KNOWLEDGE AND DATA ENGINEERING
1. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud.
view: Abstract BasePaper IEEE Transactions on Knowledge and Data Engineering
2. Adaptive Provisioning of Human Expertise in Service-oriented Systems
view: Abstract BasePaper IEEE Transactions on Knowledge and Data Engineering
3. Bridging Socially-Enhanced Virtual Communities.
View: Abstract BasePaper IEEE Transactions on Knowledge and Data Engineering
4. Data integrity proofs in cloud storage.
View: Abstract BasePaper IEEE Transactions on Knowledge and Data Engineering
5. Efficient Computing of Range Aggregates against Uncertain Location Based Collections.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
6. Exploring Application-Level Semantics for Data Compression.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
7. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
8. Integration of Sound Signature in Graphical Password Authentication System.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
9. Monitoring Service Systems from a Language-Action Perspective.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
10. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
11. Optimal Service Pricing for a Cloud Cache.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
12. A Personalized Ontology Model for Web Information Gathering.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
13. Publishing Search Logs-A Comparative Study of Privacy Guarantees.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
14. Scalable Scheduling of Updates in Streaming Data Warehouse.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
15. The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor?.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
16. The World in a Nutshell Concise Range Queries.
View: Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering
17. A Unified Probabilistic Framework for Name Disambiguation in Digital Library.
IEEE Transactions on Knowledge and Data Engineering
18. Effective Navigation of Query Results Based on Concept Hierarchies.
IEEE Transactions on Knowledge and Data Engineering
19. Bridging Domains Using World Wide Knowledge for Transfer Learning.
IEEE Transactions on Knowledge and Data Engineering
20. Automatic Template Extraction from Heterogeneous Web Pages.
IEEE Transactions on Knowledge and Data Engineering
21. Mining Web Graphs for Recommendations.
IEEE Transactions on Knowledge and Data Engineering
22. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis.
23. Document Clustering in Correlations Similarity Measure Space.
IEEE Transactions on Knowledge and Data Engineering
24. Scalable learning of collective behavior.
IEEE Transactions on Knowledge and Data Engineering
25. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators.
IEEE Transactions on Knowledge and Data Engineering
26. A Query Formulation Language for Data web.
IEEE Transactions on Knowledge and Data Engineering
27. On the Complexity of View Update Analysis and its Application to Annotation Propagation.
IEEE Transactions on Knowledge and Data Engineering
28. Concise Range Queries.
IEEE Transactions on Knowledge and Data Engineering
29. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases.
IEEE Transactions on Knowledge and Data Engineering
30. Exploring Application-Level Semantics for Data Compression .
IEEE Transactions on Knowledge and Data Engineering IEEE Transactions on Knowledge and Data Engineering
WIRELESS COMMUNICATIONS
31. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks .
View: Abstract BasePaper IEEE Transactions on Wireless Communications
View: Abstract BasePaper IEEE Transactions on Wireless Communications
32. Throughput Optimization in High Speed Downlink Packet Access (HSDPA).
View: Abstract BasePaper IEEE Transactions on Wireless Communications
View: Abstract BasePaper IEEE Transactions on Wireless Communications
33. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems.
View: Abstract BasePaper IEEE Transactions on Wireless Communications
View: Abstract BasePaper IEEE Transactions on Wireless Communications
34. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks.
View: Abstract BasePaper IEEE Transactions on Wireless Communications
View: Abstract BasePaper IEEE Transactions on Wireless Communications
Networking
36. Continuous Neighbor Discovery in Asynchronous Sensor Networks.
View: Abstract BasePaper IEEE Transactions on Networking
View: Abstract BasePaper IEEE Transactions on Networking
37. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection .
Secure Computing
38. A Policy Enforcing Mechanism for Trusted Ad Hoc Network.
View: Abstract BasePaper IEEE Transactions on Dependable and Secure
View: Abstract BasePaper IEEE Transactions on Dependable and Secure
39. A Tamper-Resistant Programming Language System.
View: Abstract BasePaper IEEE Transactions on Dependable and Secure
View: Abstract BasePaper IEEE Transactions on Dependable and Secure
40. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query- Based Wireless Sensor Networks.
View: Abstract BasePaper IEEE Transactions on Dependable and Secure
View: Abstract BasePaper IEEE Transactions on Dependable and Secure
41. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking.
42. The Geometric Efficient Matching Algorithm for Firewalls.
View: Abstract BasePaper IEEE Transactions on Dependable and Secure
View: Abstract BasePaper IEEE Transactions on Dependable and Secure
SERVICE Computing (SOA)
43. Vulnerability Analysis in SOA-based Business Processes.