2014-2015 Dotnet Projects MOBILE COMPUTING - WIRELESS COMMUNICATION 1. Keylogging-resistant Visual Authentication Protocols SOFTWARE ENGINEERING 2. Governing Software Process Improvements in Globally Distributed Product Development KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) 3. Secure Mining of Association Rules in Hor izontally Distr ibuted Databases 4. Dynamic Query Forms for Database Queries 5. Secure kNN Query Processing in Untrusted Cloud Environments 6. Achieving Effective Cloud Search Services Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query 7. An Empirical Performance Evaluation of Relational Keyword Search Systems 8. Keyword Query Routing 9. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures 10. Demand Bidding Program and Its Application in Hotel Energy Management 11. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds 12. Incremental Detection of Inconsistencies in Distributed Data 13. A Cocktail Approach for Travel Package Recommendation 14. The Role of Hubness in Clustering High-Dimensional Data PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING 15. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems 16. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Project Titles 2014-2015 Dotnet Projects MOBILE COMPUTING - WIRELESS COMMUNICATION 1. Keylogging-resistant Visual Authentication Protocols SOFTWARE ENGINEERING 2. Governing Software Process Improvements in Globally Distributed Product Development KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) 3. Secure Mining of Association Rules in Hor izontally Distr ibuted Databases 4. Dynamic Query Forms for Database Queries 5. Secure kNN Query Processing in Untrusted Cloud Environments 6. Achieving Effective Cloud Search Services Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query 7. An Empirical Performance Evaluation of Relational Keyword Search Systems 8. Keyword Query Routing 9. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
2. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
3. Secure Mining of Association Rules in Hor izontally Distr ibuted Databases
4. Dynamic Query Forms for Database Queries
5. Secure kNN Query Processing in Untrusted Cloud Environments
6. Achieving Effective Cloud Search Services Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
7. An Empirical Performance Evaluation of Relational Keyword Search Systems
8. Keyword Query Routing
9. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
10. Demand Bidding Program and Its Application in Hotel Energy Management
11. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
12. Incremental Detection of Inconsistencies in Distributed Data
13. A Cocktail Approach for Travel Package Recommendation
14. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
15. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
16. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
17. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
18. Uniform Embedding for Efficient JPEG Steganography
19. Secure Deduplication with Efficient and Reliable Convergent Key Management
20. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
21. Link Quality Aware Code Dissemination in Wireless Sensor Networks
22. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
23. Privacy Preserving Delegated Access Control in Public Clouds
24. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks25. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query26. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
27. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
28. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
29. A Mechanism Design Approach to Resource Procurement in Cloud Computing
30. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
31. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
32. A Scientometric Analysis of Cloud Computing Literature
33. Consistency as a Service Auditing Cloud Consistency
SECURE COMPUTING
IMAGE PROCESSING - MULTIMEDIA
34. FeatureMatch: A General ANNF Estimation Technique and its Applications
35. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion36. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
37. As-Projective-As-Possible Image Stitching with Moving DLT
38. Sharing Visual Secrets in Single Image Random Dot Stereograms
39. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
40. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
41. A New Iterative Triclass Thresholding Technique in Image Segmentation
42. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?43. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
44. An Iranian License Plate Recognition System Based on Color Features
45. Learning Layouts for Single-Page Graphic Designs
46. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image47. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
48. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
49. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
50. Fingerprint Compression Based on Sparse Representation
51. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
52. LBP-Based Edge-Texture Features for Object Recoginition
53. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
54. Toward Experiential Mobile Media Processing
55. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
56. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
57. Designing Truthful Spectrum Double Auctions with Local Markets
58. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
59. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
60. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
61. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
62. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
63. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
64. Online Payment System using Steganography and Visual Cryptography
65. Efficient Instant-Fuzzy Search with Proximity Ranking
66. Attribute Based Encryption with Privacy Preserving In Clouds
67. A Secure Client Side Deduplication Scheme in Cloud Storage Environments
2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
143. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
144. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
145. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
146. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
147. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
148. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
149. The Target Tracking in Mobile Sensor Networks
150. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
151. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
152. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
153. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
154. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
155. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
156. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
157. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
158. SUSIE: Search Using Services and Information Extraction
159. SeDas: A Self-Destructing Data System Based on Active Storage Framework
160. Secure Mining of Association Rules in Horizontally Distributed Databases
161. Sampling Online Social Networks
162. Privacy Preserving Delegated Access Control in Public Clouds
163. Mining Order-Preserving Submatrices from Data with Repeated Measurements
164. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
165. Ginix : Generalized Inverted Index for Keyword Search
166. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department167. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
168. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
169. Dynamic Query Forms for Database Queries
170. Cost-Based Optimization of Service Compositions
171. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
172. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
173. Automatic Extraction of Top-k Lists from the Web
174. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
175. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
176. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data177. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
178. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
179. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
180. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
181. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
182. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
183. Privacy Preserving Data Sharing With Anonymous ID Assignment
184. Non-Cooperative Location Privacy
185. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
186. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
187. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
188. Cloud based emails boundaries and vulnerabilities
189. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
190. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
191. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
192. Optimal Content Downloading in Vehicular Networks
193. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
194. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
341. View-invariant action recognition based on Artificial Neural Networks
342. User-aware Image Tag Refinement via Ternary Semantic Analysis
343. Separable Reversible Data Hiding in Encrypted Image
344. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
345. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
346. Robust Face-Name Graph Matching for Movie Character Identification
347. IntentSearch:Capturing User Intention for One-Click Internet Image Search
348. Improving Color Constancy by Photometric Edge Weighting
349. Exploring the design space of social network-based Sybil defenses
350. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
351. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
352. AnnoSearch: Image Auto-Annotation by Search
353. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
354. Scalable Scheduling of Updates in Streaming Data Warehouses
355. Scalable Learning of Collective Behavior
356. Ranking Model Adaptation for Domain-Specific Search
357. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
358. Outsourced Similarity Search on Metric Data Assets
359. Organizing User Search Histories
360. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
361. Mining Web Graphs for Recommendations
362. Joint Top K Spatial Keyword Query Processing
363. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
364. Identifying Content for Planned Events Across Social Media Sites
365. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
366. Generative Models for Item Adoptions Using Social Correlation
367. Efficient Data Mining for XML Queries Answering Support
368. Efficient audit service outsourcing for data integrity in clouds
369. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
370. Effective Pattern Discovery for Text Mining
371. Combined Mining: Discovering Informative Knowledge in Complex Data
372. Decentralized Probabilistic Text Clustering
373. Computing Structural Statistics by Keywords in Databases
374. Bridging Social and Data Networks
375. Answering General Time-Sensitive Queries
376. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
377. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
378. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
379. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
380. Resource-Aware Application State Monitoring
381. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
382. Query Access Assurance in Outsourced Databases
383. Linear and Differential Cryptanalysis
384. Expert Discovery and Interactions in Mixed Service-Oriented Systems
385. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
386. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
387. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
388. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
389. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
390. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
391. ROAuth: Recommendation Based Open Authorization
392. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
393. Recommendation Models for Open Authorization
394. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
395. Packet-Hiding Methods for Preventing Selective Jamming Attacks
396. On Privacy of Encrypted Speech Communications
397. OAuth Web Authorization Protocol
398. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
399. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
400. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
401. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
402. Fast Matrix Embedding by Matrix Extending
403. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
404. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
405. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
406. Access control for online social networks third party applications
SOFTWARE ENGINEERING
407. Measuring Code Quality to Improve Specification Mining
408. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
409. Towards Secure and Dependable Storage Services in Cloud Computing
410. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
411. Remote Display Solutions for Mobile Cloud Computing
412. Privacy Preserving Delegated Access Control in Public Clouds
413. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
414. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
415. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
416. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
417. Load-Balancing Multipath Switching System with Flow Slice
418. Assessing the Veracity of Identity Assertions via OSNs
419. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
420. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
421. A New Cell-Counting-Based Attack Against Tor
422. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
423. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
424. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
425. Network Assisted Mobile Computing with Optimal Uplink Query Processing
426. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
427. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
428. Fast Release Capture Sampling in Large-Scale Sensor Networks
429. Cooperative download in vehicular environments
430. Cooperative Data Dissemination via Roadside WLANs
431. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
432. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
433. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
434. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
435. Hiding Sensitive Association Rule for Privacy Preservation
436. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
437. Development of Certificate Authority Services for Web Applications
438. Detecting and Validating Sybil Groups in theWild
439. Association Rule Extracting Knowledge Using Market Basket Analysis
440. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
195. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
196. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
197. User Action Interpretation for Online Content Optimization
198. Spatial Query Integrity with Voronoi Neighbors
199. Spatial Approximate String Search
200. Sensitive Label Privacy Protection on Social Network Data
201. Secure Mining of Association Rules in Horizontally Distributed Databases
202. Secure Logging As a Service Delegating Log Management to the Cloud
203. Robust Module-based Data Management
204. Ranking on Data Manifold with Sink Points
205. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
206. Privacy-Enhanced Web Service Composition
207. Privacy against Aggregate Knowledge Attacks
208. Preventing Private Information Inference Attacks on Social Networks
209. PMSE: A Personalized Mobile Search Engine
210. Personalized QoS-Aware Web Service Recommendation and Visualization
211. Optimal Client-Server Assignment for Internet Distributed Systems
212. Online Search and Buying Behaviour in Consumer Markets
213. M-Privacy for Collaborative Data Publishing
214. Mining User Queries with Markov Chains: Application to Online Image Retrieval
215. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
216. Incentive Compatible Privacy-Preserving Data Analysis
217. Improving Security and Efficiency in Attribute-Based Data Sharing
218. FoCUS: Learning to Crawl Web Forums
219. Fast Nearest Neighbor Search with Keywords
220. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
221. Facilitating Effective User Navigation through Website Structure Improvement
222. Facilitating Document Annotation using Content and Querying Value
223. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
224. Efficient Evaluation of SUM Queries over Probabilistic Data*
225. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
226. Dynamic Query Forms for Database Queries
227. Dynamic Personalized Recommendation on Sparse Data
228. Distributed Strategies for Mining Outliers in Large Data Sets
229. Crowdsourcing Predictors of Behavioral Outcomes
230. Co-Occurrence-Based Diffusion for Expert Search on the Web
231. Comparable Entity Mining from Comparative Questions
232. CloudMoV: Cloud-based Mobile Social TV
233. Anomaly Detection via Online Oversampling Principal Component Analysis
234. Anomaly Detection Approach Using Hidden Markov Model
235. Annotating Search Results from Web Databases
236. A System to Filter Unwanted Messages from OSN User Walls
237. A Survey of XML Tree Patterns
238. A Probabilistic Approach to String Transformation
239. A New Algorithm for Inferring User Search Goals with Feedback Sessions
240. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
241. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
242. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
243. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
244. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
245. Towards Differential Query Services in Cost-Efficient Clouds
246. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
247. SocialTube: P2P-assisted Video Sharing in Online Social Networks
248. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
249. QoS Ranking Prediction for Cloud Services
250. Priority-Based Consolidation of Parallel Workloads in the Cloud
251. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
252. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
253. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
254. Load Rebalancing for Distributed File Systems in Clouds
255. Label-Embedding for Attribute-Based Classification
256. IP-Geolocation Mapping for Moderately Connected Internet Regions
257. Identity-Based Secure Distributed Data Storage Schemes
258. Hint-based Execution of Workloads in Clouds with Nefeli
259. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
260. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
261. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
263. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
264. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
265. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
266. Winds of Change: From Vendor Lock-In to the Meta Cloud
267. Supporting the Migration of Applications to the Cloud through a Decision Support System
268. Storing Shared Data on the Cloud via Security-Mediator
269. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
270. Privacy-Preserving Public Auditing for Secure Cloud Storage
271. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
272. Outsourcing Privacy-Preserving Social Networks to a Cloud
273. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
274. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
275. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
276. Efficient Security Solution for Privacy-Preserving Cloud Services
277. Collaboration in Multicloud Computing Environments: Framework and Security Issues
278. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
279. Cloud-based DDoS Attacks and Defenses
280. Cloud computing for mobile users can offloading compution save energy
281. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing282. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds283. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
284. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
285. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
286. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
287. Two tales of privacy in online social networks
288. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
289. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
290. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
291. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
292. Security and Privacy-Enhancing Multicloud Architectures
293. Security Using Colors and Armstrong Numbers
294. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
295. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
296. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
297. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
298. Privacy Preserving Data Analytics for Smart Homes
299. On Inference-Proof View Processing of XML Documents
300. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
301. Extracting Spread-Spectrum Hidden Data from Digital Media
302. Efficiently Outsourcing Multiparty Computation under Multiple Keys
303. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
304. Craigslist Scams and Community Composition: Investigating Online Fraud
305. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
306. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
307. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
308. Super-Resolution-based Inpainting
309. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
310. Image Authentication Using Stochastic Diffusion
463. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
464. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
465. Toward Private Joins on Outsourced Data
466. Statistical Entity Extraction from Web
467. Slicing: A New Approach to Privacy Preserving Data Publishing
468. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
469. Resilient Identity Crime Detection
470. Ranking Model Adaptation for Domain-Specific Search
471. Organizing User Search Histories
472. On the Spectral Characterization and Scalable Mining of Network Communities
473. Multiparty Access Control for Online Social Networks: Model and Mechanisms
474. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
475. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
476. How do Facebookers use Friendlists
477. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
478. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
479. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
480. Enabling Multilevel Trust in Privacy Preserving Data Mining
481. Enabling cross-site interactions in social networks
482. Efficient Similarity Search over Encrypted Data
483. Efficient Extended Boolean Retrieval
484. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
485. Efficient Anonymous Message Submission
486. Effective Pattern Discovery for Text Mining
487. DDD: A New Ensemble Approach for Dealing with Concept Drift
488. Credibility Ranking of Tweets during High Impact Events
489. Creating Evolving User Behavior Profiles Automatically
490. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
491. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
492. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
493. Anomaly Detection for Discrete Sequences: A Survey
494. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
495. Advance Mining of Temporal High Utility Itemset
496. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
497. Reliable Re-encryption in Unreliable Clouds
498. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
499. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
500. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
501. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
502. Gossip-based Resource Management for Cloud Environments
503. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
504. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
505. Cloud Data Protection for the Masses
506. Cloud Computing Security: From Single to Multi-Clouds
507. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
508. In Tags We Trust Trust modeling in social tagging of multimedia content
509. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
510. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
511. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
512. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
513. Cut Detection in Wireless Sensor Networks
514. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
515. TrickleDNS: Bootstrapping DNS Security using Social Trust
516. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
517. Policy-by-Example for Online Social Networks
518. Packet Loss Control Using Tokens at the Network Edge
519. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
520. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
521. Independent Directed Acyclic Graphs for Resilient Multipath Routing
522. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
523. Game-Theoretic Pricing for Video Streaming in Mobile Networks
524. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
525. Auditing for Network Coding Storage
526. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
527. Privacy Preserving Cloud Data Access With Multi-Authorities
528. Movie Rating and Review Summarization in Mobile Environment
529. IDSaaS: Intrusion Detection System as a Service in Public Clouds
530. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
531. BibPro: A Citation Parser Based on Sequence Alignment Techniques
532. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
2011-2012 Dotnet Projects
NETWORKING
533. Valuable Detours: Least-Cost Anypath Routing
534. Self-Reconfigurable Wireless Mesh Networks
535. Reliability in Layered Networks with Random Link Failures
536. NABS:Novel Approaches for Biometric Systems
537. Live Streaming with Receiver-based Peer-division Multiplexing
538. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
539. Continuous Neighbor Discovery in Asynchronous Sensor Networks
540. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
541. Virtualized Screen: A Third Element for CloudMobile Convergence
542. Steganographic Embedding in JPEG Images with Visual Criterion
543. On the Typical Statistic Features for Image Blind Steganalysis
544. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
545. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
546. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
547. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
548. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
549. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
550. Vulnerability Analysis in SOA-Based Business Processes
551. Service-Oriented Architecture for High-Dimensional Private Data Mashup
552. Service-Centric Framework for a Digital Government Application
553. Server-Side Streaming Processing of WS-Security
554. OWLPath: An OWL Ontology-Guided Query Editor
555. Monitoring Service Systems from a Language-Action Perspective
556. Extracting Product Features and Sentiments from Chinese Customer Reviews
557. Expert Discovery and Interactions in Mixed Service-Oriented Systems
558. Automated Certification for Compliant Cloud-based Business Processes
559. Addressing Dependability throughout the SOA Life Cycle
560. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
561. The Geometric Efficient Matching Algorithm for Firewalls
562. Secure Service-Oriented Architecture for Mobile Transactions
563. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
564. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
565. Privacy-Preserving Updates to Anonymous and Confidential Databases
566. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
567. IPAS: Implicit Password Authentication System
568. Improving Security and Performance in the Tor Network through Tunable Path Selection
569. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error570. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
571. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
572. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
573. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
574. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
575. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
576. Data Delivery Properties of Human Contact Networks
577. Converge-Cast: On the Capacity and Delay Tradeoffs
578. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
579. USHER: Improving Data Quality with Dynamic Forms
580. The World in a Nutshell: Concise Range Queries
581. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
582. Scalable Scheduling of Updates in Streaming Data Warehouses
583. Scalable Learning of Collective Behavior
584. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
585. Publishing Search Logs A Comparative Study of Privacy Guarantees
586. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
587. Optimal Service Pricing for a Cloud Cache
588. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases589. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
590. Mining Web Graphs for Recommendations
591. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
592. Integration of Sound Signature Authentication System
593. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
594. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
595. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
596. Exploring Application-Level Semantics for Data Compression
597. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
598. Data Leakage Detection
599. Cost-aware rank join with random and sorted access
600. Collaborative Filtering with Personalized Skylines