1. Data integrity proofs in cloud storage. 2. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud. 3. Optimal service pricing for a cloud cache. 4. Fuzzy Keyword Search over Encrypted Data. 5. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. 6. An economic approach for scalable and highly-available distributed applications. 7. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.
IMAGE PROCESSING
8. A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm 9. Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts
SECURE COMPUTING
10. The Geometric Efficient Matching Algorithm for Firewalls. 11. A Policy Enforcing Mechanism for Trusted Ad Hoc Network 12. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query- Based Wireless Sensor Networks 13. Detecting Kernel-Level Root kits Using Data Structure Invariants. 14. Architecting a Secure Enterprise Data Sharing. 15. Fingerprint Matching Incorporating Ridge Features With Minutiae. 16. Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Flow Watermarking 17. SigFree A Signature-free Buffer.
18. IR-Tree: An Efficient Index for Geographic Document Search. 19. Studies and Evaluation on Meta Search Engines. 20. Mining Web Graphs for Recommendations. 21. Monitoring Service Systems from a Language-Action Perspective. 22. Integration of Sound Signature in Graphical Password Authentication System 23. Exploring Application-Level Semantics for Data Compression. 24. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases 25. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators 26. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis. 27. A Personalized Ontology Model for Web Information Gathering 28. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems. 29. Efficient Computation of Range Aggregates against uncertain location based queries. 30. Scalable Learning of Collective Behavior 31. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques. 32. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases 33. Publishing Search Logs A Comparative Study of Privacy Guarantees. 34. The World in a Nutshell Concise Range Queries. 35. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs. 36. AI AND OPINION MINING. 37. ANONYMOUS QUERY PROCESSING IN ROAD NETWORKS. 38. Data Leakage Detection Abstract
NETWORKING
39. Live Streaming with Receiver-based Peer-division Multiplexing. 40. Continuous Neighbor Discovery in Asynchronous Sensor Networks. 41. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection. 42. Self-Reconfigurable Wireless Mesh Networks. 43. Conditional Shortest Path Routing in Delay Tolerant Networks. 44. Slow Adaptive OFDMA Systems Through Chance Constrained Programming. 45. Pricing under Constraints in Access Networks Revenue Maximization and Congestion management. ProjectDevlopments 2014 ProjectDevlopments@gmail.com Mob. No.: 9673921886
WIRELESS COMMUNICATION
46. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems. 47. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless networks. 48. Throughput Optimization in High Speed Downlink Packet Access (HSDPA). 49. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks.
MOBILE COMPUTING
50. MABS Multicast Authentication Based on Batch Signature.
JAVA
CLOUD COMPUTING
51. Secure and Practical Outsourcing of Linear Programming in Cloud Computing. 52. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds. 53. Improving Utilization of Infrastructure Clouds. 54. Agent-Based Urban Transportation Systems. 55. Ensuring Data Storage Security in Cloud Computing. 56. Client-side Load Balancer using Cloud.
IMAGE PROCESSING
57. Face as a mouse (using face we achieve mouse operations). 58. Embedded Extended Visual Cryptography Schemes ProjectDevlopments 2014 ProjectDevlopments@gmail.com Mob. No.: 9673921886
59. Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding 60. Computational Perceptual Features for Texture Representation and Retrieval. 61. Subspace-Based Striping Noise Reduction in Hyper-spectral Images. 62. Multiple exposure fusion for high dynamic range image acquisition. 63. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.
SECURE COMPUTING
64. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh NETWORKS 65. Analysis on Credit Card Fraud Detection Methods. 66. Towards Situational Awareness of Large-Scale Botnet Probing Events. 67. Online Intrusion Alert Aggregation with Generative Data Stream Modeling. 68. RITAS: Services for Randomized Intrusion Tolerance 69. Modeling and Detection of Camouflaging Worm. 70. Nymble Blocking Misbehaving Users in Anonymizing Networks
DATA MINING
71. Database converter . 72. Extended XML Tree Pattern Matching: Theories and Algorithms. 73. Load Shedding in Mobile Systems with MobiQual. 74. The CoQUOS Approach to Continuous Queries in Unstructured Overlays. 75. Ranking Spatial Data by Quality Preferences. 76. Effective Navigation of Query Results Based on Concept Hierarchies.
79. ProgME: Towards Programmable Network Measurement 80. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks. 81. Buffer Sizing for 802.11 Based Networks. 82. Model-Based Identification of Dominant Congested Links 83. Channel Allocation in Wireless Data Center Networks. 84. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems. 85. A new approach for FEC decoding based on the BP algorithm in LTE and Wi-MAX systems. 86. On Modeling, Analysis, and Optimization of Packet Aggregation Systems Network communication 87. A Distributed Explicit Rate Schemes in Multi-InputMulti-Output Network Systems.
WIRELESS COMMUNICATION
88. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks. 89. Host-to-Host Congestion Control for TCP. 90. Mesh Based Multicast Routing in MANET Stable Link Based Approach.
MOBILE COMPUTING
91. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks 92. Throughput Optimization in Mobile Backbone Networks. 93. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks. 94. Bandwidth recycling in IEEE 802.16 Networks. 95. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 96. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes.
PARALLEL AND DISTRIBUTED SYSTEM
97. Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming. 98. Correlation-Based Traffic Analysis Attacks on Anonymity Networks 99. Cooperative Caching in Wireless P2PNetworks Design, Implementation, And Evaluation.