The 10th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2012)
Serial Paper-ID Title  Authors E-mail Registration Payment
1 DASC-103  A Theoretical Model: Using Logistic Regression for Malware Signature based Detection  Kelly Hughes, Yanzhen Qu  yqu@coloradotech.edu S Y
2 DASC-104 Robust Architecture for Distributed Intelligence in an IP-based Mobile Wide-Area Surveillance System Mikko Nieminen, Nikolay Tcholtchev mikko.nieminen@vtt.fi Y Y
3 DASC-106 Ensemble model for CPU load prediction Jiwen Fu, Jian Cao kevin_fjw@sjtu.edu.cn S Y
4 DASC-111 Online Performance Anomaly Prediction in Cloud Environment Yi Qiu, Jian Cao cindyqy@gmail.com S Y
5 DASC-113 Nonlinear SVMs for Identifying Faults Using the Symmetric Comparison-Based Diagnosis Model Mourad Elhadef mourad.elhadef@adu.ac.ae     
6 DASC-115 NACS: A Framework for Network Aware Cloud Computing  Sheheryar Malik  sheheryar.malik@inria.fr     
7 DASC-122 Comparing Redundancy Models for High Availability Middleware  Ali Kanso, Maria Toeroe, Ferhat Khendek  al_kan@ece.concordia.ca  Y Y
8 DASC-123 A Hybrid Authentication Protocol based on Signcryption for VANET  Yiliang Han  yilianghan@hotmail.com     
9 DASC-128 Unknown Intrusion Detection with Fuzzy Genetic Algorithm  Pawita Jongsuebsook, Naruemon Wattanapongsakorn  naruemon@cpe.kmutt.ac.th     
10 DASC-131 Generalized Integer Transform Based Audio Reversible Watermarking Algorithm Ka-Cheng Choi, Chi-Man Pun  cmpun@umac.mo  Y Y
11 DASC-132 Dynamic Encryption Key Design and Management for Memory Data Encryption in Embedded Systems  Mei Hong, Hui Guo  huig@cse.unsw.edu.au Y Y
12 DASC-137 Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes  Jyh-haw Yeh jhyeh@boisestate.edu Y Y
Total            
B: Paid by bank transfer, haven't received the payment yet. 
S: Student registration, Y: confirmed