You are on page 1of 7

SL

NO
Title Tech Domain
1 Privacy-Preserving Public Auditing for Secure Cloud
Storage
JAVA Cloud
Computing
2 Winds of Change from Vendor Lock-In to the Meta
Cloud
JAVA Cloud
Computing
3 AMES-Cloud: A Framework of Adaptive Mobile Video
Streaming and Efficient Social Video Sharing in the
Clouds
JAVA Cloud
Computing
4 Attribute-based Access to Scalable Media in Cloud-
assisted Content Sharing Networks
DOTNET Cloud
Computing
5 Privacy-Preserving Public Auditing for Secure Cloud
Storage
DOTNET Cloud
Computing
6 Scalable and Secure Sharing of Personal Health
Records in Cloud Computing Using Attribute-Based
Encryption
DOTNET Cloud
Computing
7 A Load Balancing Model Based on Cloud Partitioning
for the Public Cloud
JAVA Cloud
Computing
8 Cloud computing for mobile users can offloading
compution save energy
JAVA Cloud
Computing
9 Enabling Dynamic Data and Indirect Mutual Trust for
Cloud Computing Storage Systems
DOTNET Cloud
Computing
10 A Privacy Leakage Upper Bound Constraint-Based
Approach for Cost-Effective Privacy Preserving of
Intermediate Data Sets in Cloud
DOTNET Cloud
Computing
11 Mona: Secure Multi-Owner Data Sharing for Dynamic
Groups in the Cloud
DOTNET Cloud
Computing
12 Toward Fine-Grained, Unsupervised, Scalable
Performance Diagnosis for Production Cloud
Computing Systems
DOTNET Cloud
Computing
13 Towards Secure Multi-Keyword Top-k Retrieval over
Encrypted Cloud Data
DOTNET Cloud
Computing
14 An Adaptive Cloud Downloading Service DOTNET Cloud
Computing
15 Load Rebalancing for Distributed File Systems in
Clouds
JAVA Cloud
Computing
16 Dynamic Audit Services for Outsourced Storages in
Clouds
DOTNET Cloud
Computing
17 Scalable and Secure Sharing of Personal Health
Records in Cloud Computing Using Attribute-Based
Encryption
JAVA Cloud
Computing
18 Mona: Secure Multi-Owner Data Sharing for Dynamic JAVA Cloud


Groups in the Cloud Computing
19 PACK: Prediction-Based Cloud Bandwidth and Cost
Reduction System
JAVA Cloud
Computing
20 Scalable Face Image Retrieval using Attribute-
Enhanced Sparse Codewords
JAVA IMAGE
PROCESSING
21 Local Directional Number Pattern for Face Analysis
Face and Expression Recognition
DOTNET IMAGE
PROCESSING
22 Reversible Data Hiding With Optimal Value Transfer DOTNET IMAGE
PROCESSING
23 Super-Resolution-based Inpainting JAVA IMAGE
PROCESSING
24 Reversible Watermarking Based on Invariant Image
Classification and Dynamic Histogram Shifting
DOTNET IMAGE
PROCESSING
25 A Fast Re-Route Method JAVA Journal
26 A Fast Clustering-Based Feature Subset Selection
Algorithm for High Dimensional Data
JAVA Knowledge &
Data
Engineering
(DATA
MINING)
27 CloudMoV: Cloud-based Mobile Social TV JAVA Knowledge &
Data
Engineering
(DATA
MINING)
28 Crowd sourcing Predictors of Behavioral Outcomes. JAVA Knowledge &
Data
Engineering
(DATA
MINING)
29 Spatial Approximate String Search JAVA Knowledge &
Data
Engineering
(DATA
MINING)
30 Incentive Compatible Privacy-Preserving Data Analysis JAVA Knowledge &
Data
Engineering
(DATA
MINING)
31 Focus Learning to Crawl Web Forums JAVA Knowledge &
Data
Engineering
(DATA
MINING)


32 Robust Module Based Data Management JAVA Knowledge &
Data
Engineering
(DATA
MINING)
33 Comparable Entity Mining from Comparative
Questions
JAVA Knowledge &
Data
Engineering
(DATA
MINING)
34 Facilitating Effective User Navigation through Website
Structure Improvement
JAVA Knowledge &
Data
Engineering
(DATA
MINING)
35 PMSE: A Personalized Mobile Search Engine JAVA Knowledge &
Data
Engineering
(DATA
MINING)
36 A System to Filter Unwanted Messages from OSN User
Walls
JAVA Knowledge &
Data
Engineering
(DATA
MINING)
37 Protecting Sensitive Labels in Social Network Data
Anonymization
JAVA Knowledge &
Data
Engineering
(DATA
MINING)
38 Mining Order-Preserving Sub matrices from Data with
Repeated Measurements
DOTNET Knowledge &
Data
Engineering
(DATA
MINING)
39 Secure Mining of Association Rules in Horizontally
Distributed Databases
DOTNET Knowledge &
Data
Engineering
(DATA
MINING)
40 A Generalized Flow-Based Method for Analysis of
Implicit Relationships on Wikipedia
JAVA Knowledge &
Data
Engineering
(DATA


MINING)
41 A Survey of XML Tree Patterns DOTNET Knowledge &
Data
Engineering
(DATA
MINING)
42 Dynamic Personalized Recommendation on Sparse
Data
DOTNET Knowledge &
Data
Engineering
(DATA
MINING)
43 A Probabilistic Approach to String Transformation JAVA Knowledge &
Data
Engineering
(DATA
MINING)
44 Mining User Queries with Markov Chains: Application
to Online Image Retrieval
DOTNET knowledge &
Data
Engineering
(DATA
MINING)
45 Annotating Search Results from Web Databases JAVA Knowledge &
Data
Engineering
(DATA
MINING)
46 Tweet Analysis for Real-Time Event Detection and
Earthquake Reporting System Development
JAVA Knowledge &
Data
Engineering
(DATA
MINING)
47 A New Algorithm for Inferring User Search Goals with
Feedback Sessions
JAVA Knowledge &
Data
Engineering
(DATA
MINING)
48 m-Privacy for Collaborative Data Publishing JAVA Knowledge &
Data
Engineering
(DATA
MINING)
49 Facilitating Document Annotation Using Content And
Querying Value
JAVA Knowledge &
Data
Engineering


(DATA
MINING)
50 Mobile Relay Configuration in Data-intensive Wireless
Sensor Networks
JAVA Mobile
Computing
51 Vampire attacks: Draining life from wireless ad-hoc
sensor networks
JAVA Mobile
Computing
52 A Scalable Server Architecture for Mobile Presence
Services in Social Network Applications
JAVA Mobile
Computing
53 Privacy-Preserving Distributed Profile Matching in
Proximity-based Mobile Social Networks
JAVA Mobile
Computing
54 Distributed Cooperative Caching in Social Wireless
Networks
JAVA Mobile
Computing
55 EMAP: Expedite Message Authentication Protocol for
Vehicular Ad Hoc Networks
DOTNET Mobile
Computing
56 On Quality of Monitoring for Multi-channel Wireless
Infrastructure Networks
DOTNET Mobile
Computing
57 Optimal Multicast Capacity and Delay Tradeoffs in
MANETs
DOTNET Mobile
Computing
58 Adaptive Position Update for Geographic Routing in
Mobile Ad Hoc Networks
DOTNET Mobile
Computing
59 Optimal Content Downloading in Vehicular Networks DOTNET Mobile
Computing
60 DCIM: Distributed Cache Invalidation Method for
Maintaining Cache Consistency in Wireless Mobile
Networks
JAVA Mobile
Computing
61 Optimizing Cloud Resources for Delivering IPTV
Services through Virtualization
JAVA Networking
62 Access Policy Consolidation for Event Processing
Systems
JAVA Networking
63 Fully Anonymous Profile Matching in Mobile Social
Networks
JAVA Networking
64 The Target Tracking in Mobile Sensor Networks. DOTNET Networking
65 Redundancy Management of Multipath Routing for
Intrusion Tolerance in Heterogeneous Wireless Sensor
Networks
DOTNET Networking
66 Resource Allocation for QoS Support in Wireless Mesh
Networks
DOTNET Networking
67 Back-Pressure-Based Packet-by-Packet Adaptive
Routing in Communication Networks
JAVA Networking
68 SinkTrail: A Proactive Data Reporting Protocol for
Wireless Sensor Networks
JAVA Networking
69 Localization of Wireless Sensor Networks in the Wild:
Pursuit of Ranging Quality
DOTNET Networking


70 Dynamic Control of Coding for Progressive Packet
Arrivals in DTNs
JAVA Networking
71 Transfer Reliability and Congestion Control Strategies
in Opportunistic Networks A Survey
DOTNET Networking
72 Participatory Privacy Enabling Privacy in
Participatory Sensing
JAVA Networking
73 Dynamic Resource Allocation using Virtual Machines
for Cloud Computing Environment
JAVA Parallel and Di
stributed
Systems
74 Mobi-Sync: Efficient Time Synchronization for Mobile
Underwater Sensor Networks.
DOTNET Parallel and Di
stributed
Systems
75 SPOC: A Secure and Privacy-preserving Opportunistic
Computing Framework for Mobile-Healthcare
Emergency.
DOTNET Parallel and Di
stributed
Systems
76 A Secure Payment Scheme with Low Communication
and Processing Overhead for Multihop Wireless
Networks
DOTNET Parallel and Di
stributed
Systems
77 A Secure Protocol for Spontaneous Wireless Ad Hoc
Networks Creation
JAVA Parallel and Di
stributed
Systems
78 CAM: Cloud-Assisted Privacy Preserving Mobile
Health Monitoring.
JAVA Secured
Computing
79 Two tales of privacy in online social networks JAVA Secured
Computing
80 Extracting Spread-Spectrum Hidden Data from Digital
Media
JAVA Secured
Computing
81 Utility-Privacy Tradeoff in Databases An Information-
theoretic Approach
JAVA Secured
Computing
82 Privacy Preserving Data Sharing With Anonymous ID
Assignment.
DOTNET Secured
Computing
83 Enforcing Secure and Privacy-Preserving Information
Brokering in Distributed Information Sharing
DOTNET Secured
Computing
84 Reversible Data Hiding in Encrypted Images by
Reserving Room Before Encryption
DOTNET Secured
Computing
85 EAACKA Secure Intrusion-Detection System for
MANETs
DOTNET Secured
Computing
86 SORT: A Self-ORganizing Trust Model for Peer-to-
Peer Systems
DOTNET Secured
Computing
87 NICE: Network Intrusion Detection and
Countermeasure Selection in Virtual Network Systems
JAVA Secured
Computing
88 A Decentralized Service Discovery Approach on Peer-
to-Peer Networks
JAVA Secured
Computing


89 Identity-Based Secure Distributed Data Storage
Schemes
JAVA Secured
Computing
90 WARNINGBIRD: A Near Real-time Detection System
for Suspicious URLs in Twitter Stream
JAVA Secured
Computing

You might also like