1. 1. A Decentralized Service discovery approach on peer-to-network
2. A Fast Clustering Based Feature Subset Selection Algorithm For High Dimensional Data
3. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
4. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
5. A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse
Drug Reaction Signal Pairs
6. A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK
SESSIONS
7. A new approach for FEC decoding based on the BP alogaritham in LTE and WIMAX system
8. A Study and implementation on use search Histories
9. A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS
10. Adding Temporal constraints to Xml
11. Annotating Search Results from Web Databases
12. ANOMALY DETECTION VIA ONLINE OVER-SAMPLING PRINCIPAL COMPONENT
ANALYSIS
13. A-secure protocol for spontaneous wireless Adhoc Networks Creation
14. Attribute Based Encryption for scalable and secure Sharing of medical records in cloud
computing desing and implementation
15. Automatic discovery of association orders between name and aliasis
16. Back-Pressure-Based-Packet-by-Packet-Adaptive-Routing- in-Communication-Networks-docx
17. CLOUD COMPUTING SECURITY: FROM SINGLE TO MULTI-CLOUDS
18. CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING
19. CloudMoV: Cloud-based Mobile Social TV
20. Clustering With multi view point Based similarity measure
21. Clustering-Sentence-Level-Text-Using-a-Novel-Fuzzy-Relational-Clustering-Algorithm-docx-not
there
22. Combining-Cryptographic-Primitives-to-Prevent-Jamming-Attacks- in-Wireless-Networks-not
there
23. Cut Detection In Wireless Sensor Networks
24. Distributed-Processing-of-Probabilistic-Top-k-Queries- in-Wireless-Sensor-Networks-docx
25. DoubleGuard Detecting Intrusions in multitier web application
26. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
27. EAACK--A Secure Intrusion-Detection System for MANETs.
28. Efficient algorithm for high utility item sets for trasactional data bases-2012
29. Enabling-Dynamic-Data-and-Indirect-Mutual-Trust-for-Cloud-Computing-Storage-Systems
30. ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD
31. FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS
32. Fully Anonymous Profile Matching in Mobile Social Networks
33. IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES
34. Intrusion-detection technique by using K-means,fuzzy neural networks and SVM calssifiers
35. IP-Geo Location Mapping For Moderately Connected Internet Regions
36. MeasuRouting :A Framework for Routing Assisted Traffic Monitoring
37. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
2. 38. On-the-Node-Clone-Detection-in-Wireless-Sensor-Networks-docx
39. Optimal Client Server Assignment For Internet Distributed Systems
40. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
41. Participatory Privacy: Enabling Privacy in participatory sensing
42. PMSE: A Personalized Mobile Search Engine
43. Preventing-Private-Information-Inference-Attacks-on-Social-Networks-docx
44. PRIVACY PRESERVING DATA SHARING WITH ANYONYMOUS ID ASSIGNMENT
45. PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
46. Protecting sensitive labels in social network data anonmyzation-docx
47. SECURE MULTI-OWNER DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD
48. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
49. Self Adaptive Contention Aware Routing protocol for intermittently connected mobile
Network
50. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems-56-Java-Network Security-
2013-
51. Spatial-Approximate-String-Search-docx
52. Toward-Privacy-Preserving-and-Collusion-Resistance-in-a-Location-Proof-Updating-System-docx-
not there
53. Towards a Statistical Framework for Source Anonymity in Sensor Networks
54. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System
Development-34-Data Mining-2013 Java List
55. Two tales of privacy in online social networks
56. Vampire attacks: Draining life from wireless ad-hoc sensor networks
57. Warning Bird-not there
Enabling dynamic data and index mutual trust for cloud computing storage systems(JAVA)
65-Networking-2013-Java
EAACK: A secure intrusion detection sytem for MANET(JAVA)
47-Network Security-2013-Java
AMES CLOUD:A Framework of adaptive mobile video streaming and efficient social video sharing in the
clouds(JAVA)
3-cloud computing-2013-Java
3. Optimal client-server assignment for internet distributed Systems(JAVA)
68-networking-Java
Optimal multi server configuration for profit maximization in cloud computing(.NET)
8-DotNet-Cloud Computing
A highly scalable key predestration schema for wireless sensor networks(JAVA)
60-networking-2013
A secure protocol for spontaneous wireless adhoc networks creation (JAVA)
61-networking-2013
Securing class Initialize in java-like languages(JAVA)
Privacy preserving public auditing for secure cloud storage(JAVA)
12-cloud computing-2013
MONA: Secure multiowner data sharing for dynamic groups in the cloud(.NET)
10-cloud computing-2013
Security analysis of a single sign on mechanism for distributed computer networks(JAVA)