Cse dot net java & android

571 views

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
571
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
6
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cse dot net java & android

  1. 1.           Academic Projects for CSE (2013-2014)       We will develop your ideas and your papers also, For any Further information call-9603150547 e-mail visionsolutions.9@gmail.com        
  2. 2.   DOTNET DATA MINING 1. Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data. [SMS001] 2.Secure Mining of Association Rules in Horizontally Distributed Databases. [SMS002] 3.A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models. [SMS003] 4.ELCA: Evaluation for Keyword Search on Probabilistic XML a Data. [SMS004] 5.Dynamic Query Forms for Database Queries. [SMS005] 6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors. [SMS006] 7.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse. [SMS007] 8. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm. [SMS008] 9. Optimal Route Queries with Arbitrary Order Constraints. [SMS009] 10.Failure-Aware Cascaded Suppression in Wireless Sensor Networks. [SMS010] NETWORKING AND NETWORK SECURITY 11.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System. [SMS011] 12. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Network. [SMS012] 13.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems. [SMS013] 14.Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning. [SMS014] 15.Delay-Based Network Utility Maximization. [SMS015] 16.Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience. [SMS016] 17.An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks. [SMS017]
  3. 3.   18.A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. [SMS018] CLOUD COMPUTING 19.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud. [SMS019] 20.Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS020] 21.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. [SMS021] 22.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems. [SMS022] 23.CloudMoV: Cloud-based Mobile Social TV. [SMS023] 24.Privacy Preserving Delegated Access Control in Public Clouds. [SMS024] 25.Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks. [SMS025] MOBILE COMPUTING 26.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks. [SMS026] 27.EAACK—A Secure Intrusion-Detection System for MANETs D. [SMS027] 28.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users. [SMS028] 29.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. [SMS029] 30.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks. [SMS030] 31.On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks. [SMS031] 32.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks. [SMS032] 33.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS033] 34.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users. [SMS034]
  4. 4.   35.EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks. [SMS035] PARALLEL DISTRIBUTED SYSTEMS 36.A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices. [SMS036] 37.Exploiting Service Similarity for Privacy in Location Based Search Queries. [SMS037] 38.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS038] 39.GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks. [SMS039] 40.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment. [SMS040] 41.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds. [SMS041] 42.BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments. [SMS042] 43.ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks. [SMS043] 44.A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization. [SMS044] 45.A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks. [SMS045] SERVICECOMPUTING 46.Privacy-EnhancedWebServiceComposition. [SMS046] 47.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed InformationSharing. [SMS047] 48.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. [SMS048]
  5. 5.   49.Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection. [SMS049] 50.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. [SMS050] IMAGEPROCESSING 51.Face Recognition and Verification Using Photometric Stereo: The Photo face Database and a Comprehensive Evaluation. [SMS051]
  6. 6.   JAVA DATA MINING 1.A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data.[SMS001] 2.A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data.[SMS002] 3.A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models.[SMS003] 4.A Survey of XML Tree Patterns.[SMS004] 5.Change Detection in Streaming Multivariate Data Using Likelihood Detectors.[SMS005] 6.Dynamic Personalized Recommendation on Sparse Data.[SMS006] 7.Mining User Queries with Markov Chains: Application to Online Image Retrieval.[SMS007] 8. Optimal Route Queries with Arbitrary Order Constraints.[SMS008] 9.Failure-Aware Cascaded Suppression in Wireless Sensor Networks.[SMS009] 10.Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and RuleBased Model.[SMS010] 11.A System to Filter Unwanted Messages from OSN User Walls.[SMS011] 12.M-Privacy for Collaborative Data Publishing.[SMS012] 13.Comparable Entity Mining from Comparative Questions.[SMS013] 14.Spatial Approximate String Search.[SMS014] 15.Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse.[SMS015] NETWORKING AND NETWORK SECURITY 16.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System.[SMS016] 17.Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks.[SMS017] 18.Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality.[SMS018]
  7. 7.   19.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems.[SMS019] 20.Efficient Algorithms for Neighbor Discovery in Wireless Networks.[SMS020] 21.Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning.[SMS021] 22.Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience.[SMS022] 23.An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks.[SMS023] 24.An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks.[SMS024] 25.A Rank Correlation Based Detection Resources for against Distributed Reflection DoS Attacks.[SMS025] 26.Optimizing Cloud Delivering IPTV Services through Virtualization.[SMS026] 27.Participatory Privacy Enabling Privacy in Participatory Sensing.[SMS027] CLOUD COMPUTING 28.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud.[SMS028] 29.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS029] 30.Winds of Change From Vendor Lock-In to the Meta Cloud.[SMS030] 31.Cloud computing for mobile users can offloading compution save energy.[SMS031] 32.On Data Staging Algorithms for Shared Data Accesses in Clouds.[SMS032] 33.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.[SMS033] 34.AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.[SMS034] 35.CloudMoV: Cloud-based Mobile Social TV.[SMS035] 36.QoS Ranking Prediction for Cloud Services.[SMS036] 37.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS037]
  8. 8.   38.Collaboration in Multicloud Computing Environments: Framework and Security Issues.[SMS038] 39.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS039] 40.Towards Differential Query Services in Cost-Efficient Clouds.[SMS040] MOBILE COMPUTING 41.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks.[SMS041] 42.EAACK :A Secure Intrusion-Detection System for MANETs.[SMS042] 43.Vampire attacks:Draining life from wireless ad-hoc sensor networks.[SMS043] 44.Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks.[SMS044] 45.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks.[SMS045] 46.On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks.[SMS046] 47.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.[SMS047] 48.A Scalable Server Architecture for Mobile Presence Services in Social Network Applications.[SMS048] 49.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users.[SMS049] 50.EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Mobile Ad Hoc Networks.[SMS050] 51.Adaptive Position Update for Geographic Routing in Networks.[SMS051] 52.Community-Aware Opportunistic Routing in Mobile Social Networks.[SMS052] 53.Distributed Cooperative Caching in Social Wireless Networks.[SMS053] 54.Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation.[SMS054] 55.Toward a Statistical Framework for Source Anonymity in Sensor Networks.[SMS055]
  9. 9.   PARALLEL DISTRIBUTED SYSTEMS 56.Covering Points of Interest with Mobile Sensors.[SMS056] 57.A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.[SMS057] 58.Analysis of Distance-Based Location Management in Wireless Communication Networks.[SMS058] 59.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks.[SMS059] 60.Error-Tolerant Resource Allocation and Payment Minimization for Cloud System.[SMS060] 61.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.[SMS061] 62.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment.[SMS062] 63.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds.[SMS063] 64.BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments.[SMS064] 65.Towards Differential Query Services in Cost-Efficient Clouds.[SMS065] 66.A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.[SMS066] 67.Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems.[SMS067] 68.ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.[SMS068] 69.Detection and Localization of Multiple Spoofing Attackers in Wireless Networks.[SMS069] 70.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.[SMS070]
  10. 10.   SERVICE COMPUTING 71.Privacy-Enhanced Web Service Composition.[SMS071] 72.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.[SMS072] 73.Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection.[SMS073] SECURE COMPUTING 74.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS074] 75.Secure Encounter-based Mobile Social Networks Tradeoffs.[SMS075] 76.Two tales of privacy in online social networks.[SMS076] Requirements Designs and
  11. 11.   ANDROID DATA MINING 1.Finding Rare Classes Active Learning with Generative and Discriminative Models. [SMS001] 2.A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia . [SMS002] 3.A Survey of XML Tree Patterns. [SMS003] 4.Anonymization of Centralized and Distributed Social Networks by Sequential Clustering . [SMS004] 5.T-Drive Enhancing Driving Directions with Taxi Driversâc Intelligence. [SMS005] 6.Region-Based Foldings in Process Discovery. [SMS006] 7.Ranking on Data Manifold with Sink Points. [SMS007] 8.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse. [SMS008] CLOUD COMPUTING 9. Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS009] 10. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. [SMS010] 11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems. [SMS011] 12. CloudMoV: Cloud-based Mobile Social TV. [SMS012]
  12. 12.   MOBILE COMPUTING 13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks. [SMS013] 14.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. [SMS014] 15.SSD A Robust RF Location Fingerprint Addressing Mobile Devicesa Heterogeneity. [SMS015] 16.A Scalable Server Architecture for Mobile Presence Services in Social Network Applications. [SMS016] 17.Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. [SMS017] PARALLEL DISTRIBUTED SYSTEMS 18.Distributed Web Systems Performance Forecasting Using Turning Bands Method. [SMS018] 19.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. [SMS019] 20.Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks. [SMS020] 21.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks. [SMS021] 22.Analysis of Distance-Based Location Management in Wireless Communication Networks. [SMS022]
  13. 13.   SERVICE COMPUTING 23.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. [SMS023] 24.Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection. [SMS024] 25.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. [SMS025]

×