M.tech java 2014 15 list
-
Upload
sak-informatics-pvt-ltd -
Category
Technology
-
view
141 -
download
0
Transcript of M.tech java 2014 15 list
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
M.TECH JAVA 2014-15 List
S.NoProject
CodeProject Title Domain Year
1 J1401A Hybrid Cloud Approach for Secure
Authorized DeduplicationCloud
Computing2014
2 J1402A Scalable Two-Phase Top-Down
Specialization Approach forData Anonymization Using MapReduce on
Cloud
CloudComputing 2014
3 J1403A Stochastic Model to Investigate Data
Center Performance and QoS in IaaS CloudComputing Systems
CloudComputing
2014
4J1404
Building Confidential and Efficient QueryServices in the Cloud with RASP Data
Perturbation
CloudComputing 2014
5J1405
Decentralized Access Control withAnonymous Authentication of Data
Stored in Clouds
CloudComputing 2014
6J1406
Distributed, Concurrent, and IndependentAccess to Encrypted Cloud Databases
CloudComputing 2014
7J1407
Expressive, Efficient, and Revocable DataAccess Control for Multi-Authority Cloud
Storage
CloudComputing 2014
8J1408
Key-Aggregate Cryptosystem for ScalableData Sharing in Cloud Storage
CloudComputing
2014
9 J1409 Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud
CloudComputing
2014
10 J1410 PACK: Prediction-Based Cloud Bandwidthand Cost Reduction System
CloudComputing
2014
11J1411
Privacy-Preserving Multi-Keyword RankedSearch over Encrypted Cloud Data
CloudComputing
2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
12 J1412 Scalable Distributed Service IntegrityAttestation for Software-as-Service Clouds
CloudComputing
2014
13J1413
Towards Differential Query Services inCost-Efficient Clouds
CloudComputing
2014
14 J1414On the Knowledge Soundness of a
Cooperative Provable Data PossessionScheme in Multicloud Storage - Parallel
Distributed Systems
CloudComputing
2014
15 J1415Privacy Preserving Back-Propagation
Neural Network Learning Made Practicalwith Cloud Computing
CloudComputing
2014
16 J1416 CLOUDQUAL A Quality Model for CloudServices
CloudComputing
2014
17 J1417Enabling Smart Cloud Services Through
Remote Sensing An Internet of EverythingEnabler
CloudComputing
2014
18 J1418 Quality of Service Provision in Cloud-basedStorage System for Multimedia Delivery
CloudComputing
2014
19J1419
A Cocktail Approach for Travel PackageRecommendation
DATA MINING 2014
20 J1420Accuracy-Constrained Privacy-PreservingAccess Control Mechanism for Relational
Data
DATA MINING 2014
21 J1421BestPeer++: A Peer-to-Peer Based Large-
Scale Data Processing PlatformDATA MINING 2014
22 J1422 Data Mining with Big Data DATA MINING 2014
23J1423
Dealing With Concept Drifts in ProcessMining
DATAMINING 2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
24 J1424Discovering Emerging Topics in Social
Streams via Link-AnomalyDATA
MINING2014
25J1425
Efficient Prediction of Difficult KeywordQueries over Databases
DATAMINING
2014
26J1426
Facilitating Document Annotation UsingContent and Querying Value
DATAMINING
2014
27 J1427Fast Nearest Neighbor Search with
KeywordsDATA
MINING2014
28 J1428 Keyword Query RoutingDATA
MINING 2014
29 J1429 Privacy-Preserving and Content-ProtectingLocation Based Queries
DATAMINING 2014
30 J1430 Security Evaluation of Pattern Classifiersunder Attack
DATAMINING 2014
31 J1431 Supporting Privacy Protection inPersonalized Web Search
DATAMINING 2014
32 J1432 Towards Online Shortest Path ComputationDATA
MINING 2014
33 J1433Approximate Shortest Distance Computing:
A Query-Dependent Local LandmarkScheme
DATAMINING 2014
34 J1434 LARS: An Efficient and Scalable Location-Aware Recommender System
DATAMINING 2014
35 J1435 Dynamic Query Forms for DatabaseQueries
DATAMINING 2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
36 J1436 Privacy Preserving Delegated AccessControl in Public Clouds
DATAMINING 2014
37 J1437 m-Privacy for Collaborative DataPublishing
DATAMINING 2014
38 J1438 Scalable Keyword Search on Large RDFData
DATAMINING 2014
39 J1439 Decision Trees for Mining Data StreamsBased on the Gaussian Approximation
DATAMINING 2014
40 J1440Captcha as Graphical Passwords—A New
Security Primitive Based on Hard AIProblems
SECURECOMPUTING 2014
41 J1441 Efficient and Privacy-Aware DataAggregation in Mobile Sensing
SECURECOMPUTING 2014
42 J1442 PROFILR: Toward Preserving Privacy andFunctionality in Geosocial Networks
SECURECOMPUTING 2014
43 J1443 Top-k Query Result CompletenessVerification in Tiered Sensor Networks
SECURECOMPUTING
2014
44 J1444 Bandwidth Distributed Denial of Service:Attacks and Defenses
SECURECOMPUTING
2014
45 J1445 Automatic Test Packet Generation NETWORKING 2014
46 J1446 Cost-Effective Resource Allocation ofOverlay Routing Relay Nodes
NETWORKING 2014
47 J1447 Boundary Cutting for Packet Classification NETWORKING 2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
48 J1448 Secure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks
NETWORKING 2014
49 J1449 Hiding in the Mobile Crowd: LocationPrivacy through Collaboration
NETWORKING 2014
50 J1450A General Self-Organized Tree-BasedEnergy-Balance Routing Protocol for
Wireless Sensor Network
NETWORKING 2014
51 J1451 Behavioral Malware Detection in DelayTolerant Networks
NETWORKING 2014
52 J1452Secure Data Aggregation in Wireless
Sensor Networks Filtering out theAttacker’s Impact
NETWORKING 2014
53 J1453Joint Routing and Medium Access Control
in Fixed Random Access Wireless MultihopNetworks
NETWORKING
2014
54 J1454Joint Routing and Resource Allocation for
Delay Minimization in Cognitive RadioBased Mesh Networks
NETWORKING 2014
55 J1455 Joint Topology-Transparent Scheduling andQoS Routing in Ad Hoc Networks
NETWORKING 2014
56 J1456Tradeoff Between Reliability and Securityin Multiple Access Relay Networks Under
Falsified Data Injection AttackNETWORKING 2014
57 J1457 Enabling Trustworthy Service Evaluation inService-Oriented Mobile Social Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
58 J1458Exploiting Service Similarity forPrivacy in Location-Based Search
Queries
PARALLEL &DISTRIBUTED
SYSTEMS2014
59 J1459LocaWard: A Security and PrivacyAware Location-Based Rewarding
System
PARALLEL &DISTRIBUTED
SYSTEMS2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
60 J1460On False Data-Injection Attacks against
Power System State Estimation:Modeling and Countermeasures
PARALLEL &DISTRIBUTED
SYSTEMS2014
61 J1461RRE: A Game-Theoretic Intrusion
Response and Recovery Engine
PARALLEL &DISTRIBUTED
SYSTEMS2014
62 J1462Securing Broker-Less
Publish/Subscribe Systems UsingIdentity- Based Encryption
PARALLEL &DISTRIBUTED
SYSTEMS2014
63 J1463SOS: A Distributed Mobile Q&A System
Based on Social Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
64 J1464
The Client Assignment Problem forContinuous Distributed Interactive
Applications: Analysis, Algorithms, andEvaluation
PARALLEL &DISTRIBUTED
SYSTEMS
2014
65 J1465The Design and Evaluation of AnInformation Sharing System for
Human Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
66 J1466Traffic Pattern-Based Content LeakageDetection for Trusted Content Delivery
Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
67 J1467Secure Outsourced Attribute-based
Signatures
PARALLEL &DISTRIBUTED
SYSTEMS2014
68 J1468A System for Denial-of-Service Attack
Detection Based on MultivariateCorrelation Analysis
PARALLEL &DISTRIBUTED
SYSTEMS
2014
69 J1469Multi-Core Embedded Wireless Sensor
Networks Architecture and ApplicationsPARALLEL &DISTRIBUTED
SYSTEMS
2014
70 J1470Cross-Layer Approach for Minimizing
Routing Disruption in IP NetworksPARALLEL &DISTRIBUTED
SYSTEMS2014
71 J1471Multicast Capacity in MANET with
Infrastructure SupportPARALLEL &DISTRIBUTED
SYSTEMS2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
72 J1472Efficient Data Collection for Large-
Scale Mobile Monitoring ApplicationsPARALLEL &DISTRIBUTED
SYSTEMS2014
73 J1473Hop-by-Hop Message
Authenticationand Source Privacy inWirelessSensor Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
74 J1474Optimized multicast routing algorithm
based on tree structure in MANETsPARALLEL &DISTRIBUTED
SYSTEMS2014
75 J1475 An Incentive Framework for CellularTraffic Offloading
MOBILECOMPUTING
2014
76 J1476 Cooperative Caching for Efficient DataAccess in Disruption Tolerant Networks
MOBILECOMPUTING
2014
77 J1477 Efficient Authentication for Mobile andPervasive Computing
MOBILECOMPUTING
2014
78 J1478Friendbook: A Semantic-based FriendRecommendation System for Social
Networks
MOBILECOMPUTING
2014
79 J1479Optimal Distributed Malware Defense in
Mobile Networks with HeterogeneousDevices
MOBILECOMPUTING
2014
80 J1480Energy-Efficient Reliable Routing
Considering Residual Energy in WirelessAd Hoc Networks
MOBILECOMPUTING
2014
81 J1481Energy-optimum Throughput and CarrierSensing Rate in CSMA-based Wireless
Networks
MOBILECOMPUTING
2014
82 J1482Privacy-Preserving and Truthful Detectionof Packet Dropping Attacks in Wireless Ad
Hoc Networks
MOBILECOMPUTING
2014
83 J1483 Fairness Analysis of Routing inOpportunistic Mobile Networks
MOBILECOMPUTING
2014
84 J1484 Video Dissemination over Hybrid Cellularand Ad Hoc Networks
MOBILECOMPUTING
2014
85 J1485 Privacy-Enhanced Web ServiceComposition
SERVICECOMPUTING(Web Service)
2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
86 J1486 Web Service Recommendation viaExploiting Location and QoS Information
SERVICECOMPUTING(Web Service)
2014
87 J1487Designing an Efficient Image Encryption-Then-Compression System via PredictionError Clustering and Random Permutation
- Information Forensics and Security
IMAGEPROCESSING
2014
88 J1488 Fingerprint Compression Based on SparseRepresentation
IMAGEPROCESSING
2014
89 J1489Hierarchical Prediction and Context
Adaptive Coding for Lossless Color ImageCompression
IMAGEPROCESSING
2014
90 J1490 Congestion Aware Routing in NonlinearElastic Optical Networks
NETWORKINGSecurity
2014
91 J1491 Security Analysis of Handover KeyManagement in 4G LTESAE Networks
NETWORKING2014
92 J1492 Distributed Mobile Sink Routing forWireless Sensor Networks A Survey
NETWORKING2014