You are on page 1of 3

1POINTER TECHNOLOGY DOT NET IEEE TITLES 2013-2014

1) Privacy-Preserving Public Auditing for Secure Cloud Storage 2) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 3) Privacy Preserving Data Sharing With Anonymous ID Assignment 4) Identity-Based Secure Distributed Data Storage Schemes 5) A Cloud-based Approach for Interoperable EHRs 6) Secure Logging As a ServiceDelegating Log Management to the Cloud 7) Network Performance Aware MPI Collective Communication Operations in the Cloud 8) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 9) Modeling of Distributed File Systems for Practical Performance Analysis 10) Privacy Preserving Delegated Access Control in Public Clouds 11) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 12) An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing 13) QoS Ranking Prediction for Cloud Services 14) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 15) Protecting Sensitive Labels in Social Network Data Anonymization 16) Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates 17) Efficient Evaluation of SUM Queries over Probabilistic Data 18) Supporting Search-As-You-Type Using SQL in Databases 19) Mining User Queries with Markov Chains: Application to Online Image Retrieval 20) A System to Filter Unwanted Messages from OSN User Walls 21) Reinforced Similarity Integration in Image-Rich Information Networks 22) Co-Occurrence-Based Diffusion for Expert Search on the Web 23) A New Algorithm for Inferring User Search Goals with Feedback Sessions 24) A Machine Learning Approach to Software Requirements Prioritization 25) Semi-Supervised Heterogeneous Fusion for Multimedia Data Co-clustering 26) Structural Diversity for Resisting Community Identification in Published Social Networks 27) Reversible Data Hiding With Optimal Value Transfer 28) A Formal Usability Constraints Model for Watermarking of Outsourced Datasets 29) Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development [With Hardware] 30) A Survival Modeling Approach to Biomedical Search Result Diversification Using Wikipedia 31) PMSE: A Personalized Mobile Search Engine [With Hardware]

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph 044 342323407; Mobile 9043350456, 9500139248 Email: onepointertechnology@gmail.com website: www.1pointer.com

1POINTER TECHNOLOGY
32) A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud 33) Multiparty Access Control for Online Social Networks: Model and Mechanisms 34) Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information 35) Patch-Based Image Warping for Content-Aware Retargeting 36) MSIDX: Multi-Sort Indexing for Efficient Content-based Image Search and Retrieval 37) SORT: Self-Organizing Trust Modelfor Peer-to-Peer Systems 38) A System for Timely and Controlled Information Sharing in Emergency Situations [With Hardware] 39) A MAC Sensing Protocol Design for Data Transmission with More Protection to Primary Users 40) Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data 41) Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 42) Sybil Defender: A Defense Mechanism for Sybil Attacks in Large Social Networks 43) Anonymous and Distributed Community Cyber Incident Detection 44) Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior 45) Optimal Client-Server Assignment for Internet Distributed Systems 46) A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

47)

A Secure Payment Scheme with Low Communication and Processing Overhead for Multichip Wireless Networks 48) Scaling up publish/subscribe overlays using interest correlation for link sharing 49) A Highly Practical Approach towards Achieving Minimum Datasets Storage Cost in the Cloud1 50) Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 51) Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks 52) Buffer Management for Aggregated Streaming Data with Packet Dependencies 53) Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks 54) SOS: A Distributed Mobile Q&A System Based on Social Networks 55) Behavioral Malware Detection in Delay Tolerant Networks 56) A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 57) Load Rebalancing for Distributed File Systems in Clouds 58) Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption 59) ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 60) An Adaptive Cloud Downloading Service 61) A Quantitative Model and Analysis of Information Confusion in Social Networks 62) Resource Management for Complex, Dynamic Environments
No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph 044 342323407; Mobile 9043350456, 9500139248 Email: onepointertechnology@gmail.com website: www.1pointer.com

1POINTER TECHNOLOGY 63)


Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler

YOUR OWN PAPER CONCEPTS CAN BE ACCEPTED

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph 044 342323407; Mobile 9043350456, 9500139248 Email: onepointertechnology@gmail.com website: www.1pointer.com

You might also like