List Of Topics:
- CLOUD COMPUITNG
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Privacy-Preserving Public Auditing for Secure Cloud Storage
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
Privacy-Preserving Public Auditing for Secure Cloud Storage
Winds of Change From Vendor Lock-In to the Meta Cloud.
Cloud computing for mobile users can offloading compution save energy.
On Data Staging Algorithms for Shared Data Accesses in Clouds
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
Load Rebalancing for Distributed File Systems in Clouds
Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
Privacy Preserving Delegated Access Control in Public Clouds
Attribute-Based Encryption with Verifiable Outsourced Decryption
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
CloudMoV: Cloud-based Mobile Social TV
QoS Ranking Prediction for Cloud Services
Privacy-Preserving Public Auditing for Secure Cloud Storage
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.
- DATA MINING
A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
A Survey of XML Tree Patterns
Change Detection in Streaming Multivariate Data Using Likelihood Detectors
Dynamic Personalized Recommendation on Sparse Data
Mining User Queries with Markov Chains: Application to Online Image Retrieval
Optimal Route Queries with Arbitrary Order Constraints
Failure-Aware Cascaded Suppression in Wireless Sensor Networks
- KNOWLEDGE AND DATA ENGINEERING
Facilitating Document Annotation using Content and Querying Value
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
A System to Filter Unwanted Messages from OSN User Walls
Anonymization of Centralized and Distributed Social Networks by Sequential Clustering.
Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers
Spatial Approximate String Search
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
m-Privacy for Collaborative Data Publishing
Protecting Sensitive Labels in Social Network Data Anonymization
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs
Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
Crowdsourcing Predictors of Behavioral Outcomes
Preventing Private Information Inference Attacks on Social Networks
Multiparty Access Control for Online Social Networks Model and Mechanisms
Incentive Compatible Privacy-Preserving Data Analysis
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
A New Algorithm for Inferring User Search Goals with Feedback Sessions
Annotating Search Results from Web Databases
Anomaly Detection via Online Over-Sampling Principal Component Analysis
- SECURE COMPUTING
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream
Two tales of privacy in online social networks
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
Twitsper: Tweeting Privately
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.
Two tales of privacy in online social networks.
EAACK—A Secure Intrusion-Detection System for MANETs
Identity-Based Secure Distributed Data Storage Schemes
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Privacy Preserving Data Sharing With Anonymous ID Assignment
Securing Class Initialization in Java-like Languages
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
- NETWORKING
Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.
Participatory Privacy Enabling Privacy in Participatory Sensing.
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
Delay-Based Network Utility Maximization
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
On the Node Clone Detection in Wireless Sensor Networks
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
Efficient Algorithms for Neighbor Discovery in Wireless Networks
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
Participatory Privacy: Enabling Privacy in Participatory Sensing
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
- PARALLEL AND DISTRIBUTED SYSTEMS
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
Towards Differential Query Services in Cost-Efficient Clouds.
A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.
Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems.
ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
IP-Geolocation Mapping for Moderately Connected Internet Regions
Optimal Client-Server Assignment for Internet Distributed Systems
SocialTube P2P-assisted Video Sharing in Online Social Networks
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
IP-Geolocation Mapping for Moderately Connected Internet Regions
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
Analysis of Distance-Based Location Management in Wireless Communication Networks.
Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
- MOBILE COMPUTING
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
Toward a Statistical Framework for Source Anonymity in Sensor Networks
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
EAACK—A Secure Intrusion-Detection System for MANETs
Vampire attacks:Draining life from wireless ad-hoc sensor networks.
Towards a Statistical Framework for Source Anonymity in Sensor Networks
Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
IP-Geolocation Mapping for Moderately Connected Internet Regions
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
- SERVICE COMPUTING
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
Privacy-Enhanced Web Service Composition
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
- PATTERN ANALYSIS AND MACHINE INTELLIGENCE
A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
- SERVICES COMPUTING
A Decentralized Service Discovery Approach on Peer-to-Peer Networks
Personalized QoS-Aware Web Service Recommendation and Visualization
Privacy-Enhanced Web Service Composition
All The Best friends for the Projects..
Please Like...Share...& Follow for more contents..!
No comments:
Post a Comment