Name of The Project



1 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data Download 2016
2 A System to Filter Unwanted Messages from OSN User Walls. Download 2016
3 Comparable Entity Mining from Comparative Questions. Download 2016
4 Crowd sourcing Predictors of Behavioral Outcomes. Download 2016
5 Facilitating Effective User Navigation through Website Structure Improvement. Download 2016
6 Focus Learning to Crawl Web Forums. Download 2016
7 Incentive Compatible Privacy-Preserving Data Analysis. Download 2016
8 Multiparty Access Control for Online Social Networks Model and Mechanisms. Download 2016
9 PMSE A Personalized Mobile Search Engine. Download 2016
10 Robust Module Based Data Management. Download 2016
11 Sensitive Label Privacy Protection on Social Network Data. Download 2016
12 Spatial Approximate String Search. Download 2016
13 A Unified Probabilistic Framework for Name Disambiguation in Digital Library Download 2016
14 A Survey of Indexing Techniques for Scalable Record Linkage and De-duplication Download 2016
15 Organizing User Search Histories Download 2016
16 A Framework for Personal Mobile Commerce Pattern Mining and Prediction. Download 2016
17 Publishing Search Logs—A Comparative Study of Privacy Guarantees Download 2016
18 Outsourced similarity search on Metric Data Assets Download 2016
19 Ranking Model Adaptation for Domain-Specific Search Download 2016
20 Slicing A New Approach for Privacy Preserving Data Publishing Download 2016
21 Privacy-Preserving_Updates_to_Anonymous_and_Confidential_Databases Download 2016
22 Clustering with Multiviewpoint Download 2016
23 Effective Pattern Discovery for Text Mining Download 2016
24 M-Privacy for Collaborative Data Publishing Download 2016
25 Anomaly Detection via Online Over-Sampling Principal Component Analysis Download 2016
26 Anchor: A Versatile and Efficient Framework for Resource Management Download 2016
27 A Link-Based Cluster Ensemble Approach for Categorical Data Clustering Download 2016
28 Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems Download 2016
29 Mining Web Graphs for Recommendations Download 2016
30 Risk-Aware_Mitigation for MANET routing attacks Download 2016
31 Detecting Spammers and Content Promoters in Online Video Social Networks Download 2016
32 Temporal Data Clustering via Weighted Clustering Ensemble Download 2016
33 Energy-Efficient Cooperative Video Distribution With Statistical Qos Provisions Over Wireless Netwokrs Download 2016
34 Privacy-Preserving Mining of Association Rules Download 2016
35 Supporting Search-As-You-Type Using SQL in Databases Download 2016
36 Creating Evolving User Behavior Profiles Automatically Download 2016
37 Effective Pattern Discovery for Text Mining Download 2016
1 Attribute-Based Encryption With Verifiable Outsourced Decryption. Download 2016
2 Mining Contracts for Business Events and Temporal Constraints in Service Engagements Download 2016
3 Optimizing Cloud Resources for Delivering IPTV services through Virtualization Download 2016
4 Privacy-Preserving Public Auditing for Secure Cloud Storage Download 2016
5 Winds of Change: From Vendor Lock-In to the Meta Cloud Download 2016
6 Cloud Computing Security From Single to Multi-Clouds Download 2016
7 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Download 2016
8 Ensuring Data Storage Security in Cloud Computing Download 2016
9 Towards Secure and Dependable Storage Services in Cloud Computing Download 2016
10 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Download 2016
11 Privacy Preserving Delegated Access Control in Public Clouds Download 2016
12 Ames-cloud: a framework of adaptive mobile video streaming and efficient social video sharing in the clouds Download 2016
13 Going Back And Forth Efficient Multideployment And MultiSnapShotting On Clouds Download 2016
14 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Download 2016
1 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Download 2016
2 Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks. Download 2016
3 Extracting Spread-Spectrum Hidden Data from Digital Media Download 2016
4 Identity-Based Secure Distributed Data Storage Schemes. Download 2016
5 Two tales of privacy in online social networks Download 2016
6 Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach Download 2016
7 A Novel Security Scheme for online banking Download 2016
8 Design and Implementation of TARF Download 2016
9 Ensuring Distributed Accountability for data sharing in clouds Download 2016
10 Nymble - Blocking Misbehaving Users in Anonymizing Networks Download 2016
11 SMS - A Study of the Short Message Service of a Nationwide Cellular Network Download 2016
12 Risk-Aware_Mitigation for MANET routing attacks Download 2016
13 Privacy Preserving Data Sharing With Anonymous ID Assignment Download 2016
14 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks Download 2016
15 Ranking and Clustering Software Cost Estimation Models through a Multiple comparisons Algorithm Download 2016
16 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links Download 2016
17 Cloud-based Mobile Social TV Download 2016
1 Access Policy Consolidation for Event Processing Systems Download 2016
2 Fully Anonymous Profile Matching in Mobile Social Networks. Download 2016
3 A Distributed Control Law For load Balancing In CDN Download 2016
4 An Improved Geocast for mobile Ad Hoc networks Download 2016
5 Catching Packet Droppers and Modifiers Download 2016
6 An Efficient Caching Scheme And Consistency Maintenance In Hybrid P2P System Download 2016
7 Footprint Detecting Sybil Attacks in Urban Vehicular Networks Download 2016
8 Load-Balancing Multipath Switching System with Flow Slice Download 2016
9 Privacy- and Integrity-Preserving Range Queries in Sensor Networks Download 2016
10 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Download 2016
11 Latency Equalization as a new network Service Premitive Download 2016
12 Privacy-preserving distributed profile matching in proximity-based mobile social networks Download 2016
13 Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks Download 2016
14 A Decentralized Privacy Preserving Reputation Protocol For The Malicious Download 2016
15 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks Download 2016
16 Efficient Load Re Balancing Algorithm for Distributed File Systems Download 2016
17 Delay-Based Network Utility Maximization Download 2016
18 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Download 2016
19 TAM A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks Download 2016
1 A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data Download 2016
2 A Scalable Server Architecture for Mobile Download 2016
3 Distributed Cooperative Caching in Social Wireless Networks Download 2016
4 Towards a Statistical Framework for Source Anonymity in Sensor Networks Download 2016
5 Vampire attacks: Draining life from wireless ad-hoc sensor networks Download 2016
6 Mobile Relay Configuration in Data-intensive. Download 2016
7 Efficient Search for Educational Video Resources Using Linked data Approach to Support Distance Learning. Download 2016
8 Bootstrapping Ontologies. Download 2016
9 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Download 2016
10 E-Mili Energy minimizing idle listening in Wireless Networks Download 2016
11 Distributed throughput maximization in wireless networks via random power allocation Download 2016
12 Local Greedy Approximation for Scheduling in Multihop Wireless Networks Download 2016
13 Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Download 2016
14 Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Download 2016
15 On the Throughput Capacity of Wireless Sensor Networks With Mobile Relays Download 2016
16 Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks Download 2016
17 QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems Download 2016
18 Multipath Encrypted Data Security Architecture For Mobile Ad hoc Networks. Download 2016
19 The Three-Tier Security Scheme In Wireless Sensor Networks With Mobile Sinks Download 2016
20 Mobile backbone network Download 2016
21 Dynamic Personalized recommendation on Sparse data Download 2016
1 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment Download 2016
2 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems. Download 2016
3 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. Download 2016
4 Towards Differential Query Services in Cost-Efficient Clouds Download 2016
5 Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme Download 2016
6 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Download 2016
7 Traffic Light Mapping and Detection Download 2016
8 Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks Download 2016
9 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Download 2016
10 IP-Geolocation Mapping for Moderately Connected Internet Regions Download 2016
1 A Decentralized Service Discovery Approach on Peer-to-Peer Networks Download 2016
2 Personalized QoS-Aware Web Service Recommendation and Visualization Download 2016
3 Privacy-Enhanced Web Service Composition Download 2016
1 An object-oriented web model for testing web application Download 2016
2 Audio Cryptography System Download 2016
3 Multi-path Encrypted Data Security Architecture for Mobile Ad hoc Networks Download 2016
4 Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding Download 2016
5 Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers Download 2016
1 Active Visual Segmentation Download 2016
1 Defenses Against Large Scale Online Password Guessing Attacks By Using Persuasive Click Points Download 2016
2 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group Download 2016
1 Understanding the External Links of Video Sharing Sites: Measurement and Analysis Download 2016