Sie sind auf Seite 1von 7

2014 B TECH LIST

Networking

1. Congestion Aware Routing in Nonlinear Elastic Optical Networks


2. An Economic Framework for Routing and Channel Allocation in Cognitive Wireless Mesh
Networks
3. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure
Routing
4. An Adaptive Video Streaming Control System: Modeling, Validation, and Performance
Evaluation
5. Optimization Decomposition for Scheduling and System Conguration in Wireless Networks
6. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in DelayTolerant Networks
7. A Survey of Intrusion Detection Systems in Wireless Sensor Networks
8. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks

9. Bandwidth Distributed Denial of Service: Attacks and Defenses


10. Data Retrieval Scheduling for Multi-Item Requests in Multi-Channel Wireless Broadcast
Environments
11. On the Hardness of Minimum Cost Blocking Attacks on Multi-path Wireless Routing
Protocols
12. Reliable Energy Efficient Routing Algorithms In Wireless Ad Hoc Networks
13. Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks
14. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
15. Behavioral Malware Detection in Delay Tolerant Networks

16. Dynamic cloud pricing for revenue maximization


17. A bandwidth efficient cooperative authentication scheme for filtering injected false data in
wireless sensor networks

Data Mining

1.
2.
3.
4.
5.
6.

Dealing With Concept Drifts in Process Mining


Web-Based Traffic Sentiment Analysis: Methods and Applications
Searching Dimension Incomplete Databases
Discovering Emerging Topics in Social Streams via Link Anomaly Detection
Trusted DB: A Trusted Hardware based Database with Privacy and Data Condentiality
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional

Data.
7. Facilitating Document Annotation using Content and Querying Value.
8. Facilitating Effective User Navigation through Website Structure Improvement.
9. Fast nearest Neighbor Search with Keywords.
10. M-Privacy for Collaborative Data Publishing.
11. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System.
12. Privacy Preserving Delegated Access Control in Public Clouds.
13. Secure Mining of Association Rules in Horizontally Distributed Databases.
14. Towards Online Shortest Paths Computation
15. A Cocktail Approach for Travel Package Recommendation
16. An Empirical Performance Evaluation of Relational Keyword Search Systems
17. Dynamic Query Forms for Database Queries
18. Efficient Ranking on Entity Graphs with Persanalized Relationships
19. Keyword Query Routing
20. Mapping XML to a Wide Sparse Table
21. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
22. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational
Data
23. A Probabilistic Approach to String Transformation
24. privacy preserving authenticated key exchange over internet

Cloud Computing

1. PRIVACY PRESERVING BACK-PROPAGATION NEURAL NETWORK IN CLOUD


COMPUTING
2. Automatic Scaling of Internet Applications for Cloud Computing Services

3. Enabling Smart Cloud Services Through Remote Sensing: An Internet of Everything


Enabler
4. Developing Vehicular Data Cloud Services in the Io T Environment
5. Data Similarity-Aware Computation Infrastructure for the Cloud
6. Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach for
Cloud Computing Environments
7. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization
Using Map Reduce on Cloud
8. Building Condential and Efficient Query Services in the Cloud with RASP Data
Perturbation
9. Cloud Service Negotiation in Internet of Things Environment: A Mixed Approach
10. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
11. Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach for
Cloud Computing Environments
12. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
13. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory
and Implementation
14. HARMONY: Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud
15. Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable
Mobile Applications in Clouds
16. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
17. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

18.

Privacy preserving delegated access control in public

clouds
19. Probabilistic Consolidation of Virtual Machines in Self-Organizing Cloud Data Centers
20. Scalable Analytics for IaaS Cloud Availability

21. A Stochastic Model to Investigate Data Center Performance and QOS in IaaS Cloud
Computing Systems
22. An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud
Computing
23. To Design a framework to compare cloud storage providers
24. Towards Differential Query Services in Cost-Efficient Clouds
25. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage Theory
and Implementation
26. privacy preserving multi keyword ranked search over encrypted cloud data

Mobile Computing

1. A Fade Level-Based Spatial Model for Radio Tomographic Imaging.


2. NETWRAP: An NDN Based Real Time Wireless Recharging Framework for Wireless Sensor

3.
4.
5.
6.
7.
8.

Networks.
SEAMLOC: Seamless Indoor Localization Based on Reduced Number of Calibration Points.
Token-MAC: A Fair MAC Protocol for Passive RFID Systems.
Friendbook: A Semantic-based Friend Recommendation System for Social Networks.
Real-Time Misbehavior Detection in IEEE 802.11TM: An Analytical Approach.
Video Dissemination over Hybrid Cellular and Ad Hoc Networks.
Preserving Location Privacy In Geo-Social Applications

Secure Computing

1.
2.
3.
4.
5.
6.
7.

MOSES: Supporting and Enforcing Security Proles on Smartphones


Hiding in the Mobile Crowd: Location Privacy through Collaboration
Generating Summary Risk Scores for Mobile Applications
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
PROFILE: Toward Preserving Privacy and Functionality in Geosocial Networks
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices
Human Effects of Enhanced Privacy Management Models

Parallel and distributed

1. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks.


2. Towards Differential Query Services in Cost-Efcient Clouds.
3. Signature Searching in a Networked Collection of Files

Image Processing

1. Designing an Efcient Image Encryption-Then-Compression System via Prediction Error


Clustering and Random Permutation

2. Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image
Compression

3. Captcha as Graphical PasswordsA New Security Primitive Based on Hard AI Problems

Das könnte Ihnen auch gefallen