Você está na página 1de 8

SL

NO
Title Tech Domain
1 Cloud Computing Security: From Single to Multi-Clouds JAVA Cloud
Computing
2 Cloud Data Protection for the Masses JAVA Cloud
Computing
3 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud
Storage
JAVA Cloud
Computing
4 Costing of Cloud Computing Services A Total Cost of Ownership Approach JAVA Cloud
Computing
5 Efficient audit service outsourcing for data integrity in clouds DOTNET Cloud
Computing
6 Fog Computing Mitigating Insider Data Theft Attacks in the Cloud JAVA Cloud
Computing
7 Gossip-based Resource Management for Cloud Environments JAVA Cloud
Computing
8 Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing DOTNET Cloud
Computing
9 Ensuring Distributed Accountability for Data Sharing in the Cloud JAVA Cloud
Computing
10 Reliable Re-Encryption In Unreliable Clouds JAVA Cloud
Computing
11 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using
Attribute-based Encryption
DOTNET Cloud
Computing
12 Preserving Integrity of Data and Public Auditing for Data Storage in Cloud
Computing
DOTNET Cloud
Computing
13 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud
Data
DOTNET Cloud
Computing
14 Towards Secure and Dependable Storage Services in Cloud Computing DOTNET Cloud
Computing
15 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor
Networks
DOTNET Image Proc
essing
16 DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING
ATTACKS BY USING PERSUASIVE CLICK POINTS
DOTNET Image Proc
essing
17 Exploring The Design Space Of Social Network-Based Sybil Defenses DOTNET Image Proc
essing
18 Separable Reversible Data Hiding in Encrypted Image DOTNET Image Proc
essing
19 Intent Search Capturing User Intention For One Click Internet Image Search DOTNET Image Proc
essing
20 Robust Face-Name Graph Matching for Movie Character Identify DOTNET Image Proc


essing
21 Robust Watermarking Of Compressed And Encrypted Jpeg2000 Images DOTNET Image Proc
essing
22 Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval DOTNET Image Proc
essing
23 User Aware Image Tag Refinement Via Ternary Semantic Analysis DOTNET Image Proc
essing
24 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc
Network
JAVA Internation
al
Conference
25 Association Rule -- Extracting Knowledge Using Market Basket Analysis DOTNET Internation
al
Conference
26 Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless
Sensor Networks
DOTNET Internation
al
Conference
27 Hiding Sensitive Association Rule For Privacy Preservation DOTNET Internation
al
Conference
28 Efficient load balancing and QoS-based location aware service discovery protocol for
vehicular ad hoc networks
DOTNET Internation
al
Conference
29 Movie Rating and Review Summarization in Mobile Environment JAVA Internation
al
Conference
30 Intrusion Detection System as a Service in Public Clouds JAVA Internation
al
Conference
31 DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage
Systems.
JAVA Internation
al
Conference
32 Detecting and Validating Sybil Groups in theWild DOTNET Internation
al
Conference
33 A Query Formulation Language for the data web DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
34 Advance Mining Of Temporal High Utility Itemset JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
35 An Exploration Of Improving Collaborative Recommender System Via User- Item
Subgroups
JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
36 Anamoly Detection For Discrete Sequences A Survey JAVA Knowledge
& Data
Engineerin


g (DATA
MINING)
37 Automatic Discovery of Association Orders between Name and Aliases JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)


38 Bridging Social and Data Networks DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
39 Confucius A Tool Supporting Collaborative Scientific Workflow Composition JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
40 Effective Pattern Discovery For Text Mining JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
41 Efficient and Accurate Discovery of Patterns in Sequence Data Sets DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
42 A Framework for Personal Mobile Commerce Pattern Mining and Prediction JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
43 Efficient Anonymous Message Submission JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
44 Efficient Computation of Range Aggregates against Uncertain Location Based
Queries
JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
45 Efficient Extended Boolean Retrieval JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)


46 Efficient Similarity Search Over Encrypted Data JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
47 Enabling Multilevel Trust In Privacy Preserving Data Mining JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
48 Fast and accurate annotation of short texts with wikipedia JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
49 Identifying Content for Planned Events Across Social Media Sites DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
50 Investigation And Analysis Is Of New Approach Of Intelligent Semantic Web Search
Engines
JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
51 Multiparty Access Control for Online Social Networks Model and Mechanisms JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
52 On the Spectral Characterization and Scalable Mining of Network Communities JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
53 Organizing User Search Histories JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
54 Outsourced Similarity Search on Metric Data Assets DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
55 Mining Web Graphs for Recommendations DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
56 Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering DOTNET Knowledge
& Data
Engineerin


g (DATA
MINING)
57 Joint Top-K Spatial Keyword Query Processing DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
58 Query Planning for Continuous Aggregation Queries over a Network of Data
Aggregators
DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
59 Ranking Model Adaptation for Domain-Specific Search JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
60 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
61 Altered Fingerprints: Analysis and Detection DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
62 Generative Models for Item Adoptions Using Social Correlation DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
63 Scalable Learning of Collective Behavior DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
64 Scalable Scheduling Of Updates In Streaming Data Warehouses DOTNET Knowledge
& Data
Engineerin
g (DATA
MINING)
65 Sequential Anomaly Detection In The Presence Of Noise And Limited Feedback JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
66 Slicing A New Approach to Privacy Preserving Data Publishing JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)


67 Statistical Entity Extraction from Web JAVA Knowledge
& Data
Engineerin
g (DATA
MINING)
68 Cooperative download in vehicular environments DOTNET Mobile
Computing
69 Hop-By-Hop Routing In Wireless Mesh Networks With Brndwidth Guarntees DOTNET Mobile
Computing
70 Fast Data Collection in Tree-Based Wireless Sensor Networks JAVA Mobile
Computing
71 Local Broadcast Algorithms In Wireless Ad Hoc Networks Reducing The Number
Of Transmissions
DOTNET Mobile
Computing
72 Network Assisted Mobile Computing with Optimal Uplink Query Processing DOTNET Mobile
Computing
73 Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper JAVA Mobile
Computing
74 Learn to Personalized Image Search from the Photo Sharing Websites JAVA Multimedia
75 Trust modeling in social tagging of multimedia content JAVA Multimedia
76 A New Cell-Counting-Based Attack Against Tor DOTNET Networking
77 An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System JAVA Networking
78 Game-Theoretic Pricing for Video Streaming in Mobile Networks JAVA Networking
79 Load Balancing Multipath Switching System with Flow Slice DOTNET Networking
80 Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks Theory and
Algorithms
DOTNET Networking
81 Assessing the Veracity of Identity Assertions via OSNs DOTNET Networking
82 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization JAVA Networking
83 Policy-by-Example for Online Social Networks JAVA Networking
84 Privacy- and Integrity-Preserving Range Queries in Sensor Networks JAVA Networking
85 Security Architecture for Cloud Networking JAVA Networking
86 View-invariant action recognition based on Artificial DOTNET Networking
87 Packet Loss Control Using Tokens at the Network Edge JAVA Networking
88 A Novel Antiphishing Framework Based On Visual Cryptography DOTNET Parallel and
Distributed
Systems
89 Balancing the Tradeoffs between Query Delay and Data Availability in MANETs DOTNET Parallel and
Distributed
Systems
90 BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering
Injected False Data in Wireless Sensor Networks
DOTNET Parallel and
Distributed
Systems
91 In Cloud, Can Scientific Communities Benefit from the Economies of Scale? DOTNET Parallel and
Distributed
Systems


92 Resource-Aware Application State Monitoring DOTNET Parallel and
Distributed
Systems
93 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for
Mobile-Healthcare Emergency
DOTNET Parallel and
Distributed
Systems
94 Automatic Reconfiguration for Large-Scale Reliable Storage Systems DOTNET Secured
Computing
95 Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs DOTNET Secured
Computing
96 A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group DOTNET Secured
Computing
97 Fade SecuTitle re Overlay Cloud Storage With File Assured Deletion JAVA Secured
Computing

98 Fast Matrix Embedding by Matrix Extending DOTNET Secured
Computin
g
99 Joint Relay and Jammer Selection for Secure Two-Way Relay Networks DOTNET Secured
Computin
g
100 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching DOTNET Secured
Computin
g
101 Recommendation Models for Open Authorization DOTNET Secured
Computin
g
102 Online Modeling of Proactive Moderation System for Auction Fraud Detection JAVA Secured
Computin
g
103 DoubleGuard: Detecting Intrusions In Multi-tier Web Applications JAVA Secured
Computin
g
104 Packet-Hiding Methods for Preventing Selective Jamming Attacks JAVA Secured
Computin
g
105 Persuasive Cued Click-Points Design, Implementation And Evaluation JAVA Secured
Computin
g
106 Remote Attestation With Domain -Based Integrity Model And Privacy Analysis JAVA Secured
Computin
g
107 Risk-Aware Mitigation for MANET Routing Attacks JAVA Secured
Computin
g
108 SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in
Multi-Agent Systems.
JAVA Secured
Computin
g
109 Expert Discovery and Interactions in Mixed Service-Oriented Systems DOTNET Service
Computin
g(SOA)


110 Query Access Assurance in Outsourced Databases DOTNET Service
Computin
g(SOA)
111 Dynamic Authentication for Cross-Realm SOA-Based Business Processes DOTNET Service
Computin
g(SOA)
112 PerLa a Language and Middleware Architecture JAVA Software
Engineerin
g
113 Measuring Code Quality to Improve Specification Mining DOTNET Software
Engineerin
g
114 AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing
Topologies
DOTNET Wireless
Communic
ations
115 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks JAVA Wireless
Communic
ations
116 Cooperative Data Dissemination via Roadside WLANs DOTNET Wireless
Communic
ations
117 Cut Detection in Wireless Sensor Networks JAVA Wireless
Communic
ations
118 Topology Control in Mobile Ad Hoc Networks with Cooperative Communications DOTNET Wireless
Communic
ations

Você também pode gostar