M.tech .net 2014 15 list
-
Upload
sak-informatics-pvt-ltd -
Category
Technology
-
view
35 -
download
3
Transcript of M.tech .net 2014 15 list
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
M.TECH DOT NET 2014-15 LIST
1 D1401A Geometric Deployment and RoutingScheme for Directional Wireless Mesh
Networks
NETWORKING 2014
2 D1402Fast and Secure Multi hop Broadcast
Solutions for Inter vehicularCommunication
NETWORKING 2014
3 D1403 Sleep Scheduling for Geographic Routing inDuty-Cycled Mobile Sensor Network
NETWORKING 2014
4 D1404 Security Analysis of Handover KeyManagement in 4G LTESAE Networks
NETWORKING 2014
5 D1405 Congestion Aware Routing in NonlinearElastic Optical Networks
NETWORKINGSECURITY
2014
6 D1406Joint Routing and Medium Access Control
in Fixed Random Access Wireless MultihopNetworks
NETWORKINGSECURITY
2014
7 D1407 Cross-Layer Aided Energy-EfficientOpportunistic Routing in Ad Hoc Networks
NETWORKING 2014
8 D1408Joint Interference Coordination and LoadBalancing for OFDMA Multihop Cellular
Networks
NETWORKING 2014
9 D1409Joint Routing and Resource Allocation for
Delay Minimization in Cognitive RadioBased Mesh Networks
NETWORKING 2014
10 D1410 Joint Topology-Transparent Scheduling andQoS Routing in Ad Hoc Networks
NETWORKING 2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
11 D1411Network Resource Allocation for UsersWith Multiple Connections Fairness and
Stability
NETWORKING 2014
12 D1412 On the Delay Advantage of Coding inPacket Erasure Networks
NETWORKING 2014
13 D1413Content Caching and Scheduling inWireless Networks With Elastic and
Inelastic Traffic
NETWORKING 2014
14 D1414 Distributed Mobile Sink Routing forWireless Sensor Networks A Survey
NETWORKING 2014
15 D1415 Secure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks
NETWORKING 2014
16 D1416ALBA-R Load-Balancing GeographicRouting Around Connectivity Holes in
Wireless Sensor Networks
DATAMINING 2014
17 D1417 R3E Reliable Reactive RoutingEnhancement for Wireless Sensor Networks
DATAMINING 2014
18 D1418 Secure and Efficient Data Transmission forCluster-Based Wireless Sensor Networks
DATAMINING
PARALLEL &DISTRIBUTED
SYSTEMS
2014
19 D1419Cross-Layer Approach for Minimizing
Routing Disruption in IP NetworksPARALLEL &DISTRIBUTED
SYSTEMS2014
20 D1420Multicast Capacity in MANET with
Infrastructure Support
PARALLEL &DISTRIBUTED
SYSTEMS2014
21 D1421Multi-Core Embedded Wireless Sensor
Networks Architecture and Applications
PARALLEL &DISTRIBUTED
SYSTEMS
2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
22 D1422Efficient Data Collection for Large-
Scale Mobile Monitoring ApplicationsPARALLEL &DISTRIBUTED
SYSTEMS2014
23 D1423Hop-by-Hop Message
Authenticationand Source Privacy inWirelessSensor Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
24 D1424Optimized multicast routing algorithm
based on tree structure in MANETsPARALLEL &DISTRIBUTED
SYSTEMS2014
25 D1425A Probabilistic Misbehavior Detection
Scheme toward Efficient Trust
Establishment in Delay-Tolerant Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
26 D1426 A System for Denial-of-Service AttackDetection Based on Multivariate Correlation
Analysis
PARALLEL &DISTRIBUTED
SYSTEMS2014
27 D1427An Error-Minimizing Framework for
Localizing Jammers in Wireless NetworksPARALLEL &DISTRIBUTED
SYSTEMS2014
28 D1428Certificateless Remote Anonymous
Authentication Schemes for Wireless Body
Area Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
29 D1429Efficient Data Query in Intermittently-
Connected Mobile Ad Hoc Social NetworksPARALLEL &DISTRIBUTED
SYSTEMS2014
30 D1430Transmission-Efficient Clustering Method
for Wireless Sensor Networks Using
Compressive Sensing
PARALLEL &DISTRIBUTED
SYSTEMS2014
31 D1431Web Image Re-Ranking Using Query-
Specific Semantic Signatures
PATTERNANALYSIS &
MACHINEINTELLIGENC
E
2014
32 D1432A QoS-Oriented Distributed Routing
Protocol for Hybrid Wireless NetworksMOBILE
COMPUTING 2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
33 D1433PSR A Lightweight Proactive SourceRouting Protocol For Mobile Ad Hoc
Networks
MOBILECOMPUTING
2014
34 D1434Video Dissemination over Hybrid Cellular
and Ad Hoc NetworksMOBILE
COMPUTING2014
35 D1435 Autonomous Mobile Mesh NetworksMOBILE
COMPUTING 2014
36 D1436DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile
Underwater Sensor Networks
MOBILECOMPUTING 2014
37 D1437Leveraging Social Networks for P2P
Content-Based File Sharing in DisconnectedMANETs
MOBILECOMPUTING 2014
38 D1438 Preserving Location Privacy in GeosocialApplications
MOBILECOMPUTING 2014
39 D1439 Balancing Performance, Accuracy, andPrecision for Secure Cloud Transactions
CLOUDCOMPUTING 2014
40 D1440 Building Confidential and Efficient QueryServices in the Cloud with RASP Data
Perturbation
CLOUDCOMPUTING 2014
41 D1441 Consistency as a Service: Auditing CloudConsistency
CLOUDCOMPUTING 2014
42 D1442 Decentralized Access Control withAnonymous Authentication of Data Stored in
Clouds
CLOUDCOMPUTING 2014
43 D1443 Distributed, Concurrent, and IndependentAccess to Encrypted Cloud Databases
CLOUDCOMPUTING 2014
44 D1444 Enabling Data Integrity Protection inRegenerating-Coding-Based Cloud Storage:
Theory and Implementation
CLOUDCOMPUTING 2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
45D1445 Identity-Based Distributed Provable Data
Possession in Multi- Cloud StorageCLOUD
COMPUTING 2014
46 D1446 Key-Aggregate Cryptosystem for ScalableData Sharing in Cloud Storage
CLOUDCOMPUTING 2014
47 D1447 Panda: Public Auditing for Shared Data withEfficient User Revocation in the Cloud
CLOUDCOMPUTING 2014
48 D1448 Privacy-Preserving Multi-Keyword RankedSearch over Encrypted Cloud Data
CLOUDCOMPUTING 2014
49 D1449 Scalable Distributed Service IntegrityAttestation for Software-asa- Service Clouds
CLOUDCOMPUTING 2014
50 D1450 Scalable Distributed Service IntegrityAttestation for Software-asa- Service Clouds
CLOUDCOMPUTING 2014
51 D1451 A Cocktail Approach for Travel PackageRecommendation
DATA MINING2014
52 D1452 An Empirical Performance Evaluation ofRelational Keyword Search Techniques
DATA MINING2014
53 D1453 LARS*: An Efficient and Scalable Location-Aware Recommender System
DATA MINING2014
54 D1454 Product Aspect Ranking and Its Applications DATA MINING2014
55 D1455 Secure Mining of Association Rules inHorizontally Distributed Databases
DATA MINING2014
56 D1456 Supporting Privacy Protection inPersonalized Web Search
DATA MINING2014
57 D1457 A Cocktail Approach for Travel PackageRecommendation
DATA MINING2014
58 D1458 TrustedDB: A Trusted Hardware-BasedDatabase with Privacy and Data
Confidentiality
DATA MINING2014
59 D1459 Typicality-Based Collaborative FilteringRecommendation
DATA MINING2014
60 D1460 Captcha as Graphical Passwords—A NewSecurity Primitive Based on Hard AI
Problems
SECURECOMPUTING 2014
SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]
www.sakinformatics.com
61 D1461 Click Prediction for Web Image RerankingUsing Multimodal Sparse Coding
IMAGEPROCESSING 2014
62 D1462 Designing an Efficient Image Encryption-Then-Compression System via Prediction
Error Clustering and Random Perm
IMAGEPROCESSING 2014