ieee

@ieee
5:49
Packet Loss Control Using Tokens At The Network Edge Peer
11 years ago
5:41
Persuasive Cued Click-Points Design, Implementation, And Evaluation Of A Knowledge-Based Authentication Mechanism
11 years ago
7:00
Policy By Example For Online Social Network
11 years ago
7:45
Privacy And Integrity Preserving Range Queries In Sensor Networks
11 years ago
8:18
Privacy Preserving Cloud Data Access With Multi Authorities
11 years ago
3:38
Reliable Re-Encryption In Unreliable Clouds
11 years ago
12:03
Remote Attestation With Domain -Based Integrity Model And Privacy Analysis
11 years ago
3:38
Restaurant Rating And Review Summarization In Mobile Environment
11 years ago
3:10
Risk-Aware Mitigation For MANET Routing Attacks
11 years ago
7:42
Security Architecture For Cloud Networking
11 years ago
30:15
Statistical Entity Extraction From Web
11 years ago
30:15
Statistical Entity Extraction From Web
11 years ago
8:41
Towards Secure And Dependable Storage Services In Cloud Computing
11 years ago
12:05
Trust Modeling In Social Tagging Of Multimedia Content
11 years ago
18:07
A Secure Intrusion Deection System Against DDOS Attack In Wireless Mobile AD-HOC Network
11 years ago
6:40
View Invarient Action Recognition Based On Artificial Neural Networks
11 years ago
4:10
User Aware Image Tag Refinement Via Ternary Semantic Analysis
11 years ago
3:31
Topology Control In Mobile Ad Hoc Networks With Cooperative Communications
11 years ago
8:56
Securing Node Capture Attacks For Hierarchical Data Aggregation
11 years ago
5:10
Scalable Scheduling Of Updates In Streaming Data Warehouses
11 years ago
7:04
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute Based Encryption
11 years ago
7:04
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute Based Encryption
11 years ago
5:39
Robust Face-Name Graph Matching For Movie Character Identification
11 years ago
7:01
ROAuth Recommendation Based Open Authorization
11 years ago
5:08
Ranking Model Adaption For Domain Specific Search
11 years ago
7:42
Query Planning For Continuous Aggregation
11 years ago
4:04
Query Delay And Data Availability In MANETs
11 years ago
6:31
Query Access Assurance In Outsourced Databases
11 years ago
9:25
Generative Models For Item Adoption Using Social Correlation
11 years ago
6:09
Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper
11 years ago