java 2014 15
TRANSCRIPT
![Page 1: Java 2014 15](https://reader037.vdocument.in/reader037/viewer/2022100112/58ec01a61a28aba7028b46b7/html5/thumbnails/1.jpg)
JAVA
Contact: +91 9158547792
www.candorminds.com
1
CandorMinds
CODE TITLE DESCRIPTION
IEEE
20
14
- C
LOU
D C
OM
PU
TIN
G
JCC01
Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud
Software engineering, health care record, virtual machine.
JCC02
Consistency as a Service: Auditing Cloud Consistency
Network security, auditing, CAAS, heuristic algorithm.
JCC03
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
Cloud data base, quality of service, performance evaluation, Security, key accessing.
JCC04
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud
Data mining, privacy preservation, distributed algorithm, TDS approach.
JCC05
Proactive Workload Management in Hybrid Cloud Computing
Multi-cloud, workload management, load balance, performance evaluation.
JCC06
Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach for Cloud Computing Environments
Resource allocation, quality of service, IAAS, virtual machine.
JCC07
KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications
Data mining, big data, keyword search parallel computing, filtering algorithm.
JCC08
D i s t r i b u t e d , C o n c u r r e n t , a n d Independent Access to Encrypted Cloud Databases
Network security, encryption secure data base, cryptographic schemes.
JCC09
A Hybrid Cloud Approach for Secure A u t h o r i z e d D e d u p l i c a t i o n
Hybrid cloud, authentication, deduplication private cloud, authorized duplicate check.
![Page 2: Java 2014 15](https://reader037.vdocument.in/reader037/viewer/2022100112/58ec01a61a28aba7028b46b7/html5/thumbnails/2.jpg)
JAVA
Contact: +91 9158547792
www.candorminds.com
2
CandorMinds
CODE TITLE DESCRIPTION
IEEE
20
14
- C
LOU
D C
OM
PU
TIN
G
JCC10
Shared Authority Based Privacy- preserving Authentication Protocol in Cloud Computing
Network security, privacy preserving, shared authority, authentication protocol.
JCC11
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Privacy preserving, searchable encryption rank search, cryptographic scheme.
JCC12
Resource Availability Characteristics and Node Selection in Cooperatively Shared Computing Platforms
Resource allocation, data mining, fault tolerance, quality control.
JCC13
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
Authentication, encryption, attribute based signature, multi-cloud.
JCC14
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
Security, data mining, networking, software-as-a-service, secure distributed data processing.
JCC15
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
Neural networking, networking, data mining, security, privacy Preserving, learning, back-propagation.
JDM01
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
Cloud, QOS, KNN query, cryptographic schemes.
IEEE
20
14
- D
ATA
MIN
ING
JDM02
A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E- Services
Web service, tree matching, fuzzy recommender system.
JDM03
Scalable Keyword Search on Large RDF Data
Keyword search, resource description framework.
![Page 3: Java 2014 15](https://reader037.vdocument.in/reader037/viewer/2022100112/58ec01a61a28aba7028b46b7/html5/thumbnails/3.jpg)
JAVA
Contact: +91 9158547792
www.candorminds.com
3
CandorMinds
IEEE
20
14
- D
ATA
MIN
ING
CODE TITLE DESCRIPTION
JDM04
Adaptive Replica Synchronization for Distributed File Systems
Adaptive replica synchronization, version-based update, distribution system.
JDM05
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
Tree matching, clustering, data matching.
JDM06
Probabilistic Aspect Mining Model for Drug Reviews
Data mining, medical centers, association rules, data mining algorithms, healthcare, decision model.
JDM07
Efficient Range-Based Storage Management for Scalable Data stores
Distributed system, performance evaluation, quality-measurement, Networking.
JDM08
PSMPA: Patient Self-controllable and M u l t i - l e v e l P r i v a c y - p r e s e r v i n g C o o p e r a t i v e A u t h e n t i c a t i o n i n Distributed m- Healthcare Cloud Computing System
Cloud, health care, authentication, encryption and privacy storage.
JDM09
Automatic Generation of the Domain Module from Electronic Textbooks: Method and Validation
Ontology, text mining, software engineering.
JDM10
Task Trail: An Effective Segmentation of User Search Behavior
Software engineering, task evaluation, file mining, performance evaluation.
JDM11
Supporting Privacy Protection in Personalized Web Search
Security, privacy protection, search engine.
JDM12
An Empirical Performance Evaluation of Relational Keyword Search Techniques
Keyword search, relational database, information retrieval, empirical evaluation, performance evaluation.
![Page 4: Java 2014 15](https://reader037.vdocument.in/reader037/viewer/2022100112/58ec01a61a28aba7028b46b7/html5/thumbnails/4.jpg)
JAVA
Contact: +91 9158547792
www.candorminds.com
4
CandorMinds
IEEE
20
14
-
DA
TA M
ININ
G
IEEE
20
14-
NET
WO
RK
ING
IE
EE 2
01
4-
NET
WO
RK
SEC
UR
ITY
CODE TITLE DESCRIPTION
JDM13
Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data
Data mining, artificial intelligence, security, knowledge base management, knowledge representation formalisms and methods
JNS01
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
Security, differential privacy, secure data integration, classification analysis
JNS02
Private Searching on Streaming Data Based on Keyword Frequency
Security, private searching on streaming data, fully homomorphic encryption, binary linear code, encryption.
JNS03
Building a Scalable System for Stealthy P2P-Botnet Detection
Networking, botnet, p2p, intrusion detection, network security.
JNS04
The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluations
Networking, distributed interactive application, client assignment, interactivity, consistency, fairness, np-complete
JNS05
An Empirical Study of Ontology-Based Multi-Document Summarization in Disaster Management
Data mining, disaster management, multi-document summarization, ontology, query expansion, domain description.
JNS06
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications
Networking, traffic padding, web application, side-channel Leak, privacy-preserving.
JNS07
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Content-based, publish/subscribe, P2P, broker-less, identity-based encryption
JNW01
Evolving Fuzzy Rules for Anomaly Detection in Data Streams .
Network security, fuzzy rules, anomaly detection, anomaly detection, auto-regressive model.
JNW02
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Network security, access control, attribute-based encryption (ABE), disruption-tolerant network (DTN), multi authority, secure Data retrieval.
![Page 5: Java 2014 15](https://reader037.vdocument.in/reader037/viewer/2022100112/58ec01a61a28aba7028b46b7/html5/thumbnails/5.jpg)
JAVA
Contact: +91 9158547792
www.candorminds.com
5
CandorMinds
IEEE
20
14
- SO
FTW
AR
E EN
GIN
EER
ING
IE
EE 2
014
M
OB
ILE
CO
MP
UTI
NG
IE
EE 2
01
4-
NET
WO
RK
ING
CODE TITLE DESCRIPTION
JNW03
L i s t S c h e d u l i n g A l g o r i t h m f o r H e t e ro g e n e o u s Sy s t e m s b y a n Optimistic Cost Table
Application scheduling, dag scheduling, random graphs generator, static scheduling, optimistic cost.
JNW04
Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self-Organization Mechanism in a Distributed Agent Network
Distributed multi-agent system, self-organization, reinforcement learning, and agent network.
JNW05
Breaking the Barrier to Transferring Link Information across Networks
Network security, Data mining, link prediction, link transfer, cross- network Bias, node attribution, link richness.
JNW06
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
P2p; trust; Sybil attack; collusion attack; neighbor similarity, e-commerce.
JNW07
Network Aware Scheduling for Virtual Machine Workloads with Interference Models
Cloud computing, virtualization, xen, profiling, performance modeling, support Vector machines, scheduling.
JNW08
A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices
Network security, traffic matrix, peer-to-peer (p2p), traffic engineering, cost estimation.
JSW01
Embedding reflection and learning into agile software Development
Agile software development, reflective practice, reflection in action, reflection-on-action, learning organization ,leaning teams
JSW02
Online Feature Selection and Its Applications
Web services ,feature selection, online learning, large-scale data mining, classification, big data analytics
JSW03
Continuous and Transparent User Identity Verification for Secure Internet Services
Security, web servers, mobile environments, authentication
JMC01
Interference and Outage in Mobile Random Networks: Expectation, Distribution, and Correlation
Aloha, CSMA, correlation, parallel process
![Page 6: Java 2014 15](https://reader037.vdocument.in/reader037/viewer/2022100112/58ec01a61a28aba7028b46b7/html5/thumbnails/6.jpg)
JAVA
Contact: +91 9158547792
www.candorminds.com
6
CandorMinds
IEEE
20
14-
GR
ID C
OM
PU
TIN
G
IEEE
20
14
IMA
GE
PR
OC
ESSI
NG
IE
EE 2
014
M
OB
ILE
CO
MP
UTI
NG
CODE TITLE DESCRIPTION
JMC02
Efficient Rekeying Framework for Secure Multicast with Diverse- Subscription-Period Mobile Users
Multicast, security, group key management, fault tolerance
JMC03
Achieving Maximum Throughput in Random Access Protocols with Multi packet Reception
Multi packet reception, slotted-aloha, CSMA, MAC protocol
JMC04
QOF: Towards Comprehensive Path Quality measurement in Wireless Sensor Networks
Networking, path quality, node quality, quality of forwarding, quality Measurement,
JMC05
Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks
Security, security in wireless sensor networks (WSN), byzantine attacks, distributed detection, mobile access.
JIM01
Fuzzy Clustering With a Modified MRF Energy Function for Change Detection in Synthetic Aperture Radar Images
Fuzzy clustering, image change detection, Markov random field (MRF), synthetic aperture radar (SAR).
JIM02
Measures of Effective Video Tracking Multi-target video tracking, evaluation measure, accuracy, cardinality error, id changes.
JIM03
Image Quality Assessment for Fake Biometric Detection: Application to IRIS, Fingerprint, and Face Recognition
Image quality assessment, biometrics, security, attacks, counter measures.
JIM04
Object-Oriented Shadow Detection and Removal From Urban High- Resolution Remote Sensing Images
Change detection, inner–outer outline profile line (ioopl), object-oriented, relative radiometric correction, shadow Detection, shadow removal.
JGC01
Containing Byzantine Failures with Control Zones
Byzantine failures, Multihop networks, asynchronous networks, reliable broadcast, fault tolerance, distributed computing, protocol, random failures.
JGC02
Rate less Codes and Random Walks for P2P Resource Discovery in Grids
Networking resource discovery, peer to peer, rateless codes, random walks
![Page 7: Java 2014 15](https://reader037.vdocument.in/reader037/viewer/2022100112/58ec01a61a28aba7028b46b7/html5/thumbnails/7.jpg)
JAVA
Contact: +91 9158547792
www.candorminds.com
7
CandorMinds
IEEE
20
14-
MU
LTIM
EDIA
IE
EE 2
01
4 -
J2
EE
CODE TITLE DESCRIPTION
JMM01
Uniform Embedding for Efficient JPEG Steganography
JPEG steganography, minimal - distortion embedding, uniform embedding, quality analyzer
JMM02
Performance Analysis of Media Cloud-Based Multimedia Systems With Retrying Fault-Tolerance Technique
Cloud ,performance evaluation, fault-tolerance technique, interactive video Retrieval
JMM03
Composing Kerberos and Multimedia I n t e r n e t K e y i n g ( M I K E Y ) f o r Authenticated Transport of Group Keys
Cryptographic protocols, authentication, multicast communication, cryptographic protocols, group keys management, encryption
J2EE01
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
Cloud, QOS, KNN query, cryptographic schemes.
J2EE02
A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E- Services
Web service, tree matching, fuzzy recommender system.
J2EE03
Scalable Keyword Search on Large RDF Data
Keyword search, resource description framework.
J2EE04
Adaptive Replica Synchronization for Distributed File Systems
Adaptive replica synchronization, version-based update, distribution system.
J2EE05
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
Tree matching, clustering, data matching.
J2EE06
Probabilistic Aspect Mining Model for Drug Reviews
Data mining, medical centers, association rules, data mining algorithms, healthcare, decision model.
J2EE07
Ef f i c i e n t R a n g e - B a s e d S t o r a g e Management for Scalable Data stores
Distributed system, performance evaluation, quality-measurement, Networking. Ourtechnique maximizes mixed workload performance while providing service differentiation based on high-level performance goals.
![Page 8: Java 2014 15](https://reader037.vdocument.in/reader037/viewer/2022100112/58ec01a61a28aba7028b46b7/html5/thumbnails/8.jpg)
JAVA
Contact: +91 9158547792
www.candorminds.com
8
CandorMinds
CODE TITLE DESCRIPTION
IEEE
20
14
- J
2EE
J2EE08
PSMPA: Patient Self-controllable and M u l t i - l e v e l P r i v a c y - p r e s e r v i n g C o o p e r a t i v e A u t h e n t i c a t i o n i n Distributed m- Healthcare Cloud Computing System
Cloud, health care, authentication, encryption and privacy storage.
J2EE09
Automatic Generation of the Domain Module from Electronic Textbooks: Method and Validation
Ontology, text mining, software engineering.
J2EE10
Task Trail: An Effective Segmentation of User Search Behavior
Software engineering, task evaluation, file mining, performance evaluation.
J2EE11
Supporting Privacy Protection in Personalized Web Search
Security, privacy protection, search engine.
J2EE12
An Empirical Performance Evaluation o f R e l a t i o n a l K e y w o r d S e a r c h Techniques
Keyword search, relational database, information retrieval, empirical evaluation, performance evaluation,
J2EE13
Discovering the Top-k Unexplained S e q u e n c e s i n T i m e - S t a m p e d Observation Data
Data mining, artificial intelligence, security, knowledge base management, knowledge representation formalisms and methods.