0% found this document useful (0 votes)
103 views

2010 Ieee New Titles

This document provides titles for new IEEE publications from 2010 on various domains including .NET and Java. Some of the titles include "Adaptive Join Operators for Result Rate Optimization on Streaming Inputs", "An Abuse Free Fair Contract Signing Protocol Based on the RSA Signature", and "Ensuring Data Storage Security in Cloud Computing". The document lists 28 new publication titles related to Java and distributed systems, covering topics such as intrusion detection, peer-to-peer systems, wireless networks, and data security.

Uploaded by

vinaiz1984
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views

2010 Ieee New Titles

This document provides titles for new IEEE publications from 2010 on various domains including .NET and Java. Some of the titles include "Adaptive Join Operators for Result Rate Optimization on Streaming Inputs", "An Abuse Free Fair Contract Signing Protocol Based on the RSA Signature", and "Ensuring Data Storage Security in Cloud Computing". The document lists 28 new publication titles related to Java and distributed systems, covering topics such as intrusion detection, peer-to-peer systems, wireless networks, and data security.

Uploaded by

vinaiz1984
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

2010 IEEE NEW TITLES ON ALL DOMAINS

DOT NET

1. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
2. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs
3. AI and Opinion Mining
4. An Abuse Free Fair Contract Signing Protocol Based on the RSA Signature
5. An economic approach for scalable and highly-available distributed applications
6. Analysis of P2P File Sharing Network’s Credit
7. Conditional Shortest Path Routing in Delay Tolerant Networks
8. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
9. Efficient and Robust Detection of Duplicate Videos in a Large Database
10. Fuzzy Keyword Search over Encrypted Data in Cloud Computing
11. Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor
Networks
12. MABS Multicast Authentication Based on Batch Signature
13. Privacy-Preserving Public Auditing for Data Storage
14. SigFree A Signature-free Buffer Overflow Attack Blocker
15. Data Leakage Detection
16. Inference From Aging Information
17. VEBEK__Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
18. A Study for Important Criteria of Feature Selection in Text Categorization
2010 NEW IEEE TITLES

JAVA

1. Layered Approach Using Conditional Random Fields for Intrusion Detection


2. IRM Integrated File Replication and Consistency Maintenance in P2P Systems
3. A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
4. Ensuring Data Storage Security in Cloud Computing
5. Cooperative Caching in Wireless P2PNetworks Design, Implementation, And Evaluation
6. Always Acyclic Distributed Path Computation
7. A Review of the Applications of Agent Technology In Traffic and Transportation Systems
8. Host-to-Host Congestion Control for TCP
9. Mesh Based Multicast Routing in MANET Stable Link Based Approach
10. Random Access Transport Capacity
11. Bin Rank Scaling Dynamic Authority-Based Search Using Materialized Sub graphs
12. Closeness: A New Privacy Measure for Data Publishing
13. A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks
14. Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks
15. Efficient and Dynamic Routing Topology Inference From End-to-End Measurements
16. Novel defense mechanism against data flooding attacks in wireless ad hoc networks
17. Mitigating selective forwarding attacks with a channel-aware approach in WMNS
18. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability
19. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation
Chains
20. PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
21. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
22. Bandwidth recycling in IEEE 802.16 Networks
23. Distributed Explicit Rate Schemes in Multi -Input–Multi-Output Network Systems
24. POPI A User-level Tool for Inferring Router Packet Forwarding Priority
25. on MultiHop Distances in Wireless Sensor Networks with Random Node Locations
26. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
27. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks
28. on Modeling, Analysis, and Optimization of Packet Aggregation Systems

You might also like