References
[1]. Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter
and Eike Kohnert, (2010). “A Novel Cryptoprocessor
Architecture for the McEliece Public-Key Cryptosystem”,
IEEE Transactions On Computers, pp. 1533-1546, Vol. 59,
No. 11, November.
[2]. Akrivi Vlachou, Christos Doulkeridis, Yannis Kotidis
and Michalis Vazirgiannis, (2010). “Efficient Routing of
Subspace Skyline Queries over Highly Distributed Data”, IEEE Transactions on Knowledge and Data Engineering,
pp. 1694-1708, Vol. 22, No. 12, December.
[3]. Ashish Kamra and Elisa Bertino, (2011). “Design and
Implementation of an Intrusion Response System for
Relational Databases”, IEEE Transactions on Knowledge
and Data Engineering, pp.875-888, Vol. 23, No. 6, June
2011.
[4]. P.A. Bonatti, J.L. De Coi, D. Olmedilla, and L. Sauro,
(2010). ”A Rule-Based Trust Negotiation System”, IEEE
Transactions on Knowledge and Data Engineering, pp.
1507-1514, Vol. 22, No. 11, November.
[5]. M. Brian Blake, and Michael F. Nowlan, “Knowledge
Discovery in Services (KDS): Aggregating Software
Services to Discover Enterprise Mashups”, IEEE
Transactions on Knowledge and Data Engineering,
pp.889-901, Vol. 23, No. 6, June 2011.
[6]. Chun-I Fan, Ling-Ying Huang and Pei-Hsiu Ho,
“Anonymous Multireceiver Identity-Based Encryption”,
IEEE Transactions on Computers, pp. 1239- 1249, vol. 59,
No. 9, September 2010.
[7]. Claudia Marinica and Fabrice Guillet, “Knowledge-
Based Interactive Postmining of Association Rules Using
Ontologies”, IEEE Transactions on Knowledge and Data
Engineering, pp. 784-798, Vol. 22, No. 6, June 2010.
[8]. Domenico Ficara, Andrea Di Pietro, Stefano
Giordano, Gregorio Procissi, Fabio Vitucci, and Gianni
Antichi, “Differential Encoding of DFAs for Fast Regular
Expression Matching”, IEEE/ACM Transactions on
Networking, pp.683-694, Vol. 19, No. 3, June 2011.
[9]. Dominik Fisch, Thiemo Gruber, and Bernhard Sick,
(2011). “SwiftRule: Mining Comprehensible Classification
Rules for Time Series Analysis”, IEEE Transactions on
Knowledge and Data Engineering, Vol. 23, No. 5, May.
[10]. Emilio Miguela, Pedro, Keith E. Brown, Yvan R.
Petillot, and David M. Lane, (2011). “Semantic
Knowledge-Based Framework to Improve the Situation
Awareness of Autonomous Underwater Vehicles”, IEEE
Transactions on Knowledge and Data Engineering,
pp.759-773, Vol. 23, No. 5, May.
[11]. Eric Hsueh-Chan Lu, Vincent S. Tseng, Member, IEEE,
and Philip S. Yu, (2011). “Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service
Environments”, IEEE Transactions on Knowledge And Data
Engineering, pp.914-927, Vol. 23, No. 6, June.
[12]. Hannes Frey and Ivan Stojmenovic, (2010). “On
Delivery Guarantees and Worst-Case Forwarding Bounds
of Elementary Face Routing Components in Ad Hoc and
Sensor Networks”, IEEE Transactions on Computers,
pp.1224-1238, Vol. 59, No. 9, September.
[13]. Hua Lu, and Man Lung Yiu, (2011). “On Computing
Farthest Dominated Locations”, IEEE Transactions on
Knowledge And Data Engineering, Vol. 23, No. 6, June.
[14]. Hyunjin Lee, Sangyeun Cho and Bruce R. Childers,
(2010). “PERFECTORY: A Fault-Tolerant Directory Memory
Architecture”, IEEE Transactions on Computers, pp. 638-
650, Vol. 59, No. 5, May.
[15]. Ioannis Hatzilygeroudis, and Jim Prentzas, (2010).
“Integrated Rule-Based Learning and Inference”, IEEE
Transactions on Knowledge and Data Engineering, pp.
1549-1563, Vol. 22, No. 11, November.
[16]. Irem Y. Tumer, and Carol S. Smidts, (2011).
“Integrated Design-Stage Failure Analysis of Software-
Driven Hardware Systems”, IEEE Transactions on
Computers, pp.1072-1084, Vol. 60, No. 8, August .
[17]. Javier Carretero, Xavier Vera, Pedro Chaparro, and
Jaume Abella, (2010). “Microarchitectural Online Testing
for Failure Detection in Memory Order Buffers”, IEEE
Transactions on Computers, pp. 623-637, Vol. 59, No. 5,
May.
[18]. Mahesh Balakrishnan, Tudor Marian, Kenneth P.
Birman, Hakim Weatherspoon, and Lakshmi Ganesh,
(2011). “Maelstrom: Transparent Error Correction for
Communication Between Data Centers”, IEEE/ACM
Transactions on Networking, pp.617-629, Vol. 19, No. 3,
June.
[19]. Matt Duckham, Doron Nussbaum, (2011). “Efficient,
Decentralized Computation of the Topology of Spatial
Regions”, IEEE Transactions on Computers, pp.1100-
1113, Vol. 60, No. 8, August.
[20]. Mehran Mozaffari-Kermani and Arash Reyhani-
Masoleh, (2010). “Concurrent Structure-Independent
Fault Detection Schemes for the Advanced Encryption Standard”, IEEE Transactions on Computers, pp.608-623,
Vol. 59, No. 5, May.
[21]. Mohammad M. Masud, Jing Gao, Latifur Khan,
Jiawei Han, and Bhavani Thuraisingham, (2011).
“Classification and Novel Class Detection in Concept-
Drifting Data Streams under Time Constraints”, IEEE
Transactions on Knowledge And Data Engineering,
pp.859-874 , Vol. 23, No. 6, June.
[22]. Panagiotis Papadimitriou and Hector Garcia-
Molina, (2011). “Data Leakage Detection”, IEEE
Transactions on Knowledge and Data Engineering,
pp.51-64, Vol. 23, No. 1, January 2011.
[23]. Rachid Hadjidj and Hanifa Boucheneb, (2011).
“Efficient Reachability Analysis for Time Petri Nets”, IEEE
Transactions on Computers, Vol. 60, No. 8, August 2011.
[24]. Songqing Chen, Shiping Chen, Xinyuan Wang,
Zhao Zhang and Sushil Jajodia, (2010). “An Application-
Level Data Transparent Authentication Scheme without
Communication Overhead”, IEEE Transactions on
Computers, pp. 943-954, Vol. 59, No. 7, July 2010.
[25]. Yu-Wei Eric Sung, Xin Sun, Sanjay G. Rao, Geoffrey
G. Xie, and David A. Maltz, (2011). “Towards Systematic
Design of Enterprise Networks”, IEEE/ACM Transactions on
Networking, pp.695-707, Vol. 19, No. 3, June 2011.