ieee
@ieee
Packet Loss Control Using Tokens At The Network Edge Peer
11 years ago
Persuasive Cued Click-Points Design, Implementation, And Evaluation Of A Knowledge-Based Authentication Mechanism
11 years ago
Policy By Example For Online Social Network
11 years ago
Privacy And Integrity Preserving Range Queries In Sensor Networks
11 years ago
Privacy Preserving Cloud Data Access With Multi Authorities
11 years ago
Reliable Re-Encryption In Unreliable Clouds
11 years ago
Remote Attestation With Domain -Based Integrity Model And Privacy Analysis
11 years ago
Restaurant Rating And Review Summarization In Mobile Environment
11 years ago
Risk-Aware Mitigation For MANET Routing Attacks
11 years ago
Security Architecture For Cloud Networking
11 years ago
Statistical Entity Extraction From Web
11 years ago
Statistical Entity Extraction From Web
11 years ago
Towards Secure And Dependable Storage Services In Cloud Computing
11 years ago
Trust Modeling In Social Tagging Of Multimedia Content
11 years ago
A Secure Intrusion Deection System Against DDOS Attack In Wireless Mobile AD-HOC Network
11 years ago
View Invarient Action Recognition Based On Artificial Neural Networks
11 years ago
User Aware Image Tag Refinement Via Ternary Semantic Analysis
11 years ago
Topology Control In Mobile Ad Hoc Networks With Cooperative Communications
11 years ago
Securing Node Capture Attacks For Hierarchical Data Aggregation
11 years ago
Scalable Scheduling Of Updates In Streaming Data Warehouses
11 years ago
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute Based Encryption
11 years ago
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute Based Encryption
11 years ago
Robust Face-Name Graph Matching For Movie Character Identification
11 years ago
ROAuth Recommendation Based Open Authorization
11 years ago
Ranking Model Adaption For Domain Specific Search
11 years ago
Query Planning For Continuous Aggregation
11 years ago
Query Delay And Data Availability In MANETs
11 years ago
Query Access Assurance In Outsourced Databases
11 years ago
Generative Models For Item Adoption Using Social Correlation
11 years ago
Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper
11 years ago