M.tech .net 2014 15 list

6
SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com M.TECH DOT NET 2014-15 LIST 1 D1401 A Geometric Deployment and Routing Scheme for Directional Wireless Mesh Networks NETWORKING 2014 2 D1402 Fast and Secure Multi hop Broadcast Solutions for Inter vehicular Communication NETWORKING 2014 3 D1403 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Network NETWORKING 2014 4 D1404 Security Analysis of Handover Key Management in 4G LTESAE Networks NETWORKING 2014 5 D1405 Congestion Aware Routing in Nonlinear Elastic Optical Networks NETWORKING SECURITY 2014 6 D1406 Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks NETWORKING SECURITY 2014 7 D1407 Cross-Layer Aided Energy-Efficient Opportunistic Routing in Ad Hoc Networks NETWORKING 2014 8 D1408 Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular Networks NETWORKING 2014 9 D1409 Joint Routing and Resource Allocation for Delay Minimization in Cognitive Radio Based Mesh Networks NETWORKING 2014 10 D1410 Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks NETWORKING 2014

Transcript of M.tech .net 2014 15 list

Page 1: M.tech .net 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

M.TECH DOT NET 2014-15 LIST

1 D1401A Geometric Deployment and RoutingScheme for Directional Wireless Mesh

Networks

NETWORKING 2014

2 D1402Fast and Secure Multi hop Broadcast

Solutions for Inter vehicularCommunication

NETWORKING 2014

3 D1403 Sleep Scheduling for Geographic Routing inDuty-Cycled Mobile Sensor Network

NETWORKING 2014

4 D1404 Security Analysis of Handover KeyManagement in 4G LTESAE Networks

NETWORKING 2014

5 D1405 Congestion Aware Routing in NonlinearElastic Optical Networks

NETWORKINGSECURITY

2014

6 D1406Joint Routing and Medium Access Control

in Fixed Random Access Wireless MultihopNetworks

NETWORKINGSECURITY

2014

7 D1407 Cross-Layer Aided Energy-EfficientOpportunistic Routing in Ad Hoc Networks

NETWORKING 2014

8 D1408Joint Interference Coordination and LoadBalancing for OFDMA Multihop Cellular

Networks

NETWORKING 2014

9 D1409Joint Routing and Resource Allocation for

Delay Minimization in Cognitive RadioBased Mesh Networks

NETWORKING 2014

10 D1410 Joint Topology-Transparent Scheduling andQoS Routing in Ad Hoc Networks

NETWORKING 2014

Page 2: M.tech .net 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

11 D1411Network Resource Allocation for UsersWith Multiple Connections Fairness and

Stability

NETWORKING 2014

12 D1412 On the Delay Advantage of Coding inPacket Erasure Networks

NETWORKING 2014

13 D1413Content Caching and Scheduling inWireless Networks With Elastic and

Inelastic Traffic

NETWORKING 2014

14 D1414 Distributed Mobile Sink Routing forWireless Sensor Networks A Survey

NETWORKING 2014

15 D1415 Secure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks

NETWORKING 2014

16 D1416ALBA-R Load-Balancing GeographicRouting Around Connectivity Holes in

Wireless Sensor Networks

DATAMINING 2014

17 D1417 R3E Reliable Reactive RoutingEnhancement for Wireless Sensor Networks

DATAMINING 2014

18 D1418 Secure and Efficient Data Transmission forCluster-Based Wireless Sensor Networks

DATAMINING

PARALLEL &DISTRIBUTED

SYSTEMS

2014

19 D1419Cross-Layer Approach for Minimizing

Routing Disruption in IP NetworksPARALLEL &DISTRIBUTED

SYSTEMS2014

20 D1420Multicast Capacity in MANET with

Infrastructure Support

PARALLEL &DISTRIBUTED

SYSTEMS2014

21 D1421Multi-Core Embedded Wireless Sensor

Networks Architecture and Applications

PARALLEL &DISTRIBUTED

SYSTEMS

2014

Page 3: M.tech .net 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

22 D1422Efficient Data Collection for Large-

Scale Mobile Monitoring ApplicationsPARALLEL &DISTRIBUTED

SYSTEMS2014

23 D1423Hop-by-Hop Message

Authenticationand Source Privacy inWirelessSensor Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

24 D1424Optimized multicast routing algorithm

based on tree structure in MANETsPARALLEL &DISTRIBUTED

SYSTEMS2014

25 D1425A Probabilistic Misbehavior Detection

Scheme toward Efficient Trust

Establishment in Delay-Tolerant Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

26 D1426 A System for Denial-of-Service AttackDetection Based on Multivariate Correlation

Analysis

PARALLEL &DISTRIBUTED

SYSTEMS2014

27 D1427An Error-Minimizing Framework for

Localizing Jammers in Wireless NetworksPARALLEL &DISTRIBUTED

SYSTEMS2014

28 D1428Certificateless Remote Anonymous

Authentication Schemes for Wireless Body

Area Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

29 D1429Efficient Data Query in Intermittently-

Connected Mobile Ad Hoc Social NetworksPARALLEL &DISTRIBUTED

SYSTEMS2014

30 D1430Transmission-Efficient Clustering Method

for Wireless Sensor Networks Using

Compressive Sensing

PARALLEL &DISTRIBUTED

SYSTEMS2014

31 D1431Web Image Re-Ranking Using Query-

Specific Semantic Signatures

PATTERNANALYSIS &

MACHINEINTELLIGENC

E

2014

32 D1432A QoS-Oriented Distributed Routing

Protocol for Hybrid Wireless NetworksMOBILE

COMPUTING 2014

Page 4: M.tech .net 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

33 D1433PSR A Lightweight Proactive SourceRouting Protocol For Mobile Ad Hoc

Networks

MOBILECOMPUTING

2014

34 D1434Video Dissemination over Hybrid Cellular

and Ad Hoc NetworksMOBILE

COMPUTING2014

35 D1435 Autonomous Mobile Mesh NetworksMOBILE

COMPUTING 2014

36 D1436DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile

Underwater Sensor Networks

MOBILECOMPUTING 2014

37 D1437Leveraging Social Networks for P2P

Content-Based File Sharing in DisconnectedMANETs

MOBILECOMPUTING 2014

38 D1438 Preserving Location Privacy in GeosocialApplications

MOBILECOMPUTING 2014

39 D1439 Balancing Performance, Accuracy, andPrecision for Secure Cloud Transactions

CLOUDCOMPUTING 2014

40 D1440 Building Confidential and Efficient QueryServices in the Cloud with RASP Data

Perturbation

CLOUDCOMPUTING 2014

41 D1441 Consistency as a Service: Auditing CloudConsistency

CLOUDCOMPUTING 2014

42 D1442 Decentralized Access Control withAnonymous Authentication of Data Stored in

Clouds

CLOUDCOMPUTING 2014

43 D1443 Distributed, Concurrent, and IndependentAccess to Encrypted Cloud Databases

CLOUDCOMPUTING 2014

44 D1444 Enabling Data Integrity Protection inRegenerating-Coding-Based Cloud Storage:

Theory and Implementation

CLOUDCOMPUTING 2014

Page 5: M.tech .net 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

45D1445 Identity-Based Distributed Provable Data

Possession in Multi- Cloud StorageCLOUD

COMPUTING 2014

46 D1446 Key-Aggregate Cryptosystem for ScalableData Sharing in Cloud Storage

CLOUDCOMPUTING 2014

47 D1447 Panda: Public Auditing for Shared Data withEfficient User Revocation in the Cloud

CLOUDCOMPUTING 2014

48 D1448 Privacy-Preserving Multi-Keyword RankedSearch over Encrypted Cloud Data

CLOUDCOMPUTING 2014

49 D1449 Scalable Distributed Service IntegrityAttestation for Software-asa- Service Clouds

CLOUDCOMPUTING 2014

50 D1450 Scalable Distributed Service IntegrityAttestation for Software-asa- Service Clouds

CLOUDCOMPUTING 2014

51 D1451 A Cocktail Approach for Travel PackageRecommendation

DATA MINING2014

52 D1452 An Empirical Performance Evaluation ofRelational Keyword Search Techniques

DATA MINING2014

53 D1453 LARS*: An Efficient and Scalable Location-Aware Recommender System

DATA MINING2014

54 D1454 Product Aspect Ranking and Its Applications DATA MINING2014

55 D1455 Secure Mining of Association Rules inHorizontally Distributed Databases

DATA MINING2014

56 D1456 Supporting Privacy Protection inPersonalized Web Search

DATA MINING2014

57 D1457 A Cocktail Approach for Travel PackageRecommendation

DATA MINING2014

58 D1458 TrustedDB: A Trusted Hardware-BasedDatabase with Privacy and Data

Confidentiality

DATA MINING2014

59 D1459 Typicality-Based Collaborative FilteringRecommendation

DATA MINING2014

60 D1460 Captcha as Graphical Passwords—A NewSecurity Primitive Based on Hard AI

Problems

SECURECOMPUTING 2014

Page 6: M.tech .net 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

61 D1461 Click Prediction for Web Image RerankingUsing Multimodal Sparse Coding

IMAGEPROCESSING 2014

62 D1462 Designing an Efficient Image Encryption-Then-Compression System via Prediction

Error Clustering and Random Perm

IMAGEPROCESSING 2014