Beruflich Dokumente
Kultur Dokumente
JAVA
1 JAVA/2013
SPA1301
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems CloudMoV: Cloud-based Mobile Social TV
CLOUD COMPUTING
SPA1303
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Privacy-Preserving Public Auditing for Secure Cloud Storage Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
CLOUD COMPUTING
JAVA/2013
SPA1305
CLOUD COMPUTING
JAVA/2013
JAVA/2013
SPA1307
CLOUD COMPUTING
JAVA/2013
JAVA/2013 JAVA/2013
9 10
11 SPA1311
12
SPA1312
A New Algorithm for Inferring User Search Goals with Feedback Sessions Annotating Search Results from Web Databases Anomaly Detection via Online Over-Sampling Principal Component Analysis Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks m-Privacy for Collaborative Data Publishing Protecting Sensitive Labels in Social Network Data Anonymization Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development EAACKA Secure Intrusion-Detection System for MANETs Identity-Based Secure Distributed Data Storage Schemes Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Privacy Preserving Data Sharing With Anonymous ID Assignment Securing Class Initialization in Java-like Languages Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
DATA MINING
JAVA/2013
JAVA/2013 JAVA/2013
JAVA/2013
16 17 18
JAVA/2013
SPA1323 SPA1324
SPA1326
SECURE COMPUTING
JAVA/2013
27
SPA1327
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Delay-Based Network Utility Maximization Dynamic Control of Coding for Progressive Packet Arrivals in DTNs A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme IP-Geolocation Mapping for Moderately Connected Internet Regions
SECURE COMPUTING
JAVA/2013
28 SPA1328 29 NETWORKING
JAVA/2013
NETWORKING NETWORKING
JAVA/2013 JAVA/2013
30 31
JAVA/2013 PARALLEL & DISTRIBUTED SYSTEMS PARALLEL & DISTRIBUTED SYSTEMS PARALLEL & DISTRIBUTED SYSTEMS PARALLEL & DISTRIBUTED SYSTEMS MOBILE COMPUTING JAVA/2013 SPA1336 DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Efficient Rekeying Framework for Secure Multicast with DiverseSubscription-Period Mobile Users A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data MOBILE COMPUTING JAVA/2013 SPA1337 MOBILE COMPUTING JAVA/2013 JAVA/2013 JAVA/2013
32
SPA1332
33 SPA1333 34
JAVA/2013
SPA1334
JAVA/2013
37
38
SPA1338
MOBILE COMPUTING
JAVA/2013
40
SPA1340
JAVA/2013
Networks 41 42 SPA1342 43 Privacy-Enhanced Web Service Composition SPA1341 Personalized QoS-Aware Web Service Recommendation and Visualization
SERVICE) SERVICE COMPUTING (WEB SERVICE) SERVICE COMPUTING (WEB SERVICE) SOFTWARE ENGINEERING CLOUD COMPUTING JAVA/2013 DATA MINING JAVA/2013 DATA MINING JAVA/2013 DATA MINING SECURE COMPUTING NETWORKING NETWORKING NETWORKING JAVA/2013 NETWORKING JAVA/2013 NETWORKING JAVA/2013 CLOUD COMPUTING MOBILE COMPUTING MOBILE COMPUTING JAVA/2013 JAVA/2013 JAVA/2013 JAVA/2013 JAVA/2013 JAVA/2013 JAVA/2013 JAVA/2013 JAVA/2013
JAVA/2013
SPA1343 SPA1344 SPA1345 SPA1346 SPA1347 SPA1348 SPA1349 SPA1350 SPA1351 SPA1352 SPA1353 SPA1354 SPA1355 SPA1356
Whole Test Suite Generation A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm Two tales of privacy in online social networks Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols On the Node Clone Detection in Wireless Sensor Networks Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm Load Rebalancing for Distributed File Systems in Clouds Toward a Statistical Framework for Source Anonymity in Sensor Networks Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
44 45 46 47 48 49 50 51 52 53 54 55 56
57 58 59 60 61 62 63 64 65
SPA1357 SPA1358 SPA1359 SPA1360 SPA1361 SPA1362 SPA1363 SPA1364 SPA1365 SPA1366 SPA1367 SPA1368 SPA1369 SPA1370 SPA1371
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Crowdsourcing Predictors of Behavioral Outcomes Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization Participatory Privacy: Enabling Privacy in Participatory Sensing Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs Facilitating Document Annotation using Content and Querying Value Privacy Preserving Delegated Access Control in Public Clouds Twitsper: Tweeting Privately A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia A System to Filter Unwanted Messages from OSN User Walls Anonymization of Centralized and Distributed Social Networks by Sequential Clustering Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System Understanding the External Links of Video Sharing Sites: Measurement and Analysis Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
NETWORKING JAVA/2013 SECURE COMPUTING JAVA/2013 DATA MINING CLOUD COMPUTING SECURE COMPUTING DATA MINING DATA MINING JAVA/2013 DATA MINING JAVA/2013 MOBILE COMPUTING JAVA/2013 MULTIMEDIA DATA MINING (CONFERENCE) SECURE COMPUTING (CONFERENCE) JAVA/2013 JAVA/2013 JAVA/2013 JAVA/2013 JAVA/2013 JAVA/2013
66 67
68 69 70 71
PROJECT SUPPORTS FOR STUDENTS: JOURNAL PUBLICATIONS / CONFERENCE PUBLICATIONS REVIEW DOCUMENTS AND PPTS 100% LIVE EXPLANATION PROJECT ASSIGNMENTS VIVA-VOCE QUESTIONS & ANSWERS VALID TRAINEE CERTIFICATION 100% PLACEMENT SUPPORT Own Projects are also welcomed.