You are on page 1of 23

VDOT SOFTWARE SOLUTION

JAVA-DATA MINING
VDDM01 VDDM02 VDDM03 VDDM04 VDDM05 VDDM06 VDDM07 VDDM08 VDDM09 A Framework for Similarity Search of Time Series Cliques with Natural Relations A Genetic Programming Approach to Record Deduplication A Probabilistic Scheme for Keyword-Based Incremental Query Construction A Unified Probabilistic Framework for Name Disambiguation in Digital Library Anomaly Detection for Discrete Sequences A Survey Annimos An LP-Based Approach for Anonymizing Weighted Social Network Graphs Answering General Time-Sensitive Queries Clustering with Multiviewpoint-Based Similarity Measure Cluster-Oriented Ensemble Classifier Impact of Multicluster Characterization on Ensemble Classifier Learning Design and Application of a Generic Clinical Decision Support System for Multiscale Data Effective Pattern Discovery for Text Mining Efficient Fuzzy Type-Ahead Search in XML Data Efficiently Indexing Large Sparse Graphs for Similarity Search Feature Selection Based on Class-Dependent Densities for HighDimensional Binary Data Feedback Matching Framework for Semantic Interoperability of Product Data Fractal-Based Intrinsic Dimension Estimation and Its Application in Dimensionality Reduction Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

VDDM10 VDDM11 VDDM12 VDDM13 VDDM14

VDDM15 VDDM16

VDDM17

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA-DATA MINING
VDDM18 VDDM19 VDDM20 VDDM21 VDDM22 VDDM23 VDDM24 Improving Aggregate Recommendation Diversity Using RankingBased Techniques Learning Bregman Distance Functions for Semi-Supervised Clustering Low-Rank Kernel Matrix Factorization for Large-Scale Evolutionary Clustering Mining Online Reviews for Predicting Sales Performance A Case Study in the Movie Domain Mining Web Graphs for Recommendations On Group Nearest Group Query Processing On the Complexity of View Update Analysis and Its Application to Annotation Propagation Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching Practical Efficient String Mining Privacy Preserving Decision Tree Learning Using Unrealized Data Sets Publishing Search LogsA Comparative Study of Privacy Guarantees Ranking Model Adaptation for Domain-Specific Search Resilient Identity Crime Detection Scalable Learning of Collective Behavior Slicing A New Approach for Privacy Preserving Data Publishing Topic Mining over Asynchronous Text Sequences Towards a Formal Specification Framework for Manufacturing Execution Systems TSCAN A Content Anatomy Approach to Temporal Topic Summarization

VDDM25 VDDM26

VDDM27 VDDM28 VDDM29 VDDM30 VDDM31 VDDM32 VDDM33 VDDM34

VDDM35

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION


Using Rule Ontology in Repeated Rule Acquisition from Similar Web Sites Visual Role Mining A Picture Is Worth a Thousand Roles

VDDM36 VDDM37

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA-MOBILE COMPUTING
VDMC01 VDMC02 A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access Acknowledgment-Based Broadcast Protocol for Reliable and Efficient Data Dissemination in Vehicular Ad Hoc Networks Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services Converge Cast On the Capacity and Delay Tradeoffs Cooperative Download in Vehicular Environments Design and Analysis of the Gateway Relocation and Admission Control Algorithm in Mobile WiMAX Networks Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks Distributed Throughput Maximization in Wireless Networks via Random Power Allocation Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks Efficient Virtual Backbone Construction with Routing Cost Constraint in Wireless Networks Using Directional Antennas Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols Estimating Parameters of Multiple Heterogeneous Target Objects Using Composite Sensor Nodes Fast CaptureRecapture Approach for Mitigating the Problem of Missing RFID Tags Fast Data Collection in Tree-Based Wireless Sensor Networks Fault Localization Using Passive End-to-End Measurements and Sequential Testing for Wireless Sensor Networks

VDMC03

VDMC04 VDMC05 VDMC06 VDMC07

VDMC08

VDMC09 VDMC10 VDMC11

VDMC12 VDMC13

VDMC14 VDMC15 VDMC16

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

Office: 0413-2342214, 9994232214, 8883708115. Email: info@pits.co.in www.pits.co.in

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA-MOBILE COMPUTING
VDMC17 FESCIM Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks Geometry and Motion-Based Positioning Algorithms for Mobile Tracking in NLOS Environments Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Heuristic Burst Construction Algorithm for Improving Downlink Capacity in IEEE 802.16 OFDMA Systems Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Jointly Optimal Source-Flow, Transmit-Power, and Sending-Rate Control for MaximumThroughput Delivery of VBR Traffic over Faded Links Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design Local Greedy Approximation for Scheduling in Multihop Wireless Networks Measurement-Based Bandwidth Scavenging in Wireless Networks Mobile Ad Hoc Nanonetworks with Collision-Based Molecular Communication Mobile Data Offloading through Opportunistic Communications and Social Participation Moderated Group Authoring System for Campus-Wide Workgroups Network Connectivity with a Family of Group Mobility Models OMAN A Mobile Ad Hoc Network Design System On the Cost of Knowledge of Mobility in Dynamic Networks An Information-Theoretic Approach Principal Component Localization in Indoor WLAN Environments Radio Resource Management of Composite Wireless Networks Predictive and Reactive Approaches

VDMC18

VDMC19 VDMC20

VDMC21 VDMC22

VDMC23 VDMC24 VDMC25 VDMC26 VDMC27 VDMC28 VDMC29 VDMC30

VDMC31 VDMC32 VDMC33

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION


Robust Relative Location Estimation in Wireless Sensor Networks with Inexact Position Problems Robust Topology Engineering in Multiradio Multichannel Wireless Networks SenseLess A Database-Driven White Spaces Network Smooth Trade-Offs between Throughput and Delay in Mobile Ad Hoc Networks Spectrum-Aware Mobility Management in Cognitive Radio Cellular Networks Stateless Multicast Protocol for Ad Hoc Networks Understanding the Interaction between Packet Forwarding and Channel Access in Multihop Wireless Networks Target Tracking in Wireless Sensor Networks Based on the Combination of KF and MLE Using Distance Measurements

VDMC34

VDMC35 VDMC36 VDMC37 VDMC38 VDMC39 VDMC40

VDMC41

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA-NETWORK SECURITY
VDNS01 VDNS02 VDNS03 VDNS04 VDNS05 VDNS06 VDNS07 VDNS08 VDNS09 VDNS10 VDNS11 VDNS12 VDNS13 A Flexible Approach to Improving System Reliability with Virtual Lockstep A Learning-Based Approach to Reactive Security Automated Security Test Generation with Formal Threat Models Automatic Reconfiguration for Large-Scale Reliable Storage Systems Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs Detecting Anomalous Insiders in Collaborative Information Systems DoubleGuard Detecting Intrusions in Multitier Web Applications Dynamic Security Risk Management Using Bayesian Attack Graphs Enhanced Privacy ID A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities Ensuring Distributed Accountability for Data Sharing in the Cloud Give2Get Forwarding in Social Mobile Wireless Networks of Selfish Individuals JS-Reduce Defending Your Data from Sequential Background Knowledge Attacks Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts On the Security and Efficiency of Content Distribution via Network Coding On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks Packet-Hiding Methods for Preventing Selective Jamming Attacks pCloud A Distributed System for Practical PIR

VDNS14 VDNS15 VDNS16 VDNS17

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA-NETWORK SECURITY
VDNS18 SecuredTrust A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting Survivability Experiment and Attack Characterization for RFID Persuasive Cued Click-Points Design, Implementation, and Evaluation of a KnowledgeBased Authentication Mechanism Resilient Authenticated Execution of Critical Applications in Untrusted Environments

VDNS19 VDNS20 VDNS21

VDNS22

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA-NETWORKING
VDNW01 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Analyzing the Performance of Greedy Maximal Scheduling via Local Pooling and Graph Theory Bit Weaving A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs Cooperative Profit Sharing in Coalition-Based Resource Allocation in Wireless Networks Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks CSMACN Carrier Sense Multiple Access With Collision Notification Dynamic Power Allocation Under Arbitrary Varying ChannelsAn Online Approach Economic Issues in Shared Infrastructures Exploiting Excess Capacity to Improve Robustness of WDM Mesh Networks Fast Dynamic Multiple-Set Membership Testing Using Combinatorial Bloom Filters Improving Energy Saving and Reliability in Wireless Sensor Networks Using a Simple CRTBased Packet-Forwarding Solution Latency Equalization as a New Network Service Primitive Minimizing ISP Network Energy Cost Formulation and Solutions On New Approaches of Assessing Network Vulnerability Hardness and Approximation

VDNW02 VDNW03 VDNW04

VDNW05 VDNW06 VDNW07 VDNW08 VDNW09 VDNW10 VDNW11

VDNW12 VDNW13 VDNW14 VDNW15 VDNW16

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

VDNW17

Opportunistic Flow-Level Latency Estimation Using Consistent NetFlow

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA-NETWORKING
VDNW18 VDNW19 VDNW20 VDNW21 Optimal Source-Based Filtering of Malicious Traffic Quantifying Video-QoE Degradations of Internet Links Order Matters Transmission Reordering in Wireless Networks Static Routing and Wavelength Assignment for Multicast Advance Reservation in AllOptical Wavelength-Routed WDM Networks System-Level Optimization in Wireless Networks Managing Interference and Uncertainty via Robust Optimization The Case for Feed-Forward Clock Synchronization

VDNW22 VDNW23

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA- PARALLEL AND DISTRIBUTED


VDPD01 VDPD02 VDPD03 A Correlated Resource Model of Internet End Hosts A Game-Theoretic Approach to the Formation of Clustered Overlay Networks A Novel Parallel Scan for Multicore Processors and Its Application in Sparse Matrix-Vector Multiplication A Rendezvous-Based Approach Enabling Energy-Efficient Sensory Data Collection with Mobile Sinks A Survey and Evaluation of Topology-Agnostic Deterministic Routing Algorithms A Systematic Approach toward Automated Performance Analysis and Tuning A Two-Dimensional Low-Diameter Scalable On-Chip Network for Interconnecting Thousands of Cores Adaptive Approximate Data Collection for Wireless Sensor Networks Aho-Corasick String Matching on Shared and Distributed-Memory Parallel Architectures An Efficient Approach for Mobile Asset Tracking Using Contexts An Intelligent Task Allocation Scheme for Multihop Wireless Networks An Online Data Access Prediction and Optimization Approach for Distributed Systems Analysis of Impact of TXOP Allocation on IEEE 802.11e EDCA under Variable Network Load Asymmetric Event-Driven Node Localization in Wireless Sensor Networks Balancing Performance and Cost in CMP Interconnection Networks BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks BloomCast Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks

VDPD04

VDPD05 VDPD06 VDPD07

VDPD08 VDPD09 VDPD10 VDPD11

VDPD12 VDPD13

VDPD14 VDPD15

VDPD16

VDPD17

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION


VDPD18 Capacity of Data Collection in Arbitrary Wireless Sensor Networks

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA- PARALLEL AND DISTRIBUTED


VDPD19 VDPD20 VDPD21 VDPD22 VDPD23 VDPD24 VDPD25 CCD A Distributed PublishSubscribe Framework for Rich Content Formats Codesign of NoC and Cache Organization for Reducing Access Latency in Chip Multiprocessors Comparison-Based System-Level Fault Diagnosis A Neural Network Approach Coverage and Connectivity in Duty-Cycled Wireless Sensor Networks for Event Monitoring Cut Detection in Wireless Sensor Networks DDC A Novel Scheme to Directly Decode the Collisions in UHF RFID Systems Detecting Concurrency Bugs from the Perspectives of Synchronization Intentions Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient Distributed Throughput Optimization for ZigBee Cluster-Tree Networks Dynamic Fractional Resource Scheduling versus Batch Scheduling EasyPDP An Efficient Parallel Dynamic Programming Runtime System for Computational Biology Efficient MasterWorker Parallel Discrete Event Simulation on Metacomputing Systems Embedding Cycles and Paths in Product Networks and Their Applications to Multiprocessor Systems Energy-Efficient Scheduling of Periodic Real-Time Tasks on Lightly Loaded Multicore Processors

VDPD26 VDPD27 VDPD28 VDPD29

VDPD30 VDPD31

VDPD32

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA- PARALLEL AND DISTRIBUTED


VDPD33 Exploiting Event-Level Parallelism for Parallel Network Simulation on Multicore Systems Extrema Propagation Fast Distributed Estimation of Sums and Network Sizes Fingerprinting Mobile User Positions in Sensor Networks Attacks and Countermeasures GPU Acceleration of Runge-Kutta Integrators High-Performance Energy-Efficient Multicore Embedded Computing Implementing a Regular Register in an Eventually Synchronous Distributed System Prone to Continuous Churn Interactivity-Constrained Server Provisioning in Large-Scale Distributed Virtual Environments Link-Stability and Energy Aware Routing Protocol in Distributed Wireless Networks

VDPD34 VDPD35 VDPD36 VDPD37

VDPD38

VDPD39 VDPD40 VDPD41

VDPD42

VDPD43 VDPD44 VDPD45 VDPD46

DOT NET- PARALLEL DISTRIBUTION Mesh Decomposition for Efficient Parallel Computing of Electrical Machines by Means of FEM Accounting for Motion Modeling and Analysis of Communication Networks in Multicluster Systems under SpatioTemporal Bursty Traffic On Coverage of Wireless Sensor Networks for Rolling Terrains On Optimizing Overlay Topologies for Search in Unstructured Peer-toPeer Networks Online Scheduling of Dynamic Task Graphs with Communication and Contention for Multiprocessors Optimal Construction of All Shortest Node-Disjoint Paths in Hypercubes with Applications Optimizing Techniques for Parallel Digital Logic Simulation Performance Analysis of Cloud Computing Centers Using MGmm+r Queuing Systems

VDPD47 VDPD48 VDPD49

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION


Quantifying Intrinsic Parallelism Using Linear Algebra for AlgorithmArchitecture Coexploration RCSMA Receiver-Based Carrier Sense Multiple Access in UHF RFID Systems Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Self-Protection in a Clustered Distributed System Sequence Homology Search Using Fine Grained Cycle Sharing of Idle GPUs SHIP A Scalable Hierarchical Power Control Architecture for LargeScale Data Centers Stability Analysis of Reservation-Based Scheduling Policies in Wireless Networks The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks User-Level Implementations of Read-Copy Update

VDPD50 VDPD51 VDPD52 VDPD53 VDPD54 VDPD55 VDPD56 VDPD57 VDPD58 VDPD59

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA- IMAGE PROCESSING


VDIM01 VDIM02 VDIM03 VDIM04 VDIM05 VDIM06 VDIM07 VDIM08 A Discriminative Model of Motion and Cross Ratio for ViewInvariant Action Recognition A General Fast Registration Framework by Learning Deformation Appearance Correlation A Geometric Construction of Multivariate Sinc Functions A Novel Algorithm for View and Illumination Invariant Image Matching A Spectral and Spatial Measure of Local Perceived Sharpness in Natural Images A Unified Feature and Instance Selection Framework Using Optimum Experimental Design Adaptive Distributed Source Coding An Algorithm for the Contextual Adaption of SURF Octave Selection With Good Matching Performance Best Octaves An Efficient Camera Calibration Technique Offering Robustness and Accuracy Over a Wide Range of Lens Distortion Bayesian Estimation for Optimized Structured Illumination Microscopy Binarization of Low-Quality Barcode Images Captured by Mobile Phones Using Local Window of Adaptive Location and Size B-Spline Explicit Active Surfaces An Efficient Framework for RealTime 3-D Region-Based Segmentation Change Detection in Synthetic Aperture Radar Images based on Image Fusion and Fuzzy Clustering Color Constancy for Multiple Light Sources Coupled BiasVariance Tradeoff for Cross-Pose Face Recognition Depth From Motion and Optical Blur With an Unscented Kalman Filter Design of Almost Symmetric Orthogonal Wavelet Filter Bank Via Direct Optimization Design of Interpolation Functions for Subpixel-Accuracy StereoVision Systems

VDIM09

VDIM10

VDIM11

VDIM12

VDIM13 VDIM14 VDIM15

VDIM16 VDIM17

VDIM18

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA- IMAGE PROCESSING


VDIM19 Entropy-Functional-Based Online Adaptive Decision Fusion Framework With Application to Wildfire Detection in Video Fast Semantic Diffusion for Large-Scale Context-Based Image and Video Annotation Smile Detection by Boosting Pixel Differences Gradient-Based Image Recovery Methods From Incomplete Fourier Measurements Groupwise Registration of Multimodal Images by an Efficient Joint Entropy Minimization Scheme Higher Degree Total Variation (HDTV) Regularization for Image Recovery Human Identification Using Finger Images Image Fusion Using Higher Order Singular Value Decomposition Image Segmentation Based on the Poincar Map Method Implicit Polynomial Representation Through a Fast Fitting Error Estimation Integrating Segmentation Information for Improved MRF-Based Elastic Image Registration Iterative Narrowband-Based Graph Cuts Optimization for Geodesic Active Contours With Region Forces (GACWRF) Medical Image Segmentation by Combining Graph Cuts and Oriented Active Appearance Models Monotonic Regression A New Way for Correlating Subjective and Objective Ratings in Image Quality Research Multilinear Supervised Neighborhood Embedding of a Local Descriptor Tensor for SceneObject Recognition Nonlinear Approach for Enhancement of Image Focus Volume in Shape From Focus Outdoor Scene Image Segmentation Based on Background Recognition and Perceptual Organization PDE-Based Enhancement of Color Images in RGB Space

VDIM20 VDIM21 VDIM22 VDIM23

VDIM24 VDIM25 VDIM26 VDIM27 VDIM28

VDIM29 VDIM30

VDIM31

VDIM32

VDIM33

VDIM34

VDIM35 VDIM36

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION


Polyview Fusion A Strategy to Enhance Video-Denoising Algorithms Preconditioning for Edge-Preserving Image Super Resolution PSF Estimation via Gradient Domain Correlation Rigid-Motion-Invariant Classification of 3-D Textures Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization Snakes With an Ellipse-Reproducing Property

VDIM37 VDIM38 VDIM39 VDIM40 VDIM41 VDIM42

MAILTO :votmadurai@gmail.com

VDOT SOFTWARE SOLUTION

JAVA- CLOUD COMPUTING


VDCC01 VDCC02 VDCC03 VDCC04 VDCC05 VDCC06 VDCC07 VDCC08 VDCC09 VDCC10 VDCC11 VDCC12 VDCC13 VDCC14 Data Security and Privacy Protection Issues in Cloud Computing Stochastic models of load balancing and scheduling in cloud computing clusters A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack Resource allocation and scheduling in cloud computing Application study of online education platform based on cloud computing Towards temporal access control in cloud computing Privacy-Preserving DRM for Cloud Computing Pricing and peak aware scheduling algorithm for cloud computing Comparison of Network Intrusion Detection Systems in cloud computing environment Intelligent and Active Defense Strategy of Cloud Computing Distributed Shared Memory as an Approach for Integrating WSNs and Cloud Computing Improving resource allocation in multi-tier cloud systems Ensuring Distributed Accountability for Data Sharing in the Cloud Efficient information retrieval for ranked queries in cost-effective cloud environments

MAILTO :votmadurai@gmail.com

You might also like