1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
1 A Fast Clustering-Based Feature Subset Selection Algorithm for High
Dimensional Data
2 CloudMoV Cloud-based Mobile Social TV
3 Crowd sourcing Predictors of Behavioral Outcomes
4 Spatial Approximate String Search
5 Incentive Compatible Privacy-Preserving Data Analysis
6 Focus Learning to Crawl Web Forums
7 Extracting Spread-Spectrum Hidden Data from Digital Media
8 Utility-Privacy Tradeoff in Databases An Information-theoretic Approach
9 Dynamic Resource Allocation using Virtual Machines for Cloud Computing
Environment
10 Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
11 Vampire attacks Draining life from wireless ad-hoc sensor networks
12 Towards a Statistical Framework for Source Anonymity in Sensor Networks
13 A Scalable Server Architecture for Mobile Presence Services in Social Network
Applications
14 Towards Differential Query Services in Cost-Efficient Clouds
15 Distributed Cooperative Caching in Social Wireless Networks
16 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
17 Access Policy Consolidation for Event Processing Systems
18 Mining Contracts for Business Events and Temporal Constraints in Service
Engagements
19 Fully Anonymous Profile Matching in Mobile Social Networks
20 A Decentralized Service Discovery
21 A Generalized Flow-Based Method for Analysis
22 A Generalized Flow-Based Method for Analysis
23 A Secure Protocol for Spontaneous
24 AMES
25 An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Computin
26 Attribute-Based Encryption With Verifiable
27 Back-Pressure-Based Packet-by-Packet Adaptive
28 CAM
29 Combining Cryptographic Primitives to Prevent Jamming Attacks inWireless
Networks
2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
30 Cross-Domain Privacy-Preserving Cooperative
31 DCIM
32 Delay-Based Network Utility Maximization
33 Dynamic Control of Coding for
34 EAACK—A Secure Intrusion-Detection
35 Efficient Algorithms for Neighbor Discovery in Wireless Networks
36 Enabling Dynamic Data modified
37 Error-Tolerant Resource Allocation and
38 Facilitating Document Annotation
39 Fast Transmission to Remote Cooperative Groups
40 Harnessing the Cloud for Securely Outsourcing
41 Minimum Cost Blocking Problem in Multi-path
42 Modeling the Pairwise Key Predistribution Scheme
43 Mona Secure Multi-Owner Data Sharing
44 Multiparty access control inOSN
45 NICE Network Intrusion Detection and Countermeasure
46 On the Node Clone Detection in Wireless
47 Opportunistic MANETs Mobility Can Make Up
48 Optimal Client-Server Assignment for Internet
49 Participatory Privacy
50 Privacy Preserving Data Sharing With
51 Secure Encounter-based Mobile Social
52 Secure Mining Of Association Rules in Horizontally Distributed Database
53 security analysis of single-signon mechanism
54 SORT A Self-ORganizing Trust Model
55 Tweet Analysis for Real-Time Event
56 Using Data Mining Techniques In Heart Disease Diagnosis AndTreatment
57 Using Fuzzy Logic Control to Provide Intelligent Traffic Management
58 Whole Test Suite Generation
59 Efficient Two-Server Password-Only Authenticated Key Exchange