Вы находитесь на странице: 1из 37

TOPICS ON DATA MINING

1.Evaluating the effectiveness of the personalized web search

2.Predicting the missing items in the shopping cart

3.Ranking and suggesting popular items

4.Watermarking relational database using optimization based techniques

5.A Cost-Based Approach to Adaptive Resource Management in Data Stream


Systems

6.Similarity-Profiled Temporal Association Mining

7.IMine: Index Support for Item Set Mining

8.Compression and Aggregation for Logistic Regression Analysis in Data


Cubes(OLAP)

9.Data mining over peer to peer networks

10.Dominant Local Binary Patterns for Texture Classification

11.A Communication Perspective on Automatic Text Categorization

12.The Emerging Field of Semantic Scientific Knowledge Integration


13.Rough sets-based search engine for grid service discovery

14.A Communication Perspective on Automatic Text Categorization

15.Batch Mode Active Learning with Applications to Text Categorization and


Image Retrieval

16.Similarity-Profiled Temporal Association Mining

17. Predictive Ensemble Pruning by Expectation Propagation

18.Clustering and Sequential Pattern Mining of Online Collaborative Learning


Data

19.A Generic Local Algorithm for Mining Data Streams in Large Distributed
Systems

20.Mining Projected Clusters in High-Dimensional Spaces

21.Improving Personalization Solutions through Optimal Segmentation of


Customer Bases

22.Text document clustering based on neighbors

23.Hierarchical distributed peer to peer document cluster & cluster


summarizations

24.Publishing & composition of atomicity equivalent service of the


collaboration
25.Communities and Emerging Semantics in Semantic Link Network

26.Mining non-derivable frequent item sets over data stream

27.Evaluating the Effectiveness of Personalized Web Search

WEB SERVICE TOPICS

1.A Highly Decoupled Front-end Framework for High Trafficked Web


Applications

2.A Solution Model and Tool for Supporting the Negotiation of Security
Decisions in E-Business Collaborations

3.Closing the Loop in Webpage Understanding

4.Detecting Unauthorized Modification of HTTP Communication with


Steganography

5.Multi-Modal CBIR Algorithm based on Latent Semantic Indexing

6.Personalized Service-Oriented E-Learning Environments

7.Rule-Based Coordination of Distributed Web Service Transactions


8.Separating Operational and Control Behaviors

9.TRIC An Infrastructure for Trust and Reputation Across Virtual Communities

10.WSOTF An Automatic Testing Tool forWeb Services Composition

11.A Solution Model and Tool for Supporting the Negotiation of Security
Decisions in E-Business Collaborations

12.Rule-Based Coordination of Distributed Web Service Transactions


13.TRIC:An Infrastructure for Trust and Reputation Across Virtual
Communities

14.Context-aware Campaigns in Social Networks

15.Nontraditional Approach to XML Web Services Interactions

16.BlogMiner: Web Blog Mining Application for Classification of Movie Reviews

17.SContext-Aware Interaction Models in Cross-Organizational Processes

18.Reputation-based Systems within Computer Networks

19.The Significance of Instant Messaging at Work

20.Multi-Tier-based Global Awareness

21.Design and Implementation of the Location-based Personalized Social


Media Service
22.On-demand Dynamic Location-based Services Using Web Services

23.A Promotion Mechanism for Scalable Stealth DHT

24.A Global knowledge for Information Retrieval in P2P Networks

25.Improving Performance of Declarative Query Execution in DHT-based


Systems

26.Learning Peer Selection: A Query Routing Approach for Information


Retrieval in P2P Systems

27.Extending the Bayesian Classifier to a Context-Aware Recommender


System for Mobile Devices

28.WSOTF: An Automatic Testing Tool for Web Services Composition

29.Separating Operational and Control Behaviors

30.Personalized Service-Oriented E-Learning Environments

31.Closing the Loop in Webpage Understanding

32.Detecting Unauthorized Modification of HTTP Communication with


Steganography
33.A Highly Decoupled Front-end Framework for High Trafficked Web
Applications

34.Multi-Modal CBIR Algorithm based on Latent Semantic Indexing

35.Adaptive Scheduling for Staged Applications: The Case of Multiple


Processing Units

36.Casual Multi-user Web Collaboration by Lowering Communication Barriers

37.The SHIP Validator: An Annotation-based Content-Validation Framework


for Java Applications

38.Evenly Distributing Combinatorial Tasks in a Peer-to-Peer System

39.Application Layer Traffic Optimization in the eMule System

40.Towards an XML Adaptation/Alteration Control Framework

41.Global SOA: RSS-based Web Services Repository and Ranking

42.Secure Ubiquitous House and Facility Control Solution

43.SAMI: The SLA Management Instance

44.Towards a Generic Context-Aware Framework for Self-Adaptation of


Service-Oriented Architectures

WEB SECURITY TOPICS


1. Security Decision Support Challenges in Data Collection and Use

2. Securing Android-Powered Mobile Devices Using ELinux

3. The Economics of Click Fraud

4. Risk-Based De-Identification of Health Data

5. XTS: A Mode of AES for Encrypting Hard Disks

6. Cyber-Threat Proliferation Today’s Truly Pervasive Global Epidemic

7. The Next Malware Battleground Recovery After Unknown Infection

8. Hide and Seek in the Cloud

9. Making Smart Cards Truly Portable

10. Google Android: A Comprehensive Security Assessment

11. A Mobile Biometric Systemon- Token System for Signing Digital Transactions

12. Designing Host and Network Sensors to Mitigate the Insider Threat

13. Detecting Insider Theft of Trade Secrets

14. Failures of Tamper-Proofing in PIN Entry Devices

15. High Time for Trusted Computing

16. The Dartmouth Cyber Security Initiative

17. Side-Channel Attacks on Cryptographic Software

18. Bickering In-Depth Rethinking the Composition of Competing Security Systems

19. A Semantic Search Agent Approach: Finding Appropriate Semantic Web Services Based On
User Request Term(s)

20. Personalized Ontology for Web Search Personalization

21. PAWS:Managing Primary Context through Web Services


22. Coupling RDF/RSS, WSRP and AJAX for Dynamic Reusable Portlets: An Approach and a Use
Case

23. Voice Over Internet Protocol

NETWORKING TOPICS

1. Design of network based software

2. A Photonics Based Intelligent Airport Surveillance and Tracking System

3. Accountability Computing for e-Society

4. Performance Evaluation of Database Designs

5. Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference
Constraints

6. Change Scheduling Based on Business Impact Analysis of Change-Related Risk

7. The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack

8. Algorithms for Reducing the Total Power Consumption in Data Communication-based


Applications

9. Pitcher: Enabling Distributed Parallel Computing with Automatic Thread and Data Assignments

10. Minimizing Execution Costs when using Globally Distributed Cloud Services

11. Schedule Distributed Virtual Machines in a Service Oriented Environment

12. A Visual Semantic Service Browser Supporting User-Centric Service Composition


13. Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer

14. Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission

15.AjaxScope: A Platform for Remotely Monitoring the Client-Side Behavior of web 2.0
Applications

16.Key Agreement in Peer-to-Peer Wireless Networks

17. Community-Aware Scheduling Protocol for Grids

18. A Proposal of an Associating Image-Based Password Creating Method and a Development of a


Password Creating Support System

19. CAPTCHA Using Strangeness in Machine Translation

20. A DSL-based Approach to Software Development and Deployment on Cloud

21. A Proposal of an Associating Image-Based Password Creating Method and a Development of a


Password Creating Support System

22. Cloud Analyst: A CloudSim-based Visual Modeller for Analyzing Cloud Computing
Environments and Applications

23. Mapping the Blogosphere with RSS-Feeds

25. Probabilistic proactive routing with active route trace-back for highly mobile Ad Hoc Networks

26. An Adaptive Routing Protocol for Bus Networks

27. PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network

28. Adaptive Clustering Protocol for Wireless Networks

29.A Novel Cache Management Using Geographically Partial Matching for Location-based Services

30. AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection
Enhancement

31. A Cross-Layer Decision for Mobile IP Handover

32. A Novel Cross Layer Intrusion Detection System in MANET

33. A Secure Key Management Model for Wireless Mesh Networks


34. BPE Acceleration Technique for S/W Update for Mobile Phones

35. Privacy-Preserving Collaborative Filtering Protocol based on Similarity between Items

36. Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks

37. Trustworthiness among Peer Processes in Distributed Agreement Protocol

38. New Approach to Quantification of Privacy on Social Network Sites

39. A Tree Graph Model Based on Mobile Environment

40. User-Excentric Service Composition in Pervasive Environments

41. Context-aware Mobile Services Transactions

42. Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing
Schemes

43. MARS: Multi-stage Attack Recognition System

44. Against Spyware Using CAPTCHA in Graphical Password Scheme

45. Intrusion Tolerant Services Through Virtualization: a Shared Memory Approach

46. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network

47. Empirical Analysis of Attackers Activity on Multi-TierWeb Systems

48. Key Parameters in Identifying Cost of Spam 2.0

49. Web Spambot Detection Based on Web Navigation Behaviour

50. A Dynamic NormalizedWeighting based Context Reasoning in Home-based Care

51. Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks

52. Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-
oriented Middleware

53. Symbolic Routing for Location-based Services in Wireless Mesh Networks

54. Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
55. A hybrid technique for efficient Medium Access Control in Wireless Sensor Networks

56. Tradeoffs among Delay, Energy and Accuracy of Partial Data Aggregation in Wireless Sensor
Networks

57. Sink-initiated Geographic Multicasting Protocol in Wireless Sensor Networks

58. Using Recommendation to Limit Search Space in Web Services Discovery

59. Environmental Sustainability and Improved Quality of Life Through Service Convergence
Technologies

60. HealthPass: Fine-grained Access Control to Portable Personal Health Records

61. Towards more Trustable Log Files for Digital Forensics by Means of “Trusted Computing”

62. Controlling File Distribution in The Share Network Through Content Poisoning

63. InnoDB Database Forensics

64. A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs

65. Non-Interactive Information Reconciliation for Quantum Key Distribution

66. Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber

67. Secure Communication For Internet Payment In Heterogeneous Networks

68. IDSec: an Identification Layer Security Model

69. Resist Intruders’ Manipulation via Context-based TCP/IP Packet Matching

70. Deployment of a Secure Wireless Infrastructure oriented to Vehicular Networks

71. Automatic Application Signature Construction from Unknown Traffic

72. Propagation Modeling of Peer-to-Peer Worms

73. Grid of Segment Trees for Packet Classification

74. Towards Near Real-Time Data Warehousing

75. Analyzing Human Behavior using Case-Based Reasoning with the help of Forensic Questions
76. Using Ontology for Personalized Mobile Message Computation

77. Knowledge sharing effectiveness measurement

79. Using Ontology for Personalized Mobile Message Computation

80. Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote
Collaboration

81. Knowledge sharing effectiveness measurement

82. AWorkflow Fragmentation Framework for Enterprise GridWorkflow Systems

83. Analytical Temporal Specification Issues for Industrial Control Systems

84. Deadline Aware Virtual Machine Scheduler for Grid and Cloud Computing

85. Generating Optimum Number of Clusters using Median Search and Projection Algorithms

86. Effect of Virtual Techniques in Data Storage Access

87. Routing based on Message Attraction

88. Virtual Database Technology for Distributed Database

89. Requirements for Distributed Event-based Awareness in P2P Groupware Systems

90. Security Verification for Authentication and Key Exchange Protocols, Revisited

91. Practical Threshold One-Time Proxy Signature Scheme

95. Tsunami Early Alert and Evacuation Support System for Fishery Workers by Mobile Phones

96. SAGe: Sensor Advanced Gateway for Integrating Wireless Sensor Networks and Internet

97. Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database

98.An Authentication and Authorization protocol using Ticket in Pervasive Environment.

99. Quality Metrics for Software Process Certification based on K-model

100. Towards a Unified Trust Model in Pervasive Systems

101. Improved Gait Recognition Performance Using Cycle Matching


102. An Instructional Strategy Selection Model Based on Agent and Ontology for an Intelligent
Tutoring System

103. HiTrust: A Hybrid Tree based Trust Negotiation Service

104. A Context Conflict Resolution with Optimized Mediation

105. Analysis of Anonymity in P2P Anonymous Communication Systems

106. Peer-to-Peer Overlay Gateway Services for Home Automation and Management

107. SLA-based Online Charging Model in Mobile Environment

108. Improvement and Its Evaluation of Worker’s Motion Monitor System in Automobile Assembly
Factory

109. Android, Java ME and Windows Mobile interplay

110. Detecting Suspicious Motion with Nonimaging Sensors

111. mTracker: A Mobile Tracking Application for Pervasive Environment

112. Performance Study on Location-assisted and Bluetooth-assisted Session Transfer for VoIP
Application

113. An Improvement in Apriori algorithm Using Profit And Quantity

115. Stream Switching Resilience In P2P Streaming

MOBILE COMPUTING TOPICS

1.A Better Approximation Algorithm for Computing Connected Dominating Sets in Unit Ball
Graphs

IEEE Transactions Papers 2010

2.Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking

IEEE Transactions Papers 2010

3.Controlled Wi-Fi Sharing in Cities A Decentralized Approach Relying on Indirect Reciprocity


IEEE Transactions Papers 2010

4.Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing

IEEE Transactions Papers 2010

5.Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks

IEEE Transactions Papers 2010

6.MABS Multicast Authentication Based on Batch Signature

IEEE Transactions Papers 2010

7.Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data
Streams

IEEE Transactions Papers 2010

8.Maximizing the Lifetime of a Barrier of Wireless Sensors

IEEE Transactions Papers 2010

9.On the Performance Bounds of Practical Wireless Network Coding

IEEE Transactions Papers 2010

10.Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks

IEEE Transactions Papers 2010

11.Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations

IEEE Transactions Papers 2010

12.SAMAC A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas

IEEE Transactions Papers 2010

13.Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Route

IEEE Transactions Papers 2010

14.VEBEK Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
IEEE Transactions Papers 2010

15.Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks

IEEE Transactions Papers 2010

16. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

IEEE Transactions Papers 2010

17. MABS: Multicast Authentication Based on Batch Signature

IEEE Transactions Papers 2010

18. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks

IEEE Transactions Papers 2010

19. Channel Assignment for Multihop Cellular Networks: Minimum Delay

IEEE Transactions Papers 2010

20. Uncertainty Modeling and Reduction in MANETs

IEEE Transactions Papers 2010

21. Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking

IEEE Transactions Papers 2010

22. On the Performance Bounds of Practical Wireless Network Coding

IEEE Transactions Papers 2010

23. SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas

IEEE Transactions Papers 2010

24. Internet Host Geolocation Using Maximum Likelihood Estimation Technique

IEEE Transactions Papers 2010

25. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
IEEE Transactions Papers 2010

26. Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing

IEEE Transactions Papers 2010

27. Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic
Data Streams

IEEE Transactions Papers 2010

28. SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile
Environments

IEEE Transactions Papers 2010

29. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes

IEEE Transactions Papers 2010

30. Combined Authentication-Based Multilevel Access Control in Mobile Application for


DailyLifeService

IEEE Transactions Papers 2010

31. A Coverage Inference Protocol for Wireless Sensor Networks

IEEE Transactions Papers 2010

32. Optimal Accounting Policies for AAA Systems in Mobile Telecommunications Networks

IEEE Transactions Papers 2010

33. Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks

IEEE Transactions Papers 2010

34. Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks

IEEE Transactions Papers 2010

35. Energy-Efficient Reprogramming of a Swarm of Mobile Sensors

IEEE Transactions Papers 2010


36. A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor
Networks

IEEE Transactions Papers 2010

37. SIP-Based IMS Signaling Analysis for WiMax-3G Interworking Architectures

IEEE Transactions Papers 2010

GRID COMPUTING TOPICS

1. Hierarchical Replication Techniques to Ensure Checkpoint Storage Reliability in Grid


Environment
2. An Efficient Parallel Implementation of the Hidden Markov Methods for Genomic Sequence
Search on a Massively Parallel System
3. Distributed Generation Interface to the CERTS Micro grid

CRYPTOGRAPHY TOPICS

1. A Cryptographic Approach to Securely Share and Query Genomic Sequences


IMAGE PROCESSING TOPICS

1. Invariances, Laplacian-Like Wavelet Bases, and the Whitening of Fractal Processes


2. SAR Image Regularization with Fast Approximate Discrete Minimization
3. An MRF-Based DeInterlacing Algorithm with Exemplar-Based Refinement
4. A Video Coding Scheme Based on Joint Spatiotemporal and Adaptive Prediction
5. Dominant Local Binary Patterns for Texture Classification
6. Invariances, Laplacian-Like Wavelet Bases, and the Whitening of Fractal Processes
7. Applications to Photon-Limited Image Denoising
8. A High-Capacity Steganography Scheme for JPEG2000 Baseline System
9. Hierarchical Ensemble of Global and Local Classifiers for Face Recognition
10. Image Quality Assessment Based on Multiscale Geometric Analysis
11. Clustering-Based Denoising With Locally Learned Dictionaries
12. Image Denoising Using Mixtures of Projected Gaussian Scale Mixtures
13. Geometric Video Approximation Using Weighted Matching Pursuit
14. Efficient Block-Based Frequency Domain Wavelet Transform Implementations
15. Bayesian Inference on Multiscale Models for Poisson Intensity Estimation
16. Geometric Features-Based Filtering for Suppression of Impulse Noise in Color Images
17. A Connectivity-Based Method for Defining Regions-of-Interest in fMRI Data
18. Distortion Estimators for Bitplane Image Coding
19. Improved Dot Diffusion by Diffused Matrix and Class Matrix Co-Optimization
20. Active Mask Segmentation of Fluorescence Microscope Images
21. Hierarchical Multiple Markov Chain Model for Unsupervised Texture Segmentation
22. An Edge-Weighted Centroidal Voronoi Tessellation Model for Image Segmentation
23. Stabilization of Parametric Active Contours Using a Tangential Redistribution Term
24. Super Resolution With Probabilistic Motion Estimation
25. A Robust Hidden Markov Gauss Mixture Vector Quantizer for a Noisy Source
26. Continuous Stereo Self-Calibration by Camera Parameter Tracking

NS2 TOPICS
1. Weight based DSR for Mobile Ad Hoc Networks
2. Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous
Traffic
3. On the Security of Route Discovery in MANETs
4. ZMAC : A Hybrid MAC for Wireless Sensor Networks
5. Multipoint Relay
6. Cost Minimization Planning for Greenfield PON Network
7. FPGA-Based Channel Simulator for a Wireless Network Emulator
8. NCTUns 5.0 Network Simulator for Advanced Wireless Vehicular Network Researches
10. Visual Network Simulator (VNS): A GUI to QoS simulation for the ns-2 simulator
11. Implementation Architecture of Proxy Mobile IPv6 Protocol for NS2 Simulator Software
12. End-to-end network simulator for conversational quality measurements
13. Improving Video Streaming over IEEE 802.11 Mesh Networks through a Cross-Layer Design
Technique
14. Designing and Implementing an IEEE 802.16 Network Simulator for Performance Evaluation of
Bandwidth Allocation Algorithms
15. A Case Study of Networks Simulation Tools for Wireless Networks
16. Robust and Efficient Stream Delivery for Application Layer Multicasting in Heterogeneous
Networks
17. A Cautionary View of Mobility and Connectivity Modeling in Vehicular Ad-Hoc Networks
18. Security Solution for Mobile Ad Hoc Network of Networks (MANoN )
19. Mesh-based Data Delivery over Multiple Tree-Shaped Routes in P2P Overlay Network

INTELLIGENT SYSTEM TOPICS

1. IT Strategies for Increased Rail Employee Satisfaction


2. Natural Language Processing and the Web Mobile WiMAX Network: A Survey
3. Mining the Web to Create Specialized Glossaries
4. Linking Documents to Encyclopedic Knowledge
5. Weighing Stars: Aggregating Online Product Reviews for Intelligent E-commerce Applications
6. A Multiagent System for Coordinating Ambulances for Emergency Medical Services
7. Recognition of Complex Settings by Aggregating Atomic Scenes
8. Exploring Alternative Software Architecture Designs: A Planning Perspective
9. AVA: Adjective-Verb-Adverb Combinations for Sentiment Analysis
10. CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior
11. An Artificial Emergency-Logistics-Planning System for Severe Disasters
12. Transaction based QoS web service
13. The Emerging Field of Semantic Scientific Knowledge Integration
14. Sequential pattern mining using Intelligent tutoring Agent
15. Semantic technology for communication with in an organization
16. Collaborative Spam filtering
17. Adaptive Multiagent System for Network Traffic Monitoring
18. Scaling Up Wide-Area-Search-Munition Teams
19. Guest Editors' Introduction: Agents and Data Mining
20. Adaptive Multiagent System for Network Traffic Monitoring
21. A Collaborative Multiagent System for Mining Transcriptional Regulatory Elements
22. Agent-Enriched Data Mining: A Case Study in Brain Informatics
23. Improving the Behavior of Intelligent Tutoring Agents with Data Mining
24. Agent-Based Approach to Free-Flight Planning, Control, and Simulation
25. Improving Air Traffic Management with a Learning Multiagent System

SOFTWARE ENGINEERING TOPICS

1. A Framework for Programming Robust Context-Aware Applications

2. A Quantitative Investigation of the Acceptable Risk Levels of Object-Oriented Metrics in Open-


Source Systems

3. A Theoretical and Empirical Study of Search-Based Testing Local, Global, and Hybrid Search

4. Bayesian Approaches to Matching Architectural Diagrams

5. Better Debugging via Output Tracing and Callstack-Sensitive Slicing

6. DECOR A Method for the Specification and Detection of Code and Design Smells

7. Directed Explicit State-Space Search in the Generation of Counterexamples for Stochastic Model
Checking

8. Discovering Services during Service-Based System Design Using UML

9. Effects of Personality on Pair Programming

10. Engineering a Sound Assertion Semantics for the Verifying Compiler

11. Exception Handling for Repair in Service-Based Processes

12. Exception Handling Patterns for Process Modeling


13. Generating Event Sequence-Based Test Cases Using GUI Runtime State Feedback

14. How Developers’ Experience and Ability Influence Web Application Comprehension Tasks
Supported by UML Stereotypes A Series of Four Experiments

15. Incremental Test Generation for Software Product Lines

16. Learning Communicating Automata from MSCs

17. On Event-Based Middleware for Location-Aware Mobile Applications

18. Program Behavior Discovery and Verification A Graph Grammar Approach

19. Providing Architectural Languages and Tools Interoperability through Model Transformation
Technologies

20. Service-Level Agreements for Electronic Services

21. Software Reliability and Testing Time Allocation An Architecture-Based Approach

22. Understanding Exception Handling Viewpoints of Novices and Experts

23. Verification and Trade-Off Analysis of Security Properties in UML System Models

24. Vulnerability Discovery with Attack Injection

CYBERNETICS TOPICS

1. Using a Benchmark in Case-Based Multiple-Criteria Ranking

2. Gait Feature Subset Selection by Mutual Information


3. Identifying Noncooperative Subjects at a Distance Using Face Images and Inferred Three-
Dimensional Face Models
4. Dynamic Multiple Fault Diagnosis: Mathematical Formulations and Solution Techniques

INTERN
COMPU
TOPICS

1. Daios: Efficient Dynamic Web Service Invocation


2. Building Accountability Middleware to Support Dependable SOA
3. Game-Based Learning with Ubiquitous Technologies
4. A Multidimensional Paper Recommender: Experiments and Evaluations
5. A Managed IPv6 Transitioning Architecture for Large Network Deployments
6. Semantic Technology for Capturing Communication Inside an Organization
7.Exploiting Linked Data to Build Web Applications
8. Citizen Sensing, Social Signals, and Enriching Human Experience
9. Reaping Deep Web Rewards Is a Matter of Semantics
10. IPTV: Reinventing Television in the Internet Age
11. Mobile IPTV: Approaches, Challenges, Standards, and QoS Support
12. Reducing Channel-Change Times with the Real-Time Transport Protocol
13. Standardization Activities for IPTV Set-Top Box Remote Management
14. Fighting Phishing with Discriminative Keypoint Features
15.A Semantic-Based Solution for UBL Schema Interoperability
16. Agents and Service-Oriented Computing for Autonomic Computing: A Research Agenda
17. A Dependable ESB Framework for Service Integration
18. Technology, Standards, and Real-World Deployments of the EPC Network
19. Asynchronous Participatory Exams: Internet Innovation for Engaging Students
20. Social Search: Exploring and Searching Social Architectures in Digital Networks
21. Ten Ideas for Policymakers to Drive Digital Progress
22. Free Riding in Peer-to-Peer Networks
23.Network-Enabled Compulsory Education Getting Big Push
24. Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis
25. Reputation Bootstrapping for Trust Establishment among Web Services

PARALLEL DISTRIBUTED SYSTEMS TOPICS

1. An Analytical Approach to Optimizing Parallel Image RegistrationRetrieval

2. Dealing with Transient Faults in the Interconnection Network of CMPs at the Cache Coherence
Level

3. Detecting Application Denial-of-Service Attacks A Group-Testing-Based Approach

4. Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks

5. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems


6. Improving Reliability for Application-Layer Multicast Overlays

7. Logoot-Undo Distributed Collaborative Editing System on P2P Networks

8. Resource Bundles Using Aggregation for Statistical Large-Scale Resource Discovery and
Management

9. Secure Synchronization of Periodic Updates in Ad Hoc Networks

10. Snoogle A Search Engine for Pervasive Environments

11. Stabilizing Distributed R-Trees for Peer-to-Peer Content Routing

12. The Topology of Gaussian and Eisenstein-Jacobi Interconnection Networks

13. SocioNet: A Social-Based Multimedia Access System for Unstructured P2P Networks

14. A Cross-Layer Approach-Based Gnutella for Collaborative Virtual Environments over Mobile
Ad Hoc Networks

15. Adaptive Workload Prediction of Grid Performance in Confidence Windows

16. Correlation-Based Traffic Analysis Attacks on Anonymity Networks

17. On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic

18. Coupling-Based Internal Clock Synchronization for Large-Scale Dynamic Distributed Systems

19. Efficient Algorithms for Global Snapshots in Large Distributed Systems

20. PowerPack: Energy Profiling and Analysis of High-Performance Systems and Applications

21. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery

22. A Synchronous Scheduling Service for Distributed Real-Time Java

23. Scheduling Multisource Divisible Loads on Arbitrary Networks

24. Reputation-Based Resource Allocation in P2P Systems of Rational Users

25. Privacy-Conscious Location-Based Queries in Mobile Environments

26. A Queuing Model for Evaluating the Transfer Latency of Peer-to-Peer Systems
27. Configurable Middleware for Distributed Real-Time Systems with Aperiodic and Periodic Tasks

28.Optimal Resource Placement in Structured Peer-to-Peer Networks

DEPENDABLE AND SECURE COMPUTING TOPICS

1 A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis

2 An Advanced Hybrid Peer-to-Peer Botnet

3 Conformance Testing of Temporal Role-Based Access Control Systems

4 In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm

5 On the Thermal Attack in Instruction Caches

6 Secure Data Objects Replication in Data Grid

7 Shifting Inference Control to User Side Architecture and Protocol

8 Using Web-Referral Architectures to Mitigate Denial-of-Service Threats

9. An Advanced Hybrid Peer-to-Peer Botnet

10. A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis

11. Conformance Testing of Temporal Role-Based Access Control Systems

12. Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services

13. In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm


14. Shifting Inference Control to User Side: Architecture and Protocol

15. A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory

16. Layered Approach Using Conditional Random Fields for Intrusion Detection

17. SigFree: A Signature-Free Buffer Overflow Attack Blocker

18. Secure Data Objects Replication in Data Grid

MULTIMEDIA TOPICS

1. Real-Time Environmental Monitoring and Notification for Public Safety

2. Landscaping Future Interaction: Special issue on Mobile and Ubiquitous Multimedia

3. Visual Navigation for Mobile Devices

4. Picture Context Capturing for Mobile Databases

5. Intelligent Multimedia Presentation in Ubiquitous Multidevice Scenarios

6. Design and Implementation of a Bilingual Conversation Ability Training System

7. Practical Realization of Ad hoc Network based on DSR Protocol Considering QOS for
Multimedia Services

8. Technique of Image Retrieval based on Multi-label Image Annotation

9. Reflections on the Control of Cognitive Load in Multimedia Learning

10. A Performance Evaluation of IP Mobility Support Protocols

11. A Scheduling and Management Algorithm about Proxy based on AFEC

12. A Novel Design of Internet Digital Content Distribution Platform

13. PID Parameters Tuning Method by Particle Swarm Optimization with Chaotic Disturbance

14. Geometric Distortions Correction Scheme based on Hausdorff Distance for Digital
Watermarking Image

15. Applications of Multimedia Technology in Deformation Monitoring of Subway Tunnel

16. Improvement of Image Contrast with Local Adaptation

17. Control System Design For Contant-pressure Water Supply

18. Adaptive Network Precoding Based on SJNR to Mitigate Inter-Cell Interference

19. Study on Real-time Video Monitoring System Base on BSP-16

20. Campus Internet Culture and Ideological and Political Education

21. The Application Research of OLAP in College Decision Support System

22. Effects of sonar shape distortion on time delay estimation method for left/right discrimination

23. Design and Implementation of E-commerce Feature Major Website

24. Rapid Developing Technology Research Based on Open-Source to E-commerce Site

25. The analysis for the attack on the wireless bridge monitoring system

26. Study on the Real time Log-domain Conversion for Detecting the Transient Feeble Optical
Signal

27. An Improved Private Information Keeper System

28. An Intelligent Content-Based Routing for Multimedia Mobile Ad Hoc Networks

29. Development of the Packaging Engineering Experimental Teaching Platform Based on


Interaction Design Concept

30. The Influence of E- service Quality on Consumer’s Satisfaction and WOM

31. Simple Vehicle Detection with Shadow Removal at Intersection

32. An Adaptive Ordering Framework for Filtering Multimedia Streams

33. One-Trip-Time based Congestion Control for Distributed Real-time Applications

34. An Improved Two-factor Authentication Protocol


35. Apache Struts Applied for Construction of SMS Collection System

36. Investigation on Applying Information Technology in Graduation Design

37. Dynamic Attack Tree and Its Applications on Trojan Horse Detection

38. Design and Implementation of a Call Center in IC Card Management System

39. Adaptive Rendering Cluster System Based On Browser/Server Architecture

40. Application of Customer Relationship Management in Health Care

41. A Mobile Multimedia Technology to Aid Those with Alzheimer’s Disease

42. A Platform for Context-Aware and Digital Rights Management-Enabled Content Adaptation

43. Hiding Multitone Watermarks in Halftone Images

44. Information Overload A Collaborative Dance Perform

45. Intelligent Multimedia Presentation in Ubiquitous Multidevice Scenarios

46. Keyframe-Based Video Summary Using Visual Attention Clues

47. Landscaping Future Interaction Special issue on Mobile and Ubiquitous Multimedia

48. Local Wavelet Features for Statistical Object Classification and Localization

49. Mobility Management for Video Streaming on Heterogeneous Networks

50. Modeling Media Synchronization with Semiotic Agents

51. Optimal Rate Allocation for Video Transmission over Wireless Ad Hoc Networks

52. Picture Context Capturing for Mobile Databases

53. Social Surroundings Bridging the Virtual and Physical Divide

54. Visual Navigation for Mobile Devices

KNOWLEDGE AND DATA ENGINEERING TOPICS


1 A Binary String Approach for Updates in Dynamic Ordered XML Data

IEEE Transactions Papers 2010

2 A Distance Measure Approach to Exploring the Rough Set Boundary Region for Attribute
Reduction

IEEE Transactions Papers 2010

3 A Game Theoretic Approach for Simultaneous Compaction and Equipartitioning of Spatial Data
Sets

IEEE Transactions Papers 2010

4 A General Framework of Time-Variant Bandwidth Allocation in the Data Broadcasting


Environment

IEEE Transactions Papers 2010

5 A Nonsupervised Learning Framework of Human Behavior Patterns Based on Sequential Actions

IEEE Transactions Papers 2010

6 A Reasoning System of Ternary Projective Relations

IEEE Transactions Papers 2010

7 A Unified Framework for Providing Recommendations in Social Tagging Systems Based on


Ternary Semantic Analysis

IEEE Transactions Papers 2010

8 Adaptive Join Operators for Result Rate Optimization on Streaming Inputs

IEEE Transactions Papers 2010

9 An UpDown Directed Acyclic Graph Approach for Sequential Pattern Mining

IEEE Transactions Papers 2010

10 Asking Generalized Queries to Domain Experts to Improve Learning

IEEE Transactions Papers 2010

11 Automatic Ontology Matching via Upper Ontologies A Systematic Evaluation


IEEE Transactions Papers 2010

12 Beyond Redundancies A Metric-Invariant Method for Unsupervised Feature Selection

IEEE Transactions Papers 2010

13 BinRank Scaling Dynamic Authority-Based Search Using Materialized Subgraphs

IEEE Transactions Papers 2010

14 Bregman Divergence-Based Regularization for Transfer Subspace Learning

IEEE Transactions Papers 2010

15 Bridging Domains Using World Wide Knowledge for Transfer Learning

IEEE Transactions Papers 2010

16 Building a Rule-Based Classifier :A Fuzzy-Rough Set Approach

IEEE Transactions Papers 2010

17 Closeness A New Privacy Measure for Data Publishing

IEEE Transactions Papers 2010

18 Closing the Loop in Webpage Understanding

IEEE Transactions Papers 2010

19 Conic Programming for Multitask Learning

IEEE Transactions Papers 2010

20 Constrained Dimensionality Reduction Using a Mixed-Norm Penalty Function with Neural


Networks

IEEE Transactions Papers 2010

21 Continuous Subgraph Pattern Search over Certain and Uncertain Graph Streams

IEEE Transactions Papers 2010

22 Deriving Concept-Based User Profiles from Search Engine Logs


IEEE Transactions Papers 2010

23 Domain-Driven Classification Based on Multiple Criteria and Multiple Constraint-Level


Programming for Intelligent Credit Scoring

IEEE Transactions Papers 2010

24 Domain-Driven Data Mining Challenges and Prospects

IEEE Transactions Papers 2010

25 Duplicate-Insensitive Order Statistics Computation over Data Streams

IEEE Transactions Papers 2010

26 Dynamic Dissimilarity Measure for Support-Based Clustering

IEEE Transactions Papers 2010

27 Dynamic Wavelet Synopses Management over Sliding Windows in Sensor Networks

IEEE Transactions Papers 2010

28 Efficient Algorithm for Localized Support Vector Machine

IEEE Transactions Papers 2010

29 Efficient Multidimensional Suppression for K-Anonymity

IEEE Transactions Papers 2010

30 Energy- and Latency-Efficient Processing of Full-Text Searches on a Wireless Broadcast Stream

IEEE Transactions Papers 2010

31 Ensemble Rough Hypercuboid Approach for Classifying Cancers

IEEE Transactions Papers 2010

32 Exploring Correlated Subspaces for Efficient Query Processing in Sparse Databases

IEEE Transactions Papers 2010

33 False Negative Problem of Counting Bloom Filter


IEEE Transactions Papers 2010

34 Feature Selection Using f-Information Measures in Fuzzy Approximation Spaces

IEEE Transactions Papers 2010

35 Filter-Based Data Partitioning for Training Multiple Classifier Systems

IEEE Transactions Papers 2010

36 Filtering Data Streams for Entity-Based Continuous Queries

IEEE Transactions Papers 2010

37 FiVaTech Page-Level Web Data Extraction from Template Pages

IEEE Transactions Papers 2010

38 Histograms and Wavelets on Probabilistic Data

IEEE Transactions Papers 2010

39 Incremental and General Evaluation of Reverse Nearest Neighbors

IEEE Transactions Papers 2010

40 Incremental Evaluation of Visible Nearest Neighbor Queries

IEEE Transactions Papers 2010

41 Incremental Maintenance of 2-Hop Labeling of Large Graphs

IEEE Transactions Papers 2010

42 Introduction to the Domain-Driven Data Mining Special Section

IEEE Transactions Papers 2010

43 Iso-Map Energy-Efficient Contour Mapping in Wireless Sensor Networks

IEEE Transactions Papers 2010

44 k-Anonymity in the Presence of External Databases


IEEE Transactions Papers 2010

45 Kernel Discriminant Learning for Ordinal Regression

IEEE Transactions Papers 2010

46 Knowledge-Based Interactive Postmining of Association Rules Using Ontologies

IEEE Transactions Papers 2010

47 Learning to Adapt Web Information Extraction Knowledge and Discovering New Attributes via a
Bayesian Approach

IEEE Transactions Papers 2010

48 Logic-Based Pattern Discovery

49 Maintaining Recursive Views of Regions and Connectivity in Networks

IEEE Transactions Papers 2010

50 Mining Predictive k-CNF Expressions

IEEE Transactions Papers 2010

51 Multimodal Fusion for Video Search Reranking

IEEE Transactions Papers 2010

52 Optimization of Linear Recursive Queries in SQL

IEEE Transactions Papers 2010

53 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation


Chains

IEEE Transactions Papers 2010

54 PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects

IEEE Transactions Papers 2010

55 Parallelizing Itinerary-Based KNN Query Processing in Wireless Sensor Networks


IEEE Transactions Papers 2010

56 Performance Comparison of the Tree and the Quadtree for kNN and Distance Join Queries

IEEE Transactions Papers 2010

57 Presence without Complete World Knowledge

IEEE Transactions Papers 2010

58 Privacy-Preserving Gradient-Descent Methods

IEEE Transactions Papers 2010

59 Probabilistic Reverse Nearest Neighbor Queries on Uncertain Data

IEEE Transactions Papers 2010

60 Probabilistic Topic Models for Learning Terminological Ontologies

IEEE Transactions Papers 2010

61 Projective Distribution of XQuery with Updates

IEEE Transactions Papers 2010

62 Prospective Infectious Disease Outbreak Detection Using Markov Switching Models

IEEE Transactions Papers 2010

63 Query Processing Using Distance Oracles for Spatial Networks

IEEE Transactions Papers 2010

64 Ranked Query Processing in Uncertain Databases

IEEE Transactions Papers 2010

65 Record Matching over Query Results from Multiple Web Databases

IEEE Transactions Papers 2010

66 Signaling Potential Adverse Drug Reactions from Administrative Health Databases


IEEE Transactions Papers 2010

67 Spectral Anonymization of Data

IEEE Transactions Papers 2010

68 Structural and Role-Oriented Web Service Discovery with Taxonomies in OWL-S

IEEE Transactions Papers 2010

69 Superseding Nearest Neighbor Search on Uncertain Spatial Databases

IEEE Transactions Papers 2010

70 The Impact of Diversity on Online Ensemble Learning in the Presence of Concept Drift

IEEE Transactions Papers 2010

71 The Tiled Bitmap Forensic Analysis Algorithm

IEEE Transactions Papers 2010

72 Towards an Effective XML Keyword Search

IEEE Transactions Papers 2010

73 Uninterpreted Schema Matching with Embedded Value Mapping under Opaque Column Names
and Data Values

IEEE Transactions Papers 2010

74 ViDE A Vision-Based Approach for Deep Web Data Extraction

IEEE Transactions Papers 2010

75 Domain-Driven Data Mining: Challenges and Prospects

IEEE Transactions Papers 2010

76 Bridging Domains Using World Wide Knowledge for Transfer Learning

IEEE Transactions Papers 2010

77 Signaling Potential Adverse Drug Reactions from Administrative Health Databases


IEEE Transactions Papers 2010

78 Closing the Loop in Webpage Understanding

IEEE Transactions Papers 2010

79 Incremental Evaluation of Visible Nearest Neighbor Queries

IEEE Transactions Papers 2010

80 Exception Handling Patterns for Process Modeling


CLOUD
COMPU

1 .A Profile-based Approach to Just-in-time Scalability for Cloud Applications

2. EnaCloud: An Energy-saving Application Live Placement Approach for Cloud Computing


Environments

3. From Service Clouds to User-centric Personal Clouds

4. Semantic Modeling for Cloud Computing, Part 1

5. Deployment of Services in a Cloud Subject to Memory and License Constraints

6. Activity-aware chat system based on a study of distributed collaborative learning

7. Application Performance Isolation in Virtualization

8. Optimistic Synchronization of Parallel Simulations in Cloud Computing Environments

9. SOA’s Last Mile Connecting Smartphones to the Service Cloud

10. Intelligent Management of Remote Facilities through a Ubiquitous Cloud Middleware

11. An Efficient Resource Management System for On-line Virtual Cluster Provision

12. The Method and Tool of Cost Analysis for Cloud Computing

13. Using Clouds to Elastically Extend Site Resources

14. On Technical Security Issues in Cloud Computing


15. Cloud Computing for Satellite Data Processing on High End Compute Clusters

16. Policy-based Event-driven Services-oriented Architecture for Cloud Services Operation &
Management

17. A RESTful Approach to the Management of Cloud Infrastructure

19. Architecture-Driven Variation Analysis for Designing Cloud Applications

20. Service Oriented Architecture for Cloud based Travel Reservation Software as a Service

22. Improving Scalability of Software Cloud for Composite Web Services

23. Ranking Mortgage Origination Applications using Customer, Product, Environment and
Workflow Attributes

24. Understand Collaborative Authorization Policies: Models and Specifications

25. MONGOOSE: MONitoring Global Online Opinions via Semantic Extraction

26. Rule-based Problem Classification in IT Service Management

27. Unibus-managed Execution of Scientific Applications on Aggregated Clouds

28.Design and Implementation of an efficient Two-level Scheduler for Cloud Computing


Environment

29. Dynamic Auction Mechanism for Cloud Resource Allocation

30. Profit-driven Service Request Scheduling in Clouds

31. Expanding the Cloud: A component-based architecture to application deployment on the Internet

32. Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds

33. SLA-Driven Dynamic Resource Management for Multi-tier Web Applications in a Cloud

MOBILE TECHNOLOGY
1. A User-Centered Context-sensitive Privacy Model in Pervasive Systems

2. Performance Evaluation of Handoff Queuing Schemes

3. A context-aware personalized m-learning application based on m-learning preferences

4. Adaptive Content Delivery in Ubiquitous Learning Environment

5. Development of Adaptive Vocabulary Learning via Mobile phone Email

6. Enhancing Emerging Learning Objects with Contextual Metadata Using the Linked Data
Approach

7. Orchestrating Learning in a one-to-one Technology Classroom

8. Integrating Mobile, Web and Sensory Technologies to Support Inquiry-Based Science Learning

9. A Review of Literature in Mobile Learning: Affordances and Constraints

10. Mobile Social Video Sharing Tool for Learning Applications

11. WebQuest: M-Learning for Environmental Education

Вам также может понравиться