| 2011 | A Biased Modified Binary Query Tree Protocol for RFID Tag Collision Resolution. Xinqing Yan, Yan Xu, Bin Li |
| 2011 | A Block Gathering Based on Mobile Web Page Segmentation Algorithm. Libing Wu, Yalin Ke, Yanxiang He, Nan Liu |
| 2011 | A Certificate Driven Access Control Strategy for Service Composition and Its Analysis. Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu |
| 2011 | A Charged PSO Inspired Method for Generating Immune Detectors for Network Intrusion Detection. Mark Heydenrych, Elizabeth Marie Ehlers |
| 2011 | A Cooperative Mechanism to Defense against Distributed Denial of Service Attacks. Hakem Beitollahi, Geert Deconinck |
| 2011 | A DRTM-Based Method for Trusted Network Connection. Wei Feng, Yu Qin, Aimin Yu, Dengguo Feng |
| 2011 | A Data Simulator for ZigBee-Base Wireless Sensor Network System. Kim-Yung Lu |
| 2011 | A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems. Hsiao-Ying Lin, Wen-Guey Tzeng, Bao-Shuh Paul Lin |
| 2011 | A Decision Making Ontology Building Process for Analytical Requirements Elicitation. Fahmi Bargui, Hanêne Ben-Abdallah, Jamel Feki |
| 2011 | A Distributed Real-Time Operating System with Location-Transparent System Calls for Task Management and Inter-task Synchronization. Takahiro Chiba, Yuichi Itami, Myungryun Yoo, Takanori Yokoyama |
| 2011 | A Distributed and Shortest-Path-Based Algorithm for Maximum Cover Sets Problem in Wireless Sensor Networks. Feng Zeng, Lan Yao, Zhigang Chen, Huamei Qi |
| 2011 | A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks. Qian Sun, Min Wu |
| 2011 | A Formal Approach for Modeling Interactive Visual Interfaces. Emanuele Covino, Giovanni Pani |
| 2011 | A Framework for Reputation Bootstrapping Based on Reputation Utility and Game Theories. Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu |
| 2011 | A Framework for the Assessment of the Trustworthiness of Digital Records over Time. Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård |
| 2011 | A Game Theoretic Coalitional Bidding Scheme for Efficient Routing in Vehicular Ad Hoc Networks. Muhammad Bilal, Pauline M. L. Chan |
| 2011 | A Global Scheduling Algorithm Based on Dynamic Critical Path. Xing Gu, Qun Yang, Dechang Pi, He-yang Ke |
| 2011 | A Hardware/Software Countermeasure and a Testing Framework for Cache Based Side Channel Attacks. Ankita Arora, Sri Parameswaran, Roshan G. Ragel, Darshana Jayasinghe |
| 2011 | A Hybrid Trust Model for Authorisation Using Trusted Platforms. Aarthi Krishna, Vijay Varadharajan |
| 2011 | A Logical Framework of Proof-Carrying Survivability. Yanjun Zuo, Suhas Lande |
| 2011 | A Method for Detecting Unknown Malicious Executables. Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel |
| 2011 | A Method for Searching the Centroid of a 3D Cluster Based on RSSI. Weike Chen, Heng Shou, Wenfeng Li |
| 2011 | A Model for Automating Persistent Identity Clone in Online Social Network. Bhume Bhumiratana |
| 2011 | A Model for a Testbed for Evaluating Reputation Systems. Partheeban Chandrasekaran, Babak Esfandiari |
| 2011 | A New Multivariate Hash Function with HAIFA Construction. Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang |
| 2011 | A New Security Architecture for BitTorrent. Firas Bader, Andra Radoveneanu, Hani Ragab Hassen |
| 2011 | A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks. Ji Guo, Alan Marshall, Bosheng Zhou |
| 2011 | A Novel Energy-Efficient Routing Algorithm in Multi-sink Wireless Sensor Networks. Zhiwu Huang, Yuan Cheng, Weirong Liu |
| 2011 | A Power Law Transformation Predicting Lightness Conditions Based on Skin Color Space Detection. Emmanuel Kondela, Huang Dong Jun |
| 2011 | A Precise Memory Model for Operating System Code Verification. Geng Chen, Lei Luo, Lijie Wang |
| 2011 | A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets. Mahdi Asadpour, Mohammad Torabi Dashti |
| 2011 | A Privacy-Preserving Defense Mechanism against Request Forgery Attacks. Ben S. Y. Fung, Patrick P. C. Lee |
| 2011 | A Private and Scalable Authentication for RFID Systems Using Reasonable Storage. Xiaolin Cao, Máire O'Neill |
| 2011 | A Property-Based Attestation Scheme with the Variable Privacy. Yu Qin, Dexian Chang, Shijun Zhao, Qianying Zhang |
| 2011 | A Quantitative Approach to Triaging in Mobile Forensics. Fabio Marturana, Gianluigi Me, Rosamaria Berte, Simone Tacconi |
| 2011 | A Quasi Physical Method for the Equal Sphere Packing Problem. Wenqi Huang, Liang Yu |
| 2011 | A RFID-Based Context-Aware Service Model. Jinfang Sheng, Wen Zou, Liu Yang, Bin Wang |
| 2011 | A Refined and Heuristic Algorithm for LD tagSNPs Selection. Hailin Chen, Zuping Zhang, Jing Xia |
| 2011 | A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks. Muhammad Bashir Abdullahi, Guojun Wang, Felix Musau |
| 2011 | A Reputation Mechanism for Virtual Reality - Five-Sense Oriented Feedback Provision and Subjectivity Alignment. Hui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann |
| 2011 | A Research Model for Human-Computer Trust Interaction. Zheng Yan, Raimo Kantola, Peng Zhang |
| 2011 | A Scalability Study of AAA Support in Heterogeneous Networking Environments with Global Roaming Support. Daniel Granlund, Christer Åhlund |
| 2011 | A Secure Multicoupon Solution for Multi-merchant Scenarios. Andreu-Pere Isern-Deyà, M. Francisca Hinarejos, Josep-Lluís Ferrer-Gomila, Magdalena Payeras-Capellà |
| 2011 | A Simple Balanced Password-Authenticated Key Agreement Protocol. Fuwen Liu, Hartmut König |
| 2011 | A Simulation Study of Unstructured P2P Overlay for Multimedia Streaming. Deng Li, Zhigang Chen, Jiaqi Liu, Hui Liu, Zhong Ren |
| 2011 | A Software Fault-Tolerant Method Based on Exception Handling in RT/E System. Zhou Lu, Kailong Zhang, Xingshe Zhou |
| 2011 | A Sufficient Schedulability Test for Real-Time Software Transactional Memory. Chaitanya Belwal, Albert M. K. Cheng |
| 2011 | A Survey on Latest Botnet Attack and Defense. Lei Zhang, Shui Yu, Di Wu, Paul A. Watters |
| 2011 | A Trust Prediction Model for Service Web. Wanita Sherchan, Surya Nepal, Athman Bouguettaya |
| 2011 | A Trusted Integrity Measurement Architecture for Securing Enterprise Network. Tong Liu, Prathima Agrawal |
| 2011 | A Two-Layered Replica Management Method. Chuncong Xu, Xiaomeng Huang, Guangwen Yang, Yang Zhou |
| 2011 | A UML Model-Based Approach for Replication Assessment of AUTOSAR Safety-Critical Applications. Sara Tucci Piergiovanni, Chokri Mraidha, Ernest Wozniak, Agnes Lanusse, Sébastien Gérard |
| 2011 | A Web Services Composition Model and Its Verification Algorithm Based on Interface Automata. Jianhua Li, Songqiao Chen, Lin Jian, Hongyu Zhang |
| 2011 | A Weighted Cluster Ensemble Algorithm Based on Graph. Xiaoping Fan, Yueshan Xie, Zhifang Liao, Xiaoqing Li, Li-min Liu |
| 2011 | Abnormal Process Instances Identification Method in Healthcare Environment. Bingning Han, Lihong Jiang, Hongming Cai |
| 2011 | Access Control in Distributed Systems: Merging Theory with Practice. Ivan Stojmenovic |
| 2011 | Achieving High Throughput in High-Radix Switch. Ming Fang, Songqiao Chen, Kefei Wang |
| 2011 | Adaptive Client-Side LUT-Based Digital Watermarking. Chi-Man Pun, Jing-Jing Jiang, C. L. Philip Chen |
| 2011 | An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETs. Fatemeh Barani, Mahdi Abadi |
| 2011 | An Access Control Framework for the Web of Data. Owen Sacco, Alexandre Passant, Stefan Decker |
| 2011 | An Advanced and Effective Literature Search Algorithm Based on Analytic Hierarchy Process. Qiong Wang, Cong Liu, Zhiying Wang |
| 2011 | An EAP Framework for Unified Authentication in Wireless Networks. Elankayer Sithirasenan, Saurabh Kumar, Khosrow Ramezani, Vallipuram Muthukkumarasamy |
| 2011 | An Efficient Load Balancing Multi-core Frequent Patterns Mining Algorithm. Kun-Ming Yu, Shu-Hao Wu |
| 2011 | An Efficient Method of Tracking across Multiple Cameras. Muhammad Hassan, Ahsen Mehmood, Muhammad Faisal Khan |
| 2011 | An Efficient Stereoscopic Game Conversion System for Embedded Platform. Hao Liu, Wei Guo, Chao Lu, Jizeng Wei |
| 2011 | An Email Server Optimized for Storage Issues. Yi Li, Mingzhe Zhang, Jiaqi Gu |
| 2011 | An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation Using Weighted Ontology. Mohammad Amin Morid, Amin Omidvar, Hamid Reza Shahriari |
| 2011 | An Iterative Multi-path Routing Protocol in Wireless Ad Hoc Networks. Zhongke Zhang, Yun Wang |
| 2011 | An LIRS-Based Replica Replacement Strategy for Data-Intensive Applications. Wei Liu, Feiyan Shi, Wei Du |
| 2011 | Anisotropic Band-Pass Trilateral Filter for Creating Artistic Painting from Real Image. Xiaohua Zhang, Yuto Yoshida, Ning Xie |
| 2011 | Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing. Mohd Izuan Hafez Ninggal, Jemal H. Abawajy |
| 2011 | Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs. Shaohua Liang, Md. Zakirul Alam Bhuiyan, Guojun Wang |
| 2011 | Automated Inspection Using X-Ray Imaging. Wenfei Chen, Zuohua Miao, Delie Ming |
| 2011 | Automatic Model Building and Verification of Embedded Software with UPPAAL. Xiaoli Gong, Jie Ma, Qingcheng Li, Jin Zhang |
| 2011 | Autonomous Parameter and Schedule Configuration for TDMA-Based Communication Protocols Such as FlexRay. Patrick Heinrich, Dirk Eilers, Rudi Knorr, Markus Königer, Bernd Niehoff |
| 2011 | Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses. Ricardo Jorge Santos, Jorge Bernardino, Marco Vieira |
| 2011 | Biometric Enabled Portable Trusted Computing Platform. Julian Jang, Hon Hwang, Surya Nepal |
| 2011 | Biometric Identification Using User Interactions with Virtual Worlds. Ahmed Al-Khazzar, Nick Savage |
| 2011 | Building up Trusted Identity Management in Mobile Heterogeneous Environment. Peng Zhang, Hanlin Sun, Zheng Yan |
| 2011 | CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era. Nan Zhang, Jiwu Jing, Peng Liu |
| 2011 | CNSSA: A Comprehensive Network Security Situation Awareness System. Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang |
| 2011 | Capability as Requirement Metaphor. Jiang Cao, Xinjun Mao, Huining Yan, Yushi Huang, Huaimin Wang, Xicheng Lu |
| 2011 | Case-Based Trust Evaluation from Provenance Information. Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, Yi Mu |
| 2011 | Chaotic Hash Function Based on Tandem-DM Construction. Li Gao, Xiaomin Wang, Wenfang Zhang |
| 2011 | Chinese Traffic Police Gesture Recognition in Complex Scene. Fan Guo, Zixing Cai, Jin Tang |
| 2011 | Clustering Algorithm for High Dimensional Data Stream over Sliding Windows. Weiguo Liu, Jia Ouyang |
| 2011 | Comparative Analysis of Power Consumption in the Implementation of Arithmetic Algorithms. Alexandre Wagner Chagas Faria, Leandro Pfleger de Aguiar, Daniel S. D. Lara, Antonio Alfredo Ferreira Loureiro |
| 2011 | Context Awareness for Self-Adaptiveness in Smart Terminals. Zhen Chen, Chunhong Zhang, Yang Ji |
| 2011 | Context-Aware Vertical Handoff Decision Scheme in Heterogeneous Wireless Networks. Jun Peng, Huiyuan Xian, Xiaoyong Zhang, Zheqin Li |
| 2011 | Course Improvements to 'the Principle of Computer Organization' Based on the Goal of Disciplinary Education: Taking the Examples of the Computing Science Faculty of Zhejiang University City College. Qifan Yang, Jianping Cai, Jianzhong Wu, Meimei Huo |
| 2011 | Cross-Platform Application Sharing Mechanism. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
| 2011 | DACC: Distributed Access Control in Clouds. Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic |
| 2011 | DENNC: A Wireless Malicious Detection Approach Based on Network Coding. Hong Song, Xiao Xiao, Weiping Wang, Luming Yang |
| 2011 | DSBS: Distributed and Scalable Barrier Synchronization in Many-Core Network-on-Chips. Xiaowen Chen, Shuming Chen |
| 2011 | Decreasing SoC Test Power Dissipation and Test Data Volume Based on Pattern Recombination. Chunlei Mei, Maoxiang Yi, Zhifei Shen |
| 2011 | Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments. Yang Xiang |
| 2011 | Defining and Analyzing Insiders and Their Threats in Organizations. Muntaha Alawneh, Imad M. Abbadi |
| 2011 | Dependable Context-Sensitive Services in Cyber Physical Systems. Kaiyu Wan, Vangalur S. Alagar |
| 2011 | Design Comparison to Identify Malicious Hardware in External Intellectual Property. Trey Reece, Daniel B. Limbrick, William H. Robinson |
| 2011 | Design Pattern for Self-Organization Multi-agent Systems Based on Policy. Yi Guo, Xinjun Mao, Cuiyun Hu |
| 2011 | Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems. Marc Barisch |
| 2011 | Design and Implementation of Single Sign on System with Cluster CAS for Public Service Platform of Science and Technology Evaluation. Fang Huang, Cai-Xia Wang, Jun Long |
| 2011 | Detection DoS Attack on FPGA Using Fuzzy Association Rules. Taner Tuncer, Yetkin Tatar |
| 2011 | Distributed Private-Key Generation Scheme with Self-Certified Identity. Yongming Xie, Guojun Wang |
| 2011 | Efficient Elastic Resource Management for Dynamic Embedded Systems. Ricardo Marau, Karthik Lakshmanan, Paulo Pedreiras, Luís Almeida, Raj Rajkumar |
| 2011 | Efficient GPGPU-Based Parallel Packet Classification. Che-Lun Hung, Yaw-Ling Lin, Kuan-Ching Li, Hsiao-Hsi Wang, Shih-Wei Guo |
| 2011 | Efficient Implementation of Thermal-Aware Scheduler on a Quad-core Processor. Xiaojing Yin, Yongxin Zhu, Liang Xia, Jingwei Ye, Tian Huang, Yuzhuo Fu, Meikang Qiu |
| 2011 | Efficient Java Native Interface for Android Based Mobile Devices. Yann-Hang Lee, Preetham Chandrian, Bo Li |
| 2011 | Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions. Stephen W. Neville, Michael Horie |
| 2011 | Energy Aware Routing Protocols for Wireless Sensor Networks Using Discrete Transmission Energies. Balázs Karlócai, Andras Bojárszky, János Levendovszky |
| 2011 | Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks. Jin Zheng, Xinlin Xu, Guojun Wang |
| 2011 | Energy-Efficiency Media Independent Handover Mechanism. Dongxu Jin, Fei Shi, JooSeok Song |
| 2011 | Enhancing Flexibility of TCG's TNC through Layered Property Attestation. Aimin Yu, Shijun Zhao |
| 2011 | Ensuring Secure Information Flow in Partially Reconfigurable Architectures by Means of Process Algebra Analysis. André Seffrin, Sorin A. Huss |
| 2011 | Establishing Trust in Hybrid Cloud Computing Environments. Jemal H. Abawajy |
| 2011 | Estimates of Success Rates of Denial-of-Service Attacks. Teodor Sommestad, Hannes Holm, Mathias Ekstedt |
| 2011 | Exploit TIVs to Find Faster Paths. Yanhua Zhang, Chunhong Zhang, Gang Wang |
| 2011 | Exploring and Enhancing the Performance of Parallel IDS on Multi-core Processors. Haiyang Jiang, Jianhua Yang, Gaogang Xie |
| 2011 | Extending EAST-ADL2 to Support Aspectual Requirement Specification and Analysis for Automotive Software. Xiaojian Liu, Zhixue Wang |
| 2011 | FTGS: Fault-Tolerant Fixed-Priority Scheduling on Multiprocessors. Risat Mahmud Pathan, Jan Jonsson |
| 2011 | Fault Tolerance Policy on Dynamic Load Balancing in P2P Grids. Tian-Liang Huang, Tian-An Hsieh, Kuan-Chou Lai, Kuan-Ching Li, Ching-Hsien Hsu, Hsi-Ya Chang |
| 2011 | Feasibility Interval for the Transactional Event Handlers of P-FRP. Chaitanya Belwal, Albert M. K. Cheng |
| 2011 | Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing Service. Carlos Ballester Lafuente, Xavier Titi, Jean-Marc Seigneur |
| 2011 | Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments. Ryan K. L. Ko, Peter Jagadpramana, Bu-Sung Lee |
| 2011 | Forecasting the Distribution of Network Traffic for Anomaly Detection. Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe |
| 2011 | Fusing Audio-Words with Visual Features for Pornographic Video Detection. Yizhi Liu, Xiangdong Wang, Yongdong Zhang, Sheng Tang |
| 2011 | Geometric Invariant Digital Image Watermarking Scheme Based on Feature Points Detector and Histogram Distribution. Chi-Man Pun, Xiaochen Yuan, C. L. Philip Chen |
| 2011 | Gray Map and Quantum Codes over the Ring F_2+uF_2+u^2F_2. Xunru Yin, Wenping Ma |
| 2011 | Group Formation with Neighbor Similarity Trust in P2P E-Commerce. Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi |
| 2011 | Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks. Miao Xie, Song Han, Biming Tian |
| 2011 | Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques. Zorana Bankovic, José Manuel Moya, Juan Carlos Vallejo, David Fraga, Pedro Malagón |
| 2011 | Home Service Communities and Authentication. Warodom Werapun, Julien Fasson, Béatrice Paillassa |
| 2011 | I/O Scheduling by Using Multi-network Interfaces of Virtualization System. Xia Xie, Haiqing Zhu, Wenzhi Cao, Hai Jin, Pingpeng Yuan |
| 2011 | IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011 |
| 2011 | Identification of Masses in Digital Mammogram Using an Optimal Set of Features. Wenfeng Han, Jianwei Dong, Yuting Guo, Ming Zhang, Jianzhong Wang |
| 2011 | Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability. Fei Tang, Changlu Lin, Yong Li, Shengyuan Zhang |
| 2011 | Implementation and Performance Evaluation of an Adaptive Routing Algorithm in MANETs. Annapurna P. Patil, K. Rajani Kanth, Apoorva Yadhava, H. P. Rakshith, Joseph Tom |
| 2011 | Implementation of a Reputation System for Pervasive Social Networking. Yu Chen, Zheng Yan, Valtteri Niemi |
| 2011 | Improved Partial Parallel Decision Feedback Multiuser Detection for Multiuser-MIMO System. Youxiang Wang, Jianquan Wang, Zhaobiao Lu, Minghui Wang, Wenyue Zhang |
| 2011 | Improving the Adaptiveness of FAST TCP Based on the Stability with Time-Delay. Kefei Wang, Heying Zhang, Lihong Peng, Baohua Fan |
| 2011 | IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation. Lizi Zhang, Hui Fang, Wee Keong Ng, Jie Zhang |
| 2011 | Integrity Protection for Automated Teller Machines. Ronald Petrlic |
| 2011 | Intelligent Assistant for Context-Aware Policies. Helen Balinsky, Neil C. A. Moore, Steven J. Simske |
| 2011 | Inter-Chip Authentication through I/O Character. Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu |
| 2011 | Internet Users' Security and Privacy While They Interact with Amazon. Giampaolo Bella, Lizzie Coles-Kemp |
| 2011 | Jacket Matrix and Its Applications to Signal Processing. Moon Ho Lee |
| 2011 | Key Privacy in McEliece Public Key Cryptosystem. Qiang Wang, Xue Qiu, Quan Zhang, Chaojing Tang |
| 2011 | Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables. Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha |
| 2011 | Learning Whom to Trust in a Privacy-Friendly Way. Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser |
| 2011 | Learning-Directed Dynamic Voltage and Frequency Scaling for Computation Time Prediction. Ming-Feng Chang, Wen-Yew Liang |
| 2011 | Lightweight Hidden Services. Andriy Panchenko, Otto Spaniol, André Egners, Thomas Engel |
| 2011 | LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code. Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang |
| 2011 | Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing. Jianming Fu, Xinwen Liu, Binling Cheng |
| 2011 | Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs. Silvio Cesare, Yang Xiang |
| 2011 | Migration to Cloud as Real Option: Investment Decision under Uncertainty. Chew-Yean Yam, Adrian Baldwin, Simon Shiu, Christos Ioannidis |
| 2011 | Minimizing Schedule Length via Cooperative Register Allocation and Loop Scheduling for Embedded Systems. Yazhi Huang, Qing'an Li, Chun Jason Xue |
| 2011 | Modeling Trees with Rugged Surfaces. Atsushi Mizoguchi, Kazunori Miyata |
| 2011 | Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning. Md. Tanzim Khorshed, A. B. M. Shawkat Ali, Saleh A. Wasimi |
| 2011 | Multi-relay Cooperative Mechanism with Q-Learning in Cognitive Radio Multimedia Sensor Networks. Jun Peng, Junbo Li, Shuo Li, Jing Li |
| 2011 | Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad Hoc Networks. Hui Xia, Zhiping Jia, Lei Ju, Youqin Zhu |
| 2011 | Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation. Ronghua Shi, Jinjing Shi, Ying Guo, Moon Ho Lee |
| 2011 | Mutual Authentication Protocol for Networked RFID Systems. Harinda Fernando, Jemal H. Abawajy |
| 2011 | Nose Surgery Simulation Based on Volumetric Laplacian Deformation. Jinshun Li, Yanyu Hu |
| 2011 | Object-Level Data Model for Keyword Search over Relational Databases. Jun Zhang, Renjun Shao |
| 2011 | Offline Validation of Real-Time Application Constraints Considering Adaptation Rules. Mohamed-Lamine Boukhanoufa, Ansgar Radermacher, François Terrier |
| 2011 | On Partitioned Scheduling of Fixed-Priority Mixed-Criticality Task Sets. Owen R. Kelly, Hakan Aydin, Baoxian Zhao |
| 2011 | Optimal Data Placement for Memory Architectures with Scratch-Pad Memories. Yibo Guo, Qingfeng Zhuge, Jingtong Hu, Edwin Hsing-Mean Sha |
| 2011 | Optimal Tracking Agent: A New Framework for Multi-agent Reinforcement Learning. Weihua Cao, Gang Chen, Xin Chen, Min Wu |
| 2011 | Overlapping One-Class SVMs for Utterance Verification in Speech Recognition. Cuiqin Hou, Yibin Hou, Zhangqin Huang, Qian Liu |
| 2011 | Parallel Data Cube Construction Based on an Extendible Multidimensional Array. Dong Jin, Tatsuo Tsuji |
| 2011 | Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service. Chi-won Song, Sungmin Park, Dongwook Kim, Sooyong Kang |
| 2011 | Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai |
| 2011 | Performance Design and Analysis of Handoff in Hierarchical Wireless Networks. Zaid Ahmed Zabanoot, Geyong Min |
| 2011 | Performance Modelling and Analysis of Dynamic Class-Based Call Admission Control Algorithm Using Fuzzy Logic for Heterogeneous Wireless Networks. Sha Sha, Rosemary Halliwell |
| 2011 | Permutational Genetic Algorithm for the Optimized Assignment of Priorities to Tasks and Messages in Distributed Real-Time Systems. Ekain Azketa, Juan P. Uribe, Marga Marcos, Luís Almeida, J. Javier Gutiérrez |
| 2011 | Phase-Wise Clustering of Time Series Gene Expression Data. Poonam Goyal, Navneet Goyal, Rohan Sunil Karwa, Matthew John |
| 2011 | Phishing Email Feature Selection Approach. Isredza Rahmi A. Hamid, Jemal H. Abawajy |
| 2011 | Plug-In Based Integrated Development Platform for Industrial Control System-P-IDP4ICS. Bin Wang, Dan Yin, Taiwen Wu, Jinfang Sheng |
| 2011 | Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks. Tassos Dimitriou, Ahmad Sabouri |
| 2011 | Power Control Game Algorithm Based on Combination Pricing Function. Sheng Liu, Hongdan Liu, Zhenguo Gao |
| 2011 | Power Optimization for GPU Programs Based on Software Prefetching. Yisong Lin, Tao Tang, Guibin Wang |
| 2011 | Preference-Based Top-K Influential Nodes Mining in Social Networks. Yunlong Zhang, Jingyu Zhou, Jia Cheng |
| 2011 | Privacy Crisis Due to Crisis Response on the Web. Shao-Yu Wu, Ming-Hung Wang, Kuan-Ta Chen |
| 2011 | Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems. Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, Jing Yang |
| 2011 | Privacy, Identity and Trust in Context-Aware Mobile Services. Valtteri Niemi |
| 2011 | Privacy-Preserved Access Control for Cloud Computing. Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au, Jun Yan |
| 2011 | Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration. Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai |
| 2011 | Probabilistic Schedulability Guarantees for Dependable Real-Time Systems under Error Bursts. Hüseyin Aysan, Radu Dobrin, Sasikumar Punnekkat, Rolf Johansson |
| 2011 | Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System. Hyun-Jung Lee, Kwang-Woo Lee, Dongho Won |
| 2011 | Publicly Posted Composite Documents in Variably Ordered Workflows. Helen Balinsky, Liqun Chen, Steven J. Simske |
| 2011 | Quantum Distributed Ballot Scheme Based on Entanglement Swapping. Xiaoping Lou, Zhigang Chen |
| 2011 | Quantum Secure Communication Based on Nonmaximally Entangled Qubit Pair and Dining Cryptographers Problem. Ronghua Shi, Qian Su, Ying Guo, Moon Ho Lee |
| 2011 | Real-Time Scheduling for Phase Change Main Memory Systems. Miao Zhou, Santiago Bock, Alexandre Peixoto Ferreira, Bruce R. Childers, Rami G. Melhem, Daniel Mossé |
| 2011 | RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks. Junjie Xiong, Edith C. H. Ngai, Yangfan Zhou, Michael R. Lyu |
| 2011 | Reform and Practice of Training Engineering Professionals in 2C+E Computer Science. Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, Qingfeng Li |
| 2011 | Release Offset Bounds for Response Time Analysis of P-FRP Using Exhaustive Enumeration. Chaitanya Belwal, Albert M. K. Cheng, Walid Taha |
| 2011 | Remedying the Hummingbird Cryptographic Algorithm. Xinxin Fan, Guang Gong, Honggang Hu |
| 2011 | Repeated Differential Properties of the AES-128 and AES-256 Key Schedules. Jianyong Huang, Willy Susilo, Jennifer Seberry |
| 2011 | Reputation Based Collaboration among Ethernet Switches. Timo Kiravuo |
| 2011 | Resource Management for Robotic Applications. Yi-Zong Ou, Edward T.-H. Chu, Wen-wei Lu, Jane W.-S. Liu, Ta-Chih Hung, Jwu-Sheng Hu |
| 2011 | Response Time Analysis of COTS-Based Multicores Considering the Contention on the Shared Memory Bus. Dakshina Dasari, Björn Andersson, Vincent Nélis, Stefan M. Petters, Arvind Easwaran, Jinkyu Lee |
| 2011 | Routing with Virtual Region Coordinates in Wireless Sensor Networks. Zheng Ma, Weijia Jia, Guojun Wang |
| 2011 | SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service Mashup. Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang |
| 2011 | SPARTS: Simulator for Power Aware and Real-Time Systems. Borislav Nikolic, Muhammad Ali Awan, Stefan M. Petters |
| 2011 | STrust: A Trust Model for Social Networks. Surya Nepal, Wanita Sherchan, Cécile Paris |
| 2011 | SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk. Yong Cheng, Zhiying Wang, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren, Jun Ma |
| 2011 | SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks. Wenjun Jiang, Guojun Wang |
| 2011 | Safety Verification of Non-linear, Planar Proportional Control with Differential Inclusions. Hallstein Asheim Hansen |
| 2011 | Schedulability Analysis of Transactions in Software Transactional Memory Using Timed Automata. Chaitanya Belwal, Albert M. K. Cheng |
| 2011 | Secret Sharing Scheme with Fairness. Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu |
| 2011 | Secure Virtual Layer Management in Clouds. Imad M. Abbadi, Muntaha Alawneh, Andrew P. Martin |
| 2011 | Security Issues in NoSQL Databases. Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, Jenny Abramov |
| 2011 | Semantic Web Service Automatic Composition Based on Service Parameter Relationship Graph. Jianhua Li, Songqiao Chen, Yongjun Li, Qian Zhang |
| 2011 | Semantics-Enhanced Privacy Recommendation for Social Networking Sites. Qingrui Li, Juan Li, Hui Wang, Ashok Ginjala |
| 2011 | Session Key Generation for a Group Call and Device for Security Control. Younchan Jung, Enrique Festijo |
| 2011 | Simulation Tools Enabling Research in Convergence of Fixed and Mobile Networks. Andreas Bontozoglou, Kun Yang, Ken Guild |
| 2011 | Statistical Fault Localization via Semi-dynamic Program Slicing. Rongwei Yu, Lei Zhao, Lina Wang, Xiaodan Yin |
| 2011 | Study and Practice on Teaching Team Construction of Computer Specialties in Private Undergraduate Universities and Colleges. Chaoxiang Chen, Shiping Ye, Binbin Zhou, Guoyong Dai |
| 2011 | Study of Experiment Structure in the Computer Networks Course Using PBL Methodology. Li Cheng, Cong Wang |
| 2011 | Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning. Yujing Liu, Wei Peng, Jinshu Su |
| 2011 | TRUSTIE: Design of a Trustworthy Software Production Environment. Huaimin Wang |
| 2011 | TVLAN: Trusted and Virtualised Local Area Networks. Udaya Kiran Tupakula, Vijay Varadharajan |
| 2011 | Teaching Method Practicing on Embedded Software Engineering Curriculum. Yikui Zhang, Yunfen Tian, Liwei Zhu, Haoxiang Zuo |
| 2011 | Text Line Based Correction of Distorted Document Images. Sanding Luo, Xiaomin Fang, Cong Zhao, Yisha Luo |
| 2011 | The Effective Second Classroom on Embedded System Education. Yinbo Xie, Chengcheng Guo, Jianfeng Yang |
| 2011 | The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network. Yinghui Meng, Jian Chen, Yingyou Wen, Hong Zhao |
| 2011 | The Hot Keyphrase Extraction Based on TF*PDF. Yan Gao, Jin Liu, Peixun Ma |
| 2011 | The Practice Teaching Reform of Modern Communication Technologies Course for Non-communication Majors. Zhenzhou Tang, Chang Li, Chunrong Zhang, Xiaoqiu Shi |
| 2011 | The Research of Levenberg-Marquardt Algorithm in Curve Fittings on Multiple GPUs. Lingjie Zhang, Ying Zhao, Kaixi Hou |
| 2011 | The Role of Trust in Social Life. Dong Yan, Wang Qi |
| 2011 | Theoretical Issues in the Study of Trust in Human-Computer Interaction. Zheng Yan, Raimo Kantola, Peng Zhang |
| 2011 | Thermal-Aware Scheduling of Critical Applications Using Job Migration and Power-Gating on Multi-core Chips. Buyoung Yun, Kang G. Shin, Shige Wang |
| 2011 | Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks. Fei Shi, Dongxu Jin, Weijie Liu, JooSeok Song |
| 2011 | Tool Support for Automated Traceability of Test/Code Artifacts in Embedded Software Systems. Christian Wiederseiner, Vahid Garousi, Michael Smith |
| 2011 | Towards Context-Aware Service-Oriented Semantic Reputation Framework. Rehab Alnemr, Maxim Schnjakin, Christoph Meinel |
| 2011 | Towards Detecting Thread Deadlock in Java Programs with JVM Introspection. Yan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen |
| 2011 | Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud. Lingfeng Chen, Doan B. Hoang |
| 2011 | Towards User Intent Based Searching. Haibo Yu, Tsunenori Mine, Makoto Amamiya |
| 2011 | Towards a Behavior-Based Restructure Approach for Service Composition. Zaiwen Feng, Keqing He, Rong Peng, Buqing Cao |
| 2011 | Towards a Holistic Privacy Engineering Approach for Smart Grid Systems. Hervais Simo Fhom, Kpatcha M. Bayarou |
| 2011 | Towards a Trust Management System for Cloud Computing. Sheikh Mahbub Habib, Sebastian Ries, Max Mühlhäuser |
| 2011 | Trust ME: A Trust Decision Framework for Mobile Environments. Gonzalo Huerta Cánepa, Dongman Lee, Seon-Yeong Han |
| 2011 | Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing. Mahbub Ahmed, Yang Xiang |
| 2011 | Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey. Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi |
| 2011 | Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks. Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan |
| 2011 | Trusted Block as a Service: Towards Sensitive Applications on the Cloud. Jianan Hao, Wentong Cai |
| 2011 | UML-Based Analysis of Power Consumption for Real-Time Embedded Systems. Matthias Hagner, Adina Aniculaesei, Ursula Goltz |
| 2011 | Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets. Lin Liu |
| 2011 | Unwanted Traffic Control via Global Trust Management. Zheng Yan, Raimo Kantola, Yue Shen |
| 2011 | User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment. Adeela Waqar, Asad Raza, Haider Abbas |
| 2011 | Using Project-Based Learning and Collaborative Learning in Software Engineering Talent Cultivation. Hongzhi Song, Guodong Si, Lei Yang, Huakun Liang, Lixia Zhang |
| 2011 | Variable Precision Rough Set-Based Fault Diagnosis for Web Services. Chengying Mao |
| 2011 | VerFAT: A Transparent and Efficient Multi-versioning Mechanism for FAT File System. Jiangjiang Wu, Zhiying Wang, Songzhu Mei, Yong Cheng, Jiangchun Ren |
| 2011 | Verification-Based Multi-backup Firmware Architecture, an Assurance of Trusted Boot Process for the Embedded Systems. Hongfei Yin, Hongjun Dai, Zhiping Jia |
| 2011 | Visual Navigation System with Real-Time Image Processing for Patrol Service Robot. Kenichi Asami, Hayato Hagiwara, Mochimitsu Komori |
| 2011 | Visualization of Computational Processes of Procedural Abstraction Optimization Passes. Stefan Schäckeler, Nityananda Jayadevaprakash |
| 2011 | Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks. Sancheng Peng, Guojun Wang |
| 2011 | eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems. Mei Liu, Ge Fu, Jiwu Jing |
| 2011 | hUBI: An Optimized Hybrid Mapping Scheme for NAND Flash-Based SSDs. Guangjun Xie, Guangzhi Xu, Gang Wang, Jing Liu, Rui Cao, Yan Gao |