- Cloud
- DataMining
- Image Processing
- Security
- Wireless Networks
- Secure Computing
- Service Computing
- Mobile / Multimedia
CLOUD COMPUTING
DATAMINING
1 | Search Rank Fraud and Malware Detection in Google Play | |
2 | PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks | |
3 | Influence Maximization in Trajectory Databases | |
4 | An Iterative Classification Scheme for Sanitizing Large-Scale Datasets | |
5 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | |
6 | Explaining Missing Answers to Top-k SQL Queries | |
7 | Designing High-Performance Web-Based Computing Services to Promote Telemedicine Database Management System | |
8 | Continuous Top-k Monitoring on Document Streams | |
9 | Generating Query Facets using Knowledge Bases | |
10 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | |
11 | Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data | |
12 | Understand Short Texts by Harvesting and Analyzing Semantic Knowledge | |
13 | Influence Maximization in Trajectory Databases | |
14 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | |
15 | User Vitality Ranking and Prediction in Social Networking Service: a Dynamic Network Perspective | |
16 | Energy-efficient Query Processing in Web Search Engines | |
17 | Search Rank Fraud and Malware Detection in Google Play | |
18 | SAP: Improving Continuous Top-K Queries over Streaming Data | |
19 | Online Multi-task Learning Framework for Ensemble Forecasting | |
20 | Probabilistic Models For Ad View ability Prediction On The Web | |
21 | Mining Competitors from Large Unstructured Datasets | |
22 | GALLOP: GlobAL feature fused LOcation Prediction for Different Check-in Scenarios | |
23 | Efficient Clue-based Route Search on Road Networks | |
24 | Microscopic and Macroscopic spatio-temporal Topic Models for Check-in Data | |
25 | Large-scale Location Prediction for Web Pages | |
26 | Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction | |
27 | Discrete Nonnegative Spectral Clustering | |
28 | Managing Temporal Constraints with Preferences: Representation, Reasoning, and Querying | |
29 | Facilitating Time Critical Information Seeking in Social Media | |
30 | Stochastic Blockmodeling and Variational Bayes Learning for Signed Network Analysis | |
31 | Finding Related Forum Posts through Content Similarity over Intention-based Segmentation | |
32 | l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items | |
33 | Towards Real-Time, Country-Level Location Classification of Worldwide Tweets | |
34 | Differentially Private Data Publishing and Analysis: a Survey | |
35 | Scalable Algorithms for CQA Post Voting Prediction | |
36 | Adaptive ensembling of semi-supervised clustering solutions | |
37 | A Multi-objective Optimization Approach for Question Routing in Community Question Answering Sevices | |
41 | Data-Driven Answer Selection in Community QA Systems | |
42 | Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach | |
43 | Energy-efficient Query Processing in Web Search Engines | |
44 | Online Multi-task Learning Framework for Ensemble Forecasting | |
45 | Privacy-Preserving Selective Aggregation of Online User Behavior Data | |
46 | Privacy protection based access control scheme in cloud-based services | |
47 | Continuous Top-k Monitoring on Document Streams Retrieval | |
48 | Dynamic Facet Ordering for Faceted Product Search Engines | |
49 | Applying Combinatorial Testing To datamining Algorithms | |
50 | Assessing Invariant Mining Techniques For Cloud-Based Utility Computing Systems | |
51 | Dltsr: A Deep Learning Framework For Recommendations Of Long-Tail Web Services | |
52 | Data Center Server Provision : Distributed Asynchronous Control For Coupled Renewal Systems | |
53 | Outliers discovery From smart meters data Using A Statistical Based datamining approach | |
IMAGE PROCESSING
NETWORKING AND SECURITY
1 | An Overlay Architecture for Throughput Optimal Multipath Routing | |
2 | Routing in Accumulative Multi-Hop Networks | |
3 | Coding for Improved Throughput Performance in Network Switches | |
4 | Power Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet Protocol | |
5 | A Scalable Framework for Wireless Distributed Computing | |
6 | Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels | |
7 | Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems | |
8 | Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks | |
9 | A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails | |
10 | On Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional Antennas: Theoretical Foundation and Algorithm Design | |
11 | When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks | |
12 | Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks |
Wireless Sensor Networks
1 | Energy –Efficient Transmission Based On Compressive Sensing In Wsn |
2 | Filtering Noisy 802.11 Time-Of-Flight Ranging Measurements From Commoditized Wifi Radios |
3 | Maximizing Lifetime In Wireless Sensor Network For Structural Health Monitoring With And Without Energy Harvesting |
4 | Power Efficiency And Delay Trade Off Of 10gbase-T Energy Efficient Ethernet Protocol |
5 | Data-Driven Faulty Node Detection Scheme for Wireless Sensor Networks |
DEPENDABLE AND SECURE COMPUTING
4 | My Privacy My Decision: Control of Photo Sharing on Online Social Networks
|
5 | Privacy-Preserving Aggregate Queries for Optimal Location Selection
|
6 | MMBcloud -Tree: Authenticated Index for Verifiable Cloud Service Selection Networking
|
7 | Cloud Data Auditing Techniques with a Focus on Privacy and Security |
8 | A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing |
9 | Cryptographic Solutions for Credibility and Liability Issues of Genomic Data |
10 | Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications |
11 | Fault-Tolerant Adaptive Routing in Dragonfly Networks |
12 | Optimal Spot-Checking for Collusion Tolerance in Computer Grids -Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
13 | Privacy-Preserving Aggregate Queries for Optimal Location Selection |
14 | Design and Implementation of the Ascend Secure Processor |
15 | Efficient Delegated Private Set Intersection on Outsourced Private Datasets |
16 | Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices |
17 | Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
SERVICE COMPUTING
1 | Resource renting for periodical cloud workflow applications |
2 | Pattern-Based Design and Verification of Secure Service Compositions |
3 | DLTSR: A Deep Learning Framework for Recommendation of Long-tail Web Services
|
4 | Optimal Task Dispatching on Multiple Heterogeneous Multiserver Systems with Dynamic Speed and Power Management
|
5 | Energy Theft Detection in Multi-Tenant Data Centers with Digital Protective Relay Deployment
|
6 | Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud
|
7 | Resource renting for periodical cloud workflow applications |
8 | Time Dependent Pricing for Large-scale Mobile Networks of Urban Environment: Feasibility and Adaptability |
9 | TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud |
10 | Transactional Behavior Verification in Business Process as a Service Configuration |
11 | FogRoute: DTN-based Data Dissemination Model in Fog Computing |
12 | Pattern−Based Design and Verification of Secure Service Compositions |
13 | LoDPD: A Location Difference-based Proximity Detection Protocol for Fog Computing |
14 | Resource Allocation in Vehicular Cloud Computing Systems with Heterogeneous Vehicles and Roadside Units |
15 | Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions |
16 | A Context-Aware Architecture Supporting Service Availability in Mobile Cloud Computing |
17 | A Light weight securedata Sharing Scheme For Mobile Cloud Computing |
18 | A Multi-Objectiveoptimization Approach For Question Routingin Community Question Answering Sevices |
MOBILE COMPUITNG
1 | Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems |
2 | A Classroom Scheduling Service for Smart Classes s
|
3 | Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
|
4 | Searching Trajectories by Regions of Interest
|
5 | ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes |
6 | Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
|
7 | Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy |
MULTIMEDIA
1 | Cost-Effective Low-Delay Design for Multi-Party Cloud Video Conferencing |
2 | Image Based Appraisal of Real Estate Properties
|
3 | Visual Tracking via Nonnegative Multiple Coding
|
4 | Image Based Appraisal of Real Estate Properties
|
5 | Cost-Effective Low-Delay Design for Multi-Party Cloud Video Conferencing |