- An UpDown Directed Acyclic Graph Approach for Sequential Pattern Mining
- Closeness: A New Privacy Measure for Data Publishing
- Deriving Concept-Based User Profiles from Search Engine Logs
- BinRank: Scaling Dynamic Authority-Based Search Using Materialized Subgraphs
- An Efficient Concept-Based Mining Model for Enhancing Text Clustering
- MABS: Multicast Authentication Based on Batch Signature
- Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams
- Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
- Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks
- Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
- On the Performance Bounds of Practical Wireless Network Coding
- SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments
- Modeling Power Saving Protocols for Multicast Services in 802.11 Wireless LANs
- DCAR: Distributed Coding-Aware Routing in Wireless Networks
- VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
- Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast
- Fast Algorithms for Resource Allocation in Wireless Cellular Networks
- Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks
- Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks
- Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks
- Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis
- Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility
- Equilibrium of Heterogeneous Congestion Control: Optimality and Stability
- Rate Control With Pairwise Intersession Network Coding
- Distributed Algorithms for Minimum Cost Multicast With Network Coding
- An Analytical Approach to Optimizing Parallel Image Registration / Retrieval
- Dealing with Transient Faults in the Interconnection Network of CMPs at the Cache Coherence Level
- Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach
- Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks
- Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
- Improving Reliability for Application-Layer Multicast Overlays
- Logoot-Undo Distributed Collaborative Editing System on P2P Networks
- Resource Bundles Using Aggregation for Statistical Large-Scale Resource Discovery and Management
- Secure Synchronization of Periodic Updates in Ad Hoc Networks
- Snoogle A Search Engine for Pervasive Environments
- Stabilizing Distributed R-Trees for Peer-to-Peer Content Routing
- The Topology of Gaussian and Eisenstein-Jacobi Interconnection Networks
- SocioNet: A Social-Based Multimedia Access System for Unstructured P2P Networks
- A Cross-Layer Approach-Based Gnutella for Collaborative Virtual Environments over Mobile Ad Hoc Networks
- Adaptive Workload Prediction of Grid Performance in Confidence Windows
- Correlation-Based Traffic Analysis Attacks on Anonymity Networks
- On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
- Coupling-Based Internal Clock Synchronization for Large-Scale Dynamic Distributed Systems
- Efficient Algorithms for Global Snapshots in Large Distributed Systems
- PowerPack: Energy Profiling and Analysis of High-Performance Systems and Applications
- Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
- A Synchronous Scheduling Service for Distributed Real-Time Java
- Scheduling Multisource Divisible Loads on Arbitrary Networks
- Reputation-Based Resource Allocation in P2P Systems of Rational Users
- Privacy-Conscious Location-Based Queries in Mobile Environments
- Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast
- Fast Algorithms for Resource Allocation in Wireless Cellular Networks
- Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks
- Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks
- Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks
- Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis
- Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility
- Equilibrium of Heterogeneous Congestion Control: Optimality and Stability
- Rate Control With Pairwise Intersession Network Coding
- Distributed Algorithms for Minimum Cost Multicast With Network Coding
Labels:
2012 IEEE papers in Networks,
IEEE projects topics in Networks,
networks project topics,
project topics in networsk
Tuesday, 9 October 2012
{ 0 comments... read them below or add one }
Post a Comment
Enter your comments here