You are on page 1of 17

TYPICAL SOFT TECHNOLOGIES

MOBILE COMPUTING

1. ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 2. DSS: Distributed SINR-Based Scheduling Algorithm for Multihop Wireless Networks 3. Toward Accurate Mobile Sensor Network Localization in Noisy

Environments 4. Adaptive Duty Cycle Control with Queue Management in Wireless Sensor Networks 5. Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach 6. VAPR: Void-Aware Pressure Routing for Underwater Sensor Networks 7. DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 1

TYPICAL SOFT TECHNOLOGIES


8. Cross-Layer Minimum-Delay Scheduling and Maximum-Throughput

Resource Allocation for Multiuser Cognitive Networks 9. Scheduling Partition for Order Optimal Capacity in Large-Scale Wireless Networks 10.Video On-Demand Streaming in Cognitive Wireless Mesh Networks 11.Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks 12.Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 13.Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks 14.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 15.SSD: A Robust RF Location Fingerprint Addressing Mobile Devices Heterogeneity

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 2

TYPICAL SOFT TECHNOLOGIES


16.EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 17.Channel Assignment for Throughput Optimization in Multichannel

Multiradio Wireless Mesh Networks Using Network Coding 18.Content Sharing over Smartphone-Based Delay-Tolerant Networks 19.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 20.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 21.Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks

CLOUD COMPUTING
1. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 2. Efficient Resource Mapping Framework over Networked Clouds via Iterated Local Search-Based Request Partitioning

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 3

TYPICAL SOFT TECHNOLOGIES


3. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 4. QoS Ranking Prediction for Cloud Services 5. Cloudy with a Chance of Cost Savings 6. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 7. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 8. A New Disk I/O Model of Virtualized Cloud Environment 9. On Data Staging Algorithms for Shared Data Accesses in Clouds 10.Dynamic Optimization of Multiattribute Resource Allocation in SelfOrganizing Clouds 11.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 4

TYPICAL SOFT TECHNOLOGIES


PARALLEL AND DISTRIBUTED SYSTEMS

1. A Truthful Dynamic Workflow Scheduling Mechanism for Commercial Multicloud Environments 2. Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud 3. A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud 4. Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems 5. Scalable and Accurate Graph Clustering and Community Structure Detection 6. Load Rebalancing for Distributed File Systems in Clouds 7. SPOC: A Secure and Privacy-Preserving Opportunistic Computing

Framework for Mobile-Healthcare Emergency 8. Improve Efficiency and Reliability in Single-Hop WSNs with Transmit-Only Nodes
Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116 Page 5

TYPICAL SOFT TECHNOLOGIES


9. Optimal Client-Server Assignment for Internet Distributed Systems 10.Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery 11.Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks 12.A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 13.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 14.High Performance Resource Allocation Strategies for Computational Economies 15.A Privacy Leakage Upper Bound Constraint-Based Approach for CostEffective Privacy Preserving of Intermediate Data Sets in Cloud 16.A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 6

TYPICAL SOFT TECHNOLOGIES


17.Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks 18.Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

KNOWLEDGE AND DATA ENGINEERING

1. Crowdsourced Trace Similarity with Smartphones 2. Incentive Compatible Privacy-Preserving Data Analysis 3. On Identifying Critical Nuggets of Information during Classification Tasks 4. Failure-Aware Cascaded Suppression in Wireless Sensor Networks 5. Optimal Route Queries with Arbitrary Order Constraints 6. Co-Occurrence-Based Diffusion for Expert Search on the Web 7. Clustering Uncertain Data Based on Probability Distribution Similarity

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 7

TYPICAL SOFT TECHNOLOGIES


8. PMSE: A Personalized Mobile Search Engine 9. Discovering Temporal Change Patterns in the Presence of Taxonomies 10.Spatial Approximate String Search 11.Robust Module-Based Data Management 12.Protecting Sensitive Labels in Social Network Data Anonymization 13.A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 14.A Fast Clustering-Based Feature Subset Selection Algorithm for HighDimensional Data 15.Ranking on Data Manifold with Sink Points 16.Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development 17.Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 8

TYPICAL SOFT TECHNOLOGIES


18.Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 19.A Survey of XML Tree Patterns 20.Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model

NETWORK AND SECURITY

1. A Distributed Control Law for Load Balancing in Content Delivery Networks 2. A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With Order-Optimal Per-Flow Delay 3. A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks 4. ABC: Adaptive Binary Cuttings for Multidimensional Packet Classification

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 9

TYPICAL SOFT TECHNOLOGIES


5. Achieving Efficient Flooding by Utilizing Link Correlation in Wireless Sensor Networks 6. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks 7. Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks 8. Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management 9. Combined Optimal Control of Activation and Transmission in Delay-Tolerant Networks 10.Complexity Analysis and Algorithm Design for Advance Bandwidth Scheduling in Dedicated Networks 11.Distortion-Aware Scalable Video Streaming to Multinetwork Clients 12.Efficient Algorithms for Neighbor Discovery in Wireless Networks

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 10

TYPICAL SOFT TECHNOLOGIES


13.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems 14.Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm 15.Geographic Routing in -Dimensional Spaces With Guaranteed Delivery and Low Stretch 16.ICTCP: Incast Congestion Control for TCP in Data-Center Networks 17.Optimal Content Placement for Peer-to-Peer Video-on-Demand Systems 18.Peer-Assisted Social Media Streaming with Social Reciprocity 19.Pricing-Based Decentralized Spectrum Access Control in Cognitive Radio Networks 20.QoS Guarantees and Service Differentiation for Dynamic Cloud Applications 21.Quantifying and Verifying Reachability for Access Controlled Networks 22.Rake: Semantics Assisted Network-Based Tracing Framework

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 11

TYPICAL SOFT TECHNOLOGIES


23.Semi-Random Backoff: Towards Resource Reservation for Channel Access in Wireless LANs 24.Throughput-Optimal Scheduling in Multihop Wireless Networks Without Per-Flow Information 25.Delay-Based Network Utility Maximization 26.Topology Control for Effective Interference Cancellation in Multiuser MIMO Networks 27.Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 28.Torrents on Twitter: Explore Long-Term Social Relationships in Peer-to-Peer Systems

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 12

TYPICAL SOFT TECHNOLOGIES


SECURE COMPUTING

1. A System for Timely and Controlled Information Sharing in Emergency Situations 2. WARNINGBIRD: A Near Real-Time Detection System For Suspicious Urls In Twitter Stream 3. Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing 4. Malware Clearance for Secure Commitment of OS-Level Virtual Machines 5. Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing 6. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 13

TYPICAL SOFT TECHNOLOGIES


IMAGE PROCESSING

1. General Framework to Histogram-Shifting-Based Reversible Data Hiding 2. Robust Ellipse Fitting Based on Sparse Combination of Data Points 3. Computationally Tractable Stochastic Image Modeling Based on Symmetric Markov Mesh Random Fields 4. A Robust Method for Rotation Estimation Using Spherical Harmonics Representation 5. Detecting, Grouping, and Structure Inference for Invariant Repetitive Patterns in Images 6. Action Recognition from Video Using Feature Covariance Matrices 7. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition 8. Optimized 3D Watermarking for Minimal Surface Distortion 9. Robust Radial Face Detection for Omnidirectional Vision

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 14

TYPICAL SOFT TECHNOLOGIES


10.Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage 11.Design of Low-Complexity High-Performance Wavelet Filters for Image Analysis 12.Wavelet Bayesian Network Image Denoising 13.Blur and Illumination Robust Face Recognition via Set-Theoretic

Characterization 14.View-Based Discriminative Probabilistic Modeling for 3D Object Retrieval and Recognition 15.Context-Aware Sparse Decomposition for Image Denoising and SuperResolution 16.Learning the Spherical Harmonic Features for 3-D Face Recognition 17.Rate-Distortion Optimized Rate Control for Depth Map-Based 3-D Video Coding

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 15

TYPICAL SOFT TECHNOLOGIES


18.Adaptive Fingerprint Image Enhancement With Emphasis on Preprocessing of Data 19.Image Noise Level Estimation by Principal Component Analysis 20.LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering 21.Visually Lossless Encoding for JPEG2000 22.Adaptive Markov Random Fields for Joint Unmixing and Segmentation of Hyperspectral Images 23.Efficient Image Classification via Multiple Rank Regression 24.Separable Markov Random Field Model and Its Applications in Low Level Vision

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 16

TYPICAL SOFT TECHNOLOGIES


AFFECTIVE COMPUTING
1. Predicting Emotional Responses to Long Informal Text 2. Analyses of a Multimodal Spontaneous Facial Expression Database 3. Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis 4. Modeling Arousal Phases in Daily Living Using Wearable Sensors

WEB SERVICES
1. Effective Message-Sequence Generation for Testing BPEL Programs 2. A Bayesian Network-Based Knowledge Engineering Framework for IT Service Management 3. Personalized QoS-Aware Web Service Recommendation and Visualization 4. A Decentralized Service Discovery Approach on Peer-to-Peer Networks 5. A Two-Tiered On-Demand Resource Allocation Mechanism for VM-Based Data Centers

Contact : 044-43555140 9344399918/26 1/1, Mugalivakkam Main Road, Porur, Chennai-600116

Page 17

You might also like