ieee paper

15
1 S-Logix #9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road) Ph:28343467 Mobile: 9841268578 E-Mail: [email protected] Wireless Networks ( Mobile, Ad Hoc, WLAN, Sensor) Smooth Trade-Offs between Throughput and Delay in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, March 2012 [NS2] Network Connectivity with a Family of Group Mobility Models, IEEE Transactions on Mobile Computing, March 2012 [NS2] Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, Jan 2012 [ NS2] Stateless Multicast Protocol for Ad Hoc Networks, IEEE Transactions on Mobile Computing, Feb 2012 [NS2] Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network, IEEE Transactions on Mobile Computing, IEEE Transactions on Mobile Computing, Feb 2012 [NS2] Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions, IEEE Transactions on Mobile Computing, March 2012 [NS2] Energy-Efficient Strategies for Cooperative Multi-channel MAC Protocols, IEEE Transactions on Mobile Computing, April 2012 [NS2] ALERT: An Anonymous Location-based Efficient Routing Protocol in MANETs, IEEE Transactions on Mobile Computing [ NS2] Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing [NS2] Collision-free arbitration protocol for active RFID systems, IEEE Journal of Communications and Networks, Feb 2012 [Java] Reducing RFID reader load with the meet-in-the-middle strategy , IEEE Journal of Communications and Networks, Feb 2012 [Java] Optimal Control of Wireless Networks With Finite Buffers, IEEE Transactions on Networking, 2012 (NS2) Centralized and Clustered k-Coverage Protocols for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Jan 2012 [NS2] Single RFID Tag Ownership Transfer Protocols, IEEE Transactions on Parallel and Distributed Systems, March 2012 [Java] CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks, IEEE Transactions on Parallel and Distributed Systems, Feb 2012 [NS2]

Upload: saveetharavi

Post on 01-Nov-2014

228 views

Category:

Documents


2 download

DESCRIPTION

IEEE paper

TRANSCRIPT

Page 1: IEEE paper

1

S-Logix #9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)

Ph:28343467 Mobile: 9841268578 E-Mail: [email protected]

Wireless Networks ( Mobile, Ad Hoc, WLAN, Sensor)

Smooth Trade-Offs between Throughput and Delay in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, March 2012 [NS2] Network Connectivity with a Family of Group Mobility Models, IEEE Transactions on Mobile Computing, March 2012 [NS2] Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, Jan 2012 [ NS2] Stateless Multicast Protocol for Ad Hoc Networks, IEEE Transactions on Mobile Computing, Feb 2012 [NS2] Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network, IEEE Transactions on Mobile Computing, IEEE Transactions on Mobile Computing, Feb 2012 [NS2] Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions, IEEE Transactions on Mobile Computing, March 2012 [NS2] Energy-Efficient Strategies for Cooperative Multi-channel MAC Protocols, IEEE Transactions on Mobile Computing, April 2012 [NS2] ALERT: An Anonymous Location-based Efficient Routing Protocol in MANETs, IEEE Transactions on Mobile Computing [ NS2] Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing [NS2] Collision-free arbitration protocol for active RFID systems, IEEE Journal of Communications and Networks, Feb 2012 [Java] Reducing RFID reader load with the meet-in-the-middle strategy , IEEE Journal of Communications and Networks, Feb 2012 [Java] Optimal Control of Wireless Networks With Finite Buffers, IEEE Transactions on Networking, 2012 (NS2) Centralized and Clustered k-Coverage Protocols for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Jan 2012 [NS2] Single RFID Tag Ownership Transfer Protocols, IEEE Transactions on Parallel and Distributed Systems, March 2012 [Java] CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks, IEEE Transactions on Parallel and Distributed Systems, Feb 2012 [NS2]

Page 2: IEEE paper

2

A QoS Oriented Vertical Handoff Scheme for WiMAX/WLAN Overlay Networks, IEEE Transactions on Parallel and Distributed Systems, April 2012 [NS2] Adaptive Opportunistic Routing for Wireless Ad Hoc Networks, IEEE Transactions on Networking, Feb 2012 [NS2] Balancing the Trade-Offs between Query Delay and Data Availability in MANETs, IEEE Transactions on Parallel and Distributed Systems, April 2012 [NS2] Explicit Congestion Control Algorithms for Time Varying Capacity Media, IEEE Transactions on Mobile Computing, Jan 2011 [NS2] Hop-by-Hop Traceback in Wireless Sensor Networks, IEEE Communications Letters, Feb 2012 [NS2] Detection of Sybil Attack in Mobile Wireless Sensor Networks, IJESAT | Mar-Apr 2012. [NS2] A Cooperative Clustering Protocol for Energy Saving of Mobile Devices with WLAN and Bluetooth Interfaces, IEEE Transactions on Mobile Computing, April 2011[NS2] Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, April 2011[NS2] Energy-Efficient Protocol for Cooperative Networks, IEEE/ACM Transactions on Networking, April 2011[NS2] Video Streaming Distribution in VANETs, IEEE Transactions on Parallel and Distributed Systems, July 2011[Java/NS2] Spatial Temporal coverage in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, May 2011 [NS2] DBET: Demand Based Energy efficient Topology for MANETs, IEEE International Conference on device and Communications, Feb 2011 [NS2] Continuous Neighbor Discovery in Asynchronous Sensor Networks, IEEE/ACM Transactions on Networking, Feb 2011 [NS2] On Exploiting Cognitive Radio to Mitigate Interference in Macro/Femto Heterogeneous Networks, IEEE Wireless Communications, June 2011 [NS2] Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, August 2010 [NS2] A Joint Routing and Scheduling Algorithm for Efficient Broadcast in Wireless Mesh Networks, IEEE Communications and Networking Conference, WCNC 2010 [NS2 / Java] SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile IEEE Transactions on Mobile Computing, June 2010 [Java /NS2] Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, Feb. 2010 [NS2]

Page 3: IEEE paper

3

A Hybrid Reservation/Contention-based MAC for Video Streaming over Wireless Networks, IEEE Journal on Selected Areas in Communications, April 2010 [NS2] Model-Based Techniques for Data Reliability in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, April 2009 [NS2] Cell Breathing Techniques for Load Balancing in Wireless LANs, IEEE Transactions on Mobile Computing, June 2009 [NS2] Improving TCP/IP Performance over Third-Generation Wireless Networks, IEEE Transactions on Mobile Computing, April 2008 [NS2] Benefit-Based Data Caching in Ad Hoc Networks, IEEE Transactions on Mobile Computing, March 2008 (Java / NS2) COACS: A Cooperative and Adaptive Caching System for MANETs, IEEE Transactions on Mobile Computing, Aug. 2008 [NS2 / Java] Data Dissemination with Ring-Based Index for Wireless Sensor Networks, IEEE Transactions on Mobile Computing, July 2007 [NS2 / Java] End-to-end Differentiations of Congestion and Wireless Losses, IEEE Transactions on Networking [NS2] Weight based Clustered Key Management Scheme using RSA for Wireless Mobile Ad hoc Networks. [NS2]

S-Logix #9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)

Ph:28343467 Mobile: 9841268578 E-Mail: [email protected]

Data Mining / Database A Framework for Personal Mobile Commerce Pattern Mining and Prediction, IEEE Transactions on Knowledge and Data Engineering, May 2012 [Java] Continuous Detour Queries in Spatial Networks, IEEE Transactions on Knowledge and Data Engineering, July 2012 [Java] Efficient Computation of Range Aggregates Against Uncertain Location-based Queries, IEEE Transactions on Knowledge and Data Engineering, July 2012 [ Java] Evaluating Path Queries over Frequently Updated Route Collections, IEEE Transactions on Knowledge and Data Engineering, July 2012 [ Java] Weakly Supervised Joint Sentiment-topic Detection from Text, IEEE Transactions on Knowledge and Data Engineering, June 2012 [Java] Efficient Fuzzy Type-ahead Search in XML Data, IEEE Transactions on Knowledge and Data Engineering, May 2012 [ Java /J2EE]

Page 4: IEEE paper

4

Improving Aggregate Recommendation Diversity using Ranking-based Techniques, IEEE Transactions on Knowledge and Data Engineering, May 2012 [Java/J2EE] Effective Pattern Discovery for Text Mining, IEEE Transactions on Knowledge and Data Engineering, Jan 2012 [Java] Outsourced Similarity Search on Metric Data Assets, IEEE Transactions on Knowledge and Data Engineering, Feb 2012 [Java] Mining Online Reviews for Predicting Sales Performance: A Case Study in the Movie Domain, IEEE Transactions on Knowledge and Data Engineering, April 2012 [Java/J2EE] Movie Rating and Review Summarization in Mobile Environment, IEEE Transactions on Parallel and Distributed Systems, May 2012 [Java] A Temporal Pattern Search Algorithm for Personal History Event Visualization, IEEE Transactions on Knowledge and Data Engineering, 2012 [Java/J2EE] One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases, IEEE Transactions on Knowledge and Data Engineering, 2012 [Java/J2EE] Topic Mining over Asynchronous Text Sequences, IEEE Transactions on Knowledge and Data Engineering, 2012 [Java] Understanding Plagiarism Linguistic Patterns, Textual Features, and Detection Methods, IEEE Transactions on Parallel and Distributed Systems, March 2012 [ Java/J2EE ] Exploring Application-Level Semantics for Data Compression, IEEE Transactions On Knowledge And Data Engineering, January 2011 [Java] Aspect Based Opinion Polling from Customer Reviews, IEEE Transactions On Affective Computing, March 2011. [Java] Database Access Pattern Protection without Full-Shuffles, IEEE Transactions on Information Forensics and Security, March 2011[Java] Effective Navigation of Query Results Based on Concept Hierarchies, IEEE Transactions on Knowledge and Data Engineering, April 2011[Java] Ranking Spatial Data by Quality Preferences, IEEE Transactions on Knowledge and Data Engineering, March 2011 [Java] Selecting Attributes for Sentiment Classification Using Feature Relation Networks, IEEE Transactions on Knowledge and Data Engineering, March 2011[Java] A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts, IEEE Transactions on Knowledge and Data Engineering, June 2011[Java] Automatic Enrichment of Semantic Relation Network and Its Application to Word Sense Disambiguation, IEEE Transactions on Knowledge and Data Engineering, June 2011[Java]

Page 5: IEEE paper

5

Design and Implementation of an Intrusion Response System for Relational Databases, IEEE Transactions on Knowledge and Data Engineering, June 2011[Java] Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments, IEEE Transactions on Knowledge and Data Engineering, June 2011[Java] Privacy-Preserving Updates to Anonymous and Confidential Databases, IEEE Transactions on Dependable and Secure Computing, Aug 2011[Java] Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models, IEEE Transactions on Pattern Analysis and Machine Intelligence, April 2011 [Java] Knowledge-Based Interactive Postmining of Association Rules Using Ontologies, IEEE Transactions On Knowledge And Data Engineering, June 2010 (J2EE) Assessment of the Risk Factors of Coronary Heart Events Based on Data Mining With Decision Trees, IEEE Transactions on Information Technology in Biomedicine, May 2010 [J2EE/.NET) Deriving Concept-Based User Profiles from Search Engine Logs, IEEE Transactions on Knowledge and Data Engineering, July 2010 [Java] Web User-Session Inference by Means of Clustering Techniques, IEEE/ACM Transactions on Networking, April 2009 [J2EE /.NET] Predicting Missing Items in Shopping Carts, IEEE Transactions on Knowledge and Data Engineering, July 2009 [J2EE/.NET] Exact Knowledge Hiding through Database Extension, IEEE Transactions on Knowledge and Data Engineering, May 2009 [Java] Integrating Data Warehouses with Web Data, IEEE Transactions on Knowledge and Data Engineering, July 2008, [J2EE / .NET] A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Sites, IEEE Transactions on Knowledge and Data Engineering, Feb. 2008, [ Java/J2EE] Watermarking Relational Databases Using Optimization-Based Techniques, IEEE Transactions on Knowledge and Data Engineering, Jan. 2008, [Java] Protection of Database Security via Collaborative Inference Detection, IEEE Transactions on Knowledge and Data Engineering, Aug. 2008 Database Security [Java / J2EE] Mining E-Commerce Data to Analyze the Target Customer Behavior, Third International Conference on Knowledge Discovery and Data Mining, Jan. 2008, [J2EE / .NET] Service-mining Based on the Knowledge and Customer Databases, IEEE/ACIS Intl Confrence on Computer and Information Science, ICIS July 2007, [J2EE / .NET] Comparisons of Database Replication Techniques Based on Total Order Broadcast, IEEE Transactions On Knowledge And Data Engineering April 2005 [Java]

Page 6: IEEE paper

6

Cloud Computing Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage, IEEE Transactions on Parallel and Distributed Systems, July 2012 [Java] Ensuring Distributed Accountability for Data Sharing in the Cloud, Transactions on Dependable and Secure Computing, July 2012 [Java] HASBE- A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing, IEEE Transactions on Information Forensics and Security, April 2012 [Java] p-Cloud: A Distributed System for Practical PIR, Transactions on Dependable and Secure Computing, July 2012 [Java] A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations, IEEE Transactions on Parallel and Distributed systems, June 2012 [Java] Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, May 2011(Java) Secure and Practical Outsourcing of Linear Programming in Cloud Computing, IEEE INFOCOM, April 2011[Java]

S-Logix #9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)

Ph:28343467 Mobile: 9841268578 E-Mail: [email protected]

Network Security (Wired /Wireless ) USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks , IEEE Transactions on parallel and distributed systems, May 2012 [Java/NS2] Self-Protection in a Clustered Distributed System, IEEE Transactions on Parallel and Distributed Systems, Feb 2012 [Java/J2EE] Footprint: Detecting Sybil Attacks in Urban Vehicular Networks, IEEE Transactions on Parallel and Distributed Systems, June 2012 [NS2] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption, IEEE Transactions on Parallel and Distributed Systems, [Java/J2EE] Robust Watermarking of Compressed and Encrypted JPEG2000 Images, IEEE Transactions on Multimedia, June 2012 [Java] Privacy Enabled Digital Rights Management without Trusted Third Party Assumption, IEEE Transactions on Multimedia, June 2012 [Java/J2ee]

Page 7: IEEE paper

7

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection, IEEE Transactions on Networking, June 2012 [NS2] Resilient Identity Crime Detection, IEEE Transactions on Knowledge and Data Engineering, March 2012 [Java/J2EE] Slicing: a New Approach for Privacy Preserving Data Publishing, IEEE Transactions on Knowledge and Data Engineering, March 2012 [Java/J2EE] Exact in-network Aggregation with Integrity and Confidentiality, IEEE Transactions on Knowledge and Data Engineering, 2012 [Java/J2EE] FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks, IEEE Transactions on Mobile Computing, May 2012 [NS2] EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks, IEEE Transactions on Mobile Computing, 2012 [Java/NS2] A Provable Authenticated Certificateless Group Key Agreement with Constant Rounds, IEEE Journal of Communications and Networks, Feb 2012 [Java] Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack, IEEE Communications Letters, May 2012 [NS2] Improving Selfish Node Detection in MANETs Using a Collaborative Watchdog, IEEE Communications Letters, May 2012 [NS2] DoubleGuard: Detecting Intrusions in Multitier Web Applications, Transactions on Dependable and Secure Computing, July 2012[J2EE] A New Ultralightweight RFID Authentication Protocol with Permutation, IEEE Communications Letters, May 2012 [NS2] Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities, Transactions on Dependable and Secure Computing, May 2012[Java] M-Score A Misuseability Weight Measure, Transactions on Dependable and Secure Computing, May 2012[Java] Risk-Aware Mitigation for MANET Routing Attacks, Transactions on Dependable and Secure Computing, March 2012 [NS2] OAuth Web Authorization Protocol, IEEE Internet Computing, Jan 2012 [J2EE/.NET] A Look-Ahead Approach to Secure Multiparty Protocols, IEEE Transactions on Knowledge and Data Engineering, July 2012 [Java / J2EE] A Flexible Approach to Multi-session Trust Negotiations, Transactions on Dependable and Secure Computing, Jan 2012 [NS2]

Page 8: IEEE paper

8

Packet-Hiding Methods for Preventing Selective Jamming Attacks, Transactions on Dependable and Secure Computing, Jan 2012 [NS2] Revisiting Defenses against Large-Scale Online Password Guessing Attacks, Transactions on Dependable and Secure Computing, Jan 2012 [J2EE] oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks, IEEE Transactions on Information Forensics and Security, April 2012 [Java] RIHT: A Novel Hybrid IP Traceback Scheme, IEEE Transactions on Information Forensics and Security, April 2012 [Java] A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems, IEEE Transactions on Information Forensics and Security, April 2012 [Java] A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs, IEEE Transactions on Intelligent Transportation Systems, March 2012 [Java] Antiphishing through Phishing Target Discovery, IEEE Internet Computing, March 2012 [J2EE/.NET] New Key Management Approach for Broadcast and Multicast Services, IEEE Communications Letters, Feb 2011[Java] A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting, IEEE Transactions on Information Forensics and Security, March 2011[Java] Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure, IEEE Transactions on Mobile Computing, August 2011[Java/NS2] On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, August 2011[NS2] SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks, IEEE Transactions on Dependable and Secure Computing, April 2011[Java/NS2] Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE Transactions on Mobile Computing, May 2011[NS2] Mechanism Design-Based Secure Leader Election Model Intrusion Detection in MANET, IEEE Transactions on Dependable and Secure Computing, Feb 2011[NS2] Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and Distributed Systems, July 2011[Java] P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, March 2011[Java/NS2] A Policy Enforcing Mechanism for Trusted Ad Hoc Networks, IEEE Transactions on Dependable and Secure Computing, June 2011[Java/NS2]

Page 9: IEEE paper

9

Nymble: Blocking Misbehaving Users in Anonymizing Networks, IEEE Transactions on Dependable and Secure Computing, April 2011[Java/NS2] Privacy-aware Role Based Access Control, Fuzzy Role-Based Access Control, IEEE Transactions on Information Processing Letters, June 2010 (J2EE) Vulnerability Discovery with Attack Injection, IEEE Transactions on Software Engineering, May2010 (Java) Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems, IEEE Transactions on Parallel and Distributed Systems, August 2010 (NS2) A_Puzzle-Based Defense Strategy against Flooding Attacks Using Game Theory, IEEE Transactions on Dependable and Secure Computing, March 2010 (J2EE/.NET) Dynamic rekeying in 3GPP multimedia broadcast/multicast service (MBMS) IEEE Communications Letters, April 2010 (JAVA) Authenticated Group Key Transfer Protocol Based on Secret Sharing, IEEE Transactions on Computers, June 2010 (JAVA) An Advanced Hybrid Peer-to-Peer Botnet, IEEE Transactions on Dependable and Secure Computing, June 2010 ( JAVA) Using Web-Referral Architectures to Mitigate Denial-of-Service Threats, IEEE Transactions on Dependable and Secure Computing, June 2010 (J2EE/.NET) Blind Authentication: A Secure Crypto-Biometric Verification Protocol, IEEE Transactions on Information Forensics and Security, June 2010 (JAVA) An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, IEEE Transactions on Information Forensics and Security, March 2010 (JAVA) MABS: Multicast Authentication Based on Batch Signature, IEEE Transactions on Mobile Computing, July 2010 (Java) Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes, IEEE Transactions on Vehicular Technology, June 2009 (NS2) Provably Secure Steganography, IEEE Transactions on Computers, May 2009 (Java) The Design of a Generic Intrusion-Tolerant Architecture for Web Servers, IEEE Transactions on Dependable and Secure Computing, Jan.-March 2009 (J2EE) Monitoring the Application-Layer DDoS Attacks for Popular Websites, IEEE/ACM Transactions on Networking, Feb. 2009 (J2EE/.NET) Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET, IEEE Transactions on Dependable and Secure Computing, June 2009 (NS2)

Page 10: IEEE paper

10

A Gen2-Based RFID Authentication Protocol for Security and Privacy, IEEE Transactions on Mobile Computing, Aug. 2009 (Java) Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices, IEEE Transactions on Computers, June 2008 (Java) An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting, IEEE Transactions on Dependable and Secure Computing, April-June 2008 ( Java ) Controlling IP Spoofing through Interdomain Packet Filters, IEEE Transactions on Dependable and Secure Computing, Jan.-March 2008 (NS2) Credit Card Fraud Detection Using Hidden Markov Model, IEEE Transactions on Dependable and Secure Computing, Jan.-March 2008 (J2EE/.NET) Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, IEEE Transactions on Parallel and Distributed Systems, May 2008 (Java) Keep Passwords Away from Memory: Password Caching and Verification Using TPM, 22nd Int’l Conf on Advanced Information Networking and Applications, March 2008 (Java) Agent Based Architecture for Secure Access from Multiple Hospitals, Seventh IEEE/ACIS Intl Conf on Computer and Information Science, May 2008( .NET ) Wallet Based E-Cash System for Secured Multi-hop Cash Exchange, 3rd Int’l Conference on Information and Communication Technologies: Theory to Applications, April 2008 (J2EE) Intelligent Phishing Website Detection System using Fuzzy Techniques, 3rd Int’l Conf on Information and Communication Technologies:Theory to Applications, April 2008( J2EE / .NET) Collaborative Detection of DDoS Attacks over Multiple Network Domains, IEEE Transactions on Parallel and Distributed Systems,Dec. 2007 (NS2) Secure Internet Banking Authentication, IEEE Security and Privacy April 2006(J2EE) A Practical Password-Based Two-Server Authentication and Key Exchange System, IEEE Transactions On Dependable And Secure Computing, June 2006 (J2EE)

Web/Internet Technology A Query Formulation Language for the Data Web, IEEE Transactions on Knowledge and Data Engineering, May 2012 [ J2EE/.NET] Mining Web Graphs for Recommendations, IEEE Transactions on Knowledge and Data Engineering, June 2012 [J2EE/.NET] Evolution of Social Networks based on Tagging Practices, IEEE Transactions on Service Computing, 2012 [J2EE/.NET]

Page 11: IEEE paper

11

Semantics Based Automated Service Discovery, IEEE Transactions on Service Computing, April 2012 [J2EE/.NET] Personalized QoS-Aware Web Service Recommendation and Visualization, IEEE Transactions on Service Computing, 2012 [J2EE/.NET] Service-Oriented Architecture for High-Dimensional Private Data Mashup, IEEE Transactions on Service Computing, 2012 [J2EE/.NET] Collaborative Web Service QoS Prediction via Neighborhood Integrated Matrix Factorization, IEEE Transactions on Service Computing, 2012 [J2EE/.NET] Personalized Search Strategies for Spatial Information on the Web, IEEE Intelligent Systems, Jan 2012 [J2EE/.NET] Querying Heterogeneous Datasets on the Linked Data Web: Challenges, Approaches, and Trends, IEEE Internet Computing, March 2012 [J2EE/.NET] CAPTCHA Design: Color, Usability, and Security, IEEE Internet Computing, March 2012 [J2EE/.NET] Querying Heterogeneous Datasets on the Linked Data Web: Challenges, Approaches, and Trends, IEEE Internet Computing, Jan 2012 [J2EE/.NET] Multiterm Keyword Search in NoSQL Systems, IEEE Internet Computing, Jan 2012 [J2EE/.NET] Scalable Execution of Continuous Aggregation Queries over Web Data, IEEE Internet Computing, Jan 2012 [J2EE/.NET] Enabling Web Services to Consume and Produce Large Datasets, IEEE Internet Computing, Jan 2012 [J2EE/.NET] A Personalized Ontology Model for Web Information Gathering, IEEE Transactions on Knowledge and Data Engineering, April 2011[J2EE/.NET] Efficient Techniques for Online Record Linkage, IEEE Transactions on Knowledge and Data Engineering, March 2011[J2EE/.NET] A Dual Framework and Algorithms for Targeted Online Data Delivery, IEEE Transactions on Knowledge and Data Engineering, Jan 2011[J2EE/.NET] Harvesting Image Databases from the Web, IEEE Transactions on Pattern Analysis and Machine Intelligence, April 2011 [J2EE/.NET] On Popularity in the Blogosphere, IEEE Internet Computing, May 2010[J2EE/.NET] Detecting Semantic Cloaking on the Web, IEEE Transactions on Network Service Management, March 2010 [J2EE] Googling the Internet: Profiling Internet Endpoints via the World Wide Web, IEEE/ACM Transactions on Networking, April 2010 (J2EE)

Page 12: IEEE paper

12

Record Matching over Query Results from Multiple Web Databases, IEEE Transactions on Knowledge and Data Engineering, April 2010 (J2EE/.NET) Web-Services-Based Resource Discovery Model and Service Deployment on HealthGrids, IEEE Transactions on Information Technology in Biomedicine, May 2010 (J2EE) Querying the Data Web: The MashQL Approach, IEEE Internet Computing, June 2010 (J2EE) Queueing-Model-Based Adaptive Control of Multi-Tiered Web Applications, IEEE Transactions on Network and Service Management, Sep 2008 ( J2EE/.NET ) Truth Discovery with Multiple Conflicting Information Providers on the Web, IEEE Transactions on Knowledge and Data Engineering, June 2008 ( J2EE / .NET ) Provable Protections against Web Application Vulnerabilities Related to Session Data Dependencies, IEEE Transactions on Software Engineering, Jan.-Feb. 2008 (J2EE) WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation, IEEE Transactions on Software Engineering, Feb. 2008 (J2EE) Building a Multiple-Criteria Negotiation Support System, IEEE Transactions on Knowledge and Data Engineering June 2007( J2EE / .NET ) Resource Allocation for Session-Based Two-Dimensional Service Differentiation on e-Commerce Servers IEEE Transactions on Parallel and Distributed Systems Aug. 2006 (J2EE / .NET) UNIT: User-centric Transaction Management in Web-Database Systems, ICDE April 2006, IEEE Computer Society 2006 (J2EE / .NET) Design and Implementation of a Collaborative User-Centered Content Distribution Network, IEEE Communication Magazine Aug 2006. [J2EE]

S-Logix #9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)

Ph:28343467 Mobile: 9841268578 E-Mail: [email protected]

Wired Networks

Distributed Packet Buffers for High-Bandwidth Switches and Routers, IEEE Transactions on Parallel and Distributed Systems, July 2012 [NS2] Semantic-Aware Metadata Organization Paradigm in Next-Generation File Systems, IEEE Transactions on Parallel and Distributed Systems, Feb 2012 [Java] Measuring Multipath Routing in the Internet, IEEE/ACM Transactions on Networking, June 2011[NS2] The Small World of File Sharing, IEEE Transactions on Parallel and Distributed Systems, July 2011[Java/NS2]

Page 13: IEEE paper

13

Performance Improvement of Delay-Based TCPs in Asymmetric Networks, IEEE Communications Letters, Mar 2011(NS2) Data Leakage Detection, IEEE Transactions on Knowledge and Data Engineering, January 2011 (Java) Introducing Size-Oriented Dropping Policies as QoS-Supportive Functions, IEEE Transactions On Network Service Management, March 2010. (Java / NS2) Fast Recovery from Dual-Link or Single-Node Failures in IP Networks Using Tunneling, IEEE/ACM Transactions on Networking, December 2010(Java/NS2) Formula-based TCP throughput prediction with available bandwidth: IEEE Communications Letters, April 2010 (NS2) Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis, IEEE Transactions on Dependable and Secure Computing, April-June 2009 (Java / NS2) Experimental Evaluation of TCP Protocols for High-speed Networks, IEEE/ACM Transactions on Networking, Oct 2008 (NS2) Maintaining Strong Cache Consistency for the Domain Name System, IEEE Transactions on Knowledge and Data Engineering, August 2007 (Java) The Effects of Active Queue Management and Explicit Congestion Notification on Web Performance, IEEE/ACM Transactions on Networking, Dec. 2007( NS2) COPACC: An Architecture of Cooperative Proxy-Client Caching System for On-Demand Media Streaming, IEEE Transactions on Parallel and Distributed Systems Jan. 2007, Multimedia (Java) Efficient News Video Querying and Browsing Based on Distributed News Video Servers, IEEE Transactions on multimedia Vol. 8, No. 2, April 2006. (J2EE)

S-Logix #9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)

Ph:28343467 Mobile: 9841268578 E-Mail: [email protected]

Peer to Peer Networks Flash Crowd in P2P Live Streaming Systems: Fundamental Characteristics and Design Implications, IEEE Transactions on Parallel and Distributed Systems, July 2012[Java] Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword Searching, IEEE Transactions on Knowledge and Data Engineering, April 2012 [Java] On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks, IEEE Transactions on Parallel and Distributed Systems, May 2012 [Java] Toward P2P-Based Multimedia Sharing in User Generated Contents, IEEE Transactions on Parallel and Distributed Systems, May 2012 [Java]

Page 14: IEEE paper

14

Bloom Cast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks, IEEE Transactions on Parallel and Distributed Systems, Feb 2012[Java] How Much to Share: A Repeated Game Model for Peer-to-Peer Streaming under Service Differentiation Incentives, IEEE Transactions on Parallel and Distributed Systems, Feb 2012 [Java] Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks, IEEE Transactions on Parallel and Distributed Systems, Aug 2011(NS2/JAVA) Load Balance with Imperfect Information in Structured Peer-to-Peer Systems, IEEE Transactions on Parallel and Distributed Systems, April 2011(NS2/JAVA) Design and Evaluation of a Proxy Cache for Peer-to-Peer Traffic, IEEE Transactions on Computers, July 2011(NS2/JAVA) IRM: Integrated File Replication and Consistency Maintenance in P2P Systems, IEEE Transactions on Parallel and Distributed Systems, Jan. 2010(NS2/JAVA) Efficient Range Query Processing in Peer-to-Peer Systems, IEEE Transactions on Knowledge and Data Engineering, Jan. 2009 (Java/NS2) Distributed Throughput Maximization on P2P VOD Applications, IEEE Transactions on Multimedia,April 2009 (Java/NS2) Investigating the Scheduling Sensitivity of P2P Video Streaming: An Experimental Study, IEEE Transactions on Multimedia, April 2009 (Java/NS2) Peer Assisted Video Streaming With Supply-Demand-Based Cache Optimization IEEE Transactions on Multimedia, April 2009 (Java) Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks, IEEE Transactions on Parallel and Distributed Systems, May 2009 (Java) Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs, IEEE Transactions on Parallel and Distributed Systems, Feb. 2009 (Java) Collusive Piracy Prevention in P2P Content Delivery Networks, IEEE Transactions on Computers, July 2009 (Java) Efficient Skyline Computation in Structured Peer-to-Peer Systems IEEE Transactions on Knowledge and Data Engineering, July 2009 (Java) The Server Reassignment Problem for Load Balancing in Structured P2P Systems, IEEE Transactions on Parallel and Distributed Systems, Feb. 2008(Java ) Minimizing File Download Time in Stochastic Peer-to-Peer Networks, IEEE/ACM Transactions on Networking, April 2008 (Java / NS2)

S-Logix #9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)

Ph:28343467 Mobile: 9841268578 E-Mail: [email protected]

Page 15: IEEE paper

15

Imaging / Multimedia

Efficient Relevance Feedback for Content-Based Image Retrieval by Mining User Navigation Patterns, IEEE Transactions on Knowledge and Data Engineering, March 2011[Java] Texture Classification Using Refined Histogram, IEEE Transactions on Image Processing, May 2010 [Java] Versatile Transcoding Proxy for Internet Content Adaptation, IEEE Transactions on Multimedia, June 2008, [Java] Multiquality Data Replication in Multimedia Databases, IEEE Transactions on Knowledge and Data Engineering May 2007, [Java] Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery, IEEE Transactions On Knowledge And Data Engineering, May 2006( Java ) ViBE: A Compressed Video Database Structured for Active Browsing and Search, IEEE Transactions On Multimedia, February 2004, [Java]