MATLAB TITLES:
Face Recognition by Exploring Information Jointly in Space, Scale and Orientation
Detection of Architectural Distortion in Prior Mammograms
Enhanced Assessment of the Wound-Healing Process by Accurate Multiview Tissue Classification
A New Supervised Method for Blood Vessel Segmentation in Retinal Images by Using Gray-Level and Moment Invariants-Based Features
Graph Run-Length Matrices for Histopathological Image Segmentation
Face Recognition by Exploring Information Jointly in Space, Scale and Orientation
Detection of Architectural Distortion in Prior Mammograms
Enhanced Assessment of the Wound-Healing Process by Accurate Multiview Tissue Classification
A New Supervised Method for Blood Vessel Segmentation in Retinal Images by Using Gray-Level and Moment Invariants-Based Features
Graph Run-Length Matrices for Histopathological Image Segmentation
X-ray Categorization and Retrieval on the Organ and Pathology Level, Using Patch-Based Visual Words
Standard Deviation for Obtaining the Optimal Direction in the Removal of Impulse Noise
Removal of High Density Salt and Pepper Noise Through Modified Decision Based Unsymmetric Trimmed Median Filter
IMAGE Resolution Enhancement by Using Discrete and Stationary Wavelet Decomposition
Automatic Optic Disc Detection From Retinal Images by a Line Operator
Wavelet-Based Image Texture Classification Using Local Energy Histograms
A Ringing-Artifact Reduction Method for Block-DCT-Based Image Resizing
Standard Deviation for Obtaining the Optimal Direction in the Removal of Impulse Noise
Removal of High Density Salt and Pepper Noise Through Modified Decision Based Unsymmetric Trimmed Median Filter
IMAGE Resolution Enhancement by Using Discrete and Stationary Wavelet Decomposition
Automatic Optic Disc Detection From Retinal Images by a Line Operator
Wavelet-Based Image Texture Classification Using Local Energy Histograms
A Ringing-Artifact Reduction Method for Block-DCT-Based Image Resizing
JAVA & .NET Titles
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
Data integrity proofs in cloud storage
Efficient Computing of Range Aggregates against Uncertain Location Based Collections
Exploring Application-Level Semantics for Data Compression
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
Monitoring Service Systems from a Language-Action Perspective
One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
Data integrity proofs in cloud storage
Efficient Computing of Range Aggregates against Uncertain Location Based Collections
Exploring Application-Level Semantics for Data Compression
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
Monitoring Service Systems from a Language-Action Perspective
One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases
Optimal Service Pricing for a Cloud Cache
A Personalized Ontology Model for Web Information Gathering
A Branch-and-Bound Algorithm for Solving the Multiprocessor Scheduling Problem with Improved Lower Bounding Techniques
Design and Evaluation of a Proxy Cache for Peer-to-Peer Traffic
Robust Feature Selection for Microarray Data Based on Multicriterion Fusion
Image-Based Surface Matching Algorithm Oriented to Structural Biology
Iris matching using multi-dimensional artificial neural network
Real-time tracking using A* heuristic search and template updating
A Personalized Ontology Model for Web Information Gathering
A Branch-and-Bound Algorithm for Solving the Multiprocessor Scheduling Problem with Improved Lower Bounding Techniques
Design and Evaluation of a Proxy Cache for Peer-to-Peer Traffic
Robust Feature Selection for Microarray Data Based on Multicriterion Fusion
Image-Based Surface Matching Algorithm Oriented to Structural Biology
Iris matching using multi-dimensional artificial neural network
Real-time tracking using A* heuristic search and template updating
Integral image compression based on optical characteristic
A Variational Model for Histogram Transfer of Color Images
Nonlocal Mumford-Shah Regularizers for Color Image Restoration
A Majorize–Minimize Strategy for Subspace Optimization Applied to Image Restoration
A Variational Model for Segmentation of Overlapping Objects With Additive Intensity Value.
Image Segmentation Using Fuzzy Region Competition and Spatial/Frequency Information
H.264 video watermarking with secret image sharing
Rotation, scaling, and translation resilient watermarking for images
A Variational Model for Histogram Transfer of Color Images
Nonlocal Mumford-Shah Regularizers for Color Image Restoration
A Majorize–Minimize Strategy for Subspace Optimization Applied to Image Restoration
A Variational Model for Segmentation of Overlapping Objects With Additive Intensity Value.
Image Segmentation Using Fuzzy Region Competition and Spatial/Frequency Information
H.264 video watermarking with secret image sharing
Rotation, scaling, and translation resilient watermarking for images
Improvements on Twin Support Vector Machines
Feature Selection Using Probabilistic Prediction of Support Vector Regression
Energy-Efficient Protocol for Cooperative Networks
Parametric Methods for Anomaly Detection in Aggregate Traffic
Peering Equilibrium Multipath Routing: A Game Theory Framework for Internet Peering Settlements
Impact of File Arrivals and Departures on Buffer Sizing in Core Routers
Dynamic measurement-aware routing in practice
Measurement and diagnosis of address misconfigured P2P traffic
Feature Selection Using Probabilistic Prediction of Support Vector Regression
Energy-Efficient Protocol for Cooperative Networks
Parametric Methods for Anomaly Detection in Aggregate Traffic
Peering Equilibrium Multipath Routing: A Game Theory Framework for Internet Peering Settlements
Impact of File Arrivals and Departures on Buffer Sizing in Core Routers
Dynamic measurement-aware routing in practice
Measurement and diagnosis of address misconfigured P2P traffic
Packet traffic: a good data source for wireless sensor network modeling and anomaly detection
Experiences of Internet traffic monitoring with tstat
Network traffic monitoring, analysis and anomaly detection [Guest Editorial]
Scheduling Grid Tasks in Face of Uncertain Communication Demands
Improving Application Placement for Cluster-Based Web Applications
Efficient Network Modification to Improve QoS Stability at Failure
Spectral Models for Bitrate Measurement from Packet Sampled Traffic
Vulnerability Detection Systems: Think Cyborg, Not Robot
Experiences of Internet traffic monitoring with tstat
Network traffic monitoring, analysis and anomaly detection [Guest Editorial]
Scheduling Grid Tasks in Face of Uncertain Communication Demands
Improving Application Placement for Cluster-Based Web Applications
Efficient Network Modification to Improve QoS Stability at Failure
Spectral Models for Bitrate Measurement from Packet Sampled Traffic
Vulnerability Detection Systems: Think Cyborg, Not Robot
Dynamic QoS Management and Optimization in Service-Based Systems
Seeking Quality of Web Service Composition in a Semantic Dimension
Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments
Locally Consistent Concept Factorization for Document Clustering
Knowledge Discovery in Services (KDS): Aggregating Software Services to Discover Enterprise Mashups
Design and Implementation of an Intrusion Response System for Relational Databases
Automatic Discovery of Personal Name Aliases from the Web
Seeking Quality of Web Service Composition in a Semantic Dimension
Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments
Locally Consistent Concept Factorization for Document Clustering
Knowledge Discovery in Services (KDS): Aggregating Software Services to Discover Enterprise Mashups
Design and Implementation of an Intrusion Response System for Relational Databases
Automatic Discovery of Personal Name Aliases from the Web
Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints