ieee best titles 2013 2014

6
TYPICAL SOFT TECHNOLOGIES CLOUD COMPUTING 1. Load Rebalancing for Distributed File Systems in Clouds 2. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 3. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 4. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 5. Privacy Preserving Delegated Access Control in Public Clouds PARALLEL AND DISTRIBUTED 1. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency 2. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Upload: mukundhan-elumalai

Post on 01-Jul-2015

110 views

Category:

Education


0 download

DESCRIPTION

Typical Soft Technologies is one of the leading Software Company located in Chennai that offers best Quality projects and training to all customers. We also deliver all the finest Projects at many Students, Companies. Our Computer Courses Provides best future for the Students. If you want any of our projects & Courses, then contact us. [email protected] 044-43555140, 093443 99926.

TRANSCRIPT

Page 1: Ieee best titles 2013 2014

TYPICAL SOFT TECHNOLOGIES

CLOUD COMPUTING

1. Load Rebalancing for Distributed File Systems in Clouds

2. Dynamic Resource Allocation Using Virtual Machines for Cloud

Computing Environment

3. Scalable and Secure Sharing of Personal Health Records in Cloud

Computing Using Attribute-Based Encryption

4. Error-Tolerant Resource Allocation and Payment Minimization for

Cloud System

5. Privacy Preserving Delegated Access Control in Public Clouds

PARALLEL AND DISTRIBUTED

1. SPOC: A Secure and Privacy-Preserving Opportunistic Computing

Framework for Mobile-Healthcare Emergency

2. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the

Cloud

3. Attribute-Based Encryption with Verifiable Outsourced Decryption

4. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater

Sensor Networks

5. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-

Effective Privacy Preserving of Intermediate Data Sets in Cloud

Page 2: Ieee best titles 2013 2014

TYPICAL SOFT TECHNOLOGIES

KNOWLEDGE AND DATA ENGINEERING

1. A Fast Clustering-Based Feature Subset Selection Algorithm for

High-Dimensional Data

2. Distributed Processing of Probabilistic Top-k Queries in Wireless

Sensor Networks

3. Anonymization of Centralized and Distributed Social Networks by

Sequential Clustering.

4. PMSE: A Personalized Mobile Search Engine

5. A Proxy-Based Approach to Continuous Location-Based Spatial

Queries in Mobile Environments

SECURE COMPUTING

1. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems

2. WARNINGBIRD: A Near Real-time Detection System for Suspicious

URLs in Twitter Stream

3. Cross-Domain Privacy-Preserving Cooperative Firewall

Optimization

4. NICE: Network Intrusion Detection and Countermeasure Selection

in Virtual Network Systems

Page 3: Ieee best titles 2013 2014

TYPICAL SOFT TECHNOLOGIES

NETWORKING

1. Back-Pressure-Based Packet-by-Packet Adaptive Routing in

Communication Networks

2. A Distributed Control Law for Load Balancing in Content Delivery

Networks

3. Fast Transmission to Remote Cooperative Groups: A New Key

Management Paradigm

4. ABC: Adaptive Binary Cuttings for Multidimensional Packet

Classification

5. Topology Control for Effective Interference Cancellation in Multiuser

MIMO Networks

IMAGE PROCESSING

1. Reversible Data Hiding in Encrypted Images by Reserving Room

Before Encryption

2. Reversible Data Hiding With Optimal Value Transfer

3. Reversible Watermarking Based on Invariant Image Classification and

Dynamic Histogram Shifting

4. Noise Reduction Based on Partial-Reference, Dual-Tree Complex

Wavelet Transform Shrinkage

5. Blur and Illumination Robust Face Recognition via Set-Theoretic Characterization

Page 4: Ieee best titles 2013 2014

TYPICAL SOFT TECHNOLOGIES

MOBILE COMPUTING

1. DCIM: Distributed Cache Invalidation Method for Maintaining Cache

Consistency in Wireless Mobile Networks

2. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc

Networks

3. Toward a Statistical Framework for Source Anonymity in Sensor

Networks

4. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor

Networks

5. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc

Networks

6. EMAP : Expedite Message Authentication Protocol for Vehicular Ad

Hoc Networks.

7. ALERT: An Anonymous Location-Based Efficient Routing Protocol in

MANETs

Page 5: Ieee best titles 2013 2014

TYPICAL SOFT TECHNOLOGIES

WEB SERVICES

1. Personalized QoS-Aware Web Service Recommendation and

Visualization

2. A Bayesian Network-Based Knowledge Engineering Framework for IT

Service Management

3. A Decentralized Service Discovery Approach on Peer-to-Peer Networks

4. Evolution of Social Networks Based on Tagging Practices