Beruflich Dokumente
Kultur Dokumente
JAVA-DATA MINING
VDDM01 VDDM02 VDDM03 VDDM04 VDDM05 VDDM06 VDDM07 VDDM08 VDDM09 A Framework for Similarity Search of Time Series Cliques with Natural Relations A Genetic Programming Approach to Record Deduplication A Probabilistic Scheme for Keyword-Based Incremental Query Construction A Unified Probabilistic Framework for Name Disambiguation in Digital Library Anomaly Detection for Discrete Sequences A Survey Annimos An LP-Based Approach for Anonymizing Weighted Social Network Graphs Answering General Time-Sensitive Queries Clustering with Multiviewpoint-Based Similarity Measure Cluster-Oriented Ensemble Classifier Impact of Multicluster Characterization on Ensemble Classifier Learning Design and Application of a Generic Clinical Decision Support System for Multiscale Data Effective Pattern Discovery for Text Mining Efficient Fuzzy Type-Ahead Search in XML Data Efficiently Indexing Large Sparse Graphs for Similarity Search Feature Selection Based on Class-Dependent Densities for HighDimensional Binary Data Feedback Matching Framework for Semantic Interoperability of Product Data Fractal-Based Intrinsic Dimension Estimation and Its Application in Dimensionality Reduction Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
VDDM15 VDDM16
VDDM17
MAILTO :votmadurai@gmail.com
JAVA-DATA MINING
VDDM18 VDDM19 VDDM20 VDDM21 VDDM22 VDDM23 VDDM24 Improving Aggregate Recommendation Diversity Using RankingBased Techniques Learning Bregman Distance Functions for Semi-Supervised Clustering Low-Rank Kernel Matrix Factorization for Large-Scale Evolutionary Clustering Mining Online Reviews for Predicting Sales Performance A Case Study in the Movie Domain Mining Web Graphs for Recommendations On Group Nearest Group Query Processing On the Complexity of View Update Analysis and Its Application to Annotation Propagation Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching Practical Efficient String Mining Privacy Preserving Decision Tree Learning Using Unrealized Data Sets Publishing Search LogsA Comparative Study of Privacy Guarantees Ranking Model Adaptation for Domain-Specific Search Resilient Identity Crime Detection Scalable Learning of Collective Behavior Slicing A New Approach for Privacy Preserving Data Publishing Topic Mining over Asynchronous Text Sequences Towards a Formal Specification Framework for Manufacturing Execution Systems TSCAN A Content Anatomy Approach to Temporal Topic Summarization
VDDM25 VDDM26
VDDM35
MAILTO :votmadurai@gmail.com
VDDM36 VDDM37
MAILTO :votmadurai@gmail.com
JAVA-MOBILE COMPUTING
VDMC01 VDMC02 A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access Acknowledgment-Based Broadcast Protocol for Reliable and Efficient Data Dissemination in Vehicular Ad Hoc Networks Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services Converge Cast On the Capacity and Delay Tradeoffs Cooperative Download in Vehicular Environments Design and Analysis of the Gateway Relocation and Admission Control Algorithm in Mobile WiMAX Networks Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks Distributed Throughput Maximization in Wireless Networks via Random Power Allocation Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks Efficient Virtual Backbone Construction with Routing Cost Constraint in Wireless Networks Using Directional Antennas Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols Estimating Parameters of Multiple Heterogeneous Target Objects Using Composite Sensor Nodes Fast CaptureRecapture Approach for Mitigating the Problem of Missing RFID Tags Fast Data Collection in Tree-Based Wireless Sensor Networks Fault Localization Using Passive End-to-End Measurements and Sequential Testing for Wireless Sensor Networks
VDMC03
VDMC08
VDMC12 VDMC13
MAILTO :votmadurai@gmail.com
MAILTO :votmadurai@gmail.com
JAVA-MOBILE COMPUTING
VDMC17 FESCIM Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks Geometry and Motion-Based Positioning Algorithms for Mobile Tracking in NLOS Environments Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Heuristic Burst Construction Algorithm for Improving Downlink Capacity in IEEE 802.16 OFDMA Systems Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Jointly Optimal Source-Flow, Transmit-Power, and Sending-Rate Control for MaximumThroughput Delivery of VBR Traffic over Faded Links Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design Local Greedy Approximation for Scheduling in Multihop Wireless Networks Measurement-Based Bandwidth Scavenging in Wireless Networks Mobile Ad Hoc Nanonetworks with Collision-Based Molecular Communication Mobile Data Offloading through Opportunistic Communications and Social Participation Moderated Group Authoring System for Campus-Wide Workgroups Network Connectivity with a Family of Group Mobility Models OMAN A Mobile Ad Hoc Network Design System On the Cost of Knowledge of Mobility in Dynamic Networks An Information-Theoretic Approach Principal Component Localization in Indoor WLAN Environments Radio Resource Management of Composite Wireless Networks Predictive and Reactive Approaches
VDMC18
VDMC19 VDMC20
VDMC21 VDMC22
MAILTO :votmadurai@gmail.com
MAILTO :votmadurai@gmail.com
VDMC34
VDMC41
MAILTO :votmadurai@gmail.com
JAVA-NETWORK SECURITY
VDNS01 VDNS02 VDNS03 VDNS04 VDNS05 VDNS06 VDNS07 VDNS08 VDNS09 VDNS10 VDNS11 VDNS12 VDNS13 A Flexible Approach to Improving System Reliability with Virtual Lockstep A Learning-Based Approach to Reactive Security Automated Security Test Generation with Formal Threat Models Automatic Reconfiguration for Large-Scale Reliable Storage Systems Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs Detecting Anomalous Insiders in Collaborative Information Systems DoubleGuard Detecting Intrusions in Multitier Web Applications Dynamic Security Risk Management Using Bayesian Attack Graphs Enhanced Privacy ID A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities Ensuring Distributed Accountability for Data Sharing in the Cloud Give2Get Forwarding in Social Mobile Wireless Networks of Selfish Individuals JS-Reduce Defending Your Data from Sequential Background Knowledge Attacks Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts On the Security and Efficiency of Content Distribution via Network Coding On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks Packet-Hiding Methods for Preventing Selective Jamming Attacks pCloud A Distributed System for Practical PIR
MAILTO :votmadurai@gmail.com
JAVA-NETWORK SECURITY
VDNS18 SecuredTrust A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting Survivability Experiment and Attack Characterization for RFID Persuasive Cued Click-Points Design, Implementation, and Evaluation of a KnowledgeBased Authentication Mechanism Resilient Authenticated Execution of Critical Applications in Untrusted Environments
VDNS22
MAILTO :votmadurai@gmail.com
JAVA-NETWORKING
VDNW01 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Analyzing the Performance of Greedy Maximal Scheduling via Local Pooling and Graph Theory Bit Weaving A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs Cooperative Profit Sharing in Coalition-Based Resource Allocation in Wireless Networks Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks CSMACN Carrier Sense Multiple Access With Collision Notification Dynamic Power Allocation Under Arbitrary Varying ChannelsAn Online Approach Economic Issues in Shared Infrastructures Exploiting Excess Capacity to Improve Robustness of WDM Mesh Networks Fast Dynamic Multiple-Set Membership Testing Using Combinatorial Bloom Filters Improving Energy Saving and Reliability in Wireless Sensor Networks Using a Simple CRTBased Packet-Forwarding Solution Latency Equalization as a New Network Service Primitive Minimizing ISP Network Energy Cost Formulation and Solutions On New Approaches of Assessing Network Vulnerability Hardness and Approximation
MAILTO :votmadurai@gmail.com
VDNW17
MAILTO :votmadurai@gmail.com
JAVA-NETWORKING
VDNW18 VDNW19 VDNW20 VDNW21 Optimal Source-Based Filtering of Malicious Traffic Quantifying Video-QoE Degradations of Internet Links Order Matters Transmission Reordering in Wireless Networks Static Routing and Wavelength Assignment for Multicast Advance Reservation in AllOptical Wavelength-Routed WDM Networks System-Level Optimization in Wireless Networks Managing Interference and Uncertainty via Robust Optimization The Case for Feed-Forward Clock Synchronization
VDNW22 VDNW23
MAILTO :votmadurai@gmail.com
VDPD04
VDPD12 VDPD13
VDPD14 VDPD15
VDPD16
VDPD17
MAILTO :votmadurai@gmail.com
MAILTO :votmadurai@gmail.com
VDPD30 VDPD31
VDPD32
MAILTO :votmadurai@gmail.com
VDPD38
VDPD42
DOT NET- PARALLEL DISTRIBUTION Mesh Decomposition for Efficient Parallel Computing of Electrical Machines by Means of FEM Accounting for Motion Modeling and Analysis of Communication Networks in Multicluster Systems under SpatioTemporal Bursty Traffic On Coverage of Wireless Sensor Networks for Rolling Terrains On Optimizing Overlay Topologies for Search in Unstructured Peer-toPeer Networks Online Scheduling of Dynamic Task Graphs with Communication and Contention for Multiprocessors Optimal Construction of All Shortest Node-Disjoint Paths in Hypercubes with Applications Optimizing Techniques for Parallel Digital Logic Simulation Performance Analysis of Cloud Computing Centers Using MGmm+r Queuing Systems
MAILTO :votmadurai@gmail.com
VDPD50 VDPD51 VDPD52 VDPD53 VDPD54 VDPD55 VDPD56 VDPD57 VDPD58 VDPD59
MAILTO :votmadurai@gmail.com
VDIM09
VDIM10
VDIM11
VDIM12
VDIM16 VDIM17
VDIM18
MAILTO :votmadurai@gmail.com
MAILTO :votmadurai@gmail.com
VDIM29 VDIM30
VDIM31
VDIM32
VDIM33
VDIM34
VDIM35 VDIM36
MAILTO :votmadurai@gmail.com
MAILTO :votmadurai@gmail.com
MAILTO :votmadurai@gmail.com