SlideShare a Scribd company logo
1 of 8
2013 - 2014 IEEE Projects @ JP iNFOTeCH
JAVA
CLOUD COMPUTING
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
CloudMoV: Cloud-based Mobile Social TV
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Privacy-Preserving Public Auditing for Secure Cloud Storage
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption
Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers
KNOWLEDGE AND DATA ENGINEERING
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
A New Algorithm for Inferring User Search Goals with Feedback Sessions
Annotating Search Results from Web Databases
Anomaly Detection via Online Over-Sampling Principal Component Analysis
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
m-Privacy for Collaborative Data Publishing
Protecting Sensitive Labels in Social Network Data Anonymization
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System
Development
SECURE COMPUTING
EAACK—A Secure Intrusion-Detection System for MANETs
Identity-Based Secure Distributed Data Storage Schemes
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems
Privacy Preserving Data Sharing With Anonymous ID Assignment
Securing Class Initialization in Java-like Languages
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter
Stream
NETWORKING
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
Delay-Based Network Utility Maximization
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
PARALLEL AND DISTRIBUTED SYSTEMS
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
IP-Geolocation Mapping for Moderately Connected Internet Regions
Optimal Client-Server Assignment for Internet Distributed Systems
MOBILE COMPUTING
Content Sharing over Smartphone-Based Delay-Tolerant Networks
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in
Wireless Mobile Networks
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users
PATTERN ANALYSIS AND MACHINE INTELLIGENCE
A Framework for Mining Signatures from Event Sequences and Its Applications in
Healthcare Data
SERVICES COMPUTING
A Decentralized Service Discovery Approach on Peer-to-Peer Networks
Personalized QoS-Aware Web Service Recommendation and Visualization
Privacy-Enhanced Web Service Composition
SOFTWARE ENGINEERING
Whole Test Suite Generation
2013 - 2014 IEEE Projects @ JP iNFOTeCH
DOT NET
CLOUD COMPUTING
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy
Preserving of Intermediate Data Sets in Cloud
An Adaptive Cloud Downloading Service
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
On Data Staging Algorithms for Shared Data Accesses in Clouds
Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
Privacy-Preserving Public Auditing for Secure Cloud Storage
QoS Ranking Prediction for Cloud Services
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption
Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud
Computing Systems
Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
KNOWLEDGE AND DATA ENGINEERING
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A Survey of XML Tree Patterns
Dynamic Personalized Recommendation on Sparse Data
Mining User Queries with Markov Chains: Application to Online Image Retrieval
TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality
SECURE COMPUTING
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks.
EAACK—A Secure Intrusion-Detection System for MANETs
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information
Sharing
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
Privacy Preserving Data Sharing With Anonymous ID Assignment
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
NETWORKING
A Distributed Control Law for Load Balancing in Content Delivery Networks
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc
Networks
BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
Efficient Algorithms for Neighbor Discovery in Wireless Networks
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
Resource Allocation for QoS Support in Wireless Mesh Networks
PARALLEL AND DISTRIBUTED SYSTEMS
A Secure Payment Scheme with Low Communication and Processing Overhead for
Multihop Wireless Networks
Multicast Capacity in MANET with Infrastructure Support
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
MOBILE COMPUTING
Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game
Approach
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Optimal Multicast Capacity and Delay Tradeoffs in MANETs
Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor
Networks
IMAGE PROCESSING
Query-Adaptive Image Search With Hash Codes
Reversible Data Hiding With Optimal Value Transfer
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram
Shifting
Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform
Shrinkage

More Related Content

Viewers also liked

Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
A real time adaptive algorithm for video streaming over multiple wireless acc...
A real time adaptive algorithm for video streaming over multiple wireless acc...A real time adaptive algorithm for video streaming over multiple wireless acc...
A real time adaptive algorithm for video streaming over multiple wireless acc...
JPINFOTECH JAYAPRAKASH
 
Cooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networksCooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networks
JPINFOTECH JAYAPRAKASH
 
2015 - 2016 ieee ns2 project titles
2015 - 2016 ieee ns2 project titles2015 - 2016 ieee ns2 project titles
2015 - 2016 ieee ns2 project titles
JPINFOTECH JAYAPRAKASH
 

Viewers also liked (13)

Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...
 
A real time adaptive algorithm for video streaming over multiple wireless acc...
A real time adaptive algorithm for video streaming over multiple wireless acc...A real time adaptive algorithm for video streaming over multiple wireless acc...
A real time adaptive algorithm for video streaming over multiple wireless acc...
 
Spatial approximate string search
Spatial approximate string searchSpatial approximate string search
Spatial approximate string search
 
An adaptive cloud downloading service
An adaptive cloud downloading serviceAn adaptive cloud downloading service
An adaptive cloud downloading service
 
2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLES2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLES
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
2012-2013 IEEE PROJECT TITLES
2012-2013 IEEE PROJECT TITLES2012-2013 IEEE PROJECT TITLES
2012-2013 IEEE PROJECT TITLES
 
A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...
 
Cooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networksCooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networks
 
2015 - 2016 ieee ns2 project titles
2015 - 2016 ieee ns2 project titles2015 - 2016 ieee ns2 project titles
2015 - 2016 ieee ns2 project titles
 
A probabilistic model of visual cryptography Scheme With Dynamic Group
A probabilistic model of visual cryptography Scheme With Dynamic GroupA probabilistic model of visual cryptography Scheme With Dynamic Group
A probabilistic model of visual cryptography Scheme With Dynamic Group
 

Similar to 2013 2014 bulk ieee projects

2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
Ecwaytechnoz
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
Ecway2004
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
Ecway2004
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
Ecwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
Ecwaytechnoz
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
Ecwaytech
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
Ecway2004
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
Ecwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
Ecwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
Ecway2004
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
Ecwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
Ecwaytechnoz
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
Ecwaytech
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
Ecway2004
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
Ecwaytechnoz
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
Ecwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
Ecwayt
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
Ecway2004
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
Ecwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
Ecwayt
 

Similar to 2013 2014 bulk ieee projects (20)

2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 

Recently uploaded (20)

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 

2013 2014 bulk ieee projects

  • 1. 2013 - 2014 IEEE Projects @ JP iNFOTeCH JAVA CLOUD COMPUTING A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems CloudMoV: Cloud-based Mobile Social TV Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Privacy-Preserving Public Auditing for Secure Cloud Storage Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers KNOWLEDGE AND DATA ENGINEERING A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data A New Algorithm for Inferring User Search Goals with Feedback Sessions Annotating Search Results from Web Databases
  • 2. Anomaly Detection via Online Over-Sampling Principal Component Analysis Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks m-Privacy for Collaborative Data Publishing Protecting Sensitive Labels in Social Network Data Anonymization Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development SECURE COMPUTING EAACK—A Secure Intrusion-Detection System for MANETs Identity-Based Secure Distributed Data Storage Schemes Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Privacy Preserving Data Sharing With Anonymous ID Assignment Securing Class Initialization in Java-like Languages Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream
  • 3. NETWORKING A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Delay-Based Network Utility Maximization Dynamic Control of Coding for Progressive Packet Arrivals in DTNs PARALLEL AND DISTRIBUTED SYSTEMS A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems IP-Geolocation Mapping for Moderately Connected Internet Regions Optimal Client-Server Assignment for Internet Distributed Systems MOBILE COMPUTING Content Sharing over Smartphone-Based Delay-Tolerant Networks DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
  • 4. PATTERN ANALYSIS AND MACHINE INTELLIGENCE A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data SERVICES COMPUTING A Decentralized Service Discovery Approach on Peer-to-Peer Networks Personalized QoS-Aware Web Service Recommendation and Visualization Privacy-Enhanced Web Service Composition SOFTWARE ENGINEERING Whole Test Suite Generation
  • 5. 2013 - 2014 IEEE Projects @ JP iNFOTeCH DOT NET CLOUD COMPUTING A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud An Adaptive Cloud Downloading Service Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud On Data Staging Algorithms for Shared Data Accesses in Clouds Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Privacy-Preserving Public Auditing for Secure Cloud Storage QoS Ranking Prediction for Cloud Services Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
  • 6. KNOWLEDGE AND DATA ENGINEERING A New Algorithm for Inferring User Search Goals with Feedback Sessions A Survey of XML Tree Patterns Dynamic Personalized Recommendation on Sparse Data Mining User Queries with Markov Chains: Application to Online Image Retrieval TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality SECURE COMPUTING A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. EAACK—A Secure Intrusion-Detection System for MANETs Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links Privacy Preserving Data Sharing With Anonymous ID Assignment SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems NETWORKING A Distributed Control Law for Load Balancing in Content Delivery Networks A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
  • 7. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments Efficient Algorithms for Neighbor Discovery in Wireless Networks Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality Resource Allocation for QoS Support in Wireless Mesh Networks PARALLEL AND DISTRIBUTED SYSTEMS A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Multicast Capacity in MANET with Infrastructure Support SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency MOBILE COMPUTING Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Optimal Multicast Capacity and Delay Tradeoffs in MANETs Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
  • 8. IMAGE PROCESSING Query-Adaptive Image Search With Hash Codes Reversible Data Hiding With Optimal Value Transfer Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting Local Directional Number Pattern for Face Analysis: Face and Expression Recognition Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage