Index of /IEEE 2012 Dotnet

Icon  Name                    Last modified      Size  Description
[DIR] Parent Directory - [   ] A Keyless Approach.doc 19-Nov-2013 05:11 36K [   ] A NOVEL ANTI PHISHIN..> 19-Nov-2013 05:12 767K [   ] A New Cell-Counting-..> 19-Nov-2013 05:12 455K [   ] A Query Formulation ..> 19-Nov-2013 05:12 65K [   ] A Reliable Multi Gri..> 19-Nov-2013 05:12 110K [   ] A Secure Intrusion d..> 19-Nov-2013 05:12 122K [   ] A Secure Intrusion d..> 19-Nov-2013 05:12 122K [   ] A Security Enhanced ..> 19-Nov-2013 05:12 121K [   ] A Survey of Indexing..> 19-Nov-2013 05:12 64K [   ] AMPLE An Adaptive Tr..> 19-Nov-2013 05:13 223K [   ] Abstract-Scalable an..> 19-Nov-2013 05:13 237K [   ] Access control for o..> 19-Nov-2013 05:13 82K [   ] Altered Fingerprints..> 19-Nov-2013 05:13 93K [   ] An Approach to Detec..> 19-Nov-2013 05:13 110K [   ] AnnoSearch.doc 19-Nov-2013 05:14 497K [   ] Answering General Ti..> 19-Nov-2013 05:13 32K [   ] Assessing the Veraci..> 19-Nov-2013 05:14 40K [   ] Association Rule Ext..> 19-Nov-2013 05:14 52K [   ] Association Rule E..> 19-Nov-2013 05:14 52K [   ] Automatic Protocol B..> 19-Nov-2013 05:14 135K [   ] Automatic Protocol B..> 19-Nov-2013 05:14 135K [   ] Automatic Reconfigur..> 19-Nov-2013 05:14 113K [   ] BECAN A Bandwidth-Ef..> 19-Nov-2013 05:14 203K [   ] Balancing the Tradeo..> 19-Nov-2013 05:14 68K [   ] BloomCast Efficient ..> 19-Nov-2013 05:14 37K [   ] Bridging Social and ..> 19-Nov-2013 05:14 106K [   ] Bridging Social and ..> 19-Nov-2013 05:14 85K [   ] Bridging Social and ..> 19-Nov-2013 05:15 219K [   ] Cloud Can Scientific..> 19-Nov-2013 05:15 142K [   ] Comparing the Defect..> 19-Nov-2013 05:15 141K [   ] Compressed-Sensing-E..> 19-Nov-2013 05:15 191K [   ] Computing Structural..> 19-Nov-2013 05:15 85K [   ] Cooperative Data Dis..> 19-Nov-2013 05:16 238K [   ] Cooperative Data Dis..> 19-Nov-2013 05:15 238K [   ] Cooperative download..> 19-Nov-2013 05:15 184K [   ] DEFENSES AGAINST LAR..> 19-Nov-2013 05:16 35K [   ] Decentralized Probab..> 19-Nov-2013 05:15 78K [   ] Design and Implement..> 19-Nov-2013 05:16 126K [   ] Design and Implement..> 19-Nov-2013 05:16 136K [   ] Detecting and Valida..> 19-Nov-2013 05:16 19K [   ] Development of Certi..> 19-Nov-2013 05:16 99K [   ] Discovering Informat..> 19-Nov-2013 05:16 347K [   ] Effective Pattern Fo..> 19-Nov-2013 05:16 35K [   ] Efficient Data Minin..> 19-Nov-2013 05:17 210K [   ] Efficient Data Minin..> 19-Nov-2013 05:17 210K [   ] Efficient and Discov..> 19-Nov-2013 05:16 37K [   ] Efficient audit serv..> 19-Nov-2013 05:17 111K [   ] Efficient load balan..> 19-Nov-2013 05:17 81K [   ] Enabling Secure and ..> 19-Nov-2013 05:17 32K [   ] Expert Discovery and..> 19-Nov-2013 05:17 220K [   ] Exploring The Design..> 19-Nov-2013 05:17 153K [   ] Fast Matrix Embeddin..> 19-Nov-2013 05:17 225K [   ] Fast Release Capture..> 19-Nov-2013 05:17 45K [   ] Fast-Release Capture..> 19-Nov-2013 05:17 45K [   ] Generative Models fo..> 19-Nov-2013 05:17 36K [   ] HASBE A Hierarchical..> 19-Nov-2013 05:17 153K [   ] HOMOMORPHIC AUTHENTI..> 19-Nov-2013 05:18 34K [   ] Heuristics Based Que..> 19-Nov-2013 05:17 188K [   ] Hiding Sensitive Ass..> 19-Nov-2013 05:18 69K [   ] Hop-by-Hop Routing i..> 19-Nov-2013 05:18 521K [   ] Identifying Content ..> 19-Nov-2013 05:18 35K [   ] Improving Aggregate ..> 19-Nov-2013 05:18 58K [   ] Improving Color Cons..> 19-Nov-2013 05:19 442K [   ] Integrating Web Cont..> 19-Nov-2013 05:18 45K [   ] Intent Search - Abst..> 19-Nov-2013 05:19 284K [   ] Investigation and An..> 19-Nov-2013 05:19 35K [   ] Joint Relay and Jamm..> 19-Nov-2013 05:19 75K [   ] Joint Top-K Spatial ..> 19-Nov-2013 05:19 119K [   ] Linear and Different..> 19-Nov-2013 05:19 211K [   ] Load-Balancing Multi..> 19-Nov-2013 05:19 315K [   ] Local Broadcast Algo..> 19-Nov-2013 05:19 49K [   ] Measuring Code Quali..> 19-Nov-2013 05:19 145K [   ] Mining Web Graphs fo..> 19-Nov-2013 05:19 68K [   ] Network Assisted Mob..> 19-Nov-2013 05:19 57K [   ] Novel Approach for C..> 19-Nov-2013 05:19 117K [   ] Novel Data Embedding..> 19-Nov-2013 05:20 41K [   ] OAuth Web Authorizat..> 19-Nov-2013 05:20 91K [   ] On Privacy of Encryp..> 19-Nov-2013 05:20 121K [   ] Optimal Power Alloca..> 19-Nov-2013 05:20 251K [   ] Optimization of Hori..> 19-Nov-2013 05:20 38K [   ] Organizing User Sear..> 19-Nov-2013 05:20 353K [   ] Outsourced Similarit..> 19-Nov-2013 05:20 96K [   ] Packet-Hiding Method..> 19-Nov-2013 05:20 43K [   ] Preserving Integrity..> 19-Nov-2013 05:20 113K [   ] Privacy Preserving D..> 19-Nov-2013 05:20 69K [   ] Probabilistic Model ..> 19-Nov-2013 05:21 133K [   ] Protecting Location ..> 19-Nov-2013 05:21 165K [   ] Query Access Assuran..> 19-Nov-2013 05:21 90K [   ] Query Planning for C..> 19-Nov-2013 05:21 285K [   ] ROAuth Recommendati..> 19-Nov-2013 05:22 221K [   ] Random4An Applicatio..> 19-Nov-2013 05:23 122K [   ] Ranking Model Adapta..> 19-Nov-2013 05:21 40K [   ] Recommendation Model..> 19-Nov-2013 05:21 112K [   ] Remote Display Solut..> 19-Nov-2013 05:21 262K [   ] Resource-Aware Appli..> 19-Nov-2013 05:21 91K [   ] Robust Face-Name Gra..> 19-Nov-2013 05:22 155K [   ] Robust Watermarking ..> 19-Nov-2013 05:22 87K [   ] SOA_project.doc 19-Nov-2013 05:23 155K [   ] SPOC A Secure and Pr..> 19-Nov-2013 05:23 240K [   ] SPREAD Improving ne..> 19-Nov-2013 05:24 75K [   ] Scalable Learning of..> 19-Nov-2013 05:22 107K [   ] Scalable Scheduling ..> 19-Nov-2013 05:22 32K [   ] Scalable and Secure ..> 19-Nov-2013 05:22 237K [   ] Securing Node Captur..> 19-Nov-2013 05:23 199K [   ] Securing Node Captur..> 19-Nov-2013 05:23 482K [   ] Semisupervised Biase..> 19-Nov-2013 05:23 40K [   ] Semisupervised Biase..> 19-Nov-2013 05:23 42K [   ] Separable Reversible..> 19-Nov-2013 05:23 80K [   ] Steganography.doc 19-Nov-2013 05:23 40K [   ] TPAudit and Zero Kno..> 19-Nov-2013 05:24 51K [   ] Topology Control in ..> 19-Nov-2013 05:23 199K [   ] Towards Secure and D..> 19-Nov-2013 05:24 120K [   ] User-aware Image Tag..> 19-Nov-2013 05:24 279K [   ] View-invariant actio..> 19-Nov-2013 05:24 155K