Professional Documents
Culture Documents
PROJECT LISTS
PROJECT TITLE
Domain
1) Efficient Computation of Range Aggregates Against Uncertain Location Based Queries 2) Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems 3) Exploring Application-Level Semantics for Data Compression 4) Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques 5) Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection 6) Publishing Search Logs A Comparative Studyof Privacy Guarantees 7) Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking 8) Scalable Learning of Collective Behavior 9) The Geometric Efficient Matching Algorithm for Firewalls
Knowledge and Data Engineering Wireless communicati on Knowledge and Data Engineering Knowledge and Data Engineering Networking Knowledge and Data Engineering Secure computing Knowledge and Data Engineering Secure computing
Contact
SERVICE 10) Vulnerability Analysis in SOA- COMPUTING based Business Processes Knowledge and Data Engineering Cloud computing
12) Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud. 13)MONITORING SERVICE SYSTEMS FROM A LANGUAGE-ACTION PERSPECTIVE 14) ONE SIZE DOES NOT FIT ALL: TOWARDS USER- AND QUERY-DEPENDENT RANKING FOR WEB DATABASES.
SERVICES COMPUTING,
Knowledge and Data Engineering Knowledge and Data Engineering SOFTWARE ENGINEERING ,
The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor?
Contact
Knowledge 18) Horizontal Aggregations in and SQL to Prepare Data Sets for Data Data Mining Analysis Engineering 19) Continuous Neighbor Discovery in Asynchronous Sensor Networks 20) Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks 2) Integration of Sound Signature in Graphical Password Authentication System NETWORKING
SECURE COMPUTING
Contact
Cloud Computing and Data Engineering Knowledge and Data Engineering Service Computing and Cloud computing
27) A More Secure Steganography Method in Spatial Domain 28) A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows
Data Mining
Data Mining
Contact
Data Mining
Networking
Data Mining
Contact