References
[1]. Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter
and Eike Kohnert, (November 2010). “A Novel
Cryptoprocessor Architecture for the McEliece Public-Key
Cryptosystem”, IEEE Transactions On Computers, pp.
1533-1546, Vol. 59, No. 11.
[2]. Akrivi Vlachou, Christos Doulkeridis, Yannis Kotidis
and Michalis Vazirgiannis, (December 2010). “Efficient
Routing of Subspace Skyline Queries over Highly
Distributed Data”, IEEE Transactions On Knowledge And
Data Engineering, pp. 1694-1708, Vol. 22, No. 12.
[3]. Ashish Kamra and Elisa Bertino, (June 2011). “Design
and Implementation of an Intrusion Response System for
Relational Databases”, IEEE Transactions On Knowledge
And Data Engineering, pp.875-888, Vol. 23, No. 6.
[4]. Bonatti P.A., J.L. De Coi, D. Olmedilla, and L. Sauro,
(November 2010). “A Rule-Based Trust Negotiation System”, IEEE Transactions On Knowledge snd Data
Engineering, pp. 1507-1514, Vol. 22, No. 11.
[5]. Brian Blake M , and Michael F. Nowlan, (June 2011).
“Knowledge Discovery in Services (KDS): Aggregating
Software Services to Discover Enterprise Mashups”, IEEE
Transactions On Knowledge and Data Engineering,
pp.889-901, Vol. 23, No. 6, June 2011.
[6]. Chun-I Fan, Ling-Ying Huang and Pei-Hsiu Ho,
(September 2010). “Anonymous Multireceiver Identity-
Based Encryption”, IEEE Transactions On Computers, pp.
1239- 1249, vol. 59, No. 9.
[7]. Claudia Marinica and Fabrice Guillet, (June 2010).
“Knowledge-Based Interactive Postmining of Association
Rules Using Ontologies”, IEEE Transactions On Knowledge
And Data Engineering, pp. 784-798, Vol. 22, No. 6.
[8]. Domenico Ficara, Andrea Di Pietro, Stefano
Giordano, Gregorio Procissi, Fabio Vitucci, and Gianni
Antichi, (June 2011). “Differential Encoding of DFAs for
Fast Regular Expression Matching”, IEEE/ACM Transactions
On Networking, pp.683-694, Vol. 19, No. 3.
[9]. Dominik Fisch, Thiemo Gruber, and Bernhard Sick,
(May 2011). “SwiftRule: Mining Comprehensible
Classification Rules for Time Series Analysis”, IEEE
Transactions On Knowledge And Data Engineering, Vol.
23, No. 5.
[10]. Emilio Miguela, Pedro, Keith E. Brown, Yvan R.
Petillot, and David M. Lane, May (2011). “Semantic
Knowledge-Based Framework to Improve the Situation
Awareness of Autonomous Underwater Vehicles”, IEEE
Transactions Oon Knowledge and Data Engineering,
pp.759-773, Vol. 23, No. 5.
[11]. Eric Hsueh-Chan Lu, Vincent S. Tseng, Member, IEEE,
and Philip S. Yu, (June 2011). “Mining Cluster-Based
Temporal Mobile Sequential Patterns in Location-Based
Service Environments”, IEEE Transactions On Knowledge
And Data Engineering, pp.914-927, Vol. 23, No. 6.
[12]. Hannes Frey and Ivan Stojmenovic, (September
2010). “On Delivery Guarantees and Worst-Case
Forwarding Bounds of Elementar y Face Routing
Components in Ad Hoc and Sensor Networks”, IEEE
Transactions on Computers, pp.1224-1238, Vol. 59, No. 9.
[13]. Hua Lu, and Man Lung Yiu, (June 2011). “On
Computing Farthest Dominated Locations”, IEEE
Transactions On Knowledge And Data Engineering, Vol.
23, No. 6.
[14]. Hyunjin Lee, Sangyeun Cho and Bruce R. Childers,(
May 2010). “PERFECTORY: A Fault-Tolerant Directory
Memory Architecture”, IEEE Transactions On Computers,
pp. 638- 650, Vol. 59, No. 5,
[15]. Ioannis Hatzilygeroudis, and Jim Prentzas,
(November 2010). “Integrated Rule-Based Learning and
Inference”, IEEE Transactions On Knowledge And Data
Engineering, pp. 1549-1563, Vol. 22, No. 11.
[16]. Irem Y. Tumer, and Carol S. Smidts, “Integrated
Design-Stage Failure Analysis of Software-Driven
Hardware Systems”, IEEE Transactions On Computers,
pp.No.1072-1084, Vol. 60, No. 8, August 2011.
[17]. Javier Carretero, Xavier Vera, Pedro Chaparro, and
Jaume Abella, (May 2010). “Microarchitectural Online
Testing for Failure Detection in Memory Order Buffers”, IEEE
Transactions On Computers, pp. 623-637, Vol. 59, No. 5.
[18]. Mahesh Balakrishnan, Tudor Marian, Kenneth P.
Birman, Hakim Weatherspoon, and Lakshmi Ganesh, (June
2011). “Maelstrom: Transparent Error Correction for
Communication Between Data Centers”, IEEE/ACM
Transactions On Networking, pp.617-629, Vol. 19, No. 3.
[19]. Matt Duckham, Doron Nussbaum, (August 2011).
“Efficient, Decentralized Computation of the Topology of
Spatial Regions”, IEEE Transactions On Computers,
Pg.No.1100-1113, Vol. 60, No. 8.
[20]. Mehran Mozaffari-Kermani and Arash Reyhani-
Masoleh, (May 2010). “ Concurrent Structure-
Independent Fault Detection Schemes for the Advanced
Encryption Standard”, IEEE Transactions On Computers,
pp.608-623, Vol. 59, No. 5.
[21]. Mohammad M. Masud, Jing Gao, Latifur Khan,
Jiawei Han, and Bhavani Thuraisingham, (June 2011).
“Classification and Novel Class Detection in Concept-
Drifting Data Streams under Time Constraints”, IEEE
Transactions On Knowledge and Data Engineering,
pp.859-874, Vol. 23, No. 6.
[22]. Panagiotis Papadimitriou and Hector Garcia Molina, (January 2011). “Data Leakage Detection”, IEEE
Transactions On Knowledge And Data Engineering,
pp.51-64, Vol. 23, No. 1.
[23]. Rachid Hadjidj and Hanifa Boucheneb, (August
2011). “Efficient Reachability Analysis for Time Petri Nets”,
IEEE Transactions on Computers, Vol. 60, No. 8.
[24]. Songqing Chen, Shiping Chen, Xinyuan Wang,
Zhao Zhang and Sushil Jajodia, (July 2010). “An Application-Level Data Transparent Authentication
Scheme without Communication Overhead”, IEEE
Transactions On Computers, pp. 943-954, Vol. 59, No. 7.
[25]. Yu-Wei Eric Sung, Xin Sun, Sanjay G. Rao, Geoffrey G.
Xie, and David A. Maltz, (June 2011). “Towards Systematic
Design of Enterprise Networks”, IEEE/ACM Transactions On
Networking, pp.695-707, Vol. 19, No. 3.