1.
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
2.
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
3.
Dealing With Concept Drifts in Process Mining
4.
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
5.
Supporting Privacy Protection in Personalized Web Search
6.
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
7.
A Hybrid Cloud Approach for Secure Authorized Deduplication
8.
Secure Outsourced Attribute-Based Signatures
9.
MPrivacy for collaborative data publishing
10.
Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
11.
A Rough Hypercuboid Approach for Feature Selection in Approximation Spaces
12.
Event Characterization and Prediction Based on Temporal Patterns in Dynamic
Data System
13.
Consensus-Based Ranking of Multivalued Objects: A Generalized Borda Count
Approach
14.
Active Learning of Constraints for Semi-Supervised Clustering
15.
Approximate Shortest Distance Computing: A Query-Dependent Local Landmark
Scheme
16.
A Cocktail Approach for Travel Package Recommendation
17.
A social compute cloud: Allocating and sharing Infrastructure Resources via
social networks
18.
Discovering via Link-Anomaly Detection Emerging Topics in Social Streams
19.
Supporting Privacy Protection in Personalized Web Search
20.
Facilitating Document Annotation Using Content and Querying Value
21.
Event Characterization and Prediction Based on Temporal Patterns in Dynamic
Data System
22.
Uncertain One-Class Learning and Concept Summarization Learning on Uncertain
Data Streams
23.
Learning Conditional Preference Networks from Inconsistent Examples
24.
Rough Sets, Kernel Set, and Spatiotemporal Outlier Detection
25.
Data Mining with Big Data
26.
A Comparative Study of Implementation Techniques for Query Processing in
Multicore Systems
27.
Learning Conditional Preference Networks from Inconsistent Examples
28.
Automatic Caption Generation For News In Images
29.
A Tag encoding scheme against pollution attack in linear coding
30.
Preserving Location Privacy In Geosocial Applications
31.Behavioural
malware detection in delay tolerant networks
32.
Network selection and resource allocation for WAN
33.
RRE: A Game theoretic intrusion response and recovery engine
0 comments :
Post a Comment