NETWORKING & DISTRIBUTED SYSTEMS
S.No | Title | Domain |
---|---|---|
1 | Scaling Laws for Throughput Capacity and Delay in Wireless Networks | NETWORKING & DISTRIBUTED SYSTEMS |
2
Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
NETWORKING & DISTRIBUTED SYSTEMS
3
Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
NETWORKING & DISTRIBUTED SYSTEMS
4
Efficient ITRUST for Probabilistic Misbehavior Detection in Delay-Tolerant Networks
NETWORKING & DISTRIBUTED SYSTEMS
5
Automatic Test Packet Generation
NETWORKING & DISTRIBUTED SYSTEMS
6
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
NETWORKING & DISTRIBUTED SYSTEMS
7
Boundary Cutting for Packet Classification
NETWORKING & DISTRIBUTED SYSTEMS
8
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
NETWORKING & DISTRIBUTED SYSTEMS
9
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
NETWORKING & DISTRIBUTED SYSTEMS
10
Exploiting Service Similarity for Privacy in Location-Based Search Queries
NETWORKING & DISTRIBUTED SYSTEMS
10
LocaWard: A Security and Privacy Aware Location-Based Rewarding System
NETWORKING & DISTRIBUTED SYSTEMS
10
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
NETWORKING & DISTRIBUTED SYSTEMS
10
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
NETWORKING & DISTRIBUTED SYSTEMS
10
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
NETWORKING & DISTRIBUTED SYSTEMS
10
A Distributed Mobile Q&A System Based on Social Networks
NETWORKING & DISTRIBUTED SYSTEMS
10
The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation
NETWORKING & DISTRIBUTED SYSTEMS
10
The Design and Evaluation of An Information Sharing System for Human Networks
NETWORKING & DISTRIBUTED SYSTEMS
10
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
NETWORKING & DISTRIBUTED SYSTEMS
10
Secure Outsourced Attribute-based Signatures
NETWORKING & DISTRIBUTED SYSTEMS
No comments:
Post a Comment