crec list.docx

5
1. A Decentralized Service discovery approach on peer-to-network 2. A Fast Clustering Based Feature Subset Selection Algorithm For High Dimensional Data 3. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 4. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 5. A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 6. A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONS 7. A new approach for FEC decoding based on the BP alogaritham in LTE and WIMAX system 8. A Study and implementation on use search Histories 9. A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS 10. Adding Temporal constraints to Xml 11. Annotating Search Results from Web Databases 12. ANOMALY DETECTION VIA ONLINE OVER-SAMPLING PRINCIPAL COMPONENT ANALYSIS 13. A-secure protocol for spontaneous wireless Adhoc Networks Creation 14. Attribute Based Encryption for scalable and secure Sharing of medical records in cloud computing desing and implementation 15. Automatic discovery of association orders between name and aliasis 16. Back-Pressure-Based-Packet-by-Packet-Adaptive-Routing-in- Communication-Networks-docx 17. CLOUD COMPUTING SECURITY: FROM SINGLE TO MULTI-CLOUDS 18. CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING 19. CloudMoV: Cloud-based Mobile Social TV 20. Clustering With multi view point Based similarity measure 21. Clustering-Sentence-Level-Text-Using-a-Novel-Fuzzy- Relational-Clustering-Algorithm-docx-not there 22. Combining-Cryptographic-Primitives-to-Prevent-Jamming- Attacks-in-Wireless-Networks-not there 23. Cut Detection In Wireless Sensor Networks 24. Distributed-Processing-of-Probabilistic-Top-k-Queries-in- Wireless-Sensor-Networks-docx 25. DoubleGuard Detecting Intrusions in multitier web

Upload: bhavanislide2

Post on 30-Jul-2015

54 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: CREC List.docx

1. A Decentralized Service discovery approach on peer-to-network2. A Fast Clustering Based Feature Subset Selection Algorithm For High Dimensional Data3. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks4. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud5. A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse

Drug Reaction Signal Pairs6. A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK

SESSIONS7. A new approach for FEC decoding based on the BP alogaritham in LTE and WIMAX system8. A Study and implementation on use search Histories9. A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS10. Adding Temporal constraints to Xml11. Annotating Search Results from Web Databases12. ANOMALY DETECTION VIA ONLINE OVER-SAMPLING PRINCIPAL COMPONENT

ANALYSIS13. A-secure protocol for spontaneous wireless Adhoc Networks Creation14. Attribute Based Encryption for scalable and secure Sharing of medical records in cloud

computing desing and implementation 15. Automatic discovery of association orders between name and aliasis16. Back-Pressure-Based-Packet-by-Packet-Adaptive-Routing-in-Communication-Networks-docx17. CLOUD COMPUTING SECURITY: FROM SINGLE TO MULTI-CLOUDS18. CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING19. CloudMoV: Cloud-based Mobile Social TV20. Clustering With multi view point Based similarity measure21. Clustering-Sentence-Level-Text-Using-a-Novel-Fuzzy-Relational-Clustering-Algorithm-docx-

not there22. Combining-Cryptographic-Primitives-to-Prevent-Jamming-Attacks-in-Wireless-Networks-not

there23. Cut Detection In Wireless Sensor Networks24. Distributed-Processing-of-Probabilistic-Top-k-Queries-in-Wireless-Sensor-Networks-docx25. DoubleGuard Detecting Intrusions in multitier web application26. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment27. EAACK--A Secure Intrusion-Detection System for MANETs.28. Efficient algorithm for high utility item sets for trasactional data bases-201229. Enabling-Dynamic-Data-and-Indirect-Mutual-Trust-for-Cloud-Computing-Storage-Systems30. ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD31. FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS32. Fully Anonymous Profile Matching in Mobile Social Networks33. IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES34. Intrusion-detection technique by using K-means,fuzzy neural networks and SVM calssifiers35. IP-Geo Location Mapping For Moderately Connected Internet Regions36. MeasuRouting :A Framework for Routing Assisted Traffic Monitoring37. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks38. On-the-Node-Clone-Detection-in-Wireless-Sensor-Networks-docx

Page 2: CREC List.docx

39. Optimal Client Server Assignment For Internet Distributed Systems40. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization41. Participatory Privacy: Enabling Privacy in participatory sensing42. PMSE: A Personalized Mobile Search Engine43. Preventing-Private-Information-Inference-Attacks-on-Social-Networks-docx44. PRIVACY PRESERVING DATA SHARING WITH ANYONYMOUS ID ASSIGNMENT45. PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE46. Protecting sensitive labels in social network data anonmyzation-docx47. SECURE MULTI-OWNER DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD48. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks49. Self Adaptive Contention Aware Routing protocol for intermittently connected mobile

Network50. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems-56-Java-Network Security-

2013-51. Spatial-Approximate-String-Search-docx52. Toward-Privacy-Preserving-and-Collusion-Resistance-in-a-Location-Proof-Updating-System-

docx-not there53. Towards a Statistical Framework for Source Anonymity in Sensor Networks 54. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System

Development-34-Data Mining-2013 Java List55. Two tales of privacy in online social networks56. Vampire attacks: Draining life from wireless ad-hoc sensor networks57. Warning Bird-not there

Enabling dynamic data and index mutual trust for cloud computing storage systems(JAVA)

65-Networking-2013-Java

EAACK: A secure intrusion detection sytem for MANET(JAVA)

47-Network Security-2013-Java

AMES CLOUD:A Framework of adaptive mobile video streaming and efficient social video sharing in the clouds(JAVA)

3-cloud computing-2013-Java

Page 3: CREC List.docx

Optimal client-server assignment for internet distributed Systems(JAVA)

68-networking-Java

Optimal multi server configuration for profit maximization in cloud computing(.NET)

8-DotNet-Cloud Computing

A highly scalable key predestration schema for wireless sensor networks(JAVA)60-networking-2013

A secure protocol for spontaneous wireless adhoc networks creation (JAVA)

61-networking-2013

Securing class Initialize in java-like languages(JAVA)

Privacy preserving public auditing for secure cloud storage(JAVA)

12-cloud computing-2013

MONA: Secure multiowner data sharing for dynamic groups in the cloud(.NET)

10-cloud computing-2013

Security analysis of a single sign on mechanism for distributed computer networks(JAVA)

55-Network Security

Page 4: CREC List.docx

IP-geolocation mapping for moderately connected internet regions(JAVA)

67-Networking-2013