TOPICS ON DATA MINING1.Evaluating the effectiveness of the personalized web search
2.Predicting the missing items in the shopping cart
3.Ranking and suggesting popular items
4.Watermarking relational database using optimization based techniques
5.A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems
6.Similarity-Profiled Temporal Association Mining
7.IMine: Index Support for Item Set Mining
8.Compression and Aggregation for Logistic Regression Analysis in Data Cubes(OLAP)
9.Data mining over peer to peer networks
10.Dominant Local Binary Patterns for Texture Classification
11.A Communication Perspective on Automatic Text Categorization
12.The Emerging Field of Semantic Scientific Knowledge Integration
13.Rough sets-based search engine for grid service discovery
14.A Communication Perspective on Automatic Text Categorization
15.Batch Mode Active Learning with Applications to Text Categorization and Image Retrieval
16.Similarity-Profiled Temporal Association Mining
17. Predictive Ensemble Pruning by Expectation Propagation
18.Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
19.A Generic Local Algorithm for Mining Data Streams in Large Distributed Systems
20.Mining Projected Clusters in High-Dimensional Spaces
21.Improving Personalization Solutions through Optimal Segmentation of Customer Bases
22.Text document clustering based on neighbors
23.Hierarchical distributed peer to peer document cluster & cluster summarizations
24.Publishing & composition of atomicity equivalent service of the collaboration
25.Communities and Emerging Semantics in Semantic Link Network
26.Mining non-derivable frequent item sets over data stream
27.Evaluating the Effectiveness of Personalized Web Search
WEB SERVICE TOPICS
1.A Highly Decoupled Front-end Framework for High Trafficked Web Applications
2.A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations
3.Closing the Loop in Webpage Understanding
4.Detecting Unauthorized Modification of HTTP Communication with Steganography
5.Multi-Modal CBIR Algorithm based on Latent Semantic Indexing
6.Personalized Service-Oriented E-Learning Environments
7.Rule-Based Coordination of Distributed Web Service Transactions
8.Separating Operational and Control Behaviors
9.TRIC An Infrastructure for Trust and Reputation Across Virtual Communities
10.WSOTF An Automatic Testing Tool forWeb Services Composition
11.A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations
12.Rule-Based Coordination of Distributed Web Service Transactions 13.TRIC:An Infrastructure for Trust and Reputation Across Virtual Communities
14.Context-aware Campaigns in Social Networks
15.Nontraditional Approach to XML Web Services Interactions
16.BlogMiner: Web Blog Mining Application for Classification of Movie Reviews
17.SContext-Aware Interaction Models in Cross-Organizational Processes
18.Reputation-based Systems within Computer Networks
19.The Significance of Instant Messaging at Work
20.Multi-Tier-based Global Awareness
21.Design and Implementation of the Location-based Personalized Social Media Service
22.On-demand Dynamic Location-based Services Using Web Services
23.A Promotion Mechanism for Scalable Stealth DHT
24.A Global knowledge for Information Retrieval in P2P Networks
25.Improving Performance of Declarative Query Execution in DHT-based Systems
26.Learning Peer Selection: A Query Routing Approach for Information Retrieval in P2P Systems
27.Extending the Bayesian Classifier to a Context-Aware Recommender System for Mobile Devices
28.WSOTF: An Automatic Testing Tool for Web Services Composition
29.Separating Operational and Control Behaviors
30.Personalized Service-Oriented E-Learning Environments
31.Closing the Loop in Webpage Understanding
32.Detecting Unauthorized Modification of HTTP Communication with Steganography
33.A Highly Decoupled Front-end Framework for High Trafficked Web Applications
34.Multi-Modal CBIR Algorithm based on Latent Semantic Indexing
35.Adaptive Scheduling for Staged Applications: The Case of Multiple Processing Units
36.Casual Multi-user Web Collaboration by Lowering Communication Barriers
37.The SHIP Validator: An Annotation-based Content-Validation Framework for Java Applications
38.Evenly Distributing Combinatorial Tasks in a Peer-to-Peer System
39.Application Layer Traffic Optimization in the eMule System
40.Towards an XML Adaptation/Alteration Control Framework
41.Global SOA: RSS-based Web Services Repository and Ranking
42.Secure Ubiquitous House and Facility Control Solution
43.SAMI: The SLA Management Instance
44.Towards a Generic Context-Aware Framework for Self-Adaptation of Service-Oriented Architectures
WEB SECURITY TOPICS
1. Security Decision Support Challenges in Data Collection and Use
2. Securing Android-Powered Mobile Devices Using ELinux
3. The Economics of Click Fraud
4. Risk-Based De-Identification of Health Data
5. XTS: A Mode of AES for Encrypting Hard Disks
6. Cyber-Threat Proliferation Today’s Truly Pervasive Global Epidemic
7. The Next Malware Battleground Recovery After Unknown Infection
8. Hide and Seek in the Cloud
9. Making Smart Cards Truly Portable
10. Google Android: A Comprehensive Security Assessment
11. A Mobile Biometric Systemon- Token System for Signing Digital Transactions
12. Designing Host and Network Sensors to Mitigate the Insider Threat
13. Detecting Insider Theft of Trade Secrets
14. Failures of Tamper-Proofing in PIN Entry Devices
15. High Time for Trusted Computing
16. The Dartmouth Cyber Security Initiative
17. Side-Channel Attacks on Cryptographic Software
18. Bickering In-Depth Rethinking the Composition of Competing Security Systems
19. A Semantic Search Agent Approach: Finding Appropriate Semantic Web Services Based On User Request Term(s)
20. Personalized Ontology for Web Search Personalization
21. PAWS:Managing Primary Context through Web Services
22. Coupling RDF/RSS, WSRP and AJAX for Dynamic Reusable Portlets: An Approach and a Use Case
23. Voice Over Internet Protocol
NETWORKING TOPICS
1. Design of network based software
2. A Photonics Based Intelligent Airport Surveillance and Tracking System
3. Accountability Computing for e-Society
4. Performance Evaluation of Database Designs
5. Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference Constraints
6. Change Scheduling Based on Business Impact Analysis of Change-Related Risk
7. The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
8. Algorithms for Reducing the Total Power Consumption in Data Communication-based Applications
9. Pitcher: Enabling Distributed Parallel Computing with Automatic Thread and Data Assignments
10. Minimizing Execution Costs when using Globally Distributed Cloud Services
11. Schedule Distributed Virtual Machines in a Service Oriented Environment
12. A Visual Semantic Service Browser Supporting User-Centric Service Composition
13. Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer
14. Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission
15.AjaxScope: A Platform for Remotely Monitoring the Client-Side Behavior of web 2.0 Applications
16.Key Agreement in Peer-to-Peer Wireless Networks
17. Community-Aware Scheduling Protocol for Grids
18. A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System
19. CAPTCHA Using Strangeness in Machine Translation
20. A DSL-based Approach to Software Development and Deployment on Cloud
21. A Proposal of an Associating Image-Based Password Creating Method and a Development of a
Password Creating Support System
22. Cloud Analyst: A CloudSim-based Visual Modeller for Analyzing Cloud Computing Environments and Applications
23. Mapping the Blogosphere with RSS-Feeds
25. Probabilistic proactive routing with active route trace-back for highly mobile Ad Hoc Networks
26. An Adaptive Routing Protocol for Bus Networks
27. PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network
28. Adaptive Clustering Protocol for Wireless Networks
29.A Novel Cache Management Using Geographically Partial Matching for Location-based Services
30. AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement
31. A Cross-Layer Decision for Mobile IP Handover
32. A Novel Cross Layer Intrusion Detection System in MANET
33. A Secure Key Management Model for Wireless Mesh Networks
34. BPE Acceleration Technique for S/W Update for Mobile Phones
35. Privacy-Preserving Collaborative Filtering Protocol based on Similarity between Items
36. Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
37. Trustworthiness among Peer Processes in Distributed Agreement Protocol
38. New Approach to Quantification of Privacy on Social Network Sites
39. A Tree Graph Model Based on Mobile Environment
40. User-Excentric Service Composition in Pervasive Environments
41. Context-aware Mobile Services Transactions
42. Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes
43. MARS: Multi-stage Attack Recognition System
44. Against Spyware Using CAPTCHA in Graphical Password Scheme
45. Intrusion Tolerant Services Through Virtualization: a Shared Memory Approach
46. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
47. Empirical Analysis of Attackers Activity on Multi-TierWeb Systems
48. Key Parameters in Identifying Cost of Spam 2.0
49. Web Spambot Detection Based on Web Navigation Behaviour
50. A Dynamic NormalizedWeighting based Context Reasoning in Home-based Care
51. Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
52. Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-oriented Middleware
53. Symbolic Routing for Location-based Services in Wireless Mesh Networks
54. Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
55. A hybrid technique for efficient Medium Access Control in Wireless Sensor Networks
56. Tradeoffs among Delay, Energy and Accuracy of Partial Data Aggregation in Wireless Sensor Networks
57. Sink-initiated Geographic Multicasting Protocol in Wireless Sensor Networks
58. Using Recommendation to Limit Search Space in Web Services Discovery
59. Environmental Sustainability and Improved Quality of Life Through Service Convergence Technologies
60. HealthPass: Fine-grained Access Control to Portable Personal Health Records
61. Towards more Trustable Log Files for Digital Forensics by Means of “Trusted Computing”
62. Controlling File Distribution in The Share Network Through Content Poisoning
63. InnoDB Database Forensics
64. A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
65. Non-Interactive Information Reconciliation for Quantum Key Distribution
66. Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber
67. Secure Communication For Internet Payment In Heterogeneous Networks
68. IDSec: an Identification Layer Security Model
69. Resist Intruders’ Manipulation via Context-based TCP/IP Packet Matching
70. Deployment of a Secure Wireless Infrastructure oriented to Vehicular Networks
71. Automatic Application Signature Construction from Unknown Traffic
72. Propagation Modeling of Peer-to-Peer Worms
73. Grid of Segment Trees for Packet Classification
74. Towards Near Real-Time Data Warehousing
75. Analyzing Human Behavior using Case-Based Reasoning with the help of Forensic Questions
76. Using Ontology for Personalized Mobile Message Computation
77. Knowledge sharing effectiveness measurement
79. Using Ontology for Personalized Mobile Message Computation
80. Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote Collaboration
81. Knowledge sharing effectiveness measurement
82. AWorkflow Fragmentation Framework for Enterprise GridWorkflow Systems
83. Analytical Temporal Specification Issues for Industrial Control Systems
84. Deadline Aware Virtual Machine Scheduler for Grid and Cloud Computing
85. Generating Optimum Number of Clusters using Median Search and Projection Algorithms
86. Effect of Virtual Techniques in Data Storage Access
87. Routing based on Message Attraction
88. Virtual Database Technology for Distributed Database
89. Requirements for Distributed Event-based Awareness in P2P Groupware Systems
90. Security Verification for Authentication and Key Exchange Protocols, Revisited
91. Practical Threshold One-Time Proxy Signature Scheme
95. Tsunami Early Alert and Evacuation Support System for Fishery Workers by Mobile Phones
96. SAGe: Sensor Advanced Gateway for Integrating Wireless Sensor Networks and Internet
97. Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database
98.An Authentication and Authorization protocol using Ticket in Pervasive Environment.
99. Quality Metrics for Software Process Certification based on K-model
100. Towards a Unified Trust Model in Pervasive Systems
101. Improved Gait Recognition Performance Using Cycle Matching
102. An Instructional Strategy Selection Model Based on Agent and Ontology for an Intelligent Tutoring System
103. HiTrust: A Hybrid Tree based Trust Negotiation Service
104. A Context Conflict Resolution with Optimized Mediation
105. Analysis of Anonymity in P2P Anonymous Communication Systems
106. Peer-to-Peer Overlay Gateway Services for Home Automation and Management
107. SLA-based Online Charging Model in Mobile Environment
108. Improvement and Its Evaluation of Worker’s Motion Monitor System in Automobile Assembly Factory
109. Android, Java ME and Windows Mobile interplay
110. Detecting Suspicious Motion with Nonimaging Sensors
111. mTracker: A Mobile Tracking Application for Pervasive Environment
112. Performance Study on Location-assisted and Bluetooth-assisted Session Transfer for VoIP Application
113. An Improvement in Apriori algorithm Using Profit And Quantity
115. Stream Switching Resilience In P2P Streaming
MOBILE COMPUTING TOPICS
1.A Better Approximation Algorithm for Computing Connected Dominating Sets in Unit Ball Graphs
IEEE Transactions Papers 2010
2.Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking
IEEE Transactions Papers 2010
3.Controlled Wi-Fi Sharing in Cities A Decentralized Approach Relying on Indirect Reciprocity
IEEE Transactions Papers 2010
4.Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing
IEEE Transactions Papers 2010
5.Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks
IEEE Transactions Papers 2010
6.MABS Multicast Authentication Based on Batch Signature
IEEE Transactions Papers 2010
7.Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams
IEEE Transactions Papers 2010
8.Maximizing the Lifetime of a Barrier of Wireless Sensors
IEEE Transactions Papers 2010
9.On the Performance Bounds of Practical Wireless Network Coding
IEEE Transactions Papers 2010
10.Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
IEEE Transactions Papers 2010
11.Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations
IEEE Transactions Papers 2010
12.SAMAC A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas
IEEE Transactions Papers 2010
13.Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Route
IEEE Transactions Papers 2010
14.VEBEK Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
IEEE Transactions Papers 2010
15.Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks
IEEE Transactions Papers 2010
16. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
IEEE Transactions Papers 2010
17. MABS: Multicast Authentication Based on Batch Signature
IEEE Transactions Papers 2010
18. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
IEEE Transactions Papers 2010
19. Channel Assignment for Multihop Cellular Networks: Minimum Delay
IEEE Transactions Papers 2010
20. Uncertainty Modeling and Reduction in MANETs
IEEE Transactions Papers 2010
21. Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking
IEEE Transactions Papers 2010
22. On the Performance Bounds of Practical Wireless Network Coding
IEEE Transactions Papers 2010
23. SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas
IEEE Transactions Papers 2010
24. Internet Host Geolocation Using Maximum Likelihood Estimation Technique
IEEE Transactions Papers 2010
25. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
IEEE Transactions Papers 2010
26. Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing
IEEE Transactions Papers 2010
27. Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams
IEEE Transactions Papers 2010
28. SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments
IEEE Transactions Papers 2010
29. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
IEEE Transactions Papers 2010
30. Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService
IEEE Transactions Papers 2010
31. A Coverage Inference Protocol for Wireless Sensor Networks
IEEE Transactions Papers 2010
32. Optimal Accounting Policies for AAA Systems in Mobile Telecommunications Networks
IEEE Transactions Papers 2010
33. Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks
IEEE Transactions Papers 2010
34. Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks
IEEE Transactions Papers 2010
35. Energy-Efficient Reprogramming of a Swarm of Mobile Sensors
IEEE Transactions Papers 2010
36. A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks
IEEE Transactions Papers 2010
37. SIP-Based IMS Signaling Analysis for WiMax-3G Interworking Architectures
IEEE Transactions Papers 2010
GRID COMPUTING TOPICS
1. Hierarchical Replication Techniques to Ensure Checkpoint Storage Reliability in Grid Environment 2. An Efficient Parallel Implementation of the Hidden Markov Methods for Genomic Sequence Search on a Massively Parallel System 3. Distributed Generation Interface to the CERTS Micro grid
CRYPTOGRAPHY TOPICS
1. A Cryptographic Approach to Securely Share and Query Genomic Sequences
IMAGE PROCESSING TOPICS
1. Invariances, Laplacian-Like Wavelet Bases, and the Whitening of Fractal Processes 2. SAR Image Regularization with Fast Approximate Discrete Minimization 3. An MRF-Based DeInterlacing Algorithm with Exemplar-Based Refinement 4. A Video Coding Scheme Based on Joint Spatiotemporal and Adaptive Prediction 5. Dominant Local Binary Patterns for Texture Classification 6. Invariances, Laplacian-Like Wavelet Bases, and the Whitening of Fractal Processes 7. Applications to Photon-Limited Image Denoising 8. A High-Capacity Steganography Scheme for JPEG2000 Baseline System 9. Hierarchical Ensemble of Global and Local Classifiers for Face Recognition 10. Image Quality Assessment Based on Multiscale Geometric Analysis 11. Clustering-Based Denoising With Locally Learned Dictionaries 12. Image Denoising Using Mixtures of Projected Gaussian Scale Mixtures 13. Geometric Video Approximation Using Weighted Matching Pursuit
14. Efficient Block-Based Frequency Domain Wavelet Transform Implementations 15. Bayesian Inference on Multiscale Models for Poisson Intensity Estimation 16. Geometric Features-Based Filtering for Suppression of Impulse Noise in Color Images 17. A Connectivity-Based Method for Defining Regions-of-Interest in fMRI Data 18. Distortion Estimators for Bitplane Image Coding 19. Improved Dot Diffusion by Diffused Matrix and Class Matrix Co-Optimization 20. Active Mask Segmentation of Fluorescence Microscope Images 21. Hierarchical Multiple Markov Chain Model for Unsupervised Texture Segmentation 22. An Edge-Weighted Centroidal Voronoi Tessellation Model for Image Segmentation 23. Stabilization of Parametric Active Contours Using a Tangential Redistribution Term 24. Super Resolution With Probabilistic Motion Estimation 25. A Robust Hidden Markov Gauss Mixture Vector Quantizer for a Noisy Source 26. Continuous Stereo Self-Calibration by Camera Parameter Tracking
NS2 TOPICS
1. Weight based DSR for Mobile Ad Hoc Networks 2. Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic 3. On the Security of Route Discovery in MANETs 4. ZMAC : A Hybrid MAC for Wireless Sensor Networks 5. Multipoint Relay 6. Cost Minimization Planning for Greenfield PON Network 7. FPGA-Based Channel Simulator for a Wireless Network Emulator 8. NCTUns 5.0 Network Simulator for Advanced Wireless Vehicular Network Researches 10. Visual Network Simulator (VNS): A GUI to QoS simulation for the ns-2 simulator 11. Implementation Architecture of Proxy Mobile IPv6 Protocol for NS2 Simulator Software 12. End-to-end network simulator for conversational quality measurements 13. Improving Video Streaming over IEEE 802.11 Mesh Networks through a Cross-Layer Design Technique 14. Designing and Implementing an IEEE 802.16 Network Simulator for Performance Evaluation of Bandwidth Allocation Algorithms 15. A Case Study of Networks Simulation Tools for Wireless Networks 16. Robust and Efficient Stream Delivery for Application Layer Multicasting in Heterogeneous Networks 17. A Cautionary View of Mobility and Connectivity Modeling in Vehicular Ad-Hoc Networks 18. Security Solution for Mobile Ad Hoc Network of Networks (MANoN ) 19. Mesh-based Data Delivery over Multiple Tree-Shaped Routes in P2P Overlay Network
INTELLIGENT SYSTEM TOPICS
1. IT Strategies for Increased Rail Employee Satisfaction 2. Natural Language Processing and the Web Mobile WiMAX Network: A Survey 3. Mining the Web to Create Specialized Glossaries 4. Linking Documents to Encyclopedic Knowledge 5. Weighing Stars: Aggregating Online Product Reviews for Intelligent E-commerce Applications 6. A Multiagent System for Coordinating Ambulances for Emergency Medical Services 7. Recognition of Complex Settings by Aggregating Atomic Scenes 8. Exploring Alternative Software Architecture Designs: A Planning Perspective 9. AVA: Adjective-Verb-Adverb Combinations for Sentiment Analysis 10. CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior 11. An Artificial Emergency-Logistics-Planning System for Severe Disasters 12. Transaction based QoS web service 13. The Emerging Field of Semantic Scientific Knowledge Integration 14. Sequential pattern mining using Intelligent tutoring Agent 15. Semantic technology for communication with in an organization 16. Collaborative Spam filtering 17. Adaptive Multiagent System for Network Traffic Monitoring 18. Scaling Up Wide-Area-Search-Munition Teams 19. Guest Editors' Introduction: Agents and Data Mining 20. Adaptive Multiagent System for Network Traffic Monitoring 21. A Collaborative Multiagent System for Mining Transcriptional Regulatory Elements 22. Agent-Enriched Data Mining: A Case Study in Brain Informatics 23. Improving the Behavior of Intelligent Tutoring Agents with Data Mining 24. Agent-Based Approach to Free-Flight Planning, Control, and Simulation 25. Improving Air Traffic Management with a Learning Multiagent System
SOFTWARE ENGINEERING TOPICS
1. A Framework for Programming Robust Context-Aware Applications
2. A Quantitative Investigation of the Acceptable Risk Levels of Object-Oriented Metrics in Open-Source Systems
3. A Theoretical and Empirical Study of Search-Based Testing Local, Global, and Hybrid Search
4. Bayesian Approaches to Matching Architectural Diagrams
5. Better Debugging via Output Tracing and Callstack-Sensitive Slicing
6. DECOR A Method for the Specification and Detection of Code and Design Smells
7. Directed Explicit State-Space Search in the Generation of Counterexamples for Stochastic Model Checking
8. Discovering Services during Service-Based System Design Using UML
9. Effects of Personality on Pair Programming
10. Engineering a Sound Assertion Semantics for the Verifying Compiler
11. Exception Handling for Repair in Service-Based Processes
12. Exception Handling Patterns for Process Modeling
13. Generating Event Sequence-Based Test Cases Using GUI Runtime State Feedback
14. How Developers’ Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes A Series of Four Experiments
15. Incremental Test Generation for Software Product Lines
16. Learning Communicating Automata from MSCs
17. On Event-Based Middleware for Location-Aware Mobile Applications
18. Program Behavior Discovery and Verification A Graph Grammar Approach
19. Providing Architectural Languages and Tools Interoperability through Model Transformation Technologies
20. Service-Level Agreements for Electronic Services
21. Software Reliability and Testing Time Allocation An Architecture-Based Approach
22. Understanding Exception Handling Viewpoints of Novices and Experts
23. Verification and Trade-Off Analysis of Security Properties in UML System Models
24. Vulnerability Discovery with Attack Injection
CYBERNETICS TOPICS
1. Using a Benchmark in Case-Based Multiple-Criteria Ranking
2. Gait Feature Subset Selection by Mutual Information 3. Identifying Noncooperative Subjects at a Distance Using Face Images and Inferred Three-Dimensional Face Models 4. Dynamic Multiple Fault Diagnosis: Mathematical Formulations and Solution Techniques
INTERNET COMPUTING TOPICS
1. Daios: Efficient Dynamic Web Service Invocation 2. Building Accountability Middleware to Support Dependable SOA 3. Game-Based Learning with Ubiquitous Technologies 4. A Multidimensional Paper Recommender: Experiments and Evaluations 5. A Managed IPv6 Transitioning Architecture for Large Network Deployments 6. Semantic Technology for Capturing Communication Inside an Organization 7.Exploiting Linked Data to Build Web Applications 8. Citizen Sensing, Social Signals, and Enriching Human Experience 9. Reaping Deep Web Rewards Is a Matter of Semantics 10. IPTV: Reinventing Television in the Internet Age 11. Mobile IPTV: Approaches, Challenges, Standards, and QoS Support 12. Reducing Channel-Change Times with the Real-Time Transport Protocol 13. Standardization Activities for IPTV Set-Top Box Remote Management 14. Fighting Phishing with Discriminative Keypoint Features 15.A Semantic-Based Solution for UBL Schema Interoperability 16. Agents and Service-Oriented Computing for Autonomic Computing: A Research Agenda 17. A Dependable ESB Framework for Service Integration 18. Technology, Standards, and Real-World Deployments of the EPC Network 19. Asynchronous Participatory Exams: Internet Innovation for Engaging Students 20. Social Search: Exploring and Searching Social Architectures in Digital Networks 21. Ten Ideas for Policymakers to Drive Digital Progress 22. Free Riding in Peer-to-Peer Networks 23.Network-Enabled Compulsory Education Getting Big Push 24. Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis 25. Reputation Bootstrapping for Trust Establishment among Web Services
PARALLEL DISTRIBUTED SYSTEMS TOPICS
1. An Analytical Approach to Optimizing Parallel Image RegistrationRetrieval
2. Dealing with Transient Faults in the Interconnection Network of CMPs at the Cache Coherence Level
3. Detecting Application Denial-of-Service Attacks A Group-Testing-Based Approach
4. Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks
5. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
6. Improving Reliability for Application-Layer Multicast Overlays
7. Logoot-Undo Distributed Collaborative Editing System on P2P Networks
8. Resource Bundles Using Aggregation for Statistical Large-Scale Resource Discovery and Management
9. Secure Synchronization of Periodic Updates in Ad Hoc Networks
10. Snoogle A Search Engine for Pervasive Environments
11. Stabilizing Distributed R-Trees for Peer-to-Peer Content Routing
12. The Topology of Gaussian and Eisenstein-Jacobi Interconnection Networks
13. SocioNet: A Social-Based Multimedia Access System for Unstructured P2P Networks
14. A Cross-Layer Approach-Based Gnutella for Collaborative Virtual Environments over Mobile Ad Hoc Networks
15. Adaptive Workload Prediction of Grid Performance in Confidence Windows
16. Correlation-Based Traffic Analysis Attacks on Anonymity Networks
17. On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
18. Coupling-Based Internal Clock Synchronization for Large-Scale Dynamic Distributed Systems
19. Efficient Algorithms for Global Snapshots in Large Distributed Systems
20. PowerPack: Energy Profiling and Analysis of High-Performance Systems and Applications
21. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
22. A Synchronous Scheduling Service for Distributed Real-Time Java
23. Scheduling Multisource Divisible Loads on Arbitrary Networks
24. Reputation-Based Resource Allocation in P2P Systems of Rational Users
25. Privacy-Conscious Location-Based Queries in Mobile Environments
26. A Queuing Model for Evaluating the Transfer Latency of Peer-to-Peer Systems
27. Configurable Middleware for Distributed Real-Time Systems with Aperiodic and Periodic Tasks
28.Optimal Resource Placement in Structured Peer-to-Peer Networks
DEPENDABLE AND SECURE COMPUTING TOPICS
1 A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis
2 An Advanced Hybrid Peer-to-Peer Botnet
3 Conformance Testing of Temporal Role-Based Access Control Systems
4 In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm
5 On the Thermal Attack in Instruction Caches
6 Secure Data Objects Replication in Data Grid
7 Shifting Inference Control to User Side Architecture and Protocol
8 Using Web-Referral Architectures to Mitigate Denial-of-Service Threats
9. An Advanced Hybrid Peer-to-Peer Botnet
10. A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis
11. Conformance Testing of Temporal Role-Based Access Control Systems
12. Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
13. In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm
14. Shifting Inference Control to User Side: Architecture and Protocol
15. A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory
16. Layered Approach Using Conditional Random Fields for Intrusion Detection
17. SigFree: A Signature-Free Buffer Overflow Attack Blocker
18. Secure Data Objects Replication in Data Grid
MULTIMEDIA TOPICS
1. Real-Time Environmental Monitoring and Notification for Public Safety
2. Landscaping Future Interaction: Special issue on Mobile and Ubiquitous Multimedia
3. Visual Navigation for Mobile Devices
4. Picture Context Capturing for Mobile Databases
5. Intelligent Multimedia Presentation in Ubiquitous Multidevice Scenarios
6. Design and Implementation of a Bilingual Conversation Ability Training System
7. Practical Realization of Ad hoc Network based on DSR Protocol Considering QOS for Multimedia Services
8. Technique of Image Retrieval based on Multi-label Image Annotation
9. Reflections on the Control of Cognitive Load in Multimedia Learning
10. A Performance Evaluation of IP Mobility Support Protocols
11. A Scheduling and Management Algorithm about Proxy based on AFEC
12. A Novel Design of Internet Digital Content Distribution Platform
13. PID Parameters Tuning Method by Particle Swarm Optimization with Chaotic Disturbance
14. Geometric Distortions Correction Scheme based on Hausdorff Distance for Digital Watermarking Image
15. Applications of Multimedia Technology in Deformation Monitoring of Subway Tunnel
16. Improvement of Image Contrast with Local Adaptation
17. Control System Design For Contant-pressure Water Supply
18. Adaptive Network Precoding Based on SJNR to Mitigate Inter-Cell Interference
19. Study on Real-time Video Monitoring System Base on BSP-16
20. Campus Internet Culture and Ideological and Political Education
21. The Application Research of OLAP in College Decision Support System
22. Effects of sonar shape distortion on time delay estimation method for left/right discrimination
23. Design and Implementation of E-commerce Feature Major Website
24. Rapid Developing Technology Research Based on Open-Source to E-commerce Site
25. The analysis for the attack on the wireless bridge monitoring system
26. Study on the Real time Log-domain Conversion for Detecting the Transient Feeble Optical Signal
27. An Improved Private Information Keeper System
28. An Intelligent Content-Based Routing for Multimedia Mobile Ad Hoc Networks
29. Development of the Packaging Engineering Experimental Teaching Platform Based on Interaction Design Concept
30. The Influence of E- service Quality on Consumer’s Satisfaction and WOM
31. Simple Vehicle Detection with Shadow Removal at Intersection
32. An Adaptive Ordering Framework for Filtering Multimedia Streams
33. One-Trip-Time based Congestion Control for Distributed Real-time Applications
34. An Improved Two-factor Authentication Protocol
35. Apache Struts Applied for Construction of SMS Collection System
36. Investigation on Applying Information Technology in Graduation Design
37. Dynamic Attack Tree and Its Applications on Trojan Horse Detection
38. Design and Implementation of a Call Center in IC Card Management System
39. Adaptive Rendering Cluster System Based On Browser/Server Architecture
40. Application of Customer Relationship Management in Health Care
41. A Mobile Multimedia Technology to Aid Those with Alzheimer’s Disease
42. A Platform for Context-Aware and Digital Rights Management-Enabled Content Adaptation
43. Hiding Multitone Watermarks in Halftone Images
44. Information Overload A Collaborative Dance Perform
45. Intelligent Multimedia Presentation in Ubiquitous Multidevice Scenarios
46. Keyframe-Based Video Summary Using Visual Attention Clues
47. Landscaping Future Interaction Special issue on Mobile and Ubiquitous Multimedia
48. Local Wavelet Features for Statistical Object Classification and Localization
49. Mobility Management for Video Streaming on Heterogeneous Networks
50. Modeling Media Synchronization with Semiotic Agents
51. Optimal Rate Allocation for Video Transmission over Wireless Ad Hoc Networks
52. Picture Context Capturing for Mobile Databases
53. Social Surroundings Bridging the Virtual and Physical Divide
54. Visual Navigation for Mobile Devices
KNOWLEDGE AND DATA ENGINEERING TOPICS
1 A Binary String Approach for Updates in Dynamic Ordered XML Data
IEEE Transactions Papers 2010
2 A Distance Measure Approach to Exploring the Rough Set Boundary Region for Attribute Reduction
IEEE Transactions Papers 2010
3 A Game Theoretic Approach for Simultaneous Compaction and Equipartitioning of Spatial Data Sets
IEEE Transactions Papers 2010
4 A General Framework of Time-Variant Bandwidth Allocation in the Data Broadcasting Environment
IEEE Transactions Papers 2010
5 A Nonsupervised Learning Framework of Human Behavior Patterns Based on Sequential Actions
IEEE Transactions Papers 2010
6 A Reasoning System of Ternary Projective Relations
IEEE Transactions Papers 2010
7 A Unified Framework for Providing Recommendations in Social Tagging Systems Based on Ternary Semantic Analysis
IEEE Transactions Papers 2010
8 Adaptive Join Operators for Result Rate Optimization on Streaming Inputs
IEEE Transactions Papers 2010
9 An UpDown Directed Acyclic Graph Approach for Sequential Pattern Mining
IEEE Transactions Papers 2010
10 Asking Generalized Queries to Domain Experts to Improve Learning
IEEE Transactions Papers 2010
11 Automatic Ontology Matching via Upper Ontologies A Systematic Evaluation
IEEE Transactions Papers 2010
12 Beyond Redundancies A Metric-Invariant Method for Unsupervised Feature Selection
IEEE Transactions Papers 2010
13 BinRank Scaling Dynamic Authority-Based Search Using Materialized Subgraphs
IEEE Transactions Papers 2010
14 Bregman Divergence-Based Regularization for Transfer Subspace Learning
IEEE Transactions Papers 2010
15 Bridging Domains Using World Wide Knowledge for Transfer Learning
IEEE Transactions Papers 2010
16 Building a Rule-Based Classifier :A Fuzzy-Rough Set Approach
IEEE Transactions Papers 2010
17 Closeness A New Privacy Measure for Data Publishing
IEEE Transactions Papers 2010
18 Closing the Loop in Webpage Understanding
IEEE Transactions Papers 2010
19 Conic Programming for Multitask Learning
IEEE Transactions Papers 2010
20 Constrained Dimensionality Reduction Using a Mixed-Norm Penalty Function with Neural Networks
IEEE Transactions Papers 2010
21 Continuous Subgraph Pattern Search over Certain and Uncertain Graph Streams
IEEE Transactions Papers 2010
22 Deriving Concept-Based User Profiles from Search Engine Logs
IEEE Transactions Papers 2010
23 Domain-Driven Classification Based on Multiple Criteria and Multiple Constraint-Level Programming for Intelligent Credit Scoring
IEEE Transactions Papers 2010
24 Domain-Driven Data Mining Challenges and Prospects
IEEE Transactions Papers 2010
25 Duplicate-Insensitive Order Statistics Computation over Data Streams
IEEE Transactions Papers 2010
26 Dynamic Dissimilarity Measure for Support-Based Clustering
IEEE Transactions Papers 2010
27 Dynamic Wavelet Synopses Management over Sliding Windows in Sensor Networks
IEEE Transactions Papers 2010
28 Efficient Algorithm for Localized Support Vector Machine
IEEE Transactions Papers 2010
29 Efficient Multidimensional Suppression for K-Anonymity
IEEE Transactions Papers 2010
30 Energy- and Latency-Efficient Processing of Full-Text Searches on a Wireless Broadcast Stream
IEEE Transactions Papers 2010
31 Ensemble Rough Hypercuboid Approach for Classifying Cancers
IEEE Transactions Papers 2010
32 Exploring Correlated Subspaces for Efficient Query Processing in Sparse Databases
IEEE Transactions Papers 2010
33 False Negative Problem of Counting Bloom Filter
IEEE Transactions Papers 2010
34 Feature Selection Using f-Information Measures in Fuzzy Approximation Spaces
IEEE Transactions Papers 2010
35 Filter-Based Data Partitioning for Training Multiple Classifier Systems
IEEE Transactions Papers 2010
36 Filtering Data Streams for Entity-Based Continuous Queries
IEEE Transactions Papers 2010
37 FiVaTech Page-Level Web Data Extraction from Template Pages
IEEE Transactions Papers 2010
38 Histograms and Wavelets on Probabilistic Data
IEEE Transactions Papers 2010
39 Incremental and General Evaluation of Reverse Nearest Neighbors
IEEE Transactions Papers 2010
40 Incremental Evaluation of Visible Nearest Neighbor Queries
IEEE Transactions Papers 2010
41 Incremental Maintenance of 2-Hop Labeling of Large Graphs
IEEE Transactions Papers 2010
42 Introduction to the Domain-Driven Data Mining Special Section
IEEE Transactions Papers 2010
43 Iso-Map Energy-Efficient Contour Mapping in Wireless Sensor Networks
IEEE Transactions Papers 2010
44 k-Anonymity in the Presence of External Databases
IEEE Transactions Papers 2010
45 Kernel Discriminant Learning for Ordinal Regression
IEEE Transactions Papers 2010
46 Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
IEEE Transactions Papers 2010
47 Learning to Adapt Web Information Extraction Knowledge and Discovering New Attributes via a Bayesian Approach
IEEE Transactions Papers 2010
48 Logic-Based Pattern Discovery
49 Maintaining Recursive Views of Regions and Connectivity in Networks
IEEE Transactions Papers 2010
50 Mining Predictive k-CNF Expressions
IEEE Transactions Papers 2010
51 Multimodal Fusion for Video Search Reranking
IEEE Transactions Papers 2010
52 Optimization of Linear Recursive Queries in SQL
IEEE Transactions Papers 2010
53 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
IEEE Transactions Papers 2010
54 PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
IEEE Transactions Papers 2010
55 Parallelizing Itinerary-Based KNN Query Processing in Wireless Sensor Networks
IEEE Transactions Papers 2010
56 Performance Comparison of the Tree and the Quadtree for kNN and Distance Join Queries
IEEE Transactions Papers 2010
57 Presence without Complete World Knowledge
IEEE Transactions Papers 2010
58 Privacy-Preserving Gradient-Descent Methods
IEEE Transactions Papers 2010
59 Probabilistic Reverse Nearest Neighbor Queries on Uncertain Data
IEEE Transactions Papers 2010
60 Probabilistic Topic Models for Learning Terminological Ontologies
IEEE Transactions Papers 2010
61 Projective Distribution of XQuery with Updates
IEEE Transactions Papers 2010
62 Prospective Infectious Disease Outbreak Detection Using Markov Switching Models
IEEE Transactions Papers 2010
63 Query Processing Using Distance Oracles for Spatial Networks
IEEE Transactions Papers 2010
64 Ranked Query Processing in Uncertain Databases
IEEE Transactions Papers 2010
65 Record Matching over Query Results from Multiple Web Databases
IEEE Transactions Papers 2010
66 Signaling Potential Adverse Drug Reactions from Administrative Health Databases
IEEE Transactions Papers 2010
67 Spectral Anonymization of Data
IEEE Transactions Papers 2010
68 Structural and Role-Oriented Web Service Discovery with Taxonomies in OWL-S
IEEE Transactions Papers 2010
69 Superseding Nearest Neighbor Search on Uncertain Spatial Databases
IEEE Transactions Papers 2010
70 The Impact of Diversity on Online Ensemble Learning in the Presence of Concept Drift
IEEE Transactions Papers 2010
71 The Tiled Bitmap Forensic Analysis Algorithm
IEEE Transactions Papers 2010
72 Towards an Effective XML Keyword Search
IEEE Transactions Papers 2010
73 Uninterpreted Schema Matching with Embedded Value Mapping under Opaque Column Names and Data Values
IEEE Transactions Papers 2010
74 ViDE A Vision-Based Approach for Deep Web Data Extraction
IEEE Transactions Papers 2010
75 Domain-Driven Data Mining: Challenges and Prospects
IEEE Transactions Papers 2010
76 Bridging Domains Using World Wide Knowledge for Transfer Learning
IEEE Transactions Papers 2010
77 Signaling Potential Adverse Drug Reactions from Administrative Health Databases
IEEE Transactions Papers 2010
78 Closing the Loop in Webpage Understanding
IEEE Transactions Papers 2010
79 Incremental Evaluation of Visible Nearest Neighbor Queries
IEEE Transactions Papers 2010
80 Exception Handling Patterns for Process ModelingCLOUD COMPUTING
1 .A Profile-based Approach to Just-in-time Scalability for Cloud Applications
2. EnaCloud: An Energy-saving Application Live Placement Approach for Cloud Computing Environments
3. From Service Clouds to User-centric Personal Clouds
4. Semantic Modeling for Cloud Computing, Part 1
5. Deployment of Services in a Cloud Subject to Memory and License Constraints
6. Activity-aware chat system based on a study of distributed collaborative learning
7. Application Performance Isolation in Virtualization
8. Optimistic Synchronization of Parallel Simulations in Cloud Computing Environments
9. SOA’s Last Mile Connecting Smartphones to the Service Cloud
10. Intelligent Management of Remote Facilities through a Ubiquitous Cloud Middleware
11. An Efficient Resource Management System for On-line Virtual Cluster Provision
12. The Method and Tool of Cost Analysis for Cloud Computing
13. Using Clouds to Elastically Extend Site Resources
14. On Technical Security Issues in Cloud Computing
15. Cloud Computing for Satellite Data Processing on High End Compute Clusters
16. Policy-based Event-driven Services-oriented Architecture for Cloud Services Operation & Management
17. A RESTful Approach to the Management of Cloud Infrastructure
19. Architecture-Driven Variation Analysis for Designing Cloud Applications
20. Service Oriented Architecture for Cloud based Travel Reservation Software as a Service
22. Improving Scalability of Software Cloud for Composite Web Services
23. Ranking Mortgage Origination Applications using Customer, Product, Environment and Workflow Attributes
24. Understand Collaborative Authorization Policies: Models and Specifications
25. MONGOOSE: MONitoring Global Online Opinions via Semantic Extraction
26. Rule-based Problem Classification in IT Service Management
27. Unibus-managed Execution of Scientific Applications on Aggregated Clouds
28.Design and Implementation of an efficient Two-level Scheduler for Cloud Computing Environment
29. Dynamic Auction Mechanism for Cloud Resource Allocation
30. Profit-driven Service Request Scheduling in Clouds
31. Expanding the Cloud: A component-based architecture to application deployment on the Internet
32. Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds
33. SLA-Driven Dynamic Resource Management for Multi-tier Web Applications in a Cloud
MOBILE TECHNOLOGY
1. A User-Centered Context-sensitive Privacy Model in Pervasive Systems
2. Performance Evaluation of Handoff Queuing Schemes
3. A context-aware personalized m-learning application based on m-learning preferences
4. Adaptive Content Delivery in Ubiquitous Learning Environment
5. Development of Adaptive Vocabulary Learning via Mobile phone Email
6. Enhancing Emerging Learning Objects with Contextual Metadata Using the Linked Data Approach
7. Orchestrating Learning in a one-to-one Technology Classroom
8. Integrating Mobile, Web and Sensory Technologies to Support Inquiry-Based Science Learning
9. A Review of Literature in Mobile Learning: Affordances and Constraints
10. Mobile Social Video Sharing Tool for Learning Applications
11. WebQuest: M-Learning for Environmental Education