1.
A-Long Jin and Wei Song. Incentive
Design for Mobile Cloud Computing
2.
Abdullah J. Alzahrani
and Ali A. Ghorbani. SMS
Mobile Botnet Detection Framework
3.
Amy Seo, Bradford
G. Nickerson, and Wei Song. Indoor
Localization Supporting Smartphone Advertising
4.
Andi Fitriah A.Kadir, Natalia Stakhanova,and Ali A.Ghorbani. Android
Botnet: What URLs are telling us
5.
Baoguo Zhou and
Gerhard W. Dueck. An
Investigation of the proportion of cold objects
6.
Bing Yang(UNB),
Kenneth Kent, Eric Aubanel, and Karl Taylor. A
Monitor-based Synchronization Approach for Packed Object Data Model
7.
David Bremner and Rasoul Shahsavarifar. Geometric
and Computational Aspects of Data Depth
8.
Fatemeh Lashkari and Ebrahim Bagheri. Indexing
Infrastructure for Semantic Search
9.
Hanin Almutairi. Dynamic
Node Movement Control In A Mobile Medium Ad Hoc Network
10.
Hugo González, Natalia Stakhanova,
and Ali A. Ghorbani. Exploring
the origin of Android Apps
11.
Konstantin Nasartschuk,
Kenneth B. Kent, and Dane Henshall. String
Deduplication in Virtual Machines
12.
Mahsa Kiani, Virendrakumar C. Bhavsar, and Harold Boley. A
Medical Information Retrieval System
13.
Marcel Dombrowski,
Kenneth B. Kent, Michael Dawson, and Dane Henshall.
Object
Cache Locality in a Managed Runtime Environment
14.
Mohammad Mamun,
Natalia Stakhanova, and Ali Ghorbani . Encrypted
Traffic Analysis Based on Entropy of the Payloads
15.
Mohammadreza Yavariand Bradford G. Nickerson. Ultra-Wide
Band (UWB) real time positioning aided by IMU
16.
P. Patros, D. Dilli, K. Kent, M. Dawson, and T. Watson. A
Java Multitenant Application Server
17.
Peijian Ju, Wei Song, and Dizhi Zhou.
An
Enhanced Cooperative MAC protocol Based on Perceptron Training
18.
Shijie Xu. Compile Java
Method Handle at runtime for better Just-In-Time Compilation Efficiency
19.
Stuart A. MacGillivray
and Bradford G. Nickerson. Storage
of Versioned Data Across Polygonal Regions
20.
Tristan M. Basa
and Gerhard W. Dueck. Identifying
Threads Groups Based on Escaping Objects
|