Saturday, October 3, 2009

DUAL-LINK FAILURE RESILIENCY THROUGH BACKUP LINK MUTUAL EXCLUSION

BOTMINER: CLUSTERING ANALYSIS OF NETWORK TRAFFIC FOR PROTOCOL- AND STRUCTURE-INDEPENDENT BOTNET DETECTION

A SURVEY OF LEARNING-BASED TECHNIQUES OF EMAIL SPAM FILTERING - 2008

AN EFFICIENT CLUSTERING SCHEME TO EXPLOIT HIERARCHICAL DATA IN NETWORK TRAFFIC ANALYSIS

COMPUTATION-EFFICIENT MULTICAST KEY DISTRIBUTION

COMPUTATION-EFFICIENT MULTICAST KEY DISTRIBUTION

CHARMY: A FRAMEWORK FOR DESIGNING AND VERIFYING ARCHITECTURAL SPECIFICATIONS PATRIZIO PELLICCIONE, PAOLA INVERARDI, AND HENRY MUCCINI

GENERALIZED SEQUENCE-BASED AND REVERSE SEQUENCE-BASED MODELS FOR BROADCASTING HOT VIDEOS – 2009

OPPORTUNISTIC SCHEDULING WITH RELIABILITY GUARANTEES IN COGNITIVE RADIO NETWORKS - 2009

COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS

A NOVEL APPROACH FOR COMPUTATION-EFFICIENT REKEYING FOR MULTICAST KEY DISTRIBUTION

NODE ISOLATION MODEL AND AGE-BASED NEIGHBOR SELECTION IN UNSTRUCTURED P2P NETWORKS

CONTENTION-AWARE PERFORMANCE ANALYSIS OF MOBILITY-ASSISTED ROUTING

A FLEXIBLE PRIVACY-ENHANCED LOCATION-BASED SERVICES SYSTEM FRAMEWORK AND PRACTICE