|
MOBILE COMPUTING -
WIRELESS COMMUNICATIONS
|
1. Mobile Relay Configuration in
Data-intensive Wireless Sensor Networks.
Mech : "Optimal
Mobile Relay Configuration"
View :Abstract Basepaper
|
2. Vampire attacks:Draining life from
wireless ad-hoc sensor networks.
View :Abstract Basepaper
|
3. Towards a Statistical Framework for
Source Anonymity in Sensor Networks.
Alg : "AR
and AF"
View :Abstract Basepaper
|
4. A Scalable Server Architecture for Mobile
Presence Services in Social Network Applications.
Phase 2 : "Scalable Mobile PresenceCloud with Communication
Security"
Alg : "Directed
Buddy Search Algorithm"
View :Abstract Basepaper
|
5. Privacy-Preserving Distributed Profile
Matching in Proximity-based Mobile Social Networks.
Phase 2 : "FindU : Profile Matching in Ssecure Multi-party
Computation (SMC)"
Alg : "Shamir
secret sharing scheme Algorithm"
View :Abstract Basepaper
|
6. Distributed Cooperative Caching in Social
Wireless Networks.
Alg : "Split
Cache object replacement policy,A distributed heuristic for object
replacement in SWNETs"
View :Abstract Basepaper
|
7. Community-Aware Opportunistic Routing in
Mobile Social Networks.
Alg : "Community-Aware
Opportunistic Routing (CAOR) algorithm "
View :Abstract Basepaper
|
8. Search Me If You Can Privacy-preserving
Location Query Service.
View :Abstract Basepaper
|
9. Self Adaptive Contention Aware Routing
Protocol for Intermittently Connected Mobile Networks.
View :Abstract Basepaper
|
10. Efficient Rekeying Framework for Secure
Multicast with Diverse-Subscription-Period Mobile Users.
View :Abstract Basepaper
|
|
SOFTWARE ENGINEERING
|
11. A Decentralized Self-Adaptation
Mechanism For Service-Based Applications in The Cloud.
View :Abstract Basepaper
|
|
NETWORKING
|
12. Cross-Domain Privacy-Preserving Protocol
for Cooperative Firewall Optimization.
View :Abstract Basepaper
|
|
|
14. Fault Node Recovery Algorithm for a
Wireless Sensor Network.
View :Abstract Basepaper
|
|
|
16. Topological Conditions for In-Network
Stabilization of Dynamical Systems.
View :Abstract Basepaper
|
17. Optimum Relay Selection for
Energy-Efficient Cooperative Ad Hoc Networks.
View :Abstract Basepaper
|
18. Participatory Privacy Enabling Privacy
in Participatory Sensing.
Mech : "Participatory
Privacy"
View :Abstract Basepaper
|
19. Optimizing Cloud Resources for
Delivering IPTV Services through Virtualization.
View :Abstract Basepaper
|
20. Access Policy Consolidation for Event
Processing Systems.
View :Abstract Basepaper
|
21. Fully Anonymous Profile Matching in
Mobile Social Networks.
Phase 2 : "Secure and Logical Multiparty Computation (SMC)
Profile Matching"
Alg : "Homomorphic
Encryption"
View :Abstract Basepaper
|
|
|
23. Combining Cryptographic Primitives to
Prevent Jamming Attacks in Wireless Networks.
View :Abstract Basepaper
|
24. Seed Block Algorithm A Remote Smart Data
Back-up Technique for Cloud Computing.
View :Abstract Basepaper
|
25. Using Fuzzy Logic Control to Provide
Intelligent Traffic Management Service for High-Speed Networks.
View :Abstract Basepaper
|
|
IMAGE PROCESSING -
MULTIMEDIA
|
26. Understanding the External Links of
Video Sharing Sites Measurement and Analysis.
View :Abstract Basepaper
|
|
|
|
|
29. Beyond Text QA: Multimedia Answer
Generation by Harvesting Web Information.
Alg : "Answer
medium selection"
View :Abstract Basepaper
|
30. Scalable Face Image Retrieval using
Attribute-Enhanced Sparse Codewords.
View :Abstract Basepaper
|
31. Bootstrapping Visual Categorization With
Relevant Negatives.
View :Abstract Basepaper
|
32. An extended visual cryptography scheme
without pixel expansion for halftone images.
View :Abstract Basepaper
|
|
|
|
SECURE COMPUTING
|
34. CAM: Cloud-Assisted Privacy Preserving
Mobile Health Monitoring.
Mech : "Branching
program"
View :Abstract Basepaper
|
35.Secure Encounter-based Mobile Social
Networks Requirements Designs and Tradeoffs.
Phase 2 : "MeetUp : Framework for constructing encounter-based
social networks"
Alg : "rusted
Certification"
View :Abstract Basepaper
|
36.Two tales of privacy in online social
networks.
Mech : "surveillance
problem,social privacy,institutional privacy"
View :Abstract Basepaper
|
37.Extracting Spread-Spectrum Hidden Data
from Digital Media.
Mech : "Multi-carrier
spread-spectrum embedding,Steganography"
View :Abstract Basepaper
|
38.Utility-Privacy Tradeoff in Databases An
Information-theoretic Approach.
Mech : "Encryption
& Decryption Algorithm"
View :Abstract Basepaper
|
39.TrPF A Trajectory Privacy-Preserving
Framework for Participatory Sensing.
Alg : "Trajectory
Graph Construction,Weight Construction Algorithm "
View :Abstract Basepaper
|
40. Craigslist Scams and Community
Composition Investigating Online Fraud Victimization.
View :Abstract Basepaper
|
41. Security Analysis of a Single Sign-On
Mechanism for Distributed Computer Networks.
View :Abstract Basepaper
|
42. SORT A Self-ORganizing Trust Model for
Peer-to-Peer Systems.
View :Abstract Basepaper
|
43. Securing Online Reputation Systems
through Dempster-Shafer Theory based Trust Model.
View :Abstract Basepaper
|
44. NICE Network Intrusion Detection and
Countermeasure Selection in Virtual Network Systems.
View :Abstract Basepaper
|
45. Towards Secure Multi-Keyword Top-k
Retrieval over Encrypted Cloud Data.
View :Abstract Basepaper
|
46. Efficiently Outsourcing Multiparty
Computation under Multiple Keys.
View :Abstract Basepaper
|
|
|
48. Document Clustering for Forensic
Analysis An Approach for Improving Computer Inspection.
View :Abstract Basepaper
|
|
CLOUD COMPUTING
|
|
|
50.CloudFTP A Case Study of Migrating
Traditional Applications to the Cloud.
View :Abstract Basepaper
|
51.A NOVEL METHOD TO SECURE CLOUD COMPUTING
THROUGH MULTICAST KEY MANAGEMENT.
View :Abstract Basepaper
|
52.Framework of Data Integrity for Cross
Cloud Environment Using CPDP Scheme.
View :Abstract Basepaper
|
53.Privacy-Assured Outsourcing of Image
Reconstruction Service in Cloud.
View :Abstract Basepaper
|
54.A Log-based Approach to Make Digital
Forensics Easier on Cloud Computing.
View :Abstract Basepaper
|
56.A Load Balancing Model Based on Cloud
Partitioningfor the Public Cloud.
View :Abstract Basepaper
|
57. Outsourcing Privacy-Preserving Social
Networks to a Cloud.
View :Abstract Basepaper
|
58.Privacy-Preserving Public Auditing for
Secure Cloud Storage.
View :Abstract Basepaper
|
59.Winds of Change From Vendor Lock-In to
the Meta Cloud.
Mech : "Migration
From Cloud Service Provider To Another From Identifying Cheats Of
Provider"
View :Abstract Basepaper
|
60.Cloud computing for mobile users can
offloading compution save energy.
Phase 2 : "Cloud based Energy Saving for Mobil User"
View :Abstract Basepaper
|
61.AMES-Cloud: A Framework of Adaptive
Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.
Alg : "SVC
Algorithm"
View :Abstract Basepaper
|
62.Mining Contracts for Business Events and
Temporal Constraints in Service Engagements.
Phase 2 : "Knowledge Based Business Service Engagement
Identification (KBS)"
Alg : "Grammar
Tree Pruning"
View :Abstract Basepaper
|
63.Collaboration in Multicloud Computing
Environments: Framework and Security Issues.
Phase 2 : “Proxy based Dynamic Data Outsourcing Multi clouds”
Alg : "Geometric
Data Perturbation"
View :Abstract Basepaper
|
|
PARALLEL AND
DISTRIBUTED SYSTEMS
|
64. Hint-based Execution of Workloads in
Clouds with Nefeli.
View :Abstract Basepaper
|
65. Load Rebalancing for Distributed File
Systems in Clouds.
View :Abstract Basepaper
|
|
|
67. IP-Geolocation Mapping for Moderately
Connected Internet Regions.
View :Abstract Basepaper
|
|
|
69. Efficient Two-Server Password-Only
Authenticated Key Exchange.
View :Abstract Basepaper
|
70. SocialTube P2P-assisted Video Sharing in
Online Social Networks.
View :Abstract Basepaper
|
71. Error-Tolerant Resource Allocation and
Payment Minimization for Cloud System.
View :Abstract Basepaper
|
72. Mona Secure Multi-Owner Data Sharing for
Dynamic Groups in the Cloud.
View :Abstract Basepaper
|
73. Priority-Based Consolidation of Parallel
Workloads in the Cloud.
View :Abstract Basepaper
|
74. Enabling Data Dynamic and Indirect
Mutual Trust for Cloud Computing Storage Systems.
View :Abstract Basepaper
|
75. Optimal Multiserver Configuration for
Profit Maximization in Cloud Computing.
View :Abstract Basepaper
|
76. A Privacy Leakage Upper-bound Constraint
based Approach for Cost-effective Privacy Preserving of Intermediate Datasets
in Cloud.
Phase 2 : "Cost effective Privacy preserving for intermediate
datasets on Cloud"
Alg : "practical
heuristic algorithm"
View :Abstract Basepaper
|
77. Dynamic Resource Allocation using
Virtual Machines for Cloud Computing Environment.
Phase 2 : "Cloud on Dynamic Virtual Resource Allocation"
Alg : "Skewness"
View :Abstract Basepaper
|
78. Towards Differential Query Services in
Cost-Efficient Clouds.
Mech : "Efficient
Information Retrieval for Ranked Query (EIRQ),Aggregation and Distribution
Layer (ADL)"
View :Abstract Basepaper
|
79. Geo-Community-Based Broadcasting for
Data Dissemination in Mobile Social Networks.
Alg : "Static
Route Algorithm"
View :Abstract Basepaper
|
|
KNOWLEDGE AND DATA
ENGINEERING - (DATA MINING)
|
80. A Fast Clustering-Based Feature Subset
Selection Algorithm for High Dimensional Data
Alg : "Fast
clustering-based feature selection algorithm"
View :Abstract Basepaper
|
|
|
82. Fairness-aware and Privacy-Preserving
Friend Matching Protocol in Mobile Social Networks
View :Abstract Basepaper
|
83.m-Privacy for Collaborative Data
Publishing
Alg : "Provider-Aware
Algorithm"
View :Abstract Basepaper
|
84. Crowdsourcing Predictors of Behavioral
Outcomes.
Phase 2 : "Internet-based collaborative activity"
Alg : "Crowdsourcing"
View :Abstract Basepaper
|
85. Spatial Approximate String Search.
Alg : "Novel
Adaptive Algorithm"
View :Abstract Basepaper
|
86. Facilitating Document Annotation Using
Content And Querying Value.
Mech : "Information
Extraction"
View :Abstract Basepaper
|
87.Incentive Compatible Privacy-Preserving
Data Analysis.
Mech : "Key
theorems,Association Rule Mining"
View :Abstract Basepaper
|
88.FoCUS Learning to Crawl Web Forums.
Alg : "Index/thread
URL detection,Page-flipping URL detection"
View :Abstract Basepaper
|
89.ROBUST MODULE BASED DATA MANAGEMENT.
Mech : "Novel
properties of robustness"
View :Abstract Basepaper
|
90.A Probabilistic Approach to String
Transformation.
Alg : "Aho-Corasick"
View :Abstract Basepaper
|
91.Comparable Entity Mining from Comparative
Questions.
Alg : "Bootstrapping
algorithm"
View :Abstract Basepaper
|
92.Facilitating Effective User Navigation
through Website Structure Improvement.
Alg : "Mathematical
Programming (MP) Model"
View :Abstract Basepaper
|
93.PMSE A Personalized Mobile Search Engine.
Alg : "Naïve
Bayes"
View :Abstract Basepaper
|
94.Fast Nearest Neighbor Search with
Keywords.
Mech : "Spatial
Inverted Index"
View :Abstract Basepaper
|
95.Secure Mining of Association Rules in
Horizontally Distributed Databases.
Mech : "Unifying
lists of locally Frequent Itemsets ,Kantarcioglu and Clifton"
View :Abstract Basepaper
|
96. A System to Filter Unwanted Messages
from OSN User Walls.
Mech : "Short
Text Classifier"
View :Abstract Basepaper
|
97. Anomaly Detection via Online
Oversampling Principal Component Analysis.
Alg : "Online
oversampling principal component analysis"
View :Abstract Basepaper
|
98. A Generalized Flow-Based Method for
Analysis of Implicit Relationships on Wikipedia.
Alg : "primal-dual
algorithm "
View :Abstract Basepaper
|
99. A Data-Mining Model for Protection of
FACTS-Based Transmission Line.
View :Abstract Basepaper
|
100. Sensitive Label Privacy Protection on
Social Network Data.
View :Abstract Basepaper
|
101. Preventing Private Information
Inference Attacks on Social Networks.
View :Abstract Basepaper
|
|
|
|
|
104. Secure Logging As a Service—Delegating
Log Management to the Cloud.
View :Abstract Basepaper
|
105. SybilDefender Defend Against Sybil
Attacks in Large Social Networks.
View :Abstract Basepaper
|
106. A Methodology for Direct and Indirect
Discrimination Prevention in Data Mining.
View :Abstract Basepaper
|
107. Privacy-preserving Mining of
Association Rules from Outsourced Transaction Databases.
View :Abstract Basepaper
|
108. Improving Security and Efficiency in
Attribute-Based Data Sharing.
View :Abstract Basepaper
|
|
|
110. Efficient Algorithms for Mining High
Utility Itemsets from Transactional Databases.
View :Abstract Basepaper
|
111. User Action Interpretation for Online
Content Optimization.
View :Abstract Basepaper
|
|
|
|
|
|
|
115. A Learning Approach to SQL Query
Results Ranking Using Skyline and Users’ Current Navigational Behavior.
View :Abstract Basepaper
|
116. Co-Occurrence-Based Diffusion for
Expert Search on the Web.
View :Abstract Basepaper
|
|
|
|
|
119. Efficient Evaluation of SUM Queries
over Probabilistic Data.
View :Abstract Basepaper
|
120. Vickrey-Clarke-Groves for
privacy-preserving collaborative classi?cation.
View :Abstract Basepaper
|
121. Efficient Evaluation of SUM Queries
over Probabilistic Data.
View :Abstract Basepaper
|
122. Location Based Intelligent Mobile
Organizer.(Using Android - 2011)
View :Abstract Basepaper
|
No comments:
Post a Comment