Tagging in online social networks is very popular these days, as it facilitates search and retrieval of multimedia content.
Unknown
07:08
Learn to Personalized Image Search from the Photo Sharing Websites.
Increasingly developed social sharing websites like Flickr and Youtube allow users to create, share, annotate, and comment medias.
Unknown
07:03
Client-side Load Balancer using Cloud
Web applications' traffic demand fluctuates widely and unpredictably. The common practice of provisioning a fixed capacity.
Unknown
07:01
Ensuring Data Storage Security in Cloud Computing
Several trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology.
Unknown
06:58
Agent-Based Urban Transportation Systems
Agent-based traffic management systems can use the autonomy, mobility, and adaptability of mobile agents to deal with dynamic traffic environments.
Unknown
06:39
Improving Utilization of Infrastructure Clouds
A key advantage of infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources.
Unknown
06:36
Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
Infrastructure as a Service (IaaS) cloud computing has transform the way we think of acquiring resources by introducing a simple change.
Unknown
06:34
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
Cloud Computing has great potential of providing robust computational power to the society at reduced cost.
Unknown
06:31
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges.
We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architecture and presenting one of its key.
We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architecture and presenting one of its key.
Unknown
06:26
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration
Unknown
06:22
Cloud Data Production for Masses
Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service
Unknown
06:20
Reliable Re-encryption in Unreliable Clouds
A key approach to secure cloud computing is for the data owner to store encrypted data in the cloud, and issue decryption keys to authorized users.
Unknown
06:18
Ensuring Distributed Accountability for Data Sharing in the Cloud
Cloud computing enables highly scalable services to be easily consumed over the internet on an as-needed basis.
Unknown
06:15
Costing of Cloud Computing Services A Total Cost of Ownership Approach
The use of Cloud Computing Services appears to offer significant cost advantages. Particularly start-up companies benefit from these advantages.
Unknown
06:13
Cloud Computing Security: From Single to Multi-Clouds
The use of cloud computing has increased rapidly in many organizations.
Unknown
06:10
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs).
Unknown
06:07
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
We Consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network.
Unknown
06:05
Bandwidth recycling in IEEE 802.16 Networks
IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS).
Unknown
06:02
Throughput Optimization in Mobile Backbone Networks.
This paper describes new algorithms for throughput optimization in a mobile backbone network.
Unknown
06:00
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks.
Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals.
Unknown
05:58
Fast Data Collection in Tree-Based Wireless Sensor Networks.
We first consider time scheduling on a single frequency channel with the aim of minimizing the number of time slots.
Unknown
05:07
The Server Reassignment Problem for Load Balancing in Structured Peer to Peer Systems
Application-layer peer-to-peer (P2P) networks are considered to be the most important development for next-generation Internet infrastructure. For these systems to be effective, load balancing among the peers is critical.
Unknown
05:03
Efficient and Secured content processing using cooperative intermediaries
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences.
Unknown
05:00
Optimal state allocation for multicast communication with explicit forwarding
Scalable and adaptive multicast forwarding mechanism based on explicit multicast.
Unknown
04:58
Hybrid Scheduling of Dynamic Task Graphs with Selective Duplication for Multiprocessors under Memory and Time Constraints
Hybrid scheduling methodology for task graphs to multiprocessor embedded systems.
Unknown
04:55
Dectecting Malicious Packet Losses
We consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets.
Unknown
04:52
Multi-path Dissemination in Regular Mesh Topologies
Mesh topologies are important for large-scale peer-to-peer systems that use low-power transceivers.
Unknown
04:49
Full-Information Lookups for Peer-to-Peer Overlays
Most peer-to-peer lookup schemes keep a small amount of routing state per node, typically logarithmic in the number of overlay nodes.
Unknown
04:47
Cooperative Caching in Wireless P2P Networks Design, Implementation, and Evaluation
Some recent studies have shown that cooperative cache can improve the system performance in wireless P2Pnetworks such as ad hoc networks and mesh networks.
Unknown
04:43
Correlation-Based Traffic Analysis Attacks on Anonymity Networks
We address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks.
Unknown
04:37
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distribution.
Unknown
04:34
Layered Approach Using Conditional Random Fields for Intrusion Detection.
Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic.
Unknown
04:31
Analysis on Credit Card Fraud Detection Methods.
Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud.
Unknown
04:27
A Competitive Study of Cryptography Techniques over Block Cipher.
The complexity of cryptography does not allow many people to actually understand the motivations and therefore available for practicing security cryptography.
Unknown
04:24
Towards Situational Awareness of Large-Scale Botnet Probing Events.
Botnets dominate today's attack landscape. In this work, we investigate ways to analyze collections of malicious probing.
Unknown
04:21
Online Intrusion Alert Aggregation with Generative Data Stream Modeling.
Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts-produces by low-level intrusion detection systems, firewalls, etc.
Unknown
04:16
RITAS: Services for Randomized Intrusion Tolerance
Randomized agreement protocols have been around for more than two decades.
Unknown
04:13
Modeling and Detection of Camouflaging Worm.
Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet.
Unknown
04:09
Nymble Blocking Misbehaving Users in Anonymizing Networks.
Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server.
Unknown
04:05
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks.
Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays.
Unknown
04:02
Ensuring Distributed Accountability for Data Sharing in the Cloud
Cloud computing enables highly scalable services to be easily consumed over the internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate.
Unknown
03:59
DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere.
Unknown
03:56
Online Modeling of Proactive Moderation System for Auction Fraud Detection
We consider the problem of building online machine-learned models for detecting auction frauds in e-commence web sites.
Unknown
03:53
Packet-Hiding Methods for Preventing Selective Jamming Attacks.
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.
Unknown
03:50
Risk-Aware Mitigation for MANET Routing Attacks.
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure.
Unknown
06:36
Effective Navigation of Query Results Based on Concept Hierarchies.
Search queries on biomedical databases, such as PubMed, often return a large number of results, only a small subset of which is relevant to the user.
Unknown
06:33
Ranking Spatial Data by Quality Preferences
A spatial preference query ranks objects based on the qualities of features in their spatial neighborhood.
Unknown
06:30
The CoQUOS Approach to Continuous Queries in Unstructured Overlays
The current peer-to-peer (P2P) content distribution systems are constricted by their simple on-demand content discovery mechanism.
Unknown
06:26
Extended XML Tree Pattern Matching: Theories and Algorithms
As business and enterprises generate and exchange XML data more often, there is an increasing need for efficient processing of queries on XML data.
Unknown
06:23
Organizing User Search Histories
Users are increasingly pursuing complex task-oriented goals on the web, such as making travel arrangements, managing finances, or planning purchases.
Unknown
06:18
Multiparty Access Control for Online Social Networks Model and Mechanisms
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of internet users.
Unknown
06:14
Ranking Model Adaptation for Domain-Specific Search.
With the explosive emergence of vertical search domains, applying the broad-based ranking model directly to different domains is no longer desirable.
Unknown
06:08
Efficient Extended Boolean Retrieval.
Extended Boolean retrieval (EBR) models were proposed nearly three decades ago, but have had little practical impact, despite their significant advantages compared to either ranked keyword or pure Boolean retrieval.
Unknown
06:04
Slicing A New Approach to Privacy Preserving Data Publishing.
Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing.
Unknown
07:01
Mesh Based Multicast Routing in MANET Stable Link Based Approach
The group-oriented services are one of the primary application classes that are addressed by mobile ad hoc networks (MANETs) in recent years.
Unknown
06:57
Host-to-Host Congestion Control for TCP
The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
Unknown
06:54
Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks
Multicast traffic over the Internet is growing steadily with increasing number of demanding applications including Internet broadcasting, video conferences, data stream applications and web-content distributions.
Unknown
06:50
PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems.
A declarative SQL-like language and a middleware infrastructure are presented for collecting data from different nodes of a pervasive system.
Unknown
06:46
An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
A distributed adaptive opportunistic routing scheme for multihop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model.
Unknown
06:40
Cut Detection in Wireless Sensor Networks
A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a cut. We consider the problem of detecting cuts by the remaining nodes of a wireless sensor network.
Unknown
04:39
Always Acyclic Distributed Path Computation.
Distributed routing algorithms may give rise to transient loops during path recomputation, which can pose significant stability problems in high-speed networks. Distributed Path Computation with Intermediate Variables (DIV)
Unknown
04:35
Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network
With the ever-increasing wireless/wired data applications recently, considerable efforts have focused on the design of distributed explicit rate flow control schemes for multi-input-multi-output service.
Unknown
04:32
Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems.
Reservation-based (as opposed to contention-based) channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless and embedded real-time applications.
Unknown
04:28
Channel Allocation in Wireless Data Center Networks.
Unbalanced traffic demands of different data center applications are an important issue in designing Data center network (DCNs).
Unknown
04:25
Buffer sizing for 802.11 Based Networks.
We consider the sizing of network buffers in IEEE 802.11-based networks. Wireless networks face a number of fundamental issues that do not arise in wired networks.
Unknown
04:22
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks.
We analyze the delay performance of a multi-hop wireless network in which the routes between source-destination pairs are fixed.
Unknown
04:19
ProgME: Towards Programmable Network Measurement.
Traffic measurement provide critical input for a wide range of network management applications, including traffic engineering, accounting, and security analysis. Requirements and/or traffic conditions.
Unknown
04:16
SPAF: Stateless FSA-based Packet Filters.
Stateless packet filtering technique based on finite-state automata (FSA). FSAs provide a comprehensive framework with well-defined compostion operations that enable the generation of stateless filters from high-level specifications.
Unknown
04:11
Selfish Overlay Network Creation and Maintenance.
A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of the network formation, i.e., folding new arrivals into an existing overlay, and rewiring to cope with changing network conditions.
Unknown
04:06
Security Architecture for Cloud Networking
Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increased scalability while providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS).
Unknown
04:02
Packet Loss Control Using Tokens at the Network Edge
A series of protocols have been introduced to supplement the insufficient TCP mechanism controlling the network congestion.
Unknown
03:59
An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
Peer-to-peer overlay networks are widely used in distributed systems. P2P networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary.
Unknown
03:54
Game-Theoretic Pricing for Video Streaming in Mobile Networks
Mobile phones are among the most popular consumer devices, and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plans from service providers.
Unknown
03:49
Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
Virtualized cloud-based services can take advantage of statistical multiplexing across applications to yield significant cost savings.
Unknown
03:44
Privacy- and Integrity-Preserving Range Queries in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries.