TECHNOLOGY
|
TOPIC
|
DOMAIN
|
DOT
NET
|
Improving
Utilization of Infrastructure Clouds
|
Cloud Computing
|
DOT
NET
|
One size Does Not
Fit All: Towards User-and Query-Dependent Ranking For Web Databases
|
Data Mining
|
TECHNOLOGY
|
TOPIC
|
DOMAIN
|
JAVA
|
A Dual Framework and
Algorithms for Targeted Online Data Delivery
|
Data
Mining
|
JAVA
|
A Link-Analysis
Extension of Correspondence Analysis for Mining Relational Databases
|
Data
Mining
|
JAVA
|
Answering Frequent
Probabilistic Inference Queries in Databases
|
Data
Mining
|
JAVA
|
Decision Trees for
Uncertain Data
|
Data
Mining
|
JAVA
|
Effective Navigation
of Query Results based on Concept Hierarchies
|
Data
Mining
|
JAVA
|
Extended XML Tree
Pattern matching: Theories and Algorithms
|
Data
Mining
|
JAVA
|
A Personalized
Ontology Model for Web Information Gathering
|
Data
Mining
|
JAVA
|
USHER: Improving Data
Quality with Dynamic Forms
|
Data
Mining
|
JAVA
|
A generic Framework
for Three-Factor Authentication: Preserving Security and Privacy in
Distributed Systems
|
Parallel
and Distributed Systems
|
JAVA
|
Exploiting Dynamic
Resource Allocation for Efficient Parallel Data Processing in the Cloud
|
Parallel
and Distributed Systems
|
JAVA
|
Rumor Riding:
Anonymizing Unstructured Peer-to-Peer Systems
|
Parallel
and Distributed Systems
|
JAVA
|
An Approach to Detect
and Prevent SQL Injection Attacks in Database Using Web Service
|
IEEE 2011
Network
Security
|
JAVA
|
Authentication Schemes
for Session Passwords using Color and Images
|
|
JAVA
|
Live Streaming with
Receiver-based Peer-division Multiplexing
|
Networking
|
JAVA
|
Scalable and
Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
|
Networking
|
JAVA
|
Collaboration-Based
Cloud Computing Security Management Framework
|
Cloud
Computing
|
JAVA
|
Improving Utilization
of Infrastructure Clouds
|
Cloud
Computing
|
JAVA
|
Data Integrity Proofs
in Cloud Storage
|
Communication
system and Network
|
JAVA
|
Dynamic Audit Services
for Integrity Verification of Outsourced Storages in Clouds
|
Services
Computing
|
JAVA
|
Embedded Extended
Visual Cryptography Schemes
|
Information
Forensics and Security
|
JAVA
|
Secure Type-Based
Multiple Access
|
Information
Forensics and Security
|
JAVA
|
Fault-Tolerant and
Scalable Key Management for Smart Grid
|
Smart
Grid
|
JAVA
|
Nymble: Blocking Misbehaving Users in Anonymizing Networks
|
Dependable
and Secure Computing
|
JAVA
|
Frequent pattern
Mining of Trajectory Coordinates using Apriori Algorithm
|
Computer
Applications
|
JAVA
|
Robust Video Data Hiding Using Forbidden Zone data Hiding and
Selective Embedding
|
Video
Technology
|
JAVA
|
Lightweight Palm and
Finger Tracking for Real-Time 3D Gesture Control
|
Networking
and Broadcasting
|
JAVA
|
Local Broadcast Algorithms in Wireless
Ad Hoc Networks: Reducing the Number of Transmissions
|
Mobile
Computing
|
JAVA
|
Efficient audit service
outsourcing for data integrity in clouds
|
Cloud
Computing
|
JAVA
|
A Novel Iris
Recognition System Using Morphological Edge Detector and Wavelet phase
Features
|
Biomedical
and Health Informatics
|
JAVA
|
Ranking Spatial Data
by Quality Preferences
|
Data
Mining
|
JAVA
|
RITAS: Services for
Randomized Intrusion Tolerance
|
Dependable
and Secure Computing
|
JAVA
|
Robust Video Data Hiding Using Forbidden Zone
data Hiding and Selective Embedding
|
Video Technology
|
JAVA
|
Lightweight
Palm and Finger Tracking for Real-Time 3D Gesture Control
|
Networking and Broadcasting
|
JAVA
|
Local Broadcast
Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
|
Mobile Computing
|
JAVA
|
Efficient audit
service outsourcing for data integrity in clouds
|
Cloud Computing
|
JAVA
|
A
Novel Iris Recognition System Using Morphological Edge Detector and Wavelet
phase Features
|
Biomedical and Health Informatics
|
JAVA
|
Ranking
Spatial Data by Quality Preferences
|
Data Mining
|
JAVA
|
RITAS:
Services for Randomized Intrusion Tolerance
|
Dependable and Secure Computing
|