TrustCom B

259 papers

YearTitle / Authors
2011A Biased Modified Binary Query Tree Protocol for RFID Tag Collision Resolution.
Xinqing Yan, Yan Xu, Bin Li
2011A Block Gathering Based on Mobile Web Page Segmentation Algorithm.
Libing Wu, Yalin Ke, Yanxiang He, Nan Liu
2011A Certificate Driven Access Control Strategy for Service Composition and Its Analysis.
Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu
2011A Charged PSO Inspired Method for Generating Immune Detectors for Network Intrusion Detection.
Mark Heydenrych, Elizabeth Marie Ehlers
2011A Cooperative Mechanism to Defense against Distributed Denial of Service Attacks.
Hakem Beitollahi, Geert Deconinck
2011A DRTM-Based Method for Trusted Network Connection.
Wei Feng, Yu Qin, Aimin Yu, Dengguo Feng
2011A Data Simulator for ZigBee-Base Wireless Sensor Network System.
Kim-Yung Lu
2011A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems.
Hsiao-Ying Lin, Wen-Guey Tzeng, Bao-Shuh Paul Lin
2011A Decision Making Ontology Building Process for Analytical Requirements Elicitation.
Fahmi Bargui, Hanêne Ben-Abdallah, Jamel Feki
2011A Distributed Real-Time Operating System with Location-Transparent System Calls for Task Management and Inter-task Synchronization.
Takahiro Chiba, Yuichi Itami, Myungryun Yoo, Takanori Yokoyama
2011A Distributed and Shortest-Path-Based Algorithm for Maximum Cover Sets Problem in Wireless Sensor Networks.
Feng Zeng, Lan Yao, Zhigang Chen, Huamei Qi
2011A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks.
Qian Sun, Min Wu
2011A Formal Approach for Modeling Interactive Visual Interfaces.
Emanuele Covino, Giovanni Pani
2011A Framework for Reputation Bootstrapping Based on Reputation Utility and Game Theories.
Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu
2011A Framework for the Assessment of the Trustworthiness of Digital Records over Time.
Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård
2011A Game Theoretic Coalitional Bidding Scheme for Efficient Routing in Vehicular Ad Hoc Networks.
Muhammad Bilal, Pauline M. L. Chan
2011A Global Scheduling Algorithm Based on Dynamic Critical Path.
Xing Gu, Qun Yang, Dechang Pi, He-yang Ke
2011A Hardware/Software Countermeasure and a Testing Framework for Cache Based Side Channel Attacks.
Ankita Arora, Sri Parameswaran, Roshan G. Ragel, Darshana Jayasinghe
2011A Hybrid Trust Model for Authorisation Using Trusted Platforms.
Aarthi Krishna, Vijay Varadharajan
2011A Logical Framework of Proof-Carrying Survivability.
Yanjun Zuo, Suhas Lande
2011A Method for Detecting Unknown Malicious Executables.
Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel
2011A Method for Searching the Centroid of a 3D Cluster Based on RSSI.
Weike Chen, Heng Shou, Wenfeng Li
2011A Model for Automating Persistent Identity Clone in Online Social Network.
Bhume Bhumiratana
2011A Model for a Testbed for Evaluating Reputation Systems.
Partheeban Chandrasekaran, Babak Esfandiari
2011A New Multivariate Hash Function with HAIFA Construction.
Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang
2011A New Security Architecture for BitTorrent.
Firas Bader, Andra Radoveneanu, Hani Ragab Hassen
2011A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks.
Ji Guo, Alan Marshall, Bosheng Zhou
2011A Novel Energy-Efficient Routing Algorithm in Multi-sink Wireless Sensor Networks.
Zhiwu Huang, Yuan Cheng, Weirong Liu
2011A Power Law Transformation Predicting Lightness Conditions Based on Skin Color Space Detection.
Emmanuel Kondela, Huang Dong Jun
2011A Precise Memory Model for Operating System Code Verification.
Geng Chen, Lei Luo, Lijie Wang
2011A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets.
Mahdi Asadpour, Mohammad Torabi Dashti
2011A Privacy-Preserving Defense Mechanism against Request Forgery Attacks.
Ben S. Y. Fung, Patrick P. C. Lee
2011A Private and Scalable Authentication for RFID Systems Using Reasonable Storage.
Xiaolin Cao, Máire O'Neill
2011A Property-Based Attestation Scheme with the Variable Privacy.
Yu Qin, Dexian Chang, Shijun Zhao, Qianying Zhang
2011A Quantitative Approach to Triaging in Mobile Forensics.
Fabio Marturana, Gianluigi Me, Rosamaria Berte, Simone Tacconi
2011A Quasi Physical Method for the Equal Sphere Packing Problem.
Wenqi Huang, Liang Yu
2011A RFID-Based Context-Aware Service Model.
Jinfang Sheng, Wen Zou, Liu Yang, Bin Wang
2011A Refined and Heuristic Algorithm for LD tagSNPs Selection.
Hailin Chen, Zuping Zhang, Jing Xia
2011A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks.
Muhammad Bashir Abdullahi, Guojun Wang, Felix Musau
2011A Reputation Mechanism for Virtual Reality - Five-Sense Oriented Feedback Provision and Subjectivity Alignment.
Hui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann
2011A Research Model for Human-Computer Trust Interaction.
Zheng Yan, Raimo Kantola, Peng Zhang
2011A Scalability Study of AAA Support in Heterogeneous Networking Environments with Global Roaming Support.
Daniel Granlund, Christer Åhlund
2011A Secure Multicoupon Solution for Multi-merchant Scenarios.
Andreu-Pere Isern-Deyà, M. Francisca Hinarejos, Josep-Lluís Ferrer-Gomila, Magdalena Payeras-Capellà
2011A Simple Balanced Password-Authenticated Key Agreement Protocol.
Fuwen Liu, Hartmut König
2011A Simulation Study of Unstructured P2P Overlay for Multimedia Streaming.
Deng Li, Zhigang Chen, Jiaqi Liu, Hui Liu, Zhong Ren
2011A Software Fault-Tolerant Method Based on Exception Handling in RT/E System.
Zhou Lu, Kailong Zhang, Xingshe Zhou
2011A Sufficient Schedulability Test for Real-Time Software Transactional Memory.
Chaitanya Belwal, Albert M. K. Cheng
2011A Survey on Latest Botnet Attack and Defense.
Lei Zhang, Shui Yu, Di Wu, Paul A. Watters
2011A Trust Prediction Model for Service Web.
Wanita Sherchan, Surya Nepal, Athman Bouguettaya
2011A Trusted Integrity Measurement Architecture for Securing Enterprise Network.
Tong Liu, Prathima Agrawal
2011A Two-Layered Replica Management Method.
Chuncong Xu, Xiaomeng Huang, Guangwen Yang, Yang Zhou
2011A UML Model-Based Approach for Replication Assessment of AUTOSAR Safety-Critical Applications.
Sara Tucci Piergiovanni, Chokri Mraidha, Ernest Wozniak, Agnes Lanusse, Sébastien Gérard
2011A Web Services Composition Model and Its Verification Algorithm Based on Interface Automata.
Jianhua Li, Songqiao Chen, Lin Jian, Hongyu Zhang
2011A Weighted Cluster Ensemble Algorithm Based on Graph.
Xiaoping Fan, Yueshan Xie, Zhifang Liao, Xiaoqing Li, Li-min Liu
2011Abnormal Process Instances Identification Method in Healthcare Environment.
Bingning Han, Lihong Jiang, Hongming Cai
2011Access Control in Distributed Systems: Merging Theory with Practice.
Ivan Stojmenovic
2011Achieving High Throughput in High-Radix Switch.
Ming Fang, Songqiao Chen, Kefei Wang
2011Adaptive Client-Side LUT-Based Digital Watermarking.
Chi-Man Pun, Jing-Jing Jiang, C. L. Philip Chen
2011An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETs.
Fatemeh Barani, Mahdi Abadi
2011An Access Control Framework for the Web of Data.
Owen Sacco, Alexandre Passant, Stefan Decker
2011An Advanced and Effective Literature Search Algorithm Based on Analytic Hierarchy Process.
Qiong Wang, Cong Liu, Zhiying Wang
2011An EAP Framework for Unified Authentication in Wireless Networks.
Elankayer Sithirasenan, Saurabh Kumar, Khosrow Ramezani, Vallipuram Muthukkumarasamy
2011An Efficient Load Balancing Multi-core Frequent Patterns Mining Algorithm.
Kun-Ming Yu, Shu-Hao Wu
2011An Efficient Method of Tracking across Multiple Cameras.
Muhammad Hassan, Ahsen Mehmood, Muhammad Faisal Khan
2011An Efficient Stereoscopic Game Conversion System for Embedded Platform.
Hao Liu, Wei Guo, Chao Lu, Jizeng Wei
2011An Email Server Optimized for Storage Issues.
Yi Li, Mingzhe Zhang, Jiaqi Gu
2011An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation Using Weighted Ontology.
Mohammad Amin Morid, Amin Omidvar, Hamid Reza Shahriari
2011An Iterative Multi-path Routing Protocol in Wireless Ad Hoc Networks.
Zhongke Zhang, Yun Wang
2011An LIRS-Based Replica Replacement Strategy for Data-Intensive Applications.
Wei Liu, Feiyan Shi, Wei Du
2011Anisotropic Band-Pass Trilateral Filter for Creating Artistic Painting from Real Image.
Xiaohua Zhang, Yuto Yoshida, Ning Xie
2011Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing.
Mohd Izuan Hafez Ninggal, Jemal H. Abawajy
2011Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs.
Shaohua Liang, Md. Zakirul Alam Bhuiyan, Guojun Wang
2011Automated Inspection Using X-Ray Imaging.
Wenfei Chen, Zuohua Miao, Delie Ming
2011Automatic Model Building and Verification of Embedded Software with UPPAAL.
Xiaoli Gong, Jie Ma, Qingcheng Li, Jin Zhang
2011Autonomous Parameter and Schedule Configuration for TDMA-Based Communication Protocols Such as FlexRay.
Patrick Heinrich, Dirk Eilers, Rudi Knorr, Markus Königer, Bernd Niehoff
2011Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses.
Ricardo Jorge Santos, Jorge Bernardino, Marco Vieira
2011Biometric Enabled Portable Trusted Computing Platform.
Julian Jang, Hon Hwang, Surya Nepal
2011Biometric Identification Using User Interactions with Virtual Worlds.
Ahmed Al-Khazzar, Nick Savage
2011Building up Trusted Identity Management in Mobile Heterogeneous Environment.
Peng Zhang, Hanlin Sun, Zheng Yan
2011CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era.
Nan Zhang, Jiwu Jing, Peng Liu
2011CNSSA: A Comprehensive Network Security Situation Awareness System.
Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang
2011Capability as Requirement Metaphor.
Jiang Cao, Xinjun Mao, Huining Yan, Yushi Huang, Huaimin Wang, Xicheng Lu
2011Case-Based Trust Evaluation from Provenance Information.
Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, Yi Mu
2011Chaotic Hash Function Based on Tandem-DM Construction.
Li Gao, Xiaomin Wang, Wenfang Zhang
2011Chinese Traffic Police Gesture Recognition in Complex Scene.
Fan Guo, Zixing Cai, Jin Tang
2011Clustering Algorithm for High Dimensional Data Stream over Sliding Windows.
Weiguo Liu, Jia Ouyang
2011Comparative Analysis of Power Consumption in the Implementation of Arithmetic Algorithms.
Alexandre Wagner Chagas Faria, Leandro Pfleger de Aguiar, Daniel S. D. Lara, Antonio Alfredo Ferreira Loureiro
2011Context Awareness for Self-Adaptiveness in Smart Terminals.
Zhen Chen, Chunhong Zhang, Yang Ji
2011Context-Aware Vertical Handoff Decision Scheme in Heterogeneous Wireless Networks.
Jun Peng, Huiyuan Xian, Xiaoyong Zhang, Zheqin Li
2011Course Improvements to 'the Principle of Computer Organization' Based on the Goal of Disciplinary Education: Taking the Examples of the Computing Science Faculty of Zhejiang University City College.
Qifan Yang, Jianping Cai, Jianzhong Wu, Meimei Huo
2011Cross-Platform Application Sharing Mechanism.
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
2011DACC: Distributed Access Control in Clouds.
Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic
2011DENNC: A Wireless Malicious Detection Approach Based on Network Coding.
Hong Song, Xiao Xiao, Weiping Wang, Luming Yang
2011DSBS: Distributed and Scalable Barrier Synchronization in Many-Core Network-on-Chips.
Xiaowen Chen, Shuming Chen
2011Decreasing SoC Test Power Dissipation and Test Data Volume Based on Pattern Recombination.
Chunlei Mei, Maoxiang Yi, Zhifei Shen
2011Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments.
Yang Xiang
2011Defining and Analyzing Insiders and Their Threats in Organizations.
Muntaha Alawneh, Imad M. Abbadi
2011Dependable Context-Sensitive Services in Cyber Physical Systems.
Kaiyu Wan, Vangalur S. Alagar
2011Design Comparison to Identify Malicious Hardware in External Intellectual Property.
Trey Reece, Daniel B. Limbrick, William H. Robinson
2011Design Pattern for Self-Organization Multi-agent Systems Based on Policy.
Yi Guo, Xinjun Mao, Cuiyun Hu
2011Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems.
Marc Barisch
2011Design and Implementation of Single Sign on System with Cluster CAS for Public Service Platform of Science and Technology Evaluation.
Fang Huang, Cai-Xia Wang, Jun Long
2011Detection DoS Attack on FPGA Using Fuzzy Association Rules.
Taner Tuncer, Yetkin Tatar
2011Distributed Private-Key Generation Scheme with Self-Certified Identity.
Yongming Xie, Guojun Wang
2011Efficient Elastic Resource Management for Dynamic Embedded Systems.
Ricardo Marau, Karthik Lakshmanan, Paulo Pedreiras, Luís Almeida, Raj Rajkumar
2011Efficient GPGPU-Based Parallel Packet Classification.
Che-Lun Hung, Yaw-Ling Lin, Kuan-Ching Li, Hsiao-Hsi Wang, Shih-Wei Guo
2011Efficient Implementation of Thermal-Aware Scheduler on a Quad-core Processor.
Xiaojing Yin, Yongxin Zhu, Liang Xia, Jingwei Ye, Tian Huang, Yuzhuo Fu, Meikang Qiu
2011Efficient Java Native Interface for Android Based Mobile Devices.
Yann-Hang Lee, Preetham Chandrian, Bo Li
2011Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions.
Stephen W. Neville, Michael Horie
2011Energy Aware Routing Protocols for Wireless Sensor Networks Using Discrete Transmission Energies.
Balázs Karlócai, Andras Bojárszky, János Levendovszky
2011Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks.
Jin Zheng, Xinlin Xu, Guojun Wang
2011Energy-Efficiency Media Independent Handover Mechanism.
Dongxu Jin, Fei Shi, JooSeok Song
2011Enhancing Flexibility of TCG's TNC through Layered Property Attestation.
Aimin Yu, Shijun Zhao
2011Ensuring Secure Information Flow in Partially Reconfigurable Architectures by Means of Process Algebra Analysis.
André Seffrin, Sorin A. Huss
2011Establishing Trust in Hybrid Cloud Computing Environments.
Jemal H. Abawajy
2011Estimates of Success Rates of Denial-of-Service Attacks.
Teodor Sommestad, Hannes Holm, Mathias Ekstedt
2011Exploit TIVs to Find Faster Paths.
Yanhua Zhang, Chunhong Zhang, Gang Wang
2011Exploring and Enhancing the Performance of Parallel IDS on Multi-core Processors.
Haiyang Jiang, Jianhua Yang, Gaogang Xie
2011Extending EAST-ADL2 to Support Aspectual Requirement Specification and Analysis for Automotive Software.
Xiaojian Liu, Zhixue Wang
2011FTGS: Fault-Tolerant Fixed-Priority Scheduling on Multiprocessors.
Risat Mahmud Pathan, Jan Jonsson
2011Fault Tolerance Policy on Dynamic Load Balancing in P2P Grids.
Tian-Liang Huang, Tian-An Hsieh, Kuan-Chou Lai, Kuan-Ching Li, Ching-Hsien Hsu, Hsi-Ya Chang
2011Feasibility Interval for the Transactional Event Handlers of P-FRP.
Chaitanya Belwal, Albert M. K. Cheng
2011Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing Service.
Carlos Ballester Lafuente, Xavier Titi, Jean-Marc Seigneur
2011Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments.
Ryan K. L. Ko, Peter Jagadpramana, Bu-Sung Lee
2011Forecasting the Distribution of Network Traffic for Anomaly Detection.
Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe
2011Fusing Audio-Words with Visual Features for Pornographic Video Detection.
Yizhi Liu, Xiangdong Wang, Yongdong Zhang, Sheng Tang
2011Geometric Invariant Digital Image Watermarking Scheme Based on Feature Points Detector and Histogram Distribution.
Chi-Man Pun, Xiaochen Yuan, C. L. Philip Chen
2011Gray Map and Quantum Codes over the Ring F_2+uF_2+u^2F_2.
Xunru Yin, Wenping Ma
2011Group Formation with Neighbor Similarity Trust in P2P E-Commerce.
Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi
2011Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks.
Miao Xie, Song Han, Biming Tian
2011Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques.
Zorana Bankovic, José Manuel Moya, Juan Carlos Vallejo, David Fraga, Pedro Malagón
2011Home Service Communities and Authentication.
Warodom Werapun, Julien Fasson, Béatrice Paillassa
2011I/O Scheduling by Using Multi-network Interfaces of Virtualization System.
Xia Xie, Haiqing Zhu, Wenzhi Cao, Hai Jin, Pingpeng Yuan
2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011
2011Identification of Masses in Digital Mammogram Using an Optimal Set of Features.
Wenfeng Han, Jianwei Dong, Yuting Guo, Ming Zhang, Jianzhong Wang
2011Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability.
Fei Tang, Changlu Lin, Yong Li, Shengyuan Zhang
2011Implementation and Performance Evaluation of an Adaptive Routing Algorithm in MANETs.
Annapurna P. Patil, K. Rajani Kanth, Apoorva Yadhava, H. P. Rakshith, Joseph Tom
2011Implementation of a Reputation System for Pervasive Social Networking.
Yu Chen, Zheng Yan, Valtteri Niemi
2011Improved Partial Parallel Decision Feedback Multiuser Detection for Multiuser-MIMO System.
Youxiang Wang, Jianquan Wang, Zhaobiao Lu, Minghui Wang, Wenyue Zhang
2011Improving the Adaptiveness of FAST TCP Based on the Stability with Time-Delay.
Kefei Wang, Heying Zhang, Lihong Peng, Baohua Fan
2011IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation.
Lizi Zhang, Hui Fang, Wee Keong Ng, Jie Zhang
2011Integrity Protection for Automated Teller Machines.
Ronald Petrlic
2011Intelligent Assistant for Context-Aware Policies.
Helen Balinsky, Neil C. A. Moore, Steven J. Simske
2011Inter-Chip Authentication through I/O Character.
Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu
2011Internet Users' Security and Privacy While They Interact with Amazon.
Giampaolo Bella, Lizzie Coles-Kemp
2011Jacket Matrix and Its Applications to Signal Processing.
Moon Ho Lee
2011Key Privacy in McEliece Public Key Cryptosystem.
Qiang Wang, Xue Qiu, Quan Zhang, Chaojing Tang
2011Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.
Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha
2011Learning Whom to Trust in a Privacy-Friendly Way.
Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser
2011Learning-Directed Dynamic Voltage and Frequency Scaling for Computation Time Prediction.
Ming-Feng Chang, Wen-Yew Liang
2011Lightweight Hidden Services.
Andriy Panchenko, Otto Spaniol, André Egners, Thomas Engel
2011LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code.
Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang
2011Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing.
Jianming Fu, Xinwen Liu, Binling Cheng
2011Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs.
Silvio Cesare, Yang Xiang
2011Migration to Cloud as Real Option: Investment Decision under Uncertainty.
Chew-Yean Yam, Adrian Baldwin, Simon Shiu, Christos Ioannidis
2011Minimizing Schedule Length via Cooperative Register Allocation and Loop Scheduling for Embedded Systems.
Yazhi Huang, Qing'an Li, Chun Jason Xue
2011Modeling Trees with Rugged Surfaces.
Atsushi Mizoguchi, Kazunori Miyata
2011Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning.
Md. Tanzim Khorshed, A. B. M. Shawkat Ali, Saleh A. Wasimi
2011Multi-relay Cooperative Mechanism with Q-Learning in Cognitive Radio Multimedia Sensor Networks.
Jun Peng, Junbo Li, Shuo Li, Jing Li
2011Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad Hoc Networks.
Hui Xia, Zhiping Jia, Lei Ju, Youqin Zhu
2011Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation.
Ronghua Shi, Jinjing Shi, Ying Guo, Moon Ho Lee
2011Mutual Authentication Protocol for Networked RFID Systems.
Harinda Fernando, Jemal H. Abawajy
2011Nose Surgery Simulation Based on Volumetric Laplacian Deformation.
Jinshun Li, Yanyu Hu
2011Object-Level Data Model for Keyword Search over Relational Databases.
Jun Zhang, Renjun Shao
2011Offline Validation of Real-Time Application Constraints Considering Adaptation Rules.
Mohamed-Lamine Boukhanoufa, Ansgar Radermacher, François Terrier
2011On Partitioned Scheduling of Fixed-Priority Mixed-Criticality Task Sets.
Owen R. Kelly, Hakan Aydin, Baoxian Zhao
2011Optimal Data Placement for Memory Architectures with Scratch-Pad Memories.
Yibo Guo, Qingfeng Zhuge, Jingtong Hu, Edwin Hsing-Mean Sha
2011Optimal Tracking Agent: A New Framework for Multi-agent Reinforcement Learning.
Weihua Cao, Gang Chen, Xin Chen, Min Wu
2011Overlapping One-Class SVMs for Utterance Verification in Speech Recognition.
Cuiqin Hou, Yibin Hou, Zhangqin Huang, Qian Liu
2011Parallel Data Cube Construction Based on an Extendible Multidimensional Array.
Dong Jin, Tatsuo Tsuji
2011Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service.
Chi-won Song, Sungmin Park, Dongwook Kim, Sooyong Kang
2011Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai
2011Performance Design and Analysis of Handoff in Hierarchical Wireless Networks.
Zaid Ahmed Zabanoot, Geyong Min
2011Performance Modelling and Analysis of Dynamic Class-Based Call Admission Control Algorithm Using Fuzzy Logic for Heterogeneous Wireless Networks.
Sha Sha, Rosemary Halliwell
2011Permutational Genetic Algorithm for the Optimized Assignment of Priorities to Tasks and Messages in Distributed Real-Time Systems.
Ekain Azketa, Juan P. Uribe, Marga Marcos, Luís Almeida, J. Javier Gutiérrez
2011Phase-Wise Clustering of Time Series Gene Expression Data.
Poonam Goyal, Navneet Goyal, Rohan Sunil Karwa, Matthew John
2011Phishing Email Feature Selection Approach.
Isredza Rahmi A. Hamid, Jemal H. Abawajy
2011Plug-In Based Integrated Development Platform for Industrial Control System-P-IDP4ICS.
Bin Wang, Dan Yin, Taiwen Wu, Jinfang Sheng
2011Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks.
Tassos Dimitriou, Ahmad Sabouri
2011Power Control Game Algorithm Based on Combination Pricing Function.
Sheng Liu, Hongdan Liu, Zhenguo Gao
2011Power Optimization for GPU Programs Based on Software Prefetching.
Yisong Lin, Tao Tang, Guibin Wang
2011Preference-Based Top-K Influential Nodes Mining in Social Networks.
Yunlong Zhang, Jingyu Zhou, Jia Cheng
2011Privacy Crisis Due to Crisis Response on the Web.
Shao-Yu Wu, Ming-Hung Wang, Kuan-Ta Chen
2011Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems.
Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, Jing Yang
2011Privacy, Identity and Trust in Context-Aware Mobile Services.
Valtteri Niemi
2011Privacy-Preserved Access Control for Cloud Computing.
Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au, Jun Yan
2011Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration.
Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai
2011Probabilistic Schedulability Guarantees for Dependable Real-Time Systems under Error Bursts.
Hüseyin Aysan, Radu Dobrin, Sasikumar Punnekkat, Rolf Johansson
2011Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System.
Hyun-Jung Lee, Kwang-Woo Lee, Dongho Won
2011Publicly Posted Composite Documents in Variably Ordered Workflows.
Helen Balinsky, Liqun Chen, Steven J. Simske
2011Quantum Distributed Ballot Scheme Based on Entanglement Swapping.
Xiaoping Lou, Zhigang Chen
2011Quantum Secure Communication Based on Nonmaximally Entangled Qubit Pair and Dining Cryptographers Problem.
Ronghua Shi, Qian Su, Ying Guo, Moon Ho Lee
2011Real-Time Scheduling for Phase Change Main Memory Systems.
Miao Zhou, Santiago Bock, Alexandre Peixoto Ferreira, Bruce R. Childers, Rami G. Melhem, Daniel Mossé
2011RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks.
Junjie Xiong, Edith C. H. Ngai, Yangfan Zhou, Michael R. Lyu
2011Reform and Practice of Training Engineering Professionals in 2C+E Computer Science.
Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, Qingfeng Li
2011Release Offset Bounds for Response Time Analysis of P-FRP Using Exhaustive Enumeration.
Chaitanya Belwal, Albert M. K. Cheng, Walid Taha
2011Remedying the Hummingbird Cryptographic Algorithm.
Xinxin Fan, Guang Gong, Honggang Hu
2011Repeated Differential Properties of the AES-128 and AES-256 Key Schedules.
Jianyong Huang, Willy Susilo, Jennifer Seberry
2011Reputation Based Collaboration among Ethernet Switches.
Timo Kiravuo
2011Resource Management for Robotic Applications.
Yi-Zong Ou, Edward T.-H. Chu, Wen-wei Lu, Jane W.-S. Liu, Ta-Chih Hung, Jwu-Sheng Hu
2011Response Time Analysis of COTS-Based Multicores Considering the Contention on the Shared Memory Bus.
Dakshina Dasari, Björn Andersson, Vincent Nélis, Stefan M. Petters, Arvind Easwaran, Jinkyu Lee
2011Routing with Virtual Region Coordinates in Wireless Sensor Networks.
Zheng Ma, Weijia Jia, Guojun Wang
2011SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service Mashup.
Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang
2011SPARTS: Simulator for Power Aware and Real-Time Systems.
Borislav Nikolic, Muhammad Ali Awan, Stefan M. Petters
2011STrust: A Trust Model for Social Networks.
Surya Nepal, Wanita Sherchan, Cécile Paris
2011SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk.
Yong Cheng, Zhiying Wang, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren, Jun Ma
2011SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks.
Wenjun Jiang, Guojun Wang
2011Safety Verification of Non-linear, Planar Proportional Control with Differential Inclusions.
Hallstein Asheim Hansen
2011Schedulability Analysis of Transactions in Software Transactional Memory Using Timed Automata.
Chaitanya Belwal, Albert M. K. Cheng
2011Secret Sharing Scheme with Fairness.
Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu
2011Secure Virtual Layer Management in Clouds.
Imad M. Abbadi, Muntaha Alawneh, Andrew P. Martin
2011Security Issues in NoSQL Databases.
Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, Jenny Abramov
2011Semantic Web Service Automatic Composition Based on Service Parameter Relationship Graph.
Jianhua Li, Songqiao Chen, Yongjun Li, Qian Zhang
2011Semantics-Enhanced Privacy Recommendation for Social Networking Sites.
Qingrui Li, Juan Li, Hui Wang, Ashok Ginjala
2011Session Key Generation for a Group Call and Device for Security Control.
Younchan Jung, Enrique Festijo
2011Simulation Tools Enabling Research in Convergence of Fixed and Mobile Networks.
Andreas Bontozoglou, Kun Yang, Ken Guild
2011Statistical Fault Localization via Semi-dynamic Program Slicing.
Rongwei Yu, Lei Zhao, Lina Wang, Xiaodan Yin
2011Study and Practice on Teaching Team Construction of Computer Specialties in Private Undergraduate Universities and Colleges.
Chaoxiang Chen, Shiping Ye, Binbin Zhou, Guoyong Dai
2011Study of Experiment Structure in the Computer Networks Course Using PBL Methodology.
Li Cheng, Cong Wang
2011Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning.
Yujing Liu, Wei Peng, Jinshu Su
2011TRUSTIE: Design of a Trustworthy Software Production Environment.
Huaimin Wang
2011TVLAN: Trusted and Virtualised Local Area Networks.
Udaya Kiran Tupakula, Vijay Varadharajan
2011Teaching Method Practicing on Embedded Software Engineering Curriculum.
Yikui Zhang, Yunfen Tian, Liwei Zhu, Haoxiang Zuo
2011Text Line Based Correction of Distorted Document Images.
Sanding Luo, Xiaomin Fang, Cong Zhao, Yisha Luo
2011The Effective Second Classroom on Embedded System Education.
Yinbo Xie, Chengcheng Guo, Jianfeng Yang
2011The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network.
Yinghui Meng, Jian Chen, Yingyou Wen, Hong Zhao
2011The Hot Keyphrase Extraction Based on TF*PDF.
Yan Gao, Jin Liu, Peixun Ma
2011The Practice Teaching Reform of Modern Communication Technologies Course for Non-communication Majors.
Zhenzhou Tang, Chang Li, Chunrong Zhang, Xiaoqiu Shi
2011The Research of Levenberg-Marquardt Algorithm in Curve Fittings on Multiple GPUs.
Lingjie Zhang, Ying Zhao, Kaixi Hou
2011The Role of Trust in Social Life.
Dong Yan, Wang Qi
2011Theoretical Issues in the Study of Trust in Human-Computer Interaction.
Zheng Yan, Raimo Kantola, Peng Zhang
2011Thermal-Aware Scheduling of Critical Applications Using Job Migration and Power-Gating on Multi-core Chips.
Buyoung Yun, Kang G. Shin, Shige Wang
2011Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks.
Fei Shi, Dongxu Jin, Weijie Liu, JooSeok Song
2011Tool Support for Automated Traceability of Test/Code Artifacts in Embedded Software Systems.
Christian Wiederseiner, Vahid Garousi, Michael Smith
2011Towards Context-Aware Service-Oriented Semantic Reputation Framework.
Rehab Alnemr, Maxim Schnjakin, Christoph Meinel
2011Towards Detecting Thread Deadlock in Java Programs with JVM Introspection.
Yan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen
2011Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud.
Lingfeng Chen, Doan B. Hoang
2011Towards User Intent Based Searching.
Haibo Yu, Tsunenori Mine, Makoto Amamiya
2011Towards a Behavior-Based Restructure Approach for Service Composition.
Zaiwen Feng, Keqing He, Rong Peng, Buqing Cao
2011Towards a Holistic Privacy Engineering Approach for Smart Grid Systems.
Hervais Simo Fhom, Kpatcha M. Bayarou
2011Towards a Trust Management System for Cloud Computing.
Sheikh Mahbub Habib, Sebastian Ries, Max Mühlhäuser
2011Trust ME: A Trust Decision Framework for Mobile Environments.
Gonzalo Huerta Cánepa, Dongman Lee, Seon-Yeong Han
2011Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing.
Mahbub Ahmed, Yang Xiang
2011Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey.
Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi
2011Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks.
Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan
2011Trusted Block as a Service: Towards Sensitive Applications on the Cloud.
Jianan Hao, Wentong Cai
2011UML-Based Analysis of Power Consumption for Real-Time Embedded Systems.
Matthias Hagner, Adina Aniculaesei, Ursula Goltz
2011Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets.
Lin Liu
2011Unwanted Traffic Control via Global Trust Management.
Zheng Yan, Raimo Kantola, Yue Shen
2011User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment.
Adeela Waqar, Asad Raza, Haider Abbas
2011Using Project-Based Learning and Collaborative Learning in Software Engineering Talent Cultivation.
Hongzhi Song, Guodong Si, Lei Yang, Huakun Liang, Lixia Zhang
2011Variable Precision Rough Set-Based Fault Diagnosis for Web Services.
Chengying Mao
2011VerFAT: A Transparent and Efficient Multi-versioning Mechanism for FAT File System.
Jiangjiang Wu, Zhiying Wang, Songzhu Mei, Yong Cheng, Jiangchun Ren
2011Verification-Based Multi-backup Firmware Architecture, an Assurance of Trusted Boot Process for the Embedded Systems.
Hongfei Yin, Hongjun Dai, Zhiping Jia
2011Visual Navigation System with Real-Time Image Processing for Patrol Service Robot.
Kenichi Asami, Hayato Hagiwara, Mochimitsu Komori
2011Visualization of Computational Processes of Procedural Abstraction Optimization Passes.
Stefan Schäckeler, Nityananda Jayadevaprakash
2011Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks.
Sancheng Peng, Guojun Wang
2011eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems.
Mei Liu, Ge Fu, Jiwu Jing
2011hUBI: An Optimized Hybrid Mapping Scheme for NAND Flash-Based SSDs.
Guangjun Xie, Guangzhi Xu, Gang Wang, Jing Liu, Rui Cao, Yan Gao