BD01 |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
Big Data |
JAVA/2017 |
BD02 |
Efficient Processing of Skyline Queries Using MapReduce |
Big Data |
JAVA/2017 |
BD03 |
Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web |
Big Data |
JAVA/2017 |
BD04 |
SocialQA An Online Social Network Based Question and Answer System |
Big Data |
JAVA/2017 |
BD05 |
A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment |
Big Data |
JAVA/2017 |
BD06 |
Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing |
Big Data |
JAVA/2017 |
BD07 |
Toward Efficient and Flexible Metadata Indexing of Big Data Systems |
Big Data |
JAVA/2017 |
BD08 |
A Fast Image Retrieval Method Designed for Network Big Data |
Big Data |
JAVA/2017 |
BD09 |
A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds |
Big Data |
JAVA/2017 |
BD10 |
Mining the Most Influential k-Location Set From Massive Trajectories |
Big Data |
JAVA/2017 |
BD11 |
Complex Queries Optimization And Evaluation Over Relational And NoSQL Data Stores In Cloud Environments |
Big Data |
JAVA/2017 |
BD12 |
Spamdoop: A privacy-preserving Big Data platform for collaborative spam detection |
Big Data |
JAVA/2017 |
BD13 |
Big?Health Application System based on Health Internet of Things and?BigData |
Big Data |
JAVA/2017 |
BD14 |
Semantic-based and Entity-Resolution Fusion to Enhance Quality of?Big?RDF?Data |
Big Data |
JAVA/2017 |
BD15 |
Application-Aware?Big?Data?Deduplication in Cloud Environment |
Big Data |
JAVA/2017 |
BD16 |
Cost-Aware?Big?Data?Processing across Geo-distributed Datacenters |
Big Data |
JAVA/2017 |
BD17 |
Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for?Big?Data |
Big Data |
JAVA/2017 |
BD18 |
Mobile Cloud-Based?Big?Healthcare?Data?Processing in Smart Cities |
Big Data |
JAVA/2017 |
BD19 |
IoT-Based?Big?Data?Storage Systems in Cloud Computing: Perspectives and Challenges |
Big Data |
JAVA/2017 |
BD20 |
Sentiment Computing for the News Event Based on the Social Media?BigData |
Big Data |
JAVA/2017 |
BD21 |
A Cluster-Based?Data?Fusion Technique to Analyze?Big?Data?in Wireless Multi-Sensor System? |
Big Data |
JAVA/2017 |
BD22 |
Preconditioned?Data?Scarification for?Big?Data?With Applications to PCA and K-Means |
Big Data |
JAVA/2017 |
BD23 |
A Novel Embedding Method for Information Diffusion Prediction in Social Network?Big?Data |
Big Data |
JAVA/2017 |
CC01 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
Cloud Computing |
Net / JAVA 2017 |
CC02 |
Catch You if You Misbehave- Ranked Keyword Search Results Verification in Cloud Computing |
Cloud Computing |
Net / JAVA 2017 |
CC03 |
Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks |
Cloud Computing |
JAVA/2017 |
CC04 |
A Context-aware Service Evaluation Approach over Big Data for Cloud Applications |
Cloud Computing |
Net / JAVA 2017 |
CC05 |
A Johnson's-Rule-Based Genetic Algorithm for Two-Stage-Task Scheduling Problem in Data-Centers of Cloud Computing |
Cloud Computing |
Net / JAVA 2017 |
CC06 |
Identity-Based Private Matching over Outsourced Encrypted Datasets |
Cloud Computing |
Net / JAVA 2017 |
CC07 |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
Cloud Computing |
Net / JAVA 2017 |
CC08 |
Efficient Public Verification of Data Integrity for Cloud Storage Systems from In distinguishability Obfuscation Public Cloud |
Cloud Computing |
JAVA/2017 |
CC09 |
A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud ata Sharing |
Cloud Computing |
JAVA/2017 |
CC10 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
Cloud Computing |
JAVA/2017 |
CC11 |
Securing Aggregate Queries for DNA Databases |
Cloud Computing |
JAVA/2017 |
CC12 |
TEES-An Efficient Search Scheme over Encrypted Data on Mobile Cloud |
Cloud Computing |
JAVA/2017 |
CC13 |
Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing |
Cloud Computing |
JAVA/2017 |
CC10 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
Cloud Computing |
JAVA/2017 |
CC11 |
Securing Aggregate Queries for DNA Databases |
Cloud Computing |
JAVA/2017 |
CC12 |
TEES-An Efficient Search Scheme over Encrypted Data on Mobile Cloud |
Cloud Computing |
JAVA/2017 |
CC13 |
Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing |
Cloud Computing |
JAVA/2017 |
CC14 |
A Modified Hierarchical Attribute-based Encryption Access Control Method for Mobile Cloud Computing |
Cloud Computing |
JAVA/2017 |
CC15 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
Cloud Computing |
JAVA/2017 |
CC16 |
Toward Cloud Computing QoS Architecture: Analysis of Cloud Systems and Cloud Services |
Cloud Computing |
JAVA/2017 |
CC17 |
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving |
Cloud Computing |
JAVA/2017 |
CC18 |
Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing |
Cloud Computing |
JAVA/2017 |
CC19 |
Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing |
Cloud Computing |
JAVA/2017 |
CC20 |
Multiagent-Based Resource Allocation for Energy Minimization in Cloud Computing Systems |
Cloud Computing |
JAVA/2017 |
DM01 |
Application of data mining techniques to predict length of stay of stroke patients |
Data Mining |
Net/JAVA 2017 |
DM02 |
Applying Data Mining techniques in Cyber Crimes |
Data Mining |
Net/JAVA 2017 |
DM03 |
Experimental analysis of data mining application for intrusion detection with feature reduction |
Data Mining |
Net/JAVA 2017 |
DM04 |
Predicting Persuasive Message for Changing Student's Attitude Using Data Mining |
Data Mining |
Net/JAVA 2017 |
DM05 |
Energy-Efficient Query Processing in Web Search Engines |
Data Mining |
Net/JAVA 2017 |
DM06 |
Online Transfer Learning with Multiple Homogeneous or Heterogeneous Sources |
Data Mining |
Net/JAVA 2017 |
DM07 |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
Data Mining |
Net/JAVA 2017 |
DM08 |
A Scalable Data Chunk Similarity Based Compression Approach for Efficient Big Sensing Data Processing on Cloud |
Data Mining |
Net/JAVA 2017 |
DM09 |
Keyword Search over Distributed Graphs with Compressed Signature |
Data Mining |
Net/JAVA 2017 |
DM10 |
User Vitality Ranking and Prediction in Social Networking Services: A Dynamic Network Perspective |
Data Mining |
Net/JAVA 2017 |
DM11 |
Unsupervised Visual Hashing with Semantic Assistant for Content-Based Image Retrieval |
Data Mining |
Net/JAVA 2017 |
DM12 |
Efficient Keyword-aware Representative Travel Route Recommendation |
Data Mining |
Net/JAVA 2017 |
DM13 |
Efficient Clue-based Route Search on Road Networks |
Data Mining |
Net/JAVA 2017 |
DM14 |
Storing Tracking and Querying Provenance Linked Data |
Data Mining |
Net/JAVA 2017 |
DM15 |
Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data |
Data Mining |
Net/JAVA 2017 |
DM16 |
Understand Short Texts by Harvesting and Analyzing Semantic Knowledge |
Data Mining |
Net/JAVA 2017 |
DM17 |
Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation |
Data Mining |
JAVA/2017 |
DM18 |
Filtering Out Infrequent Behavior from Business Process Event Logs |
Data Mining |
JAVA/2017 |
DM19 |
Differential Private Data Collection and Analysis Based on Randomized Multiple Dummies for Untrusted Mobile Crowdsensing |
Data Mining |
JAVA/2017 |
DM20 |
Detecting Communities on Topic of Transportation With Sparse Crowd Annotations |
Data Mining |
JAVA/2017 |
DM21 |
Collaborative Filtering-Based Recommendation of Online Social Voting Filtering. |
Data Mining |
JAVA/2017 |
DM22 |
Predicting Social Emotions from Readers? Perspective |
Data Mining |
JAVA/2017 |
DM23 |
Semantics-enhanced Online Intellectual Capital Mining Service for Enterprise Customer Centers |
Data Mining |
JAVA/2017 |
JIM 01 |
Efficient joint encryption and data hiding algorithm for medical images security |
Image Processing |
JAVA/2017 |
JIM 02 |
Energy Efficient Image Encryption Algorithm |
Image Processing |
JAVA/2017 |
JIM 03 |
Reversible data hiding in encrypted images using reformed JPEG compression |
Image Processing |
JAVA/2017 |
JIM 04 |
Image Re-Ranking Based on Topic Diversity |
Image Processing |
JAVA/2017 |
JIM 05 |
Facial Expression Recognition in Video with Multiple Feature Fusion |
Image Processing |
JAVA/2017 |
JIM 06 |
Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing |
Image Processing |
JAVA/2017 |
JNS01 |
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage |
Network Security |
JAVA/2017 |
JNS02 |
On the Security of a Variant of ElGamal Encryption Scheme |
Network Security |
JAVA/2017 |
JNS03 |
Privacy-Preserving Selective Aggregation of Online User Behavior Data |
Network Security |
JAVA/2017 |
JNS04 |
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model |
Network Security |
JAVA/2017 |
JNS05 |
Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System |
Network Security |
JAVA/2017 |
JNS06 |
Online and Scalable Unsupervised Network Anomaly Detection Method |
Network Security |
JAVA/2017 |
JNS07 |
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam |
Network Security |
JAVA/2017 |
JNS08 |
Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions |
Network Security |
JAVA/2017 |
JNS09 |
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data |
Network Security |
JAVA/2017 |
JNS10 |
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage |
Network Security |
JAVA/2017 |
JNS11 |
Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels |
Network Security |
JAVA/2017 |
JNS12 |
Secret-Key Generation Using Compound Sources and One-Way Public Communication |
Network Security |
JAVA/2017 |
JNS13 |
FACT: A Framework for Authentication in Cloud-based IP Traceback |
Network Security |
JAVA/2017 |
JNS14 |
Identity Deception Prevention Using Common Contribution Network Data |
Network Security |
JAVA/2017 |
JWM01 |
Modeling and Learning Continuous Word Embedding with Metadata for Question Retrieval |
Web Mining |
JAVA/2017 |
JWM02 |
Analysis of users? behaviour in structured e-commerce websites |
Web Mining |
JAVA/2017 |
JWM03 |
Rating Credits of Online Merchants Using Negative Ranks |
Web Mining |
JAVA/2017 |
JWM04 |
Service Rating Prediction by Exploring Social Mobile Users? Geographical Locations |
Web Mining |
JAVA/2017 |
JWM05 |
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam |
Web Mining |
JAVA/2017 |
JWM06 |
Towards Real-Time Country-Level Location Classification of Worldwide Tweets |
Web Mining |
JAVA/2017 |
JWM07 |
Generating Query Facets Using Knowledge Bases |
Web Mining |
JAVA/2017 |
JMC01 |
Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions |
Mobile Computing |
JAVA/2017 |
JMC02 |
Detecting Mobile Malicious Webpages in Real Time |
Mobile Computing |
JAVA/2017 |
JMC03 |
A Fine-Grained Indoor Location-Based Social Network |
Mobile Computing |
JAVA/2017 |
JN01 |
Unsupervised Clustering Under Temporal Feature Volatility in Network Stack Fingerprinting |
Networking |
JAVA/2017 |
JN02 |
An Online Learning Approach to Improving the Quality of Crowd-Sourcing |
Networking |
JAVA/2017 |
JN03 |
Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers |
Networking |
JAVA/2017 |
JN04 |
An Overlay Architecture for Throughput Optimal Multipath Routing |
Networking |
JAVA/2017 |
JN05 |
Analysis of security attacks in a smart home networks |
Networking |
JAVA/2017 |
JN06 |
Mobility-aware route selection technique for mobile?ad hoc?networks |
Networking |
JAVA/2017 |
JN07 |
Robust and Reliable Predictive Routing Strategy for Flying?Ad-Hoc?Networks |
Networking |
JAVA/2017 |
JN08 |
A Dynamic Hop-Aware Buffer Management Scheme for Multi-Hop?Ad?Hoc?Networks |
Networking |
JAVA/2017 |
JN09 |
Caching Transient Data in Internet Content Routers |
Networking |
JAVA/2017 |
JN10 |
Improving Safety on Highways by Customizing Vehicular?Ad?Hoc?Networks |
Networking |
JAVA/2017 |
PDC01 |
Internet Traffic Privacy Enhancement with Masking: Optimization and Trade-Offs |
Parallel And Distributed Computing |
JAVA/2017 |
PDC02 |
Response-Time Analysis in Hierarchically-Scheduled Time-Partitioned Distributed Systems |
Parallel And Distributed Computing |
JAVA/2017 |
PDC03 |
Improving Performance of Heterogeneous MapReduce Clusters with Adaptive Task Tuning |
Parallel And Distributed Computing |
JAVA/2017 |
PDC04 |
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks |
Parallel And Distributed Computing |
JAVA/2017 |
PDC05 |
MRCP-RM A Technique for Resource Allocation and Scheduling of MapReduce Jobs with Deadlines |
Parallel And Distributed Computing |
JAVA/2017 |
PDC06 |
Using imbalance characteristic for fault-tolerant workflow scheduling in Cloud Systems |
Parallel And Distributed Computing |
JAVA/2017 |
PDC07 |
Splitting Large Medical Data Sets based on Normal Distribution in Cloud Environment |
Parallel And Distributed Computing |
JAVA/2017 |
PDC08 |
Renewable Energy Pricing Driven Scheduling in Distributed Smart Community Systems |
Parallel And Distributed Computing |
JAVA/2017 |
PDC09 |
Reliable Virtual Machine Placement and Routing in Clouds |
Parallel And Distributed Computing |
JAVA/2017 |
PDC10 |
Measuring Scale-up and Scale-out Hadoop with Remote and Local File Systems and Selecting the Best Platform |
Parallel And Distributed Computing |
JAVA/2017 |
PDC11 |
Cluster-Aware Virtual Machine Collaborative Migration in Media Cloud |
Parallel And Distributed Computing |
JAVA/2017 |
PDC12 |
A General-Purpose Architecture for Replicated Metadata Services in Distributed File Systems |
Parallel And Distributed Computing |
JAVA/2017 |
PDC13 |
Solving k-Set Agreement Using Failure Detectors in Unknown Dynamic Networks |
Parallel And Distributed Computing |
JAVA/2017 |
AND01 |
Mobile Cloud-Based?Big?Healthcare?Data?Processing in Smart Cities |
ANDROID |
JAVA/2017 |
AND02 |
Privacy-Preserving Verifiable Set Operation in?Big?Data?for Cloud-Assisted Mobile Crowdsourcing |
ANDROID |
JAVA/2017 |
AND03 |
A Secure Mechanism for?Big?Data?Collection in Large Scale Internet of Vehicle |
ANDROID |
JAVA/2017 |
AND04 |
Improving diabetes adherence using an?ANDROID?application |
ANDROID |
JAVA/2017 |
AND05 |
RoadSense: Smartphone Application to Estimate Road Conditions using Accelerometer and Gyroscope |
ANDROID |
JAVA/2017 |
AND06 |
IoT based vehicle parking manager |
ANDROID |
JAVA/2017 |
IOT01 |
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things |
IOT |
JAVA/2017 |
IOT02 |
An Incremental CFS Algorithm for Clustering Large Data in Industrial Internet of Things |
IOT |
JAVA/2017 |
IOT03 |
Smart Monitoring Cameras Driven Intelligent Processing to Big Surveillance Video Data |
IOT |
JAVA/2017 |
IOT04 |
Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts |
IOT |
JAVA/2017 |
IOT05 |
IoT software infrastructure for Energy Management and Simulation in Smart Cities |
IOT |
JAVA/2017 |
IOT06 |
Spectrum-Availability Based Routing for Cognitive Sensor Networks |
IOT |
JAVA/2017 |
IOT07 |
Optimizing M2M Communications and Quality of Services in the IoT for Sustainable Smart Cities |
IOT |
JAVA/2017 |
IOT08 |
Multiple QoS Parameters-Based Routing for Civil Aeronautical Ad Hoc Networks |
IOT |
JAVA/2017 |
IOT09 |
Multicast Routing for Multimedia Communications in the Internet of Things |
IOT |
JAVA/2017 |
IOT10 |
Models for integrating wireless sensor networks into the Internet of Things |
IOT |
JAVA/2017 |
IOT11 |
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications |
IOT |
JAVA/2017 |
IOT12 |
Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks |
IOT |
JAVA/2017 |
IOT13 |
ISMA Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT |
IOT |
JAVA/2017 |
IOT14 |
Enforcing Differential Privacy for Shared Collaborative Filtering |
IOT |
JAVA/2017 |
IOT15 |
Estimation of Passenger Route Choice Pattern Using Smart Card Data for Complex Metro Systems |
IOT |
JAVA/2017 |
DSC01 |
Towards Detecting Compromised Accounts on Social Networks |
Depentable and Secure Computing |
JAVA/2017 |
DSC02 |
Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage |
Depentable and Secure Computing |
JAVA/2017 |
DSC03 |
Securing Coding-Based Cloud Storage Against Pollution Attacks |
Depentable and Secure Computing |
JAVA/2017 |
DSC04 |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
Depentable and Secure Computing |
JAVA/2017 |
DSC05 |
On the Security of a Class of Diffusion Mechanisms for Image Encryption |
Depentable and Secure Computing |
JAVA/2017 |
JM01 |
Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model |
Multimedia |
JAVA/2017 |
JM02 |
Reversible Data Hiding in Encrypted 3D Mesh Models |
Multimedia |
JAVA/2017 |
JM03 |
A Hierarchical Spatio-Temporal Model for Human Activity Recognition |
Multimedia |
JAVA/2017 |
JM04 |
Known-Artist Live Song Identification Using Audio Hashprints |
Multimedia |
JAVA/2017 |
JM05 |
Inferring Emotional Tags From Social Images With User Demographics |
Multimedia |
JAVA/2017 |
JM06 |
Personalized Social Image Recommendation Method Based on User-Image-Tag Mode |
Multimedia |
JAVA/2017 |
JM07 |
Toward Encrypted Cloud Media Center With Secure Deduplication |
Multimedia |
JAVA/2017 |
JM08 |
Joint Compression of Near-Duplicate Videos Sign In or Purchase |
Multimedia |
JAVA/2017 |
JM09 |
Semi-Supervised Online Multi-Kernel Similarity Learning for Image Retrieval |
Multimedia |
JAVA/2017 |
WS01 |
A New QoS-Aware Web Service Recommendation System Based on Contextual Feature Recognition at Server-Side |
Web Services |
JAVA/2017 |
WS02 |
A Web Service Discovery Approach Based on Common Topic Groups Extraction |
Web Services |
JAVA/2017 |
WS03 |
Chemical Medicine Classification Through Chemical Properties Analysis |
Web Services |
JAVA/2017 |
WS04 |
FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data |
Web Services |
JAVA/2017 |
WS05 |
Keyword Search for Building Service-Based Systems |
Web Services |
JAVA/2017 |
WS06 |
Search-based Web Service Antipatterns Detection |
Web Services |
JAVA/2017 |
WS07 |
Sentiment Computing for the News Event Based on the Social Media Big Data |
Web Services |
JAVA/2017 |
WS08 |
SWEET Serving the Web by Exploiting Email Tunnels |
Web Services |
JAVA/2017 |
SC01 |
A Genetic Algorithm Based Data Replica Placement Strategy for Scientific Applications in Clouds |
Service Computing |
JAVA/2017 |
SC02 |
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification |
Service Computing |
JAVA/2017 |
SC03 |
An Efficient Privacy-Preserving Outsourced Computation over Public Data |
Service Computing |
JAVA/2017 |
SC04 |
Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method |
Service Computing |
JAVA/2017 |
SC05 |
Efficient Alignment BetweenEvent Logs and Process Models |
Service Computing |
JAVA/2017 |
SC06 |
Flexible Wildcard Searchable Encryption System |
Service Computing |
JAVA/2017 |
SC07 |
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree |
Service Computing |
JAVA/2017 |
SC08 |
Full Verifiability for Outsourced Decryption in Attribute Based Encryption |
Service Computing |
JAVA/2017 |
GC01 |
An Attribute-Based Encryption Scheme to Secure Fog Communications |
Grid Computing |
JAVA/2017 |
SE01 |
A Developer Centered Bug Prediction Model |
Software Engineering |
JAVA/2017 |
SE02 |
A Feature-based Classification of Model Repair Approaches |
Software Engineering |
JAVA/2017 |
SE03 |
A Multi-Perspective Method for Analysis of Cooperative Behaviors Among Industrial Devices of Smart Factory |
Software Engineering |
JAVA/2017 |
SE04 |
A Systematic Mapping Study of Software Development With GitHub |
Software Engineering |
JAVA/2017 |
SE05 |
An Emotion Recognition System for Mobile Applications |
Software Engineering |
JAVA/2017 |
SE06 |
Biometric Security Through Visual Encryption for Fog Edge Computing |
Software Engineering |
JAVA/2017 |
SE07 |
Complete and Interpretable Conformance Checking of Business Processes |
Software Engineering |
JAVA/2017 |
SE08 |
Efficient Revocable ID-Based Signature With Cloud Revocation Server |
Software Engineering |
JAVA/2017 |
SE09 |
Hierarchical Trust Level Evaluation for Pervasive Social Networking |
Software Engineering |
JAVA/2017 |
SE10 |
Keyword Search for Building Service-Based Systems |
Software Engineering |
JAVA/2017 |