SlideShare a Scribd company logo
1 of 3
Download to read offline
IEEE 2015-2016 PROJECT CAPTION –JAVA
73/5,3rd Floor,Sri Kamatchi Complex
Opp.City Hospital (Near Lakshmi Complex)
Trichy- 620018, Contact No: 7200021403/04
Sl.No PROJECT CAPTION
DTSJV1
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost
Optimization
DTSJV2 A Hybrid Cloud Approach for Secure Authorized Deduplication
DTSJV3
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud
Computing Services
DTSJV4 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe
Systems
DTSJV5
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable
Delegation in
Cloud Computing
DTSJV6
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous
Attribute-Based Encryption
DTSJV7
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
DTSJV8 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
DTSJV9
Public Integrity Auditing for Dynamic Data Sharing with Multi-User
Modification
DTSJV10
Service Operator-Aware Trust Scheme for Resource Matchmaking across
Multiple Clouds
DTSJV11
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User
Revocation
DTSJV12
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe
Systems
DTSJV13
CloudArmor: Supporting Reputation-based Trust Management for Cloud
Services
DTSJV14
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous
Attribute-Based Encryption
DTSJV15 Enabling Cloud Storage Auditing With Key-Exposure Resistance
DTSJV16
An Iterative MapReduce Based Frequent Subgraph Mining Algorithm
DTSJV17 Collaborative Fuzzy Clustering From Multiple Weighted Views
IEEE 2015-2016 PROJECT CAPTION –JAVA
73/5,3rd Floor,Sri Kamatchi Complex
Opp.City Hospital (Near Lakshmi Complex)
Trichy- 620018, Contact No: 7200021403/04
DTSJV18 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
DTSJV19
Discovering Data Set Nature through Algorithmic Clustering Based on String
Compression
DTSJV20
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based
on the Word
DTSJV21 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DTSJV22 Resampling-Based Ensemble Methods for Online Class Imbalance Learning
DTSJV23
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational
Data
DTSJV24
PPDM: Privacy-preserving Protocol for Dynamic Medical Text Mining and Image
Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare
Systems
DTSJV25 Scalable Constrained Spectral Clustering
DTSJV26
Scalable Distributed Processing of K Nearest Neighbor Queries over Moving
Objects
DTSJV27
Smart Diary: A Smartphone-Based Framework for Sensing, Inferring, and
Logging Users’ Daily Life
DTSJV28 Efficient reversible data hiding based on multiple histograms modification
DTSJV29 Image Search Reranking With Hierarchical Topic Awareness
DTSJV30 Learning to Rank Using User Clicks and Visual Features for Image Retrieval
DTSJV31 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DTSJV32
What Can Pictures Tell Us About Web Pages? Improving Document Search Using
Images
DTSJV33
Adaptive Video Streaming for Wireless Networks With Multiple Users and
Helpers
DTSJV34 Context-Based Access Control Systems for Mobile Devices
IEEE 2015-2016 PROJECT CAPTION –JAVA
73/5,3rd Floor,Sri Kamatchi Complex
Opp.City Hospital (Near Lakshmi Complex)
Trichy- 620018, Contact No: 7200021403/04
DTSJV35 Discovery of Ranking Fraud for Mobile Apps
DTSJV36
Friendbook: A Semantic-Based Friend Recommendation System for Social
Networks
DTSJV37
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading
in Wireless Sensor Networks
DTSJV38 Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud
DTSJV39 A Survey of Security Attacks in Information-Centric Networking
DTSJV40 Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
DTSJV41 Cooperative Positioning and Tracking in Disruption Tolerant Networks
DTSJV42 Identifying High-Cardinality Hosts from Network-wide Traffic Measurements
DTSJV43 Low-Rate DoS Attacks Detection Based on Network Multifractal
DTSJV44
Secure Data Aggregation Technique for Wireless Sensor Networks in the
Presence of Collusion Attacks
DTSJV45
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service
Attacks
DTSJV46 Top-k Similarity Join in Heterogeneous Information Networks
DTSJV47
VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud
Environments
DTSJV48 Towards Effective Bug Triage with Software Data Reduction Techniques
DTSJV49
Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous
Hadoop Clusters
DTSJV50 An Efficient Privacy-Preserving Ranked Keyword Search Method
DTSJV51
Exact and Heuristic Resource Mapping Algorithms for Distributed and Hybrid
Clouds
DTSJV52
HadoopCL2: Motivating the Design of a Distributed, Heterogeneous
Programming System With Machine-Learning Applications
DTSJV53 i2MapReduce: Incremental MapReduce for Mining Evolving Big Data

More Related Content

Viewers also liked

Windows live messenger
Windows live messengerWindows live messenger
Windows live messengercofrem
 
Ed Priest Resume October 25 2016
Ed Priest Resume October 25 2016Ed Priest Resume October 25 2016
Ed Priest Resume October 25 2016Edward Priest
 
Final year java dreamweb techno solutions trichy - copy (2)
Final year java dreamweb techno solutions trichy - copy (2)Final year java dreamweb techno solutions trichy - copy (2)
Final year java dreamweb techno solutions trichy - copy (2)ranjith kumar
 
Deber de computacion maria
Deber de computacion mariaDeber de computacion maria
Deber de computacion mariaDiego Velasco
 
Hábitos orientados para la protección de la identidad de la persona
Hábitos orientados para la protección de la identidad de la personaHábitos orientados para la protección de la identidad de la persona
Hábitos orientados para la protección de la identidad de la personateresa estepa
 
Final year java dreamweb techno solutions trichy - copy (2)
Final year java dreamweb techno solutions trichy - copy (2)Final year java dreamweb techno solutions trichy - copy (2)
Final year java dreamweb techno solutions trichy - copy (2)ranjith kumar
 
ProyectO TIC CHUIRA CACHIMBERO
ProyectO TIC CHUIRA CACHIMBEROProyectO TIC CHUIRA CACHIMBERO
ProyectO TIC CHUIRA CACHIMBEROCHUIRA
 
Desayunos Mazars. Internalización, China y Crecimiento
Desayunos Mazars. Internalización, China y Crecimiento Desayunos Mazars. Internalización, China y Crecimiento
Desayunos Mazars. Internalización, China y Crecimiento MazarsChinaDesk
 
Trabajo de bádminton jav, dra joel
Trabajo de bádminton jav, dra joelTrabajo de bádminton jav, dra joel
Trabajo de bádminton jav, dra joelsextobolvega
 
Con referencias[1].docx el problema cuft
Con referencias[1].docx el problema  cuftCon referencias[1].docx el problema  cuft
Con referencias[1].docx el problema cuftstefanita2012
 
Presentación1
Presentación1Presentación1
Presentación1psicomusic
 
Función de los lms
Función de los lmsFunción de los lms
Función de los lmsjmcortes12
 
World Office Forum Alianza del Pacífico 2015
World Office Forum Alianza del Pacífico 2015World Office Forum Alianza del Pacífico 2015
World Office Forum Alianza del Pacífico 2015Jorge Zanoletty Pérez
 

Viewers also liked (19)

El corazon
El corazonEl corazon
El corazon
 
Windows live messenger
Windows live messengerWindows live messenger
Windows live messenger
 
Ed Priest Resume October 25 2016
Ed Priest Resume October 25 2016Ed Priest Resume October 25 2016
Ed Priest Resume October 25 2016
 
svfw
svfwsvfw
svfw
 
Final year java dreamweb techno solutions trichy - copy (2)
Final year java dreamweb techno solutions trichy - copy (2)Final year java dreamweb techno solutions trichy - copy (2)
Final year java dreamweb techno solutions trichy - copy (2)
 
Deber de computacion maria
Deber de computacion mariaDeber de computacion maria
Deber de computacion maria
 
Hábitos orientados para la protección de la identidad de la persona
Hábitos orientados para la protección de la identidad de la personaHábitos orientados para la protección de la identidad de la persona
Hábitos orientados para la protección de la identidad de la persona
 
Final year java dreamweb techno solutions trichy - copy (2)
Final year java dreamweb techno solutions trichy - copy (2)Final year java dreamweb techno solutions trichy - copy (2)
Final year java dreamweb techno solutions trichy - copy (2)
 
hipercolesteremia
hipercolesteremiahipercolesteremia
hipercolesteremia
 
ProyectO TIC CHUIRA CACHIMBERO
ProyectO TIC CHUIRA CACHIMBEROProyectO TIC CHUIRA CACHIMBERO
ProyectO TIC CHUIRA CACHIMBERO
 
El balonmano
El balonmanoEl balonmano
El balonmano
 
Desayunos Mazars. Internalización, China y Crecimiento
Desayunos Mazars. Internalización, China y Crecimiento Desayunos Mazars. Internalización, China y Crecimiento
Desayunos Mazars. Internalización, China y Crecimiento
 
Trabajo de bádminton jav, dra joel
Trabajo de bádminton jav, dra joelTrabajo de bádminton jav, dra joel
Trabajo de bádminton jav, dra joel
 
Con referencias[1].docx el problema cuft
Con referencias[1].docx el problema  cuftCon referencias[1].docx el problema  cuft
Con referencias[1].docx el problema cuft
 
Presentación1
Presentación1Presentación1
Presentación1
 
Función de los lms
Función de los lmsFunción de los lms
Función de los lms
 
Arte en red power
Arte en red powerArte en red power
Arte en red power
 
ицуумцим
ицуумцимицуумцим
ицуумцим
 
World Office Forum Alianza del Pacífico 2015
World Office Forum Alianza del Pacífico 2015World Office Forum Alianza del Pacífico 2015
World Office Forum Alianza del Pacífico 2015
 

Recently uploaded

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 

Recently uploaded (20)

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 

IEEE 2015 Java Projects

  • 1. IEEE 2015-2016 PROJECT CAPTION –JAVA 73/5,3rd Floor,Sri Kamatchi Complex Opp.City Hospital (Near Lakshmi Complex) Trichy- 620018, Contact No: 7200021403/04 Sl.No PROJECT CAPTION DTSJV1 A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization DTSJV2 A Hybrid Cloud Approach for Secure Authorized Deduplication DTSJV3 A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services DTSJV4 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems DTSJV5 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing DTSJV6 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption DTSJV7 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications DTSJV8 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage DTSJV9 Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification DTSJV10 Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds DTSJV11 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation DTSJV12 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems DTSJV13 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services DTSJV14 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption DTSJV15 Enabling Cloud Storage Auditing With Key-Exposure Resistance DTSJV16 An Iterative MapReduce Based Frequent Subgraph Mining Algorithm DTSJV17 Collaborative Fuzzy Clustering From Multiple Weighted Views
  • 2. IEEE 2015-2016 PROJECT CAPTION –JAVA 73/5,3rd Floor,Sri Kamatchi Complex Opp.City Hospital (Near Lakshmi Complex) Trichy- 620018, Contact No: 7200021403/04 DTSJV18 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security DTSJV19 Discovering Data Set Nature through Algorithmic Clustering Based on String Compression DTSJV20 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word DTSJV21 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites DTSJV22 Resampling-Based Ensemble Methods for Online Class Imbalance Learning DTSJV23 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data DTSJV24 PPDM: Privacy-preserving Protocol for Dynamic Medical Text Mining and Image Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare Systems DTSJV25 Scalable Constrained Spectral Clustering DTSJV26 Scalable Distributed Processing of K Nearest Neighbor Queries over Moving Objects DTSJV27 Smart Diary: A Smartphone-Based Framework for Sensing, Inferring, and Logging Users’ Daily Life DTSJV28 Efficient reversible data hiding based on multiple histograms modification DTSJV29 Image Search Reranking With Hierarchical Topic Awareness DTSJV30 Learning to Rank Using User Clicks and Visual Features for Image Retrieval DTSJV31 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites DTSJV32 What Can Pictures Tell Us About Web Pages? Improving Document Search Using Images DTSJV33 Adaptive Video Streaming for Wireless Networks With Multiple Users and Helpers DTSJV34 Context-Based Access Control Systems for Mobile Devices
  • 3. IEEE 2015-2016 PROJECT CAPTION –JAVA 73/5,3rd Floor,Sri Kamatchi Complex Opp.City Hospital (Near Lakshmi Complex) Trichy- 620018, Contact No: 7200021403/04 DTSJV35 Discovery of Ranking Fraud for Mobile Apps DTSJV36 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks DTSJV37 Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks DTSJV38 Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud DTSJV39 A Survey of Security Attacks in Information-Centric Networking DTSJV40 Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption DTSJV41 Cooperative Positioning and Tracking in Disruption Tolerant Networks DTSJV42 Identifying High-Cardinality Hosts from Network-wide Traffic Measurements DTSJV43 Low-Rate DoS Attacks Detection Based on Network Multifractal DTSJV44 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks DTSJV45 Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks DTSJV46 Top-k Similarity Join in Heterogeneous Information Networks DTSJV47 VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud Environments DTSJV48 Towards Effective Bug Triage with Software Data Reduction Techniques DTSJV49 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters DTSJV50 An Efficient Privacy-Preserving Ranked Keyword Search Method DTSJV51 Exact and Heuristic Resource Mapping Algorithms for Distributed and Hybrid Clouds DTSJV52 HadoopCL2: Motivating the Design of a Distributed, Heterogeneous Programming System With Machine-Learning Applications DTSJV53 i2MapReduce: Incremental MapReduce for Mining Evolving Big Data