
KNOWLEDGE AND DATA ENGINEERING 

1. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud.
view: Abstract BasePaper
IEEE Transactions on Knowledge and Data Engineering 2. Adaptive Provisioning of Human Expertise in Service-oriented Systems
view: Abstract BasePaper
IEEE Transactions on Knowledge and Data Engineering 3. Bridging Socially-Enhanced Virtual Communities.
View: Abstract BasePaper
IEEE Transactions on Knowledge and Data Engineering 4. Data integrity proofs in cloud storage.
View: Abstract BasePaper
IEEE Transactions on Knowledge and Data Engineering 5. Efficient Computing of Range Aggregates against Uncertain Location Based Collections.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 6. Exploring Application-Level Semantics for Data Compression.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 7. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 8. Integration of Sound Signature in Graphical Password Authentication System.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 9. Monitoring Service Systems from a Language-Action Perspective.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 10. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 11. Optimal Service Pricing for a Cloud Cache.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 12. A Personalized Ontology Model for Web Information Gathering.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 13. Publishing Search Logs-A Comparative Study of Privacy Guarantees.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 14. Scalable Scheduling of Updates in Streaming Data Warehouse.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 15. The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor?.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 16. The World in a Nutshell Concise Range Queries.
View: Abstract Basepaper
IEEE Transactions on Knowledge and Data Engineering 17. A Unified Probabilistic Framework for Name Disambiguation in Digital Library.
IEEE Transactions on Knowledge and Data Engineering
18. Effective Navigation of Query Results Based on Concept Hierarchies.
IEEE Transactions on Knowledge and Data Engineering
19. Bridging Domains Using World Wide Knowledge for Transfer Learning.
IEEE Transactions on Knowledge and Data Engineering
20. Automatic Template Extraction from Heterogeneous Web Pages.
IEEE Transactions on Knowledge and Data Engineering
21. Mining Web Graphs for Recommendations.
IEEE Transactions on Knowledge and Data Engineering
22. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis.
23. Document Clustering in Correlations Similarity Measure Space.
IEEE Transactions on Knowledge and Data Engineering
24. Scalable learning of collective behavior.
IEEE Transactions on Knowledge and Data Engineering
25. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators.
IEEE Transactions on Knowledge and Data Engineering
26. A Query Formulation Language for Data web.
IEEE Transactions on Knowledge and Data Engineering
27. On the Complexity of View Update Analysis and its Application to Annotation Propagation.
IEEE Transactions on Knowledge and Data Engineering
28. Concise Range Queries.
IEEE Transactions on Knowledge and Data Engineering
29. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases.
IEEE Transactions on Knowledge and Data Engineering
30. Exploring Application-Level Semantics for Data Compression .
IEEE Transactions on Knowledge and Data Engineering IEEE Transactions on Knowledge and Data Engineering
WIRELESS COMMUNICATIONS 

31. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks .
View: Abstract BasePaper
IEEE Transactions on Wireless Communications
View: Abstract BasePaper
IEEE Transactions on Wireless Communications 32. Throughput Optimization in High Speed Downlink Packet Access (HSDPA).
View: Abstract BasePaper
IEEE Transactions on Wireless Communications
View: Abstract BasePaper
IEEE Transactions on Wireless Communications 33. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems.
View: Abstract BasePaper
IEEE Transactions on Wireless Communications
View: Abstract BasePaper
IEEE Transactions on Wireless Communications34. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks.
View: Abstract BasePaper
IEEE Transactions on Wireless Communications
View: Abstract BasePaper
IEEE Transactions on Wireless Communications Networking 

36. Continuous Neighbor Discovery in Asynchronous Sensor Networks.
View: Abstract BasePaper
IEEE Transactions on Networking
View: Abstract BasePaper
IEEE Transactions on Networking 37. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection .
Secure Computing
38. A Policy Enforcing Mechanism for Trusted Ad Hoc Network.
View: Abstract BasePaper
IEEE Transactions on Dependable and Secure
View: Abstract BasePaper
IEEE Transactions on Dependable and Secure 39. A Tamper-Resistant Programming Language System.
View: Abstract BasePaper
IEEE Transactions on Dependable and Secure
View: Abstract BasePaper
IEEE Transactions on Dependable and Secure 40. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query- Based Wireless Sensor Networks.
View: Abstract BasePaper
IEEE Transactions on Dependable and Secure
View: Abstract BasePaper
IEEE Transactions on Dependable and Secure 41. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking.
42. The Geometric Efficient Matching Algorithm for Firewalls.
View: Abstract BasePaper
IEEE Transactions on Dependable and Secure
View: Abstract BasePaper
IEEE Transactions on Dependable and Secure SERVICE Computing (SOA) 

43. Vulnerability Analysis in SOA-based Business Processes.