java 2014 15

8
JAVA Contact: +91 9158547792 www.candorminds.com 1 CandorMinds CODE TITLE DESCRIPTION IEEE 2014 - CLOUD COMPUTING JCC01 Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud Software engineering, health care record, virtual machine. JCC02 Consistency as a Service: Auditing Cloud Consistency Network security, auditing, CAAS, heuristic algorithm. JCC03 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Cloud data base, quality of service, performance evaluation, Security, key accessing. JCC04 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud Data mining, privacy preservation, distributed algorithm, TDS approach. JCC05 Proactive Workload Management in Hybrid Cloud Computing Multi-cloud, workload management, load balance, performance evaluation. JCC06 Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach for Cloud Computing Environments Resource allocation, quality of service, IAAS, virtual machine. JCC07 KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications Data mining, big data, keyword search parallel computing, filtering algorithm. JCC08 D i s t r i b u t e d , C o n c u r r e n t , a n d Independent Access to Encrypted Cloud Databases Network security, encryption secure data base, cryptographic schemes. JCC09 A Hybrid Cloud Approach for Secure A u t h o r i z e d D e d u p l i c a t i o n Hybrid cloud, authentication, deduplication private cloud, authorized duplicate check.

Upload: shahu2212

Post on 11-Apr-2017

130 views

Category:

Engineering


1 download

TRANSCRIPT

Page 1: Java 2014 15

JAVA

Contact: +91 9158547792

www.candorminds.com

1

CandorMinds

CODE TITLE DESCRIPTION

IEEE

20

14

- C

LOU

D C

OM

PU

TIN

G

JCC01

Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud

Software engineering, health care record, virtual machine.

JCC02

Consistency as a Service: Auditing Cloud Consistency

Network security, auditing, CAAS, heuristic algorithm.

JCC03

Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

Cloud data base, quality of service, performance evaluation, Security, key accessing.

JCC04

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud

Data mining, privacy preservation, distributed algorithm, TDS approach.

JCC05

Proactive Workload Management in Hybrid Cloud Computing

Multi-cloud, workload management, load balance, performance evaluation.

JCC06

Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach for Cloud Computing Environments

Resource allocation, quality of service, IAAS, virtual machine.

JCC07

KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications

Data mining, big data, keyword search parallel computing, filtering algorithm.

JCC08

D i s t r i b u t e d , C o n c u r r e n t , a n d Independent Access to Encrypted Cloud Databases

Network security, encryption secure data base, cryptographic schemes.

JCC09

A Hybrid Cloud Approach for Secure A u t h o r i z e d D e d u p l i c a t i o n

Hybrid cloud, authentication, deduplication private cloud, authorized duplicate check.

Page 2: Java 2014 15

JAVA

Contact: +91 9158547792

www.candorminds.com

2

CandorMinds

CODE TITLE DESCRIPTION

IEEE

20

14

- C

LOU

D C

OM

PU

TIN

G

JCC10

Shared Authority Based Privacy- preserving Authentication Protocol in Cloud Computing

Network security, privacy preserving, shared authority, authentication protocol.

JCC11

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Privacy preserving, searchable encryption rank search, cryptographic scheme.

JCC12

Resource Availability Characteristics and Node Selection in Cooperatively Shared Computing Platforms

Resource allocation, data mining, fault tolerance, quality control.

JCC13

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

Authentication, encryption, attribute based signature, multi-cloud.

JCC14

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

Security, data mining, networking, software-as-a-service, secure distributed data processing.

JCC15

Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing

Neural networking, networking, data mining, security, privacy Preserving, learning, back-propagation.

JDM01

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

Cloud, QOS, KNN query, cryptographic schemes.

IEEE

20

14

- D

ATA

MIN

ING

JDM02

A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E- Services

Web service, tree matching, fuzzy recommender system.

JDM03

Scalable Keyword Search on Large RDF Data

Keyword search, resource description framework.

Page 3: Java 2014 15

JAVA

Contact: +91 9158547792

www.candorminds.com

3

CandorMinds

IEEE

20

14

- D

ATA

MIN

ING

CODE TITLE DESCRIPTION

JDM04

Adaptive Replica Synchronization for Distributed File Systems

Adaptive replica synchronization, version-based update, distribution system.

JDM05

OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage

Tree matching, clustering, data matching.

JDM06

Probabilistic Aspect Mining Model for Drug Reviews

Data mining, medical centers, association rules, data mining algorithms, healthcare, decision model.

JDM07

Efficient Range-Based Storage Management for Scalable Data stores

Distributed system, performance evaluation, quality-measurement, Networking.

JDM08

PSMPA: Patient Self-controllable and M u l t i - l e v e l P r i v a c y - p r e s e r v i n g C o o p e r a t i v e A u t h e n t i c a t i o n i n Distributed m- Healthcare Cloud Computing System

Cloud, health care, authentication, encryption and privacy storage.

JDM09

Automatic Generation of the Domain Module from Electronic Textbooks: Method and Validation

Ontology, text mining, software engineering.

JDM10

Task Trail: An Effective Segmentation of User Search Behavior

Software engineering, task evaluation, file mining, performance evaluation.

JDM11

Supporting Privacy Protection in Personalized Web Search

Security, privacy protection, search engine.

JDM12

An Empirical Performance Evaluation of Relational Keyword Search Techniques

Keyword search, relational database, information retrieval, empirical evaluation, performance evaluation.

Page 4: Java 2014 15

JAVA

Contact: +91 9158547792

www.candorminds.com

4

CandorMinds

IEEE

20

14

-

DA

TA M

ININ

G

IEEE

20

14-

NET

WO

RK

ING

IE

EE 2

01

4-

NET

WO

RK

SEC

UR

ITY

CODE TITLE DESCRIPTION

JDM13

Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data

Data mining, artificial intelligence, security, knowledge base management, knowledge representation formalisms and methods

JNS01

Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data

Security, differential privacy, secure data integration, classification analysis

JNS02

Private Searching on Streaming Data Based on Keyword Frequency

Security, private searching on streaming data, fully homomorphic encryption, binary linear code, encryption.

JNS03

Building a Scalable System for Stealthy P2P-Botnet Detection

Networking, botnet, p2p, intrusion detection, network security.

JNS04

The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluations

Networking, distributed interactive application, client assignment, interactivity, consistency, fairness, np-complete

JNS05

An Empirical Study of Ontology-Based Multi-Document Summarization in Disaster Management

Data mining, disaster management, multi-document summarization, ontology, query expansion, domain description.

JNS06

PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications

Networking, traffic padding, web application, side-channel Leak, privacy-preserving.

JNS07

Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

Content-based, publish/subscribe, P2P, broker-less, identity-based encryption

JNW01

Evolving Fuzzy Rules for Anomaly Detection in Data Streams .

Network security, fuzzy rules, anomaly detection, anomaly detection, auto-regressive model.

JNW02

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Network security, access control, attribute-based encryption (ABE), disruption-tolerant network (DTN), multi authority, secure Data retrieval.

Page 5: Java 2014 15

JAVA

Contact: +91 9158547792

www.candorminds.com

5

CandorMinds

IEEE

20

14

- SO

FTW

AR

E EN

GIN

EER

ING

IE

EE 2

014

M

OB

ILE

CO

MP

UTI

NG

IE

EE 2

01

4-

NET

WO

RK

ING

CODE TITLE DESCRIPTION

JNW03

L i s t S c h e d u l i n g A l g o r i t h m f o r H e t e ro g e n e o u s Sy s t e m s b y a n Optimistic Cost Table

Application scheduling, dag scheduling, random graphs generator, static scheduling, optimistic cost.

JNW04

Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self-Organization Mechanism in a Distributed Agent Network

Distributed multi-agent system, self-organization, reinforcement learning, and agent network.

JNW05

Breaking the Barrier to Transferring Link Information across Networks

Network security, Data mining, link prediction, link transfer, cross- network Bias, node attribution, link richness.

JNW06

Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce

P2p; trust; Sybil attack; collusion attack; neighbor similarity, e-commerce.

JNW07

Network Aware Scheduling for Virtual Machine Workloads with Interference Models

Cloud computing, virtualization, xen, profiling, performance modeling, support Vector machines, scheduling.

JNW08

A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices

Network security, traffic matrix, peer-to-peer (p2p), traffic engineering, cost estimation.

JSW01

Embedding reflection and learning into agile software Development

Agile software development, reflective practice, reflection in action, reflection-on-action, learning organization ,leaning teams

JSW02

Online Feature Selection and Its Applications

Web services ,feature selection, online learning, large-scale data mining, classification, big data analytics

JSW03

Continuous and Transparent User Identity Verification for Secure Internet Services

Security, web servers, mobile environments, authentication

JMC01

Interference and Outage in Mobile Random Networks: Expectation, Distribution, and Correlation

Aloha, CSMA, correlation, parallel process

Page 6: Java 2014 15

JAVA

Contact: +91 9158547792

www.candorminds.com

6

CandorMinds

IEEE

20

14-

GR

ID C

OM

PU

TIN

G

IEEE

20

14

IMA

GE

PR

OC

ESSI

NG

IE

EE 2

014

M

OB

ILE

CO

MP

UTI

NG

CODE TITLE DESCRIPTION

JMC02

Efficient Rekeying Framework for Secure Multicast with Diverse- Subscription-Period Mobile Users

Multicast, security, group key management, fault tolerance

JMC03

Achieving Maximum Throughput in Random Access Protocols with Multi packet Reception

Multi packet reception, slotted-aloha, CSMA, MAC protocol

JMC04

QOF: Towards Comprehensive Path Quality measurement in Wireless Sensor Networks

Networking, path quality, node quality, quality of forwarding, quality Measurement,

JMC05

Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks

Security, security in wireless sensor networks (WSN), byzantine attacks, distributed detection, mobile access.

JIM01

Fuzzy Clustering With a Modified MRF Energy Function for Change Detection in Synthetic Aperture Radar Images

Fuzzy clustering, image change detection, Markov random field (MRF), synthetic aperture radar (SAR).

JIM02

Measures of Effective Video Tracking Multi-target video tracking, evaluation measure, accuracy, cardinality error, id changes.

JIM03

Image Quality Assessment for Fake Biometric Detection: Application to IRIS, Fingerprint, and Face Recognition

Image quality assessment, biometrics, security, attacks, counter measures.

JIM04

Object-Oriented Shadow Detection and Removal From Urban High- Resolution Remote Sensing Images

Change detection, inner–outer outline profile line (ioopl), object-oriented, relative radiometric correction, shadow Detection, shadow removal.

JGC01

Containing Byzantine Failures with Control Zones

Byzantine failures, Multihop networks, asynchronous networks, reliable broadcast, fault tolerance, distributed computing, protocol, random failures.

JGC02

Rate less Codes and Random Walks for P2P Resource Discovery in Grids

Networking resource discovery, peer to peer, rateless codes, random walks

Page 7: Java 2014 15

JAVA

Contact: +91 9158547792

www.candorminds.com

7

CandorMinds

IEEE

20

14-

MU

LTIM

EDIA

IE

EE 2

01

4 -

J2

EE

CODE TITLE DESCRIPTION

JMM01

Uniform Embedding for Efficient JPEG Steganography

JPEG steganography, minimal - distortion embedding, uniform embedding, quality analyzer

JMM02

Performance Analysis of Media Cloud-Based Multimedia Systems With Retrying Fault-Tolerance Technique

Cloud ,performance evaluation, fault-tolerance technique, interactive video Retrieval

JMM03

Composing Kerberos and Multimedia I n t e r n e t K e y i n g ( M I K E Y ) f o r Authenticated Transport of Group Keys

Cryptographic protocols, authentication, multicast communication, cryptographic protocols, group keys management, encryption

J2EE01

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

Cloud, QOS, KNN query, cryptographic schemes.

J2EE02

A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E- Services

Web service, tree matching, fuzzy recommender system.

J2EE03

Scalable Keyword Search on Large RDF Data

Keyword search, resource description framework.

J2EE04

Adaptive Replica Synchronization for Distributed File Systems

Adaptive replica synchronization, version-based update, distribution system.

J2EE05

OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage

Tree matching, clustering, data matching.

J2EE06

Probabilistic Aspect Mining Model for Drug Reviews

Data mining, medical centers, association rules, data mining algorithms, healthcare, decision model.

J2EE07

Ef f i c i e n t R a n g e - B a s e d S t o r a g e Management for Scalable Data stores

Distributed system, performance evaluation, quality-measurement, Networking. Ourtechnique maximizes mixed workload performance while providing service differentiation based on high-level performance goals.

Page 8: Java 2014 15

JAVA

Contact: +91 9158547792

www.candorminds.com

8

CandorMinds

CODE TITLE DESCRIPTION

IEEE

20

14

- J

2EE

J2EE08

PSMPA: Patient Self-controllable and M u l t i - l e v e l P r i v a c y - p r e s e r v i n g C o o p e r a t i v e A u t h e n t i c a t i o n i n Distributed m- Healthcare Cloud Computing System

Cloud, health care, authentication, encryption and privacy storage.

J2EE09

Automatic Generation of the Domain Module from Electronic Textbooks: Method and Validation

Ontology, text mining, software engineering.

J2EE10

Task Trail: An Effective Segmentation of User Search Behavior

Software engineering, task evaluation, file mining, performance evaluation.

J2EE11

Supporting Privacy Protection in Personalized Web Search

Security, privacy protection, search engine.

J2EE12

An Empirical Performance Evaluation o f R e l a t i o n a l K e y w o r d S e a r c h Techniques

Keyword search, relational database, information retrieval, empirical evaluation, performance evaluation,

J2EE13

Discovering the Top-k Unexplained S e q u e n c e s i n T i m e - S t a m p e d Observation Data

Data mining, artificial intelligence, security, knowledge base management, knowledge representation formalisms and methods.