Tagging in online social networks is very popular these days, as it facilitates search and retrieval of multimedia content.
Unknown
07:08
Learn to Personalized Image Search from the Photo Sharing Websites.
Increasingly developed social sharing websites like Flickr and Youtube allow users to create, share, annotate, and comment medias.
Unknown
07:03
Client-side Load Balancer using Cloud
Web applications' traffic demand fluctuates widely and unpredictably. The common practice of provisioning a fixed capacity.
Unknown
07:01
Ensuring Data Storage Security in Cloud Computing
Several trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology.
Unknown
06:58
Agent-Based Urban Transportation Systems
Agent-based traffic management systems can use the autonomy, mobility, and adaptability of mobile agents to deal with dynamic traffic environments.
Unknown
06:39
Improving Utilization of Infrastructure Clouds
A key advantage of infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources.
Unknown
06:36
Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
Infrastructure as a Service (IaaS) cloud computing has transform the way we think of acquiring resources by introducing a simple change.
Unknown
06:34
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
Cloud Computing has great potential of providing robust computational power to the society at reduced cost.
Unknown
06:31
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges.
We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architecture and presenting one of its key.
We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architecture and presenting one of its key.
Unknown
06:26
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration
Unknown
06:22
Cloud Data Production for Masses
Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service
Unknown
06:20
Reliable Re-encryption in Unreliable Clouds
A key approach to secure cloud computing is for the data owner to store encrypted data in the cloud, and issue decryption keys to authorized users.
Unknown
06:18
Ensuring Distributed Accountability for Data Sharing in the Cloud
Cloud computing enables highly scalable services to be easily consumed over the internet on an as-needed basis.
Unknown
06:15
Costing of Cloud Computing Services A Total Cost of Ownership Approach
The use of Cloud Computing Services appears to offer significant cost advantages. Particularly start-up companies benefit from these advantages.
Unknown
06:13
Cloud Computing Security: From Single to Multi-Clouds
The use of cloud computing has increased rapidly in many organizations.
Unknown
06:10
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs).
Unknown
06:07
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
We Consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network.
Unknown
06:05
Bandwidth recycling in IEEE 802.16 Networks
IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS).
Unknown
06:02
Throughput Optimization in Mobile Backbone Networks.
This paper describes new algorithms for throughput optimization in a mobile backbone network.
Unknown
06:00
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks.
Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals.
Unknown
05:58
Fast Data Collection in Tree-Based Wireless Sensor Networks.
We first consider time scheduling on a single frequency channel with the aim of minimizing the number of time slots.
Unknown
05:07
The Server Reassignment Problem for Load Balancing in Structured Peer to Peer Systems
Application-layer peer-to-peer (P2P) networks are considered to be the most important development for next-generation Internet infrastructure. For these systems to be effective, load balancing among the peers is critical.
Unknown
05:03
Efficient and Secured content processing using cooperative intermediaries
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences.
Unknown
05:00
Optimal state allocation for multicast communication with explicit forwarding
Scalable and adaptive multicast forwarding mechanism based on explicit multicast.
Unknown
04:58
Hybrid Scheduling of Dynamic Task Graphs with Selective Duplication for Multiprocessors under Memory and Time Constraints
Hybrid scheduling methodology for task graphs to multiprocessor embedded systems.
Unknown
04:55
Dectecting Malicious Packet Losses
We consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets.
Unknown
04:52
Multi-path Dissemination in Regular Mesh Topologies
Mesh topologies are important for large-scale peer-to-peer systems that use low-power transceivers.
Unknown
04:49
Full-Information Lookups for Peer-to-Peer Overlays
Most peer-to-peer lookup schemes keep a small amount of routing state per node, typically logarithmic in the number of overlay nodes.
Unknown
04:47
Cooperative Caching in Wireless P2P Networks Design, Implementation, and Evaluation
Some recent studies have shown that cooperative cache can improve the system performance in wireless P2Pnetworks such as ad hoc networks and mesh networks.
Unknown
04:43
Correlation-Based Traffic Analysis Attacks on Anonymity Networks
We address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks.
Unknown
04:37
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distribution.
Unknown
04:34
Layered Approach Using Conditional Random Fields for Intrusion Detection.
Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic.
Unknown
04:31
Analysis on Credit Card Fraud Detection Methods.
Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud.
Unknown
04:27
A Competitive Study of Cryptography Techniques over Block Cipher.
The complexity of cryptography does not allow many people to actually understand the motivations and therefore available for practicing security cryptography.
Unknown
04:24
Towards Situational Awareness of Large-Scale Botnet Probing Events.
Botnets dominate today's attack landscape. In this work, we investigate ways to analyze collections of malicious probing.
Unknown
04:21
Online Intrusion Alert Aggregation with Generative Data Stream Modeling.
Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts-produces by low-level intrusion detection systems, firewalls, etc.
Unknown
04:16
RITAS: Services for Randomized Intrusion Tolerance
Randomized agreement protocols have been around for more than two decades.
Unknown
04:13
Modeling and Detection of Camouflaging Worm.
Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet.
Unknown
04:09
Nymble Blocking Misbehaving Users in Anonymizing Networks.
Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server.
Unknown
04:05
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks.
Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays.
Unknown
04:02
Ensuring Distributed Accountability for Data Sharing in the Cloud
Cloud computing enables highly scalable services to be easily consumed over the internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate.
Unknown
03:59
DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere.
Unknown
03:56
Online Modeling of Proactive Moderation System for Auction Fraud Detection
We consider the problem of building online machine-learned models for detecting auction frauds in e-commence web sites.
Unknown
03:53
Packet-Hiding Methods for Preventing Selective Jamming Attacks.
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.
Unknown
03:50
Risk-Aware Mitigation for MANET Routing Attacks.
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure.
Unknown
06:36
Effective Navigation of Query Results Based on Concept Hierarchies.
Search queries on biomedical databases, such as PubMed, often return a large number of results, only a small subset of which is relevant to the user.
Unknown
06:33
Ranking Spatial Data by Quality Preferences
A spatial preference query ranks objects based on the qualities of features in their spatial neighborhood.
Unknown
06:30
The CoQUOS Approach to Continuous Queries in Unstructured Overlays
The current peer-to-peer (P2P) content distribution systems are constricted by their simple on-demand content discovery mechanism.
Unknown
06:26
Extended XML Tree Pattern Matching: Theories and Algorithms
As business and enterprises generate and exchange XML data more often, there is an increasing need for efficient processing of queries on XML data.
Unknown
06:23
Organizing User Search Histories
Users are increasingly pursuing complex task-oriented goals on the web, such as making travel arrangements, managing finances, or planning purchases.
Unknown
06:18
Multiparty Access Control for Online Social Networks Model and Mechanisms
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of internet users.
Unknown
06:14
Ranking Model Adaptation for Domain-Specific Search.
With the explosive emergence of vertical search domains, applying the broad-based ranking model directly to different domains is no longer desirable.
Unknown
06:08
Efficient Extended Boolean Retrieval.
Extended Boolean retrieval (EBR) models were proposed nearly three decades ago, but have had little practical impact, despite their significant advantages compared to either ranked keyword or pure Boolean retrieval.
Unknown
06:04
Slicing A New Approach to Privacy Preserving Data Publishing.
Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing.