1. A Decentralized Service discovery approach on peer-to-network 
2. A Fast Clustering Based Feature Subset Selection Algorithm For High Dimensional Data 
3. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 
4. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 
5. A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse 
Drug Reaction Signal Pairs 
6. A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK 
SESSIONS 
7. A new approach for FEC decoding based on the BP alogaritham in LTE and WIMAX system 
8. A Study and implementation on use search Histories 
9. A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS 
10. Adding Temporal constraints to Xml 
11. Annotating Search Results from Web Databases 
12. ANOMALY DETECTION VIA ONLINE OVER-SAMPLING PRINCIPAL COMPONENT 
ANALYSIS 
13. A-secure protocol for spontaneous wireless Adhoc Networks Creation 
14. Attribute Based Encryption for scalable and secure Sharing of medical records in cloud 
computing desing and implementation 
15. Automatic discovery of association orders between name and aliasis 
16. Back-Pressure-Based-Packet-by-Packet-Adaptive-Routing- in-Communication-Networks-docx 
17. CLOUD COMPUTING SECURITY: FROM SINGLE TO MULTI-CLOUDS 
18. CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING 
19. CloudMoV: Cloud-based Mobile Social TV 
20. Clustering With multi view point Based similarity measure 
21. Clustering-Sentence-Level-Text-Using-a-Novel-Fuzzy-Relational-Clustering-Algorithm-docx-not 
there 
22. Combining-Cryptographic-Primitives-to-Prevent-Jamming-Attacks- in-Wireless-Networks-not 
there 
23. Cut Detection In Wireless Sensor Networks 
24. Distributed-Processing-of-Probabilistic-Top-k-Queries- in-Wireless-Sensor-Networks-docx 
25. DoubleGuard Detecting Intrusions in multitier web application 
26. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 
27. EAACK--A Secure Intrusion-Detection System for MANETs. 
28. Efficient algorithm for high utility item sets for trasactional data bases-2012 
29. Enabling-Dynamic-Data-and-Indirect-Mutual-Trust-for-Cloud-Computing-Storage-Systems 
30. ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD 
31. FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS 
32. Fully Anonymous Profile Matching in Mobile Social Networks 
33. IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES 
34. Intrusion-detection technique by using K-means,fuzzy neural networks and SVM calssifiers 
35. IP-Geo Location Mapping For Moderately Connected Internet Regions 
36. MeasuRouting :A Framework for Routing Assisted Traffic Monitoring 
37. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
38. On-the-Node-Clone-Detection-in-Wireless-Sensor-Networks-docx 
39. Optimal Client Server Assignment For Internet Distributed Systems 
40. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 
41. Participatory Privacy: Enabling Privacy in participatory sensing 
42. PMSE: A Personalized Mobile Search Engine 
43. Preventing-Private-Information-Inference-Attacks-on-Social-Networks-docx 
44. PRIVACY PRESERVING DATA SHARING WITH ANYONYMOUS ID ASSIGNMENT 
45. PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE 
46. Protecting sensitive labels in social network data anonmyzation-docx 
47. SECURE MULTI-OWNER DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD 
48. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 
49. Self Adaptive Contention Aware Routing protocol for intermittently connected mobile 
Network 
50. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems-56-Java-Network Security- 
2013- 
51. Spatial-Approximate-String-Search-docx 
52. Toward-Privacy-Preserving-and-Collusion-Resistance-in-a-Location-Proof-Updating-System-docx- 
not there 
53. Towards a Statistical Framework for Source Anonymity in Sensor Networks 
54. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System 
Development-34-Data Mining-2013 Java List 
55. Two tales of privacy in online social networks 
56. Vampire attacks: Draining life from wireless ad-hoc sensor networks 
57. Warning Bird-not there 
Enabling dynamic data and index mutual trust for cloud computing storage systems(JAVA) 
65-Networking-2013-Java 
EAACK: A secure intrusion detection sytem for MANET(JAVA) 
47-Network Security-2013-Java 
AMES CLOUD:A Framework of adaptive mobile video streaming and efficient social video sharing in the 
clouds(JAVA) 
3-cloud computing-2013-Java
Optimal client-server assignment for internet distributed Systems(JAVA) 
68-networking-Java 
Optimal multi server configuration for profit maximization in cloud computing(.NET) 
8-DotNet-Cloud Computing 
A highly scalable key predestration schema for wireless sensor networks(JAVA) 
60-networking-2013 
A secure protocol for spontaneous wireless adhoc networks creation (JAVA) 
61-networking-2013 
Securing class Initialize in java-like languages(JAVA) 
Privacy preserving public auditing for secure cloud storage(JAVA) 
12-cloud computing-2013 
MONA: Secure multiowner data sharing for dynamic groups in the cloud(.NET) 
10-cloud computing-2013 
Security analysis of a single sign on mechanism for distributed computer networks(JAVA)
55-Network Security 
IP-geolocation mapping for moderately connected internet regions(JAVA) 
67-Networking-2013

CREC List.docx

  • 1.
    1. A DecentralizedService discovery approach on peer-to-network 2. A Fast Clustering Based Feature Subset Selection Algorithm For High Dimensional Data 3. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 4. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 5. A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 6. A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONS 7. A new approach for FEC decoding based on the BP alogaritham in LTE and WIMAX system 8. A Study and implementation on use search Histories 9. A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS 10. Adding Temporal constraints to Xml 11. Annotating Search Results from Web Databases 12. ANOMALY DETECTION VIA ONLINE OVER-SAMPLING PRINCIPAL COMPONENT ANALYSIS 13. A-secure protocol for spontaneous wireless Adhoc Networks Creation 14. Attribute Based Encryption for scalable and secure Sharing of medical records in cloud computing desing and implementation 15. Automatic discovery of association orders between name and aliasis 16. Back-Pressure-Based-Packet-by-Packet-Adaptive-Routing- in-Communication-Networks-docx 17. CLOUD COMPUTING SECURITY: FROM SINGLE TO MULTI-CLOUDS 18. CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING 19. CloudMoV: Cloud-based Mobile Social TV 20. Clustering With multi view point Based similarity measure 21. Clustering-Sentence-Level-Text-Using-a-Novel-Fuzzy-Relational-Clustering-Algorithm-docx-not there 22. Combining-Cryptographic-Primitives-to-Prevent-Jamming-Attacks- in-Wireless-Networks-not there 23. Cut Detection In Wireless Sensor Networks 24. Distributed-Processing-of-Probabilistic-Top-k-Queries- in-Wireless-Sensor-Networks-docx 25. DoubleGuard Detecting Intrusions in multitier web application 26. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 27. EAACK--A Secure Intrusion-Detection System for MANETs. 28. Efficient algorithm for high utility item sets for trasactional data bases-2012 29. Enabling-Dynamic-Data-and-Indirect-Mutual-Trust-for-Cloud-Computing-Storage-Systems 30. ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD 31. FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS 32. Fully Anonymous Profile Matching in Mobile Social Networks 33. IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES 34. Intrusion-detection technique by using K-means,fuzzy neural networks and SVM calssifiers 35. IP-Geo Location Mapping For Moderately Connected Internet Regions 36. MeasuRouting :A Framework for Routing Assisted Traffic Monitoring 37. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
  • 2.
    38. On-the-Node-Clone-Detection-in-Wireless-Sensor-Networks-docx 39.Optimal Client Server Assignment For Internet Distributed Systems 40. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 41. Participatory Privacy: Enabling Privacy in participatory sensing 42. PMSE: A Personalized Mobile Search Engine 43. Preventing-Private-Information-Inference-Attacks-on-Social-Networks-docx 44. PRIVACY PRESERVING DATA SHARING WITH ANYONYMOUS ID ASSIGNMENT 45. PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE 46. Protecting sensitive labels in social network data anonmyzation-docx 47. SECURE MULTI-OWNER DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD 48. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 49. Self Adaptive Contention Aware Routing protocol for intermittently connected mobile Network 50. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems-56-Java-Network Security- 2013- 51. Spatial-Approximate-String-Search-docx 52. Toward-Privacy-Preserving-and-Collusion-Resistance-in-a-Location-Proof-Updating-System-docx- not there 53. Towards a Statistical Framework for Source Anonymity in Sensor Networks 54. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development-34-Data Mining-2013 Java List 55. Two tales of privacy in online social networks 56. Vampire attacks: Draining life from wireless ad-hoc sensor networks 57. Warning Bird-not there Enabling dynamic data and index mutual trust for cloud computing storage systems(JAVA) 65-Networking-2013-Java EAACK: A secure intrusion detection sytem for MANET(JAVA) 47-Network Security-2013-Java AMES CLOUD:A Framework of adaptive mobile video streaming and efficient social video sharing in the clouds(JAVA) 3-cloud computing-2013-Java
  • 3.
    Optimal client-server assignmentfor internet distributed Systems(JAVA) 68-networking-Java Optimal multi server configuration for profit maximization in cloud computing(.NET) 8-DotNet-Cloud Computing A highly scalable key predestration schema for wireless sensor networks(JAVA) 60-networking-2013 A secure protocol for spontaneous wireless adhoc networks creation (JAVA) 61-networking-2013 Securing class Initialize in java-like languages(JAVA) Privacy preserving public auditing for secure cloud storage(JAVA) 12-cloud computing-2013 MONA: Secure multiowner data sharing for dynamic groups in the cloud(.NET) 10-cloud computing-2013 Security analysis of a single sign on mechanism for distributed computer networks(JAVA)
  • 4.
    55-Network Security IP-geolocationmapping for moderately connected internet regions(JAVA) 67-Networking-2013