Posts

old
Organizing User Search Histories

Organizing User Search Histories

Organizing User Search Histories

old
Publishing Search Logs – A Comparative Study  Of Privacy Guarantees

Publishing Search Logs – A Comparative Study Of Privac...

Publishing Search Logs – A Comparative Study Of Privacy Guarantees

old
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

Query Planning for Continuous Aggregation Queries over ...

Query Planning for Continuous Aggregation Queries over a Network of Data Aggrega...

old
ROAD: A New Spatial Object Search Framework for Road Networks

ROAD: A New Spatial Object Search Framework for Road Ne...

ROAD: A New Spatial Object Search Framework for Road Networks

old
Scalable Learning of Collective Behavior

Scalable Learning of Collective Behavior

Scalable Learning of Collective Behavior

old
Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings

Tree-Based Mining for Discovering Patterns of Human Int...

Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings

old
Bounding the Impact of Unbounded Attacks in Stabilization

Bounding the Impact of Unbounded Attacks in Stabilization

Bounding the Impact of Unbounded Attacks in Stabilization

old
Catching Packet Droppers and Modifiers in Wireless Sensor Networks

Catching Packet Droppers and Modifiers in Wireless Sens...

Catching Packet Droppers and Modifiers in Wireless Sensor Networks

old
A New Cell-Counting-Based Attack Against Tor

A New Cell-Counting-Based Attack Against Tor

A New Cell-Counting-Based Attack Against Tor

old
The Three-Tier Security Scheme in Wireless  Sensor Networks with Mobile Sinks

The Three-Tier Security Scheme in Wireless Sensor Netw...

The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

old
Optimal Source-Based Filtering of Malicious Traffic

Optimal Source-Based Filtering of Malicious Traffic

Optimal Source-Based Filtering of Malicious Traffic

old
Topology Control In Mobile Ad Hoc Networks With Cooperative Communications

Topology Control In Mobile Ad Hoc Networks With Coopera...

Topology Control In Mobile Ad Hoc Networks With Cooperative Communications

old
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

A Secure Intrusion detection system against DDOS attack...

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-ho...

old
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Design and Implementation of TARF: A Trust-Aware Routin...

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

old
On the Security and Efficiency of Content Distribution via Network Coding

On the Security and Efficiency of Content Distribution ...

On the Security and Efficiency of Content Distribution via Network Coding

old
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

SPOC: A Secure and Privacy-preserving Opportunistic Com...

SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobi...