Sie sind auf Seite 1von 8

CONTACT @ 094930 59954 MAIL US @

CHENNAI2011PROJECT S@GMAIL.COM

2012 JAVA /.NET PROJECTS

CLOUD COMPUTING
TITLE Cashing in on the Cache in the Cloud Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage pCloud: A Distributed System for Practical PIR DOMAIN CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING

DATA MINING
Adding Temporal Constraints to XML Schema Clustering with Multiviewpoint-Based Similarity Measure Combining Tag and Value Similarity for Data Extraction and Alignment Coupled Behavior Analysis with Applications DATA MINING DATA MINING DATA MINING DATA MINING

Data Mining for XML Query-Answering Support Document Clustering in Correlation Similarity Measure Space Efficient and Effective Duplicate Detection in Hierarchical Data Efficient Extended Boolean Retrieval Efficient Fuzzy Type-Ahead Search in XML Data Optimizing Bloom Filter Settings in Peerto-Peer Multi-keyword Searching Organizing User Search Histories Publishing Search LogsA Comparative Study of Privacy Guarantees Slicing: A New Approach for Privacy Preserving Data Publishing

DATA MINING DATA MINING DATA MINING DATA MINING DATA MINING DATA MINING DATA MINING DATA MINING DATA MINING

IMAGE PROCESSING
A Blur-Robust Descriptor with Applications to Face Recognition IMAGE PROCESSIN

G Automatic Image Equalization and Contrast Enhancement Using Gaussian Mixture Modeling Handwritten Chinese Text Recognition by Integrating Multiple Contexts IMAGE PROCESSIN G IMAGE PROCESSIN G

MOBILE COMPUTING
Moderated Group Authoring System for Campus-Wide Workgroups Optimization-Based Distributed Algorithms for Mobile Data Gathering in Wireless Sensor Networks MOBILE COMPUTING MOBILE COMPUTING

NETWORK SECURITY
A Hybrid Approach to Private Record Matching A Trapdoor Hash-Based Mechanism for Stream Authentication DoubleGuard: Detecting Intrusions in Multitier Web Applications Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Ensuring Distributed ACloud Computingountability for Data Sharing in the Cloud On Privacy of Encrypted Speech NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY NETWORK

Communications Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism Privacy-Preserving Enforcement of Spatially Aware RBAC Revisiting Defenses against Large-Scale Online Password Guessing Attacks Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting

SECURITY NETWORK SECURITY

NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY

NETWORKING
A Network Coding Equivalent Content Distribution Scheme for Efficient Peerto-Peer Interactive VoD Streaming BGP Churn Evolution: A Perspective NETWORKIN G NETWORKIN

From the Core Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters Distributed Packet Buffers for HighBandwidth Switches and Routers Efcient Error Estimating Coding: Feasibility and Applications Footprint: Detecting Sybil Attacks in Urban Vehicular Networks Insights on Media Streaming Progress Using BitTorrent-Like Protocols for OnDemand Streaming

G NETWORKIN G NETWORKIN G NETWORKIN G NETWORKIN G NETWORKIN G

MeasuRouting: A Framework for Routing NETWORKIN Assisted Trafc Monitoring G On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks NETWORKIN G NETWORKIN G

Das könnte Ihnen auch gefallen