Professional Documents
Culture Documents
micansinfotech
11. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
12. An Empirical Performance Evaluation of Relational Keyword Search Systems
13. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark
Scheme
14. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
15. Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
16. Demand Bidding Program and Its Application in Hotel Energy Management
17. Dynamic Query Forms for Database Queries
18. Exploiting Service Similarity for Privacy in Location-Based Search Queries
19. Facilitating Document Annotation Using Content and Querying Value
20. Fast Nearest Neighbor Search with Keywords
21. Governing Software Process Improvements in Globally Distributed Product
Development
22. Incremental Detection of Inconsistencies in Distributed Data
23. Keyword Query Routing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
24. LARS: An Efficient and Scalable Location-Aware Recommender System
25. m-Privacy for Collaborative Data Publishing
26. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous
Devices
27. Preserving Location Privacy in Geosocial Applications
28. Secure kNN Query Processing in Untrusted Cloud Environments
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM
micansinfotech
micansinfotech
CLOUD COMPUTING
1. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
2. A Mechanism Design Approach to Resource Procurement in Cloud Computing
3. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in
Delay-Tolerant Networks
4. A Scientometric Analysis of Cloud Computing Literature
5. A secure data self-destructing scheme in cloud computing
6. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social
Networks
7. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis
8. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over
Encrypted Cloud Data Supporting Synonym Query
9. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
10. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks
11. Automatic Scaling of Internet Applications for Cloud Computing Services
12. Behavioral Malware Detection in Delay Tolerant Networks
13. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
14. Consistency as a Service Auditing Cloud Consistency
15. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
16. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error
Clustering and Random Permutation
17. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM
micansinfotech
18. Dynamic Authentication with Sensory Information for the Access Control Systems
19. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory
and Implementation
20. Enabling P2P One-View Multiparty Video Conferencing
21. Exploiting Rateless Codes in Cloud Storage Systems
22. Fuzzy Authorization for Cloud Storage
23. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
24. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
25. On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme
in
Multicloud Storage
26. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
27. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
28. Planning vs. dynamic control Resource allocation in corporate clouds
29. Privacy Preserving Back-Propagation Neural Network Learning Made Practical with
Cloud Computing
30. Privacy Preserving Delegated Access Control in Public Clouds
31. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
32. Secure kNN Query Processing in Untrusted Cloud Environments
33. Securing the cloud storage audit service: defending against frame and collude attacks of
third party auditor
34. Strategy-proof Pricing for Cloud Service Composition
IMAGE PROCESSING MULTIMEDIA
micansinfotech
micansinfotech
micansinfotech
JAVA
MOBILE COMPUTING - WIRELESS COMMUNICATION
14. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
15. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
16. Preserving Location Privacy in Geo-Social Applications
17. Efficient Authentication for Mobile and Pervasive Computing
18. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
19. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental
Study
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM
micansinfotech
micansinfotech
36. Determining Process Model Precision and Generalization with Weighted Articial
Negative Events
37. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
38. Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
39. Efcient Prediction of Difcult Keyword Queries over Databases
40. Efficient Ranking on Entity Graphs with Personalized Relationships
41. Facilitating Document Annotation using Content and Querying Value
42. Fast Nearest Neighbor Search with Keywords
43. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
44. Incremental Affinity Propagation Clustering Based on Message Passing
45. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
46. Interpreting the Public Sentiment Variations
47. Keyword Query Routing
48. Malware Propagation in Large-Scale Networks
49. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
50. On Skyline Groups
51. On the use of Side Information for Mining Text Data
52. Online Feature Selection and Its Applications
53. Personalized Recommendation Combining User Interest and Social Circle
54. Privacy Preserving and Content Protecting Location based Queries
55. Privacy-Preserving Enhanced Collaborative Tagging
56. Secure kNN Query Processing in Untrusted Cloud Environments
57. Secure Outsourced Attribute-Based Signatures
58. Security Evaluation of Pattern Classifiers under Attack
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM
micansinfotech
59. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
60. Supporting Privacy Protection in Personalized Web Search
61. Task Trail: An Effective Segmentation of User Search Behavior
62. Towards Differential Quer y Ser vices in Cost-Efficient Clouds
63. Towards Online Shortest Path Computation
64. XSPath Navigation on XML Schemas Made Easy
micansinfotech
micansinfotech
CLOUD COMPUTING
1. A Hybrid Cloud Approach for Secure Authorized Deduplication
2. A Novel Model for Competition and Cooperation Among Cloud Providers
3. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe
Systems
4. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization
Using MapReduce on Cloud
5. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
6. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of
Personal Storage
7. Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
8. CLOUDQUAL: A Quality Model for Cloud Services
9. Decentralized Access Control with Anonymous Authentication of Data Stored in
Clouds
10. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
11. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage
12. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
13. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
14. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
micansinfotech
15. Performance and cost evaluation of an adaptive encryption architecture for cloud
databases
16. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
17. Scalable architecture for multi-user encrypted SQL operations on cloud database
services
18. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
19. Secure kNN Query Processing in Untrusted Cloud Environments
20. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud
Computing
21. Towards Differential Query Services in Cost-Efficient Clouds
IMAGE PROCESSING MULTIMEDIA
22. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI
Problems
23. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View
Images
24. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
NETWORKING
1. A Cloud Enviroment for Backup and Data Storage
2. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding
Cryptographic Scheme and Evaluating Its Performance
3. Automatic Test Packet Generation
4. Boundary Cutting for Packet Classification
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM
micansinfotech
micansinfotech
micansinfotech