1. SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
M.TECH JAVA LIST 2013-14
S. No
Project
Code
Project Title Domain Year
1 J1301
Privacy-Preserving Public Auditing for
Secure Cloud Storage
Cloud
Computing
2013
2 J1302
Winds of Change from Vendor Lock-In to
the Meta Cloud
Cloud
Computing
2013
3 J1303
AMES-Cloud: A Framework of Adaptive
Mobile Video Streaming and Efficient
Social Video Sharing in
the Clouds
Cloud
Computing
2013
4
J1304
A Load Balancing Model Based on Cloud
Partitioning for the
Public Cloud
Cloud
Computing 2013
5
J1305 Privacy Preserving Delegated Access
Control in Public Clouds
Cloud
Computing
2013
6
J1306
A Stochastic Model to Investigate Data
Center Performance and QoS in IaaS Cloud
Computing Systems
Cloud
Computing 2013
7
J1307
CloudMoV: Cloud-based Mobile Social TV
Cloud
Computing 2013
8
J1308
Dynamic Resource Allocation Using Virtual
Machines for Cloud Computing
Environment
Cloud
Computing
2013
9
J1309
Error-Tolerant Resource Allocation and
Payment Minimization for Cloud System
Cloud
Computing
2013
10
J1310
Harnessing the Cloud for Securely
Outsourcing Large-Scale Systems of Linear
Equations
Cloud
Computing
2013
2. SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
11
J1311
Mona: Secure Multi-Owner Data Sharing
for Dynamic Groups in the Cloud
Cloud
Computing
2013
12
J1312
PACK: Prediction-Based Cloud Bandwidth
and Cost Reduction System
Cloud
Computing
2013
13
J1313
Scalable and Secure Sharing of Personal
Health Records in Cloud Computing Using
Attribute-Based Encryption
Cloud
Computing
2013
14
J1314
Enabling Dynamic Data and Indirect Mutual
Trust for Cloud
Computing Storage Systems
Cloud
Computing 2013
15
J1315
Load Rebalancing for Distributed File
Systems in Clouds
Cloud
Computing
2013
16
J1316
Optimizing Cloud Resources for
Delivering IPTV Services Through
Virtualization
Cloud
Computing
2013
17
J1317
Attribute-Based Encryption With
Verifiable Outsourced Decryption
Cloud
Computing
2013
18
J1318
A Fast Clustering-Based Feature Subset
Selection Algorithm for High-
Dimensional Data
DATA
MINING
2013
19
J1319
CloudMoV: Cloud-based Mobile Social TV
DATA
MINING 2013
20
J1320
Crowd sourcing Predictors of Behavioral
Outcomes
DATA
MINING
2013
3. SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
21
J1321
Spatial Approximate String Search
DATA
MINING
2013
22
J1322 Incentive Compatible Privacy-Preserving
Data Analysis
DATA
MINING
2013
23
J1323 Focus Learning to Crawl Web Forums DATA
MINING 2013
24
J1324 Robust Module Based Data Management DATA
MINING 2013
25
J1325 Comparable Entity Mining from
Comparative Questions
DATA
MINING 2013
26
J1326 Facilitating Effective User Navigation
through Website Structure Improvement
DATA
MINING 2013
27
J1327 PMSE: A Personalized Mobile Search
Engine
DATA
MINING 2013
28
J1328 Sensitive Label Privacy Protection on Social
Network Data
DATA
MINING 2013
29
J1329 . A System to Filter Unwanted Messages
from OSN User Walls
DATA
MINING 2013
30
J1330
A New Algorithm for Inferring User Search
Goals with Feedback Sessions
DATA
MINING 2013
31
J1331
Annotating Search Results from Web
Databases
DATA
MINING
2013
4. SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
32
J1332
Anomaly Detection via Online Over-
Sampling Principal Component Analysis
DATA
MINING
2013
33
J1333
Distributed Processing of Probabilistic Top-
k Queries in Wireless Sensor Networks
DATA
MINING
2013
34
J1334
m-Privacy for Collaborative Data
Publishing
DATA
MINING
2013
35
J1335
Protecting Sensitive Labels in Social
Network Data Anonymization
DATA
MINING 2013
36
J1336
Tweet Analysis for Real-Time Event
Detection and Earthquake
DATA
MINING 2013
37
J1337
Document Clustering for Forensic
Analysis: An Approach for
Improving
Computer
Inspection
DATA
MINING
2013
38
J1338
A Method for Mining Infrequent
Causal Associations and Its
Application in Finding Adverse
Drug Reaction Signal Pairs
DATA
MINING
2013
39
J1339
Clustering Sentence-Level Text Using
a Novel Fuzzy Relational
Clust
ering
Algo
rithm
DATA
MINING
2013
40
J1340
Facilitating Document Annotation
using Content and Querying
V
a
l
u
e
DATA
MINING 2013
41
J1341
A Generalized Flow-Based Method
for Analysis of Implicit
Relationsh
ips on
Wikipedia
DATA
MINING 2013
5. SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
42
J1342
Anonymization of Centralized and
Distributed Social Networks by
Seque
ntial
Clust
ering
DATA
MINING
2013
43
J1343
Intrusion Detection Technique by using
K-means, Fuzzy Neural
Network
and SVM
classifiers.
DATA
MINING
2013
44
J1344
Preventing Private Information
Inference Attacks on Social
N
e
t
w
o
r
k
s
DATA
MINING 2013
45
J1345
Multiparty Access Control for Online
Social Networks Model and
M
e
c
h
a
n
i
s
m
s
DATA
MINING 2013
46
J1346
EAACK—A Secure Intrusion-
Detection System for MANETs
DATA
MINING
2013
47
J1347
Identity-Based Secure Distributed Data
Storage Schemes
DATA
MINING
2013
48
J1348 Modeling the Pairwise Key
Predistribution Scheme in the Presence
of Unreliable Links
DATA
MINING
2013
49
J1349
A Highly Scalable Key Pre-Distribution
Scheme for Wireless Sensor Networks
Networking
2013
50
J1350
Optimizing Cloud Resources for Delivering
IPTV Services through Virtualization
Networking
2013
51
J1351
Mining contract s for business event and
temporal constraints in service engagement
Networking
2013
6. SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
52
J1352
Fully Anonymous Profile Matching in
Mobile Social Networks
Networking
2013
53
J1353
Access Policy Consolidation for Event
Processing Systems
Networking
2013
54
J1354
Price Differentiation for Communication
Networks Networking 2013
55 J1355 Delay-Based Network Utility Maximization Networking 2013
56
J356
Dynamic Control of Coding for Progressive
Packet Arrivals in DTNs
Networking 2013
57
J1357
Minimum Cost Blocking Problem in
Multi-path Wireless Routing
P
r
o
t
o
c
o
l
s
Networking
2013
58
J1358 On the Node Clone Detection in Wireless
Sensor Networks
Networking 2013
59
J1359 Opportunistic MANETs: Mobility
Can Make Up for LowTransmission
Power
Networking 2013
60
J1360
Back-Pressure-Based Packet-by-
Packet Adaptive Routing in
Communi
cation
Networks
Networking 2013
61
J1361
Fast Transmission to Remote
Cooperative Groups: A New Key
Manage
ment
Paradig
m
Networking
2013
7. SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
62
J1362
Participatory Privacy: Enabling Privacy
in Participatory Sensing
Networking
2013
63
J1363 Using Fuzzy Logic Control to Provide
Intelligent Traffic Management Service for
High-Speed Networks
Networking 2013
64
J1364
CAM: Cloud-Assisted Privacy Preserving
Mobile Health Monitoring.
Secure
Computing
2013
65
J1365
Utility-Privacy Tradeoff in Databases An
Information-theoretic Approach.
Secure
Computing
2013
66
J1366
Extracting Spread-Spectrum Hidden Data
from Digital Media
Secure
Computing
2013
67
J1367
Two tales of privacy in online social
networks
Secure
Computing
2013
68
J1368 Dynamic Resource Allocation using Virtual
Machines for Cloud Computing
Environment
Parallel and
Distributed
Systems
2013
69
J1369
Mobile Relay Configuration in Data-
intensive Wireless Sensor Networks.
Mobile
Computing
2013
70
J1370
Vampire attacks: Draining life from
wireless ad-hoc sensor networks.
Mobile
Computing
2013
71
J1371
Towards a Statistical Framework for Source
Anonymity in Sensor Networks
Mobile
Computing
2013
8. SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
72
J1372 A Scalable Server Architecture for Mobile
Presence Services in Social Network
Applications
Mobile
Computing
2013
73
J1373 Privacy-Preserving Distributed Profile
Matching in Proximity-based Mobile Social
Networks
Mobile
Computing
2013
74
J1374
Distributed Cooperative Caching in Social
Wireless Networks
Mobile
Computing
2013