ranking Model Adaptation for Domain-Specific Search KNOWLEDGE AND DATA ENGINEERING 2012/JAVA
11. Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/JAVA
12. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA
13. Payments for Outsourced Computations PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA
14. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks NETWORKING 2012/JAVA
15. Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters NETWORKING 2012/JAVA
16. Independent Directed Acyclic Graphs for Resilient Multipath Routing NETWORKING 2012/JAVA
17. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring NETWORKING 2012/JAVA
18. Privacy- and Integrity-Preserving Range Queries in Sensor Networks NETWORKING 2012/JAVA
19. RIHT: A Novel Hybrid IP Traceback Scheme NETWORKING 2012/JAVA
20. Router Support for Fine-Grained Latency Measurements NETWORKING 2012/JAVA
21. A Stochastic Model of Multi-virus Dynamics SECURE COMPUTING 2012/JAVA
22. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING 2012/JAVA
23. Detecting and Resolving Firewall Policy Anomalies SECURE COMPUTING 2012/JAVA
24. Detecting Spam Zombies by Monitoring Outgoing Messages SECURE COMPUTING 2012/JAVA
25. On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks SECURE COMPUTING 2012/JAVA
26. Online Modeling of Proactive Moderation System for Auction Fraud Detection SECURE COMPUTING 2012/JAVA
27. Packet-Hiding Methods for Preventing Selective Jamming Attacks SECURE COMPUTING 2012/JAVA
28. Risk-Aware Mitigation for MANET Routing Attacks SECURE COMPUTING 2012/JAVA
29. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/JAVA
30. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers IMAGE PROCESSING 2012/JAVA
31. Scalable Coding of Encrypted Images IMAGE PROCESSING 2012/JAVA
32. Learn to Personalized Image Search from the Photo Sharing Websites MULTIMEDIA 2012/JAVA
33. Fast Data Collection in Tree-Based Wireless Sensor Networks MOBILE COMPUTING 2012/JAVA
34. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper MOBILE COMPUTING 2012/JAVA
35. Bootstrapping Ontologies for Web Services SERVICE COMPUTING (WEB SERVICE) 2012/JAVA
36. Handwritten Chinese Text Recognition by Integrating Multiple Contexts IMAGE PROCESSING 2012/JAVA
37. Adaptive Membership Functions for Hand-Written Character Recognition by Voronoi-based Image Zoning IMAGE PROCESSING 2012/JAVA
38. Semantics-Based Automated Service Discovery WEB SERVICE (SOA) 2012/JAVA
39. Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/JAVA
40. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/JAVA
41. Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks MOBILE COMPUTING 2012/JAVA
DOWNLOAD BASE PAPERS
https://rapidshare.com/files/3188434777/JAVA.rar
No comments:
Post a Comment