IEEE 2013-14 DOTNET PROJECTS AT ECRUITMENTS SOLUTIONS
PARALLEL DISTRIBUTION
1. Lightweight Location Verification Algorithms for Wireless Sensor Networks
2. Heterogeneous Resource Allocation under Degree Constraints
3. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
4. GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks
5. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
6. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
7. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
8. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
9. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks
10. A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization
11. A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks
12. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks.
13. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for MobileHealthcare Emergency.
14. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Walid
2. Heterogeneous Resource Allocation under Degree Constraints
3. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
4. GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks
5. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
6. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
7. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
8. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
9. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks
10. A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization
11. A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks
12. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks.
13. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for MobileHealthcare Emergency.
14. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Walid
CLOUD COMPUITNG
1. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
2. Privacy-Preserving Public Auditing for Secure Cloud Storage
3. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encrytion
4. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
5. CloudMoV: Cloud-based Mobile Social TV
6. Privacy Preserving Delegated Access Control in Public Clouds.
7. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks.
2. Privacy-Preserving Public Auditing for Secure Cloud Storage
3. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encrytion
4. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
5. CloudMoV: Cloud-based Mobile Social TV
6. Privacy Preserving Delegated Access Control in Public Clouds.
7. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks.
DATA MINING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
2. Secure Mining of Association Rules in Horizontally Distributed Databases.
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4. ELCA: Evaluation for Keyword Search on Probabilistic XML Data.
5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
7. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
8. Optimal Route Queries with Arbitrary Order Constraints
9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
2. Secure Mining of Association Rules in Horizontally Distributed Databases.
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4. ELCA: Evaluation for Keyword Search on Probabilistic XML Data.
5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
7. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
8. Optimal Route Queries with Arbitrary Order Constraints
9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
MOBILE COMPUTING
1. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
2. EAACK—A Secure Intrusion-Detection System for MANETs
3. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
4. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
5. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
6. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
7. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
8. IP-Geolocation Mapping for Moderately Connected Internet Regions
9. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
2. EAACK—A Secure Intrusion-Detection System for MANETs
3. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
4. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
5. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
6. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
7. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
8. IP-Geolocation Mapping for Moderately Connected Internet Regions
9. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
NETWORKING
1. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
2. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
2. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
3. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
4. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
5. Delay-Based Network Utility Maximization
6. Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
7. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
8. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
9. The Target Tracking in Mobile Sensor Networks.
SERVICE COMPUTING
1. Privacy-Enhanced Web Service Composition
2. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
3. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
4. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
2. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
3. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
4. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
No comments:
Post a Comment