NETWORKING & DISTRIBUTED SYSTEMS
S.No | Title | Domain |
---|---|---|
1 | Scaling Laws for Throughput Capacity and Delay in Wireless Networks | NETWORKING & DISTRIBUTED SYSTEMS |
2 | Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact | NETWORKING & DISTRIBUTED SYSTEMS |
3 | Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs | NETWORKING & DISTRIBUTED SYSTEMS |
4 | Efficient ITRUST for Probabilistic Misbehavior Detection in Delay-Tolerant Networks | NETWORKING & DISTRIBUTED SYSTEMS |
5 | Automatic Test Packet Generation | NETWORKING & DISTRIBUTED SYSTEMS |
6 | Cost-Effective Resource Allocation of Overlay Routing Relay Nodes | NETWORKING & DISTRIBUTED SYSTEMS |
7 | Boundary Cutting for Packet Classification | NETWORKING & DISTRIBUTED SYSTEMS |
8 | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks | NETWORKING & DISTRIBUTED SYSTEMS |
9 | Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks | NETWORKING & DISTRIBUTED SYSTEMS |
10 | Exploiting Service Similarity for Privacy in Location-Based Search Queries | NETWORKING & DISTRIBUTED SYSTEMS |
10 | LocaWard: A Security and Privacy Aware Location-Based Rewarding System | NETWORKING & DISTRIBUTED SYSTEMS |
10 | On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures | NETWORKING & DISTRIBUTED SYSTEMS |
10 | RRE: A Game-Theoretic Intrusion Response and Recovery Engine | NETWORKING & DISTRIBUTED SYSTEMS |
10 | Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption | NETWORKING & DISTRIBUTED SYSTEMS |
10 | A Distributed Mobile Q&A System Based on Social Networks | NETWORKING & DISTRIBUTED SYSTEMS |
10 | The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation | NETWORKING & DISTRIBUTED SYSTEMS |
10 | The Design and Evaluation of An Information Sharing System for Human Networks | NETWORKING & DISTRIBUTED SYSTEMS |
10 | Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks | NETWORKING & DISTRIBUTED SYSTEMS |
10 | Secure Outsourced Attribute-based Signatures | NETWORKING & DISTRIBUTED SYSTEMS |
No comments:
Post a Comment
Note: only a member of this blog may post a comment.