Sie sind auf Seite 1von 7

Java/J2EE/Java ME (IEEE Journal Papers)

Transaction on Knowledge and Data Mining 1. 2. PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects (Mar-2010) P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains (Jul2010) 3. 4. 5. 6. 7. 8. 9. BinRank: Scaling Dynamic Authority-Based Search Using Materialized Subgraphs (Aug-2010) Projective Distribution of XQuery with Updates (Aug-10) Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks (Sep-2010) Grid Video: A Practical Example of Nonscientific Application on the Grid (2009) Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems (2009) Effective and Efficient Query Processing for Video Subsequence Identification (2009) Approximate Distributed K-Means Clustering over a Peer-to-Peer Network (2009)

Transaction on Networking 10. A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks (Feb-2010) 11. 12. 13. 14. POPI: A User-level Tool for Inferring Router Packet Forwarding Priority (Feb-2010) SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks (Jun-2010) Approximation of Generalized Processor Sharing With Interleaved Stratified Timer Wheels (Jun-2010) Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks (Jun-2010) 15. 16. 17. 18. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis (Aug-2010) Lord of the Links: A Framework for Discovering Missing Links in the Internet Topology (2009) Multiple Routing Configurations for Fast IP Network Recovery (2009) Monitoring the Application-Layer DDoS Attacks for Popular Websites (2009)

Java/J2EE/Java ME (IEEE Journal Papers)

19. 20. 21.

Maintaining Colored Trees for Disjoint Multipath Routing Under Node Failures (2009) An AS-level overlay network for IP Traceback (2009) An Optimal Wake-Up Scheduling Algorithm for Minimizing Energy Consumption while Limiting Maximum Delay in a Mesh Sensor Network (2009)

Transaction on Software Engineering 22. Vulnerability Discovery with Attack Injection (Jun-2010) 23. On Event-Based Middleware for Location-Aware Mobile Applications (Jun-2010)

Transaction on Services Computing 24. Semantic-Based Mashup of Composite Applications (Mar-2010) 25. 26. An Autonomic Service Delivery Platform for Service-Oriented Network Environments (Jun-2010) A Distributed System for Consuming Web Services and Caching Their Responses in MANETs (2009)

Transaction on Dependable and Secure Computing 27. 28. 29. 30. pCloud: A Distributed System for Practical PIR (2010) An Advanced Hybrid Peer-to-Peer Botnet (Jun-2010) Using Web-Referral Architectures to Mitigate Denial-of-Service Threats (Jun-2010) On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme (2009)

Transactions on Information Technology in BIOMEDICINE 31. Using Heterogeneous Wireless Sensor Networks in a Tele-Monitoring System for Healthcare (Mar- 2010)

Transaction on Multimedia

Java/J2EE/Java ME (IEEE Journal Papers)

32. 33. 34.

Effective Annotation and Search for Video Blogs with Integration of Context and Content Analysis (2009) WMA: A Marking-Based Synchronized Multimedia Tutoring System for English Composition Studies (2009) Hybrid Tagging and Browsing Approaches for Efficient Manual Image Annotation (2009)

Transaction on Parallel and Distributed Computing 35. 36. 37. 38. 39. 40. 41. 42. IRM: Integrated File Replication and Consistency Maintenance in P2P Systems (Jan-2010) Toward Automated Anomaly Identification in Large-Scale Systems (Feb-2010) Elastic Routing Table with Provable Performance for Congestion Control in DHT Networks (Feb-2010) Privacy-Conscious Location-Based Queries in Mobile Environments (Mar-2010) Group-Based Negotiations in P2P Systems (Oct-2010) A Decentralized Method for Scaling Up Genome Similarity Search Services (2009) Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems (2009) Multipath Dissemination in Regular Mesh Topologies (2009)

Transaction on Mobile Computing 43. 44. 45. An Improved Geocast for Mobile Ad Hoc Networks. (Feb 2011) Parallelizing Itinerary-Based KNN Query Processing in Wireless Sensor Networks (May 2010) SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments (Jun 2010) 46. 47. 48. 49. 50. 51. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes (Jun - 2010) MABS: Multicast Authentication Based on Batch Signature (Jul - 2010) Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing (Aug-2010) Efficient Load-Aware Routing Scheme for Wireless Mesh Networks (Sep-2010) On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures (Sep 2010) A Biased Random Walk Routing Protocol for Wireless Sensor Networks: The Lukewarm Potato Protocol (Nov 2010)

Java/J2EE/Java ME (IEEE Journal Papers)

52. 53. 54. 55. 56.

An Improved Geocast for Mobile Ad Hoc Networks. (Feb 2011) BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks (2009) Consistency Management Strategies for Data Replication in Mobile Ad Hoc Networks (2009) SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks (2009) Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs (2009)

Transaction on Learning Technologies 57. A Mobile Live Video Learning System for Large-Scale Learning System Design and Evaluation (Mar-2010) Transaction on Information and Forensic 58. Blind Authentication: A Secure Crypto-Biometric Verification Protocol (Jun-2010) 59. 60. Edge Adaptive Image Steganography Based on LSB Matching Revisited (Jun-2010) Exploiting the Human Machine Gap in Image Recognition for Designing CAPTCHAs (2009)

Transaction on Vehicular Technology 61. Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks (Feb2010) 62. 63. 64. 65. DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks (Feb-2010) A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments (2009) Protection Against Mobile Tracing through Motion-MIX for Mobile Wireless Nodes (2009) A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks (2009)

Transaction on Communications 66. Keychain-Based Signatures for Securing BGP (Oct-2010)

Java/J2EE/Java ME (IEEE Journal Papers)

67.

A secure mobile healthcare system using trust-based multicast scheme (2009)

Transaction on Wireless Communications 68. Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs (May-2010)

Transaction on Systems, Man and Cybernetics 69. Multifactor Identity Verification Using Aggregated Proof of Knowledge (Jul-2010) 70. Mining Demand Chain Knowledge for New Product Development and Marketing (2009)

Transaction on Computers 71. Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures (2010) 72. Collusive Piracy Prevention in P2P Content Delivery Networks (2009)

Transaction on Consumer Electronics 73. Social Applications in the Home Network (Feb-2010) 74. 75. Personalized DTV Program Recommendation System under a Cloud Computing Environment (May-2010) Content Sharing between Home Networks by using Personal Information and Associated Fuzzy Vault Scheme (2009)

IEEE Conference Papers 76. Secured WSN-integrated Cloud Computing for u-Life Care (2010) 77. 78. 79. 80. Use of Query Tokenization to detect and prevent SQL Injection Attacks (2010) Research and Implementation of the Coal Enterprises Bidding System Based on BS.(2010) Semi-automatic creation of graphically-rich mobile Television services and applications 2010) A new architecture of online trading platform based on Cloud computing 2010)

Java/J2EE/Java ME (IEEE Journal Papers)

81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91.

Personalized Multimedia Touristic Services for Hybrid Broadcast/Broadband Mobile Receivers (2010) Mobile Healthcare Information Management utilizing Cloud Computing and Android OS (2010) Asynchronous Anti Phishing Image Captcha Approach towards Phishing (2010) Widget Based Position System (WBPS) An innovative mobile Application (2010) Defending Grid Web Services from XDoS Attacks by SOTA (2009) Design of mobile electronic commerce system based on J2ME (2009) A Proactive Approach to Preventing Phishing Attacks Using Pshark. (2009) Multi-Layered Defense against Web Application Attacks (2009) The Construction of E-Business Portal Based on Struts, Spring and Hibernate. (2009) Design and Implementation of Interoperable Medical Information System Based on SOA (2009) Research and design of Animation Promotion Public Service Platform based on SOA (2009)

IEEE Computer Society 92. Intrusion Detection for Grid and Cloud Computing (IEEE-2010) 93. 94. Enabling Cross-Disciplinary E-Science by Integrating Geoscience Ontologies with Dolce (2009) Rainbow Product Ranking for Upgrading E-Commerce (2009)

Image Processing IEEE Papers Based on Matlab 95. Reversible Image Watermarking Using Interpolation Technique. (IEEE 2010) 96. 97. 98. An Identity Authentication System Based on Face Biometrics and Eye Localization (IEEE 2010) Drowsiness Detection Based on Eyelid Movement.(IEEE 2010) A remote marker less human gait tracking for e-healthcare based on content-aware wireless multimedia communications. (IEEE 2010) 99. 100. 101. 102. 103. Digital watermarking of ECG data for secure wireless communication.(IEEE 2010) High Resolution Cerebral Blood Flow Imaging by Registered Laser Speckle Contrast Analysis(IEEE 2010) Detecting Abandoned Objects With a Moving Camera.(IEEE 2010) Video Segmentation Based on Motion Coherence of Particles in a Video Sequence(IEEE 2010) A Combinatorial Solution for Model-Based Image Segmentation and Real-Time Tracking (IEEE 2010)

Java/J2EE/Java ME (IEEE Journal Papers)

104.

Digital Cinema Watermarking For Estimating The Position Of The Pirate.(IEEE 2010)

Das könnte Ihnen auch gefallen