Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on


Published in: Education, Technology
  • Be the first to comment


  1. 1. Further more details visit: send your request to : 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : JAVA & DOTNET SOFTWARE 2013-2014 TITLES S.NO. TITLES CODE CLOUD COMPUTING 1. ANTELOPE:A Semantic -aware Data Cube Scheme for Cloud Data Center Networks JD1 2. Cost Optimization of Elasticity Cloud Resource Subscription Policy JD2 3. Scalable and Accurate Prediction of Availability of Atomic Web Services JD3 4. Towards Efficient Virtual Appliance Delivery with Minimal Manageable Virtual Appliances JD4 5. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds JD5 6. Security and Privacy-Enhancing Multi cloud Architectures JD6 7. Toward Secure Multi keyword Top-k Retrieval over Encrypted Cloud Data JD7 IMAGE PROCESSING 8. Automatic License Plate Recognition(ALPR): A State-of-the-Art Review JD8 9. Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain JD9 10. Learning-based, automatic 2D-to-3D image and video conversion JD10 11. Pose-Robust Recognition of Low-Resolution Face Images JD11 12. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting JD12 13. Robust Face Recognition for Uncontrolled Pose and Illumination Changes JD13 14. Strip Features for Fast Object Detection JD14 15. The Use of Automotive Radars in Video-Based Overtaking Assistance Applications JD15 16. What Are We Tracking: A Unified Approach of Tracking and Recognition JD16 Knowledge and Data Engineering 17. Active Learning of Constraints for Semi-Supervised Clustering JD17 18. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval JD18 19. Identity-Based Secure Distributed Data Storage Schemes JD19 20. Mining Interaction Patterns among Brain Regions by Clustering JD20 21. On-demand Snapshot: An Efficient Versioning File System for Phase-Change Memory JD21 22. A User-Friendly Patent Search Paradigm JD22 23. Finding Probabilistic Prevalent Colocations in Spatially Uncertain Data Sets JD23 24. FoCUS: Learning to Crawl Web Forums JD24 25. PMSE: A Personalized Mobile Search Engine JD25 DATAMINING 26. Comparable Entity Mining from Comparative Questions JD26 27. Change Detection in Streaming Multivariate Data Using Likelihood Detectors JD27
  2. 2. Further more details visit: send your request to : 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : 28. Cutting Plane Training for Linear Support Vector Machines JD28 29. Errata Corrige on “Modeling and Computing Ternary Projective Relations between Regions” JD29 30. Finding Probabilistic Prevalent Colocations in Spatially Uncertain Data Sets JD30 31. Fuzzy Web Data Tables Integration Guided by an Ontological and Terminological Resource JD31 32. Lineage Encoding: An Efficient Wireless XML Streaming Supporting Twig Pattern Queries JD32 33. Mining Order-Preserving Sub matrices from Data with Repeated Measurements JD33 34. Radio Database Compression for Accurate Energy-Efficient Localization in Fingerprinting Systems JD34 35. Range-Based Skyline Queries in Mobile Environments JD35 36. Successive Group Selection for Micro aggregation JD36 37. Supporting Pattern-Preserving Anonymization for Time-Series Data JD37 38. Transfer across Completely Different Feature Spaces via Spectral Embedding JD38 39. TW-k-Means: Automated Two-Level Variable Weighting Clustering Algorithm for Multiview Data JD39 40. A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs JD40 41. A Survival Modeling Approach to Biomedical Search Result Diversification Using Wikipedia JD41 42. Coping with Events in Temporal Relational Databases JD42 43. Efficient All Top-k Computation—A Unified Solution for All Top-k, Reverse Top-k and Top-m Influential Queries JD43 44. Efficient Service Skyline Computation for Composite Service Selection JD44 45. Failure-Aware Cascaded Suppression in Wireless Sensor Networks JD45 46. Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy JD46 47. Optimal Route Queries with Arbitrary Order Constraints JD47 48. Skyline Processing on Distributed Vertical Decompositions JD48 49. Spatial Query Integrity with Voronoi Neighbors JD49 50. SVStream: A Support Vector-Based Algorithm for Clustering Data Streams JD50 51. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development JD51 52. U-Skyline: A New Skyline Query for Uncertain Databases JD52 53. Answering general time-sensitive queries JD53 54. Creating evolving user profiles automatically JD54 55. Outsourced similarity search on metric data assets JD55 56. Slicing: a new approach for privacy preserving data publishing JD56 57. Tree-based mining for discovering patterns of human interaction in meetings JD57 58. Efficient deduplication techniques for modern backup operation JD58 59. Spark med: A Framework For Dynamic Integration Of Multimedia Medical JD59
  3. 3. Further more details visit: send your request to : 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : Data Into Distributed M-Health Systems 60. Business-Owl (Bowl)—A Hierarchical Task Network Ontology For Dynamic Business Process Decomposition And Formulation JD60 61. Autonomic placement of mixed batch and transactional workloads JD61 62. Enabling public audit ability and data dynamics for storage security in cloud computing JD62 DEPENDABLE AND SECURE COMPUTING 63. Securing Class Initialization in Java-like Languages JD63 64. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems JD64 65. Unprivileged Black-Box Detection of User-Space Key loggers JD65 66. The Foundational Work of Harrison Ruzzo-Ullman Revisited JD66 67. To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks JD67 68. Non-Cooperative Location Privacy JD68 69. On Inference-Proof View Processing of XML Documents JD69 70. Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing JD70 71. Malware Clearance for Secure Commitment of OS-Level Virtual Machines JD71 72. Warning Bird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream JD72 73. A System for Timely and Controlled Information Sharing in Emergency Situations JD73 74. On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections JD74 75. Riht: a novel hybrid ip trace back scheme JD75 76. On the security and efficiency of content distribution via network coding JD76 77. Risk-aware mitigation for manet routing attacks JD77 78. A new secure route discovery protocol JD78 79. JD79 PARALLEL AND DISTRIBUTED SYSTEMS 80. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing JD80 81. Finite-Difference Wave Propagation Modeling on Special-Purpose Dataflow Machines JD81 82. Heterogeneous Resource Allocation under Degree Constraints JD82 83. Hypo comb: Bounded-Degree Localized Geometric Planar Graphs for Wireless Ad Hoc Networks JD83 84. Lightweight Location Verification Algorithms for Wireless Sensor Networks JD84 85. Link Scheduling for Exploiting Spatial Reuse in Multi hop MIMO Networks JD85 86. Lower and Upper Bounds for Multicasting under Distance Dependent JD86
  4. 4. Further more details visit: send your request to : 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : Forwarding Cost Functions 87. PASQUAL: Parallel Techniques for Next Generation Genome Sequence Assembly JD87 88. Retrieving Smith-Waterman Alignments with Optimizations for Mega base Biological Sequences Using GPU JD88 89. Scalable and Accurate Graph Clustering and Community Structure Detection JD89 90. Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks JD90 91. Survey of Energy-Cognizant Scheduling Techniques JD91 92. A Fast RPC System for Virtual Machines JD92 93. A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization JD93 94. Attached-RTS: Eliminating an Exposed Terminal Problem in Wireless Networks JD94 95. Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks JD95 96. Efficient Resource Mapping Framework over Networked Clouds via Iterated Local Search-Based Request Partitioning JD96 97. Electricity Cost Saving Strategy in Data Centers by Using Energy Storage JD97 98. ESWC: Efficient Scheduling for the Mobile Sink in Wireless Sensor Networks with Delay Constraint JD98 99. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations JD99 100. Optimal Multi server Configuration for Profit Maximization in Cloud Computing JD100 101. Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior JD101 102. Runtime Contention and Bandwidth-Aware Adaptive Routing Selection Strategies for Networks-on-Chip JD102 103. Scaling Laws of Cognitive Ad Hoc Networks over General Primary Network Models JD103 104. Sensor Network Navigation without Locations JD104 105. SyRaFa: Synchronous Rate and Frequency Adjustment for Utilization Control in Distributed Real-Time Embedded Systems JD105 106. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost- Effective Privacy Preserving of Intermediate Data Sets in Cloud JD106 107. A Truthful Dynamic Workflow Scheduling Mechanism for Commercial Multi cloud Environments JD107 108. Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud JD108 109. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment JD109 110. Error-Tolerant Resource Allocation and Payment Minimization for Cloud JD110
  5. 5. Further more details visit: send your request to : 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : System 111. Improving Data Center Network Utilization Using Near-Optimal Traffic Engineering JD111 112. Managing Overloaded Hosts for Dynamic Consolidation of Virtual Machines in Cloud Data Centers under Quality of Service Constraints JD112 113. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud JD113 114. A New Disk I/O Model of Virtualized Cloud Environment JD114 115. Per-Flow Queue Management with Succinct Priority Indexing Structures for High Speed Packet Scheduling JD115 116. Performance Enhancement for Network I/O Virtualization with Efficient Interrupt Coalescing and Virtual Receive-Side Scaling JD116 117. POVA: Traffic Light Sensing with Probe Vehicles JD117 118. Self-Adaptation-Based Dynamic Coalition Formation in a Distributed Agent Network: A Mechanism and a Brief Survey JD118 119. Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers JD119 120. Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems JD120 MOBILE COMPUTING 121. A MAC Sensing Protocol Design for Data Transmission with More Protection to Primary Users JD121 122. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks JD122 123. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks JD123 124. Analytical Framework for WLAN-Cellular Voice Handover Evaluation JD124 125. Bounded-Hop Energy-Efficient Liveness of Flocking Swarms JD125 126. Content Sharing over Smartphone-Based Delay-Tolerant Networks JD126 127. Contention-Based Estimation of Neighbor Cardinality JD127 128. Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space JD128 129. Modeling and Restraining Mobile Virus Propagation JD129 130. On Random Access Scheduling for Multimedia Traffic in Multi hop Wireless Networks with Fading Channels JD130 131. On Using Interference-Aware Spectrum Sensing for Dynamic Spectrum Access in Cognitive Radio Networks JD131 132. Passive Measurement of Interference in Wi-Fi Networks with Application in Misbehavior Detection JD132 133. Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks JD133 134. Robust Distributed Power Control in Cognitive Radio Networks JD134 135. Video On-Demand Streaming in Cognitive Wireless Mesh Networks JD135
  6. 6. Further more details visit: send your request to : 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : 136. Cross-Layer Minimum-Delay Scheduling and Maximum-Throughput Resource Allocation for Multiuser Cognitive Networks JD136 137. DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks JD137 138. Distributed Cooperation and Diversity for Hybrid Wireless Networks JD138 139. Effective Carrier Sensing in CSMA Networks under Cumulative Interference JD139 140. Estimation of Task Persistence Parameters from Pervasive Medical Systems with Censored Data JD140 141. Geometry-Assisted Localization Algorithms for Wireless Networks JD141 142. Joint Physical-Layer and System-Level Power Management for Delay- Sensitive Wireless Communications JD142 143. Novel Design and Analysis of Aggregated ARQ Protocols for IEEE 802.11n Networks JD143 144. Probability-Based Prediction and Sleep Scheduling for Energy-Efficient Target Tracking in Sensor Networks JD144 145. Spatial Distribution and Channel Quality Adaptive Protocol for Multi hop Wireless Broadcast Routing in VANET JD145 146. TCP CRAHN: A Transport Control Protocol for Cognitive Radio Ad Hoc Networks JD146 147. Tula: Balancing Energy for Sensing and Communication in a Perpetual Mobile System JD147 148. UACAP: A Unified Auxiliary Channel Authentication Protocol JD148 149. Uplink Power Control via Adaptive Hidden-Markov-Model-Based Path loss Estimation JD149 150. Distributed Cooperative Caching in Social Wireless Networks JD150 151. Network-Assisted Mobile Computing with Optimal Uplink Query Processing JD151 152. DSS: Distributed SINR-Based Scheduling Algorithm for Multi hop Wireless Networks JD152 153. Toward Accurate Mobile Sensor Network Localization in Noisy Environments JD153 154. On the Forwarding Performance under Heterogeneous Contact Dynamics in Mobile Opportunistic Networks JD154 155. Path Selection under Budget Constraints in Multi hop Cognitive Radio Networks JD155 156. Predicting Human Movement Based on Telecom’s Handoff in Mobile Networks JD156 157. Deployment of a Connected Reinforced Backbone Network with a Limited Number of Backbone Nodes JD157 158. Measurement-Based Design of Roadside Content Delivery Systems JD158 159. Understanding the Information Propagation Speed in Multi hop Cognitive Radio Networks JD159 160. Underwater Localization with Time-Synchronization and Propagation Speed Uncertainties JD160 161. A Spectrum Switching Delay-Aware Scheduling Algorithm for Centralized JD161
  7. 7. Further more details visit: send your request to : 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : Cognitive Radio Networks 162. Adaptive Duty Cycle Control with Queue Management in Wireless Sensor Networks JD162 163. Maximizing Rendezvous Diversity in Rendezvous Protocols for Decentralized Cognitive Radio Networks JD163 164. Predictable Mobile Routing for Spacecraft Networks JD164 165. Proteus: Multi flow Diversity Routing for Wireless Networks with Cooperative Transmissions JD165 166. A Progressive Approach to Reducing Data Collection Latency in Wireless Sensor Networks with Mobile Elements JD166 167. Nuzzer: A Large-Scale Device-Free Passive Localization System for Wireless Environments JD167 168. A Traffic-Aware Channel and Rate Reassignment Algorithm for Wireless Mesh Networks JD168 169. Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective JD169 170. A Robust Indoor Pedestrian Tracking System with Sparse Infrastructure Support JD170 171. Scheduling Partition for Order Optimal Capacity in Large-Scale Wireless Networks JD171 172. Low-Complexity Class-Based Scheduling Algorithm for Scheduled Automatic Power-Save Delivery for Wireless LANs JD172 173. United We Stand: Intrusion Resilience in Mobile Unattended WSNs JD173 174. Studying Smartphone Usage: Lessons from a Four-Month Field Study JD174 175. On Power and Throughput Tradeoffs of Wi-Fi and Bluetooth in Smartphone’s JD175