[vc_row][vc_column width=”1/1″][vc_tabs interval=”10″ el_class=”nav-bar-java”][vc_tab title=”Cloud” tab_id=”1506542085-1-82″][vc_column_text]
CLOUD COMPUTING
[/vc_column_text][/vc_tab][vc_tab title=”DataMining” tab_id=”1506542085-2-87″][vc_column_text]
DATAMINING
| 1 | Search Rank Fraud and Malware Detection in Google Play | |
| 2 | PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks | |
| 3 | Influence Maximization in Trajectory Databases | |
| 4 | An Iterative Classification Scheme for Sanitizing Large-Scale Datasets | |
| 5 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | |
| 6 | Explaining Missing Answers to Top-k SQL Queries | |
| 7 | Designing High-Performance Web-Based Computing Services to Promote Telemedicine Database Management System | |
| 8 | Continuous Top-k Monitoring on Document Streams | |
| 9 | Generating Query Facets using Knowledge Bases | |
| 10 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | |
| 11 | Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data | |
| 12 | Understand Short Texts by Harvesting and Analyzing Semantic Knowledge | |
| 13 | Influence Maximization in Trajectory Databases | |
| 14 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | |
| 15 | User Vitality Ranking and Prediction in Social Networking Service: a Dynamic Network Perspective | |
| 16 | Energy-efficient Query Processing in Web Search Engines | |
| 17 | Search Rank Fraud and Malware Detection in Google Play | |
| 18 | SAP: Improving Continuous Top-K Queries over Streaming Data | |
| 19 | Online Multi-task Learning Framework for Ensemble Forecasting | |
| 20 | Probabilistic Models For Ad View ability Prediction On The Web | |
| 21 | Mining Competitors from Large Unstructured Datasets | |
| 22 | GALLOP: GlobAL feature fused LOcation Prediction for Different Check-in Scenarios | |
| 23 | Efficient Clue-based Route Search on Road Networks | |
| 24 | Microscopic and Macroscopic spatio-temporal Topic Models for Check-in Data | |
| 25 | Large-scale Location Prediction for Web Pages | |
| 26 | Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction | |
| 27 | Discrete Nonnegative Spectral Clustering | |
| 28 | Managing Temporal Constraints with Preferences: Representation, Reasoning, and Querying | |
| 29 | Facilitating Time Critical Information Seeking in Social Media | |
| 30 | Stochastic Blockmodeling and Variational Bayes Learning for Signed Network Analysis | |
| 31 | Finding Related Forum Posts through Content Similarity over Intention-based Segmentation | |
| 32 | l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items | |
| 33 | Towards Real-Time, Country-Level Location Classification of Worldwide Tweets | |
| 34 | Differentially Private Data Publishing and Analysis: a Survey | |
| 35 | Scalable Algorithms for CQA Post Voting Prediction | |
| 36 | Adaptive ensembling of semi-supervised clustering solutions | |
| 37 | A Multi-objective Optimization Approach for Question Routing in Community Question Answering Sevices | |
| 41 | Data-Driven Answer Selection in Community QA Systems | |
| 42 | Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach | |
| 43 | Energy-efficient Query Processing in Web Search Engines | |
| 44 | Online Multi-task Learning Framework for Ensemble Forecasting | |
| 45 | Privacy-Preserving Selective Aggregation of Online User Behavior Data | |
| 46 | Privacy protection based access control scheme in cloud-based services | |
| 47 | Continuous Top-k Monitoring on Document Streams Retrieval | |
| 48 | Dynamic Facet Ordering for Faceted Product Search Engines | |
| 49 | Applying Combinatorial Testing To datamining Algorithms | |
| 50 | Assessing Invariant Mining Techniques For Cloud-Based Utility Computing Systems | |
| 51 | Dltsr: A Deep Learning Framework For Recommendations Of Long-Tail Web Services | |
| 52 | Data Center Server Provision : Distributed Asynchronous Control For Coupled Renewal Systems | |
| 53 | Outliers discovery From smart meters data Using A Statistical Based datamining approach | |
[/vc_column_text][/vc_tab][vc_tab tab_id=”4f23c2b8-df2c-2″ title=”Image Processing”][vc_column_text]IMAGE PROCESSING
[/vc_column_text][/vc_tab][vc_tab tab_id=”d947003a-b129-3″ title=”Security”][vc_column_text] NETWORKING AND SECURITY
|
1 |
An Overlay Architecture for Throughput Optimal Multipath Routing | |
|
2 |
Routing in Accumulative Multi-Hop Networks | |
|
3 |
Coding for Improved Throughput Performance in Network Switches | |
|
4 |
Power Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet Protocol | |
|
5 |
A Scalable Framework for Wireless Distributed Computing | |
|
6 |
Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels | |
| 7 | Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems | |
| 8 | Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks | |
| 9 | A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails | |
| 10 | On Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional Antennas: Theoretical Foundation and Algorithm Design | |
| 11 | When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks | |
| 12 | Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks |
[/vc_column_text][/vc_tab][vc_tab tab_id=”d2473b62-0647-4″ title=”Wireless Networks”][vc_column_text]
Wireless Sensor Networks
|
1 |
Energy –Efficient Transmission Based On Compressive Sensing In Wsn |
|
2 |
Filtering Noisy 802.11 Time-Of-Flight Ranging Measurements From Commoditized Wifi Radios |
|
3 |
Maximizing Lifetime In Wireless Sensor Network For Structural Health Monitoring With And Without Energy Harvesting |
| 4 | Power Efficiency And Delay Trade Off Of 10gbase-T Energy Efficient Ethernet Protocol |
| 5 | Data-Driven Faulty Node Detection Scheme for Wireless Sensor Networks |
[/vc_column_text][/vc_tab][vc_tab tab_id=”122beab2-97fc-5″ title=”Secure Computing”][vc_column_text] DEPENDABLE AND SECURE COMPUTING
| 4 | My Privacy My Decision: Control of Photo Sharing on Online Social Networks
|
| 5 | Privacy-Preserving Aggregate Queries for Optimal Location Selection
|
| 6 | MMBcloud -Tree: Authenticated Index for Verifiable Cloud Service Selection
Networking
|
| 7 | Cloud Data Auditing Techniques with a Focus on Privacy and Security |
| 8 | A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing |
| 9 | Cryptographic Solutions for Credibility and Liability Issues of Genomic Data |
| 10 | Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications |
| 11 | Fault-Tolerant Adaptive Routing in Dragonfly Networks |
| 12 | Optimal Spot-Checking for Collusion Tolerance in Computer Grids -Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
| 13 | Privacy-Preserving Aggregate Queries for Optimal Location Selection |
| 14 | Design and Implementation of the Ascend Secure Processor |
| 15 | Efficient Delegated Private Set Intersection on Outsourced Private Datasets |
| 16 | Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices |
| 17 | Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
[/vc_column_text][/vc_tab][vc_tab tab_id=”bdf9ecab-1854-6″ title=”Service Computing”][vc_column_text] SERVICE COMPUTING
| 1 | Resource renting for periodical cloud workflow applications |
| 2 | Pattern-Based Design and Verification of Secure Service Compositions |
| 3 | DLTSR: A Deep Learning Framework for Recommendation of Long-tail Web Services
|
| 4 | Optimal Task Dispatching on Multiple Heterogeneous Multiserver Systems with Dynamic Speed and Power Management
|
| 5 | Energy Theft Detection in Multi-Tenant Data Centers with Digital Protective Relay Deployment
|
| 6 | Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud
|
| 7 | Resource renting for periodical cloud workflow applications |
| 8 | Time Dependent Pricing for Large-scale Mobile Networks of Urban Environment: Feasibility and Adaptability |
| 9 | TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud |
| 10 | Transactional Behavior Verification in Business Process as a Service Configuration |
| 11 | FogRoute: DTN-based Data Dissemination Model in Fog Computing |
| 12 | Pattern−Based Design and Verification of Secure Service Compositions |
| 13 | LoDPD: A Location Difference-based Proximity Detection Protocol for Fog Computing |
| 14 | Resource Allocation in Vehicular Cloud Computing Systems with Heterogeneous Vehicles and Roadside Units |
| 15 | Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions |
| 16 | A Context-Aware Architecture Supporting Service Availability in Mobile Cloud Computing |
| 17 | A Light weight securedata Sharing Scheme For Mobile Cloud Computing |
| 18 | A Multi-Objectiveoptimization Approach For Question Routingin Community Question Answering Sevices |
[/vc_column_text][/vc_tab][vc_tab tab_id=”6e5e16e4-c4e9-7″ title=”Mobile / Multimedia”][vc_column_text] MOBILE COMPUITNG
| 1 | Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems |
| 2 | A Classroom Scheduling Service for Smart Classes s
|
| 3 | Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
|
| 4 | Searching Trajectories by Regions of Interest
|
| 5 | ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes |
| 6 | Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
|
| 7 | Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy |
MULTIMEDIA
| 1 | Cost-Effective Low-Delay Design for Multi-Party Cloud Video Conferencing |
| 2 | Image Based Appraisal of Real Estate Properties
|
| 3 | Visual Tracking via Nonnegative Multiple Coding
|
| 4 | Image Based Appraisal of Real Estate Properties
|
| 5 | Cost-Effective Low-Delay Design for Multi-Party Cloud Video Conferencing |
[/vc_column_text][/vc_tab][/vc_tabs][/vc_column][/vc_row]