Sie sind auf Seite 1von 3

IEEE 2014 JAVA / J2EE /DOT NET TITLES

DATA ALCOTT SYSTEMS


Old No.13/1, New No.27, Second Floor, Brndavan Street
West Mambalam, Chennai 600 033
ieeedata@gmail.com
(0) 9600095046 / 47

S.NO

TITLE

TECHNOLOGY

MONTH/
YEAR

KNOWLEDGE AND DATA ENGINEERING / DATA MINING


1
2
3

Supporting Privacy Protection in Personalized Web Search


JAVA/J2EE
Fast Nearest Neighbor Search with Keywords
JAVA
Approximate Shortest Distance Computing: A Query-Dependent JAVA/J2EE

Feb 2014
April 2014
Jan 2014

Local Landmark Scheme


LARS: An Efficient and Scalable Location-Aware Recommender JAVA/J2EE

June 2014

5
6
7
8

System
Dynamic Query Forms for Database Queries
Privacy Preserving Delegated Access Control in Public Clouds
m-Privacy for Collaborative Data Publishing
Scalable Keyword Search on Large RDF Data

Preprint
Preprint
Preprint
Preprint

IMAGE PROCESSING
Designing an Efficient Image Encryption-Then-Compression JAVA

JAVA/J2EE
JAVA/J2EE
JAVA/J2EE
JAVA/J2EE

Jan 2014

System via Prediction Error Clustering and Random Permutation


10
11

- Information Forensics and Security


Fingerprint Compression Based on Sparse Representation
JAVA
Hierarchical Prediction and Context Adaptive Coding for Lossless JAVA

Feb 2014
Jan 2014

Color Image Compression

12

CLOUD COMPUTING
Oruta: Privacy-Preserving Public Auditing for Shared Data in the JAVA/J2EE

Jan-

13

Cloud
Decentralized Access Control with Anonymous Authentication of

2014
Feb 2014

Data Stored in Clouds - Parallel Distributed Systems

Mar

14

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud

Feb 2014

Storage - Parallel Distributed Systems


15

On the Knowledge Soundness of a Cooperative Provable Data

Jan 2014

Possession Scheme in Multicloud Storage - Parallel Distributed


16

Systems
Privacy Preserving Back-Propagation Neural Network Learning JAVA/J2EE

Jan 2014

17

Made Practical with Cloud Computing


Identity-Based Distributed Provable Data Possession in Multi- DOT NET

Jan 2014

Cloud Storage- Services Computing

18

NETWORKING
Secure Data Retrieval for Decentralized Disruption-Tolerant

Feb 2014

Military Networks

19

WIRELESS COMMUNICATIONS
Incentive Based Data Sharing in Delay Tolerant Mobile Networks

20

DEPENDABLE SECURE COMPUTING / NETWORK SECURITY


Hiding in the Mobile Crowd: Location Privacy through JAVA

May June

Collaboration

2014

21

MOBILE COMPUTING
Energy-Efficient Reliable Routing Considering Residual Energy

Feb 2014

22

in Wireless Ad Hoc Networks


Video Dissemination over Hybrid Cellular and Ad Hoc Networks

Feb 2014

23

Energy-optimum Throughput and Carrier Sensing Rate in JAVA

June 2014

24

CSMA-based Wireless Networks


Cooperative Caching for Efficient Data Access in Disruption JAVA

March 2014

25

Tolerant Networks
Privacy-Preserving and Truthful Detection of Packet Dropping JAVA

Preprint

Attacks in Wireless Ad Hoc Networks

2014

PARALLEL DISTRIBUTED SYSTEMS


Securing Broker-Less Publish/Subscribe Systems Using Identity-

Feb 2014

26

JAVA

Jan 2014

27

Based Encryption
Traffic pattern-based content leakage detection for trusted

Feb 2014

content delivery networks


28

A System for Denial-of-Service Attack Detection Based on JAVA

Feb 2014

29

Multivariate Correlation Analysis


Cross-Layer Approach for Minimizing Routing Disruption in IP JAVA

July 2014

Networks

30

SECURITY AND PRIVACY


Bandwidth Distributed Denial of Service: Attacks and Defenses

JAVA

Jan Feb
2014

Das könnte Ihnen auch gefallen