Sei sulla pagina 1di 3

1.

Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use
Recommendations.
2.Multipath Dissemination in Regular Mesh Topologies.
3.Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments.
4.Detecting Malicious Packet Losses.
5.Dynamic Routing with Security Considerations.
6.Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
7.Mitigation of Control Channel Jamming under Node Capture Attacks.
8.Security Analysis of the SASI(strong authentication and strong integrity) Protocol.
9.Energy-Efficient SINR-Based Routing for Multi-hop Wireless Networks.
10.Mitigation of Control Channel Jamming under Node Capture Attacks.
11 .Dynamic Routing with Security Considerations.
12 .Detecting Malicious Packet Losses.
13 .Multipath Dissemination in Regular Mesh Topologies.
14 .A Faithful Distributed Mechanism for Sharing theCost of Multicast Transmissions.
15 .Movement-Assisted Connectivity Restoration inWireless Sensor and Actor

Networks.

16 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing

Analysis.

17 .The Effectiveness of Checksums for Embedded Control Networks.


18 Multiple Routing Configurations for Fast IP Network Recovery.
19. Monitoring the Application-Layer DDoS Attacks for Popular Websites.
20 .Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
21 .Scalable Routing in Cyclic Mobile Networks.
22 .Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows.
23 .SIMPS: Using Sociology for Personal Mobility.
24 .Capturing Router Congestion and Delay.
25 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures.
26.Security Analysis of the SASI Protocol.
27.Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments.

28.Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
29.Congestion Control Algorithm for Tree-based Reliable Multicast Protocols.
30 .Security Agents for Network Traffic Analysis (SANTA).
31 .Capturing Router Congestion and Delay.
32 .Detecting Malicious Packet Losses.
33 .Dynamic Routing with Security Considerations.
34 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
35 .FEBA: A Bandwidth Allocation Algorithm for Service Differentiation in IEEE 802.16 Mesh
Networks.
36 .Joint Task Migration and Power Management in Wireless Computing.
37 .Large Connectivity for Dynamic Random Geometric Graphs.
38 .Measuring Capacity Bandwidth of Targeted Path Segments .
39 .Mitigating Denial-of-Service Attacks on The Chord Overlay Network:A Location Hiding Approach .
40 .Mitigatation Of Control Channel Jamming Under Node Capture Attacks.
41 .Monitoring the Application-Layer DDoS Attacks for Popular Websites .
42.Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
43 .SIMPS: Using Sociology for Personal Mobility.
44 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures .
45.Multi-core Supported Network and System Security and Security in Next
Networks.

Generation Wireless

46 .Mobile Agents and Security.


48 .Configuring BlueStars: Multihop Scatternet Formation for Bluetooth Networks.
49 .Agent Mobility for Large-scale Network Monitoring.
50 .Active Distributed Monitoring system based on mobile agents.
51 .Network Security using HoneyPot.
52 .Multiresolution Data Integration using Mobile Agent in Distributed Sensor Networks.
53 .Distributed Algorithm for Source based Energy Efficient Multicasting in wireless AdHoc Networks.
54.Privacy-Aware Collaborative Spam Filtering.

55.Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks.


56.A Decentralized Method for Scaling Up Genome Similarity Search Services.
57.Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search .
58.Cooperative Secondary Authorization Recycling.
59.Robust Rate Control for Heterogeneous Network Access in Multihomed Environments .
60.Catching the Trend: A Framework for Clustering Concept-Drifting Categorical Data .
61.CDNs Content Outsourcing via Generalized Communities .
62.IMine: Index Support for Item Set Mining.
63.Progressive Parametric Query Optimization.
64.Headlight Prefetching and Dynamic Chaining for Cooperative Media Streaming in Mobile
Environments.
65.A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous
Sensor Networks.
67.Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
68.Lightweight Online Performance Monitoring and Tuning with Embedded Gossip.
69.Bi-Criteria Scheduling of Scientific Grid Workflows.
70.TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
71.Adaptive Task Checkpointing and Replication: Toward Efficient Fault-Tolerant Grids.
72.Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures.

Potrebbero piacerti anche