SlideShare a Scribd company logo
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
M.TECH DOT NET 2014-15 LIST
1 D1401
A Geometric Deployment and Routing
Scheme for Directional Wireless Mesh
Networks
NETWORKING 2014
2 D1402
Fast and Secure Multi hop Broadcast
Solutions for Inter vehicular
Communication
NETWORKING 2014
3 D1403 Sleep Scheduling for Geographic Routing in
Duty-Cycled Mobile Sensor Network
NETWORKING 2014
4 D1404 Security Analysis of Handover Key
Management in 4G LTESAE Networks
NETWORKING 2014
5 D1405 Congestion Aware Routing in Nonlinear
Elastic Optical Networks
NETWORKING
SECURITY
2014
6 D1406
Joint Routing and Medium Access Control
in Fixed Random Access Wireless Multihop
Networks
NETWORKING
SECURITY
2014
7 D1407 Cross-Layer Aided Energy-Efficient
Opportunistic Routing in Ad Hoc Networks
NETWORKING 2014
8 D1408
Joint Interference Coordination and Load
Balancing for OFDMA Multihop Cellular
Networks
NETWORKING 2014
9 D1409
Joint Routing and Resource Allocation for
Delay Minimization in Cognitive Radio
Based Mesh Networks
NETWORKING 2014
10 D1410 Joint Topology-Transparent Scheduling and
QoS Routing in Ad Hoc Networks
NETWORKING 2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
11 D1411
Network Resource Allocation for Users
With Multiple Connections Fairness and
Stability
NETWORKING 2014
12 D1412 On the Delay Advantage of Coding in
Packet Erasure Networks
NETWORKING 2014
13 D1413
Content Caching and Scheduling in
Wireless Networks With Elastic and
Inelastic Traffic
NETWORKING 2014
14 D1414 Distributed Mobile Sink Routing for
Wireless Sensor Networks A Survey
NETWORKING 2014
15 D1415 Secure Data Retrieval for Decentralized
Disruption-Tolerant Military Networks
NETWORKING 2014
16 D1416
ALBA-R Load-Balancing Geographic
Routing Around Connectivity Holes in
Wireless Sensor Networks
DATA
MINING 2014
17 D1417 R3E Reliable Reactive Routing
Enhancement for Wireless Sensor Networks
DATA
MINING 2014
18 D1418 Secure and Efficient Data Transmission for
Cluster-Based Wireless Sensor Networks
DATA
MINING
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
19 D1419
Cross-Layer Approach for Minimizing
Routing Disruption in IP Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
20 D1420
Multicast Capacity in MANET with
Infrastructure Support
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
21 D1421
Multi-Core Embedded Wireless Sensor
Networks Architecture and Applications
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
22 D1422
Efficient Data Collection for Large-
Scale Mobile Monitoring Applications
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
23 D1423
Hop-by-Hop Message
Authenticationand Source Privacy in
WirelessSensor Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
24 D1424
Optimized multicast routing algorithm
based on tree structure in MANETs
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
25 D1425
A Probabilistic Misbehavior Detection
Scheme toward Efficient Trust
Establishment in Delay-Tolerant Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
26 D1426
A System for Denial-of-Service Attack
Detection Based on Multivariate Correlation
Analysis
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
27 D1427
An Error-Minimizing Framework for
Localizing Jammers in Wireless Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
28 D1428
Certificateless Remote Anonymous
Authentication Schemes for Wireless Body
Area Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
29 D1429
Efficient Data Query in Intermittently-
Connected Mobile Ad Hoc Social Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
30 D1430
Transmission-Efficient Clustering Method
for Wireless Sensor Networks Using
Compressive Sensing
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
31 D1431
Web Image Re-Ranking Using Query-
Specific Semantic Signatures
PATTERN
ANALYSIS &
MACHINE
INTELLIGENC
E
2014
32 D1432
A QoS-Oriented Distributed Routing
Protocol for Hybrid Wireless Networks
MOBILE
COMPUTING 2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
33 D1433
PSR A Lightweight Proactive Source
Routing Protocol For Mobile Ad Hoc
Networks
MOBILE
COMPUTING
2014
34 D1434
Video Dissemination over Hybrid Cellular
and Ad Hoc Networks
MOBILE
COMPUTING
2014
35 D1435 Autonomous Mobile Mesh Networks
MOBILE
COMPUTING 2014
36 D1436
DA-Sync: A Doppler-Assisted Time-
Synchronization Scheme for Mobile
Underwater Sensor Networks
MOBILE
COMPUTING 2014
37 D1437
Leveraging Social Networks for P2P
Content-Based File Sharing in Disconnected
MANETs
MOBILE
COMPUTING 2014
38 D1438 Preserving Location Privacy in Geosocial
Applications
MOBILE
COMPUTING 2014
39 D1439 Balancing Performance, Accuracy, and
Precision for Secure Cloud Transactions
CLOUD
COMPUTING 2014
40 D1440 Building Confidential and Efficient Query
Services in the Cloud with RASP Data
Perturbation
CLOUD
COMPUTING 2014
41 D1441 Consistency as a Service: Auditing Cloud
Consistency
CLOUD
COMPUTING 2014
42 D1442 Decentralized Access Control with
Anonymous Authentication of Data Stored in
Clouds
CLOUD
COMPUTING 2014
43 D1443 Distributed, Concurrent, and Independent
Access to Encrypted Cloud Databases
CLOUD
COMPUTING 2014
44 D1444 Enabling Data Integrity Protection in
Regenerating-Coding-Based Cloud Storage:
Theory and Implementation
CLOUD
COMPUTING 2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
45
D1445 Identity-Based Distributed Provable Data
Possession in Multi- Cloud Storage
CLOUD
COMPUTING 2014
46 D1446 Key-Aggregate Cryptosystem for Scalable
Data Sharing in Cloud Storage
CLOUD
COMPUTING 2014
47 D1447 Panda: Public Auditing for Shared Data with
Efficient User Revocation in the Cloud
CLOUD
COMPUTING 2014
48 D1448 Privacy-Preserving Multi-Keyword Ranked
Search over Encrypted Cloud Data
CLOUD
COMPUTING 2014
49 D1449 Scalable Distributed Service Integrity
Attestation for Software-asa- Service Clouds
CLOUD
COMPUTING 2014
50 D1450 Scalable Distributed Service Integrity
Attestation for Software-asa- Service Clouds
CLOUD
COMPUTING 2014
51 D1451 A Cocktail Approach for Travel Package
Recommendation
DATA MINING
2014
52 D1452 An Empirical Performance Evaluation of
Relational Keyword Search Techniques
DATA MINING
2014
53 D1453 LARS*: An Efficient and Scalable Location-
Aware Recommender System
DATA MINING
2014
54 D1454 Product Aspect Ranking and Its Applications DATA MINING
2014
55 D1455 Secure Mining of Association Rules in
Horizontally Distributed Databases
DATA MINING
2014
56 D1456 Supporting Privacy Protection in
Personalized Web Search
DATA MINING
2014
57 D1457 A Cocktail Approach for Travel Package
Recommendation
DATA MINING
2014
58 D1458 TrustedDB: A Trusted Hardware-Based
Database with Privacy and Data
Confidentiality
DATA MINING
2014
59 D1459 Typicality-Based Collaborative Filtering
Recommendation
DATA MINING
2014
60 D1460 Captcha as Graphical Passwords—A New
Security Primitive Based on Hard AI
Problems
SECURE
COMPUTING 2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
61 D1461 Click Prediction for Web Image Reranking
Using Multimodal Sparse Coding
IMAGE
PROCESSING 2014
62 D1462 Designing an Efficient Image Encryption-
Then-Compression System via Prediction
Error Clustering and Random Perm
IMAGE
PROCESSING 2014

More Related Content

What's hot

2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java
Papitha Velumani
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
Adz91 Digital Ads Pvt Ltd
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
LeMeniz Infotech
 
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
John Britto
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...
zettanetworks
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project list
MSR PROJECTS
 
2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics
Papitha Velumani
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
TELKOMNIKA JOURNAL
 
MS.NET IEEE 2015
MS.NET IEEE 2015MS.NET IEEE 2015
MS.NET IEEE 2015
NEWZEN INFOTECH
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Privacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud compPrivacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud comp
IAEME Publication
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 

What's hot (18)

2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
 
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project list
 
2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
 
MS.NET IEEE 2015
MS.NET IEEE 2015MS.NET IEEE 2015
MS.NET IEEE 2015
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Privacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud compPrivacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud comp
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 

Viewers also liked

M.tech dsp list 2014 15
M.tech dsp list 2014 15M.tech dsp list 2014 15
M.tech dsp list 2014 15
SAK Informatics
 
Youth Friday Liturgy for Diocesan Primary Schools 2013
Youth Friday Liturgy for Diocesan Primary Schools 2013Youth Friday Liturgy for Diocesan Primary Schools 2013
Youth Friday Liturgy for Diocesan Primary Schools 2013
YMTResources
 
M.Tech VLSI List of new titles for the year 2014
M.Tech VLSI List of new titles for the year 2014 M.Tech VLSI List of new titles for the year 2014
M.Tech VLSI List of new titles for the year 2014
SAK Informatics
 
CV TKD
CV TKDCV TKD
Ts102922391
Ts102922391Ts102922391
Ts102922391
rarmst11
 
Questions and negatives
Questions and negativesQuestions and negatives
Questions and negatives
CvHeusden
 
Vlsi b.tech 2014 15
Vlsi b.tech 2014 15Vlsi b.tech 2014 15
Vlsi b.tech 2014 15
SAK Informatics
 
M.tech dsp list 2014 15
M.tech dsp list 2014 15M.tech dsp list 2014 15
M.tech dsp list 2014 15
SAK Informatics
 
Presentazione gruppo lorenzo, davis, andrea, matteo
Presentazione gruppo lorenzo, davis, andrea, matteoPresentazione gruppo lorenzo, davis, andrea, matteo
Presentazione gruppo lorenzo, davis, andrea, matteopestalozzi29
 
Dsp mini list 2014
Dsp mini list 2014Dsp mini list 2014
Dsp mini list 2014
SAK Informatics
 
Шпаргалка по рекомендательному рекрутингу
Шпаргалка по рекомендательному рекрутингуШпаргалка по рекомендательному рекрутингу
Шпаргалка по рекомендательному рекрутингу
TalentHunting
 
Embedded mini list 2014
Embedded mini list 2014Embedded mini list 2014
Embedded mini list 2014
SAK Informatics
 
Youth Friday Liturgy for Diocesan Secondary Schools 2013
Youth Friday Liturgy for Diocesan Secondary Schools 2013Youth Friday Liturgy for Diocesan Secondary Schools 2013
Youth Friday Liturgy for Diocesan Secondary Schools 2013
YMTResources
 
Dsp b.tech 2014 15
Dsp b.tech 2014 15Dsp b.tech 2014 15
Dsp b.tech 2014 15
SAK Informatics
 
Реферальные технологии в HR (вебинар от 4.12.14)
Реферальные технологии в HR (вебинар от 4.12.14)Реферальные технологии в HR (вебинар от 4.12.14)
Реферальные технологии в HR (вебинар от 4.12.14)
TalentHunting
 

Viewers also liked (15)

M.tech dsp list 2014 15
M.tech dsp list 2014 15M.tech dsp list 2014 15
M.tech dsp list 2014 15
 
Youth Friday Liturgy for Diocesan Primary Schools 2013
Youth Friday Liturgy for Diocesan Primary Schools 2013Youth Friday Liturgy for Diocesan Primary Schools 2013
Youth Friday Liturgy for Diocesan Primary Schools 2013
 
M.Tech VLSI List of new titles for the year 2014
M.Tech VLSI List of new titles for the year 2014 M.Tech VLSI List of new titles for the year 2014
M.Tech VLSI List of new titles for the year 2014
 
CV TKD
CV TKDCV TKD
CV TKD
 
Ts102922391
Ts102922391Ts102922391
Ts102922391
 
Questions and negatives
Questions and negativesQuestions and negatives
Questions and negatives
 
Vlsi b.tech 2014 15
Vlsi b.tech 2014 15Vlsi b.tech 2014 15
Vlsi b.tech 2014 15
 
M.tech dsp list 2014 15
M.tech dsp list 2014 15M.tech dsp list 2014 15
M.tech dsp list 2014 15
 
Presentazione gruppo lorenzo, davis, andrea, matteo
Presentazione gruppo lorenzo, davis, andrea, matteoPresentazione gruppo lorenzo, davis, andrea, matteo
Presentazione gruppo lorenzo, davis, andrea, matteo
 
Dsp mini list 2014
Dsp mini list 2014Dsp mini list 2014
Dsp mini list 2014
 
Шпаргалка по рекомендательному рекрутингу
Шпаргалка по рекомендательному рекрутингуШпаргалка по рекомендательному рекрутингу
Шпаргалка по рекомендательному рекрутингу
 
Embedded mini list 2014
Embedded mini list 2014Embedded mini list 2014
Embedded mini list 2014
 
Youth Friday Liturgy for Diocesan Secondary Schools 2013
Youth Friday Liturgy for Diocesan Secondary Schools 2013Youth Friday Liturgy for Diocesan Secondary Schools 2013
Youth Friday Liturgy for Diocesan Secondary Schools 2013
 
Dsp b.tech 2014 15
Dsp b.tech 2014 15Dsp b.tech 2014 15
Dsp b.tech 2014 15
 
Реферальные технологии в HR (вебинар от 4.12.14)
Реферальные технологии в HR (вебинар от 4.12.14)Реферальные технологии в HR (вебинар от 4.12.14)
Реферальные технологии в HR (вебинар от 4.12.14)
 

Similar to M.tech .net 2014 15 list

2014 and 2015 ieee projects for CNE
2014 and 2015 ieee  projects for CNE2014 and 2015 ieee  projects for CNE
2014 and 2015 ieee projects for CNE
Tmks Infotech
 
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
Bulk 2014 and 2015 ieee Projects @ TMKS InfotechBulk 2014 and 2015 ieee Projects @ TMKS Infotech
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
Tmks Infotech
 
2014 dotnet ieee
2014 dotnet ieee2014 dotnet ieee
2014 dotnet ieee
anandkumartakeoff
 
Final Year 2014 and 2015 IEEE projects
Final Year 2014 and 2015 IEEE projects Final Year 2014 and 2015 IEEE projects
Final Year 2014 and 2015 IEEE projects
Tmks Infotech
 
2014 and 2015 IEEE Projects
2014 and 2015 IEEE Projects 2014 and 2015 IEEE Projects
2014 and 2015 IEEE Projects
Tmks Infotech
 
2014 and 2015 ieee projects for BE
2014 and 2015 ieee projects for BE2014 and 2015 ieee projects for BE
2014 and 2015 ieee projects for BE
Tmks Infotech
 
2014 and 2015 ieee projects for MTech
2014 and 2015 ieee  projects for MTech2014 and 2015 ieee  projects for MTech
2014 and 2015 ieee projects for MTech
Tmks Infotech
 
2014 and 2015 ieee projects for cse
2014 and 2015 ieee  projects for cse2014 and 2015 ieee  projects for cse
2014 and 2015 ieee projects for cse
Tmks Infotech
 
final year ieee project centre in chennai
final year ieee project centre in chennaifinal year ieee project centre in chennai
final year ieee project centre in chennai
Aishwarya Rajesh
 
best project centre in chennai titles 2014
best project centre in chennai titles 2014best project centre in chennai titles 2014
best project centre in chennai titles 2014
Aishwarya Rajesh
 
cse project centre in chennai
cse project centre in chennai cse project centre in chennai
cse project centre in chennai
Aishwarya Rajesh
 
be project centre in chennai
be project centre in chennaibe project centre in chennai
be project centre in chennai
Aishwarya Rajesh
 
best ieee project centre in chennai
best ieee project centre in chennaibest ieee project centre in chennai
best ieee project centre in chennai
Aishwarya Rajesh
 
java project centre in chennai
java project centre in chennaijava project centre in chennai
java project centre in chennai
Aishwarya Rajesh
 
ece project centre in chennai titles 2014
ece project centre in chennai titles 2014ece project centre in chennai titles 2014
ece project centre in chennai titles 2014
Aishwarya Rajesh
 
dotnet project centre in chennai
dotnet project centre in chennaidotnet project centre in chennai
dotnet project centre in chennai
Aishwarya Rajesh
 
ieee project centre in chennai
ieee project centre in chennaiieee project centre in chennai
ieee project centre in chennai
Aishwarya Rajesh
 
2014 and 2015 ieee projects list
2014 and 2015 ieee projects list2014 and 2015 ieee projects list
2014 and 2015 ieee projects list
Manju Nath
 
Final year be,mtech 2014 and 2015 ieee projects list
Final year be,mtech 2014 and 2015 ieee projects listFinal year be,mtech 2014 and 2015 ieee projects list
Final year be,mtech 2014 and 2015 ieee projects list
Manju Nath
 
2014 and 2015 ieee projects list
2014 and 2015 ieee projects list2014 and 2015 ieee projects list
2014 and 2015 ieee projects list
manju nath
 

Similar to M.tech .net 2014 15 list (20)

2014 and 2015 ieee projects for CNE
2014 and 2015 ieee  projects for CNE2014 and 2015 ieee  projects for CNE
2014 and 2015 ieee projects for CNE
 
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
Bulk 2014 and 2015 ieee Projects @ TMKS InfotechBulk 2014 and 2015 ieee Projects @ TMKS Infotech
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
 
2014 dotnet ieee
2014 dotnet ieee2014 dotnet ieee
2014 dotnet ieee
 
Final Year 2014 and 2015 IEEE projects
Final Year 2014 and 2015 IEEE projects Final Year 2014 and 2015 IEEE projects
Final Year 2014 and 2015 IEEE projects
 
2014 and 2015 IEEE Projects
2014 and 2015 IEEE Projects 2014 and 2015 IEEE Projects
2014 and 2015 IEEE Projects
 
2014 and 2015 ieee projects for BE
2014 and 2015 ieee projects for BE2014 and 2015 ieee projects for BE
2014 and 2015 ieee projects for BE
 
2014 and 2015 ieee projects for MTech
2014 and 2015 ieee  projects for MTech2014 and 2015 ieee  projects for MTech
2014 and 2015 ieee projects for MTech
 
2014 and 2015 ieee projects for cse
2014 and 2015 ieee  projects for cse2014 and 2015 ieee  projects for cse
2014 and 2015 ieee projects for cse
 
final year ieee project centre in chennai
final year ieee project centre in chennaifinal year ieee project centre in chennai
final year ieee project centre in chennai
 
best project centre in chennai titles 2014
best project centre in chennai titles 2014best project centre in chennai titles 2014
best project centre in chennai titles 2014
 
cse project centre in chennai
cse project centre in chennai cse project centre in chennai
cse project centre in chennai
 
be project centre in chennai
be project centre in chennaibe project centre in chennai
be project centre in chennai
 
best ieee project centre in chennai
best ieee project centre in chennaibest ieee project centre in chennai
best ieee project centre in chennai
 
java project centre in chennai
java project centre in chennaijava project centre in chennai
java project centre in chennai
 
ece project centre in chennai titles 2014
ece project centre in chennai titles 2014ece project centre in chennai titles 2014
ece project centre in chennai titles 2014
 
dotnet project centre in chennai
dotnet project centre in chennaidotnet project centre in chennai
dotnet project centre in chennai
 
ieee project centre in chennai
ieee project centre in chennaiieee project centre in chennai
ieee project centre in chennai
 
2014 and 2015 ieee projects list
2014 and 2015 ieee projects list2014 and 2015 ieee projects list
2014 and 2015 ieee projects list
 
Final year be,mtech 2014 and 2015 ieee projects list
Final year be,mtech 2014 and 2015 ieee projects listFinal year be,mtech 2014 and 2015 ieee projects list
Final year be,mtech 2014 and 2015 ieee projects list
 
2014 and 2015 ieee projects list
2014 and 2015 ieee projects list2014 and 2015 ieee projects list
2014 and 2015 ieee projects list
 

More from SAK Informatics

M.tech vlsi list 2014 15
M.tech vlsi list 2014 15M.tech vlsi list 2014 15
M.tech vlsi list 2014 15
SAK Informatics
 
M.tech embedded list 2014 15
M.tech embedded list 2014 15 M.tech embedded list 2014 15
M.tech embedded list 2014 15
SAK Informatics
 
M.tech eee list 2014 15
M.tech eee list 2014 15M.tech eee list 2014 15
M.tech eee list 2014 15
SAK Informatics
 
M.Tech NS2 List
M.Tech NS2 List M.Tech NS2 List
M.Tech NS2 List
SAK Informatics
 
M.tech java list 2013
M.tech java list  2013M.tech java list  2013
M.tech java list 2013
SAK Informatics
 
M.tech embedded 2013 14 list
M.tech embedded 2013 14 listM.tech embedded 2013 14 list
M.tech embedded 2013 14 list
SAK Informatics
 
Arm 7 m.tech list
Arm 7 m.tech listArm 7 m.tech list
Arm 7 m.tech list
SAK Informatics
 

More from SAK Informatics (7)

M.tech vlsi list 2014 15
M.tech vlsi list 2014 15M.tech vlsi list 2014 15
M.tech vlsi list 2014 15
 
M.tech embedded list 2014 15
M.tech embedded list 2014 15 M.tech embedded list 2014 15
M.tech embedded list 2014 15
 
M.tech eee list 2014 15
M.tech eee list 2014 15M.tech eee list 2014 15
M.tech eee list 2014 15
 
M.Tech NS2 List
M.Tech NS2 List M.Tech NS2 List
M.Tech NS2 List
 
M.tech java list 2013
M.tech java list  2013M.tech java list  2013
M.tech java list 2013
 
M.tech embedded 2013 14 list
M.tech embedded 2013 14 listM.tech embedded 2013 14 list
M.tech embedded 2013 14 list
 
Arm 7 m.tech list
Arm 7 m.tech listArm 7 m.tech list
Arm 7 m.tech list
 

Recently uploaded

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 

Recently uploaded (20)

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 

M.tech .net 2014 15 list

  • 1. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com M.TECH DOT NET 2014-15 LIST 1 D1401 A Geometric Deployment and Routing Scheme for Directional Wireless Mesh Networks NETWORKING 2014 2 D1402 Fast and Secure Multi hop Broadcast Solutions for Inter vehicular Communication NETWORKING 2014 3 D1403 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Network NETWORKING 2014 4 D1404 Security Analysis of Handover Key Management in 4G LTESAE Networks NETWORKING 2014 5 D1405 Congestion Aware Routing in Nonlinear Elastic Optical Networks NETWORKING SECURITY 2014 6 D1406 Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks NETWORKING SECURITY 2014 7 D1407 Cross-Layer Aided Energy-Efficient Opportunistic Routing in Ad Hoc Networks NETWORKING 2014 8 D1408 Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular Networks NETWORKING 2014 9 D1409 Joint Routing and Resource Allocation for Delay Minimization in Cognitive Radio Based Mesh Networks NETWORKING 2014 10 D1410 Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks NETWORKING 2014
  • 2. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 11 D1411 Network Resource Allocation for Users With Multiple Connections Fairness and Stability NETWORKING 2014 12 D1412 On the Delay Advantage of Coding in Packet Erasure Networks NETWORKING 2014 13 D1413 Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic NETWORKING 2014 14 D1414 Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey NETWORKING 2014 15 D1415 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks NETWORKING 2014 16 D1416 ALBA-R Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks DATA MINING 2014 17 D1417 R3E Reliable Reactive Routing Enhancement for Wireless Sensor Networks DATA MINING 2014 18 D1418 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks DATA MINING PARALLEL & DISTRIBUTED SYSTEMS 2014 19 D1419 Cross-Layer Approach for Minimizing Routing Disruption in IP Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 20 D1420 Multicast Capacity in MANET with Infrastructure Support PARALLEL & DISTRIBUTED SYSTEMS 2014 21 D1421 Multi-Core Embedded Wireless Sensor Networks Architecture and Applications PARALLEL & DISTRIBUTED SYSTEMS 2014
  • 3. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 22 D1422 Efficient Data Collection for Large- Scale Mobile Monitoring Applications PARALLEL & DISTRIBUTED SYSTEMS 2014 23 D1423 Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 24 D1424 Optimized multicast routing algorithm based on tree structure in MANETs PARALLEL & DISTRIBUTED SYSTEMS 2014 25 D1425 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 26 D1426 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis PARALLEL & DISTRIBUTED SYSTEMS 2014 27 D1427 An Error-Minimizing Framework for Localizing Jammers in Wireless Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 28 D1428 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 29 D1429 Efficient Data Query in Intermittently- Connected Mobile Ad Hoc Social Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 30 D1430 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing PARALLEL & DISTRIBUTED SYSTEMS 2014 31 D1431 Web Image Re-Ranking Using Query- Specific Semantic Signatures PATTERN ANALYSIS & MACHINE INTELLIGENC E 2014 32 D1432 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks MOBILE COMPUTING 2014
  • 4. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 33 D1433 PSR A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks MOBILE COMPUTING 2014 34 D1434 Video Dissemination over Hybrid Cellular and Ad Hoc Networks MOBILE COMPUTING 2014 35 D1435 Autonomous Mobile Mesh Networks MOBILE COMPUTING 2014 36 D1436 DA-Sync: A Doppler-Assisted Time- Synchronization Scheme for Mobile Underwater Sensor Networks MOBILE COMPUTING 2014 37 D1437 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs MOBILE COMPUTING 2014 38 D1438 Preserving Location Privacy in Geosocial Applications MOBILE COMPUTING 2014 39 D1439 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions CLOUD COMPUTING 2014 40 D1440 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation CLOUD COMPUTING 2014 41 D1441 Consistency as a Service: Auditing Cloud Consistency CLOUD COMPUTING 2014 42 D1442 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds CLOUD COMPUTING 2014 43 D1443 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases CLOUD COMPUTING 2014 44 D1444 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation CLOUD COMPUTING 2014
  • 5. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 45 D1445 Identity-Based Distributed Provable Data Possession in Multi- Cloud Storage CLOUD COMPUTING 2014 46 D1446 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage CLOUD COMPUTING 2014 47 D1447 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud CLOUD COMPUTING 2014 48 D1448 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data CLOUD COMPUTING 2014 49 D1449 Scalable Distributed Service Integrity Attestation for Software-asa- Service Clouds CLOUD COMPUTING 2014 50 D1450 Scalable Distributed Service Integrity Attestation for Software-asa- Service Clouds CLOUD COMPUTING 2014 51 D1451 A Cocktail Approach for Travel Package Recommendation DATA MINING 2014 52 D1452 An Empirical Performance Evaluation of Relational Keyword Search Techniques DATA MINING 2014 53 D1453 LARS*: An Efficient and Scalable Location- Aware Recommender System DATA MINING 2014 54 D1454 Product Aspect Ranking and Its Applications DATA MINING 2014 55 D1455 Secure Mining of Association Rules in Horizontally Distributed Databases DATA MINING 2014 56 D1456 Supporting Privacy Protection in Personalized Web Search DATA MINING 2014 57 D1457 A Cocktail Approach for Travel Package Recommendation DATA MINING 2014 58 D1458 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality DATA MINING 2014 59 D1459 Typicality-Based Collaborative Filtering Recommendation DATA MINING 2014 60 D1460 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems SECURE COMPUTING 2014
  • 6. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 61 D1461 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding IMAGE PROCESSING 2014 62 D1462 Designing an Efficient Image Encryption- Then-Compression System via Prediction Error Clustering and Random Perm IMAGE PROCESSING 2014