SlideShare a Scribd company logo
1 of 8
2013 - 2014 IEEE Projects @ JP iNFOTeCH
JAVA
CLOUD COMPUTING
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
CloudMoV: Cloud-based Mobile Social TV
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Privacy-Preserving Public Auditing for Secure Cloud Storage
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption
Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers
KNOWLEDGE AND DATA ENGINEERING
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
A New Algorithm for Inferring User Search Goals with Feedback Sessions
Annotating Search Results from Web Databases
Anomaly Detection via Online Over-Sampling Principal Component Analysis
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
m-Privacy for Collaborative Data Publishing
Protecting Sensitive Labels in Social Network Data Anonymization
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System
Development
SECURE COMPUTING
EAACK—A Secure Intrusion-Detection System for MANETs
Identity-Based Secure Distributed Data Storage Schemes
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems
Privacy Preserving Data Sharing With Anonymous ID Assignment
Securing Class Initialization in Java-like Languages
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter
Stream
NETWORKING
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
Delay-Based Network Utility Maximization
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
PARALLEL AND DISTRIBUTED SYSTEMS
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
IP-Geolocation Mapping for Moderately Connected Internet Regions
Optimal Client-Server Assignment for Internet Distributed Systems
MOBILE COMPUTING
Content Sharing over Smartphone-Based Delay-Tolerant Networks
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in
Wireless Mobile Networks
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users
PATTERN ANALYSIS AND MACHINE INTELLIGENCE
A Framework for Mining Signatures from Event Sequences and Its Applications in
Healthcare Data
SERVICES COMPUTING
A Decentralized Service Discovery Approach on Peer-to-Peer Networks
Personalized QoS-Aware Web Service Recommendation and Visualization
Privacy-Enhanced Web Service Composition
SOFTWARE ENGINEERING
Whole Test Suite Generation
2013 - 2014 IEEE Projects @ JP iNFOTeCH
DOT NET
CLOUD COMPUTING
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy
Preserving of Intermediate Data Sets in Cloud
An Adaptive Cloud Downloading Service
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
On Data Staging Algorithms for Shared Data Accesses in Clouds
Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
Privacy-Preserving Public Auditing for Secure Cloud Storage
QoS Ranking Prediction for Cloud Services
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption
Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud
Computing Systems
Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
KNOWLEDGE AND DATA ENGINEERING
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A Survey of XML Tree Patterns
Dynamic Personalized Recommendation on Sparse Data
Mining User Queries with Markov Chains: Application to Online Image Retrieval
TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality
SECURE COMPUTING
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks.
EAACK—A Secure Intrusion-Detection System for MANETs
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information
Sharing
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
Privacy Preserving Data Sharing With Anonymous ID Assignment
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
NETWORKING
A Distributed Control Law for Load Balancing in Content Delivery Networks
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc
Networks
BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
Efficient Algorithms for Neighbor Discovery in Wireless Networks
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
Resource Allocation for QoS Support in Wireless Mesh Networks
PARALLEL AND DISTRIBUTED SYSTEMS
A Secure Payment Scheme with Low Communication and Processing Overhead for
Multihop Wireless Networks
Multicast Capacity in MANET with Infrastructure Support
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
MOBILE COMPUTING
Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game
Approach
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Optimal Multicast Capacity and Delay Tradeoffs in MANETs
Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor
Networks
IMAGE PROCESSING
Query-Adaptive Image Search With Hash Codes
Reversible Data Hiding With Optimal Value Transfer
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram
Shifting
Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform
Shrinkage

More Related Content

Viewers also liked

2015 2016 ieee matlab project titles
2015 2016 ieee matlab project titles2015 2016 ieee matlab project titles
2015 2016 ieee matlab project titles
JPINFOTECH JAYAPRAKASH
 
2012 13 ece ieee projects - jp infotech
2012 13 ece ieee projects - jp infotech2012 13 ece ieee projects - jp infotech
2012 13 ece ieee projects - jp infotech
JPINFOTECH JAYAPRAKASH
 

Viewers also liked (17)

ieee projects 2013 for m.tech.
ieee projects 2013 for m.tech.ieee projects 2013 for m.tech.
ieee projects 2013 for m.tech.
 
Meet you – social networking on android
Meet you – social networking on androidMeet you – social networking on android
Meet you – social networking on android
 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse data
 
Collaborative learning assistant for android
Collaborative learning assistant for androidCollaborative learning assistant for android
Collaborative learning assistant for android
 
Caching strategies based on information density estimation in wireless ad hoc...
Caching strategies based on information density estimation in wireless ad hoc...Caching strategies based on information density estimation in wireless ad hoc...
Caching strategies based on information density estimation in wireless ad hoc...
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
final year ieee projects in pondicherry 2013
final year ieee projects in pondicherry 2013final year ieee projects in pondicherry 2013
final year ieee projects in pondicherry 2013
 
Cloud ftp a case study of migrating traditional applications to the cloud
Cloud ftp a case study of migrating traditional applications to the cloudCloud ftp a case study of migrating traditional applications to the cloud
Cloud ftp a case study of migrating traditional applications to the cloud
 
2015 2016 ieee matlab project titles
2015 2016 ieee matlab project titles2015 2016 ieee matlab project titles
2015 2016 ieee matlab project titles
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
 
Resource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksResource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networks
 
2012 13 ece ieee projects - jp infotech
2012 13 ece ieee projects - jp infotech2012 13 ece ieee projects - jp infotech
2012 13 ece ieee projects - jp infotech
 
2011 IEEE PROJECT TITLES
2011 IEEE PROJECT TITLES2011 IEEE PROJECT TITLES
2011 IEEE PROJECT TITLES
 
Tweet analysis for real time event detection and earthquake reporting system ...
Tweet analysis for real time event detection and earthquake reporting system ...Tweet analysis for real time event detection and earthquake reporting system ...
Tweet analysis for real time event detection and earthquake reporting system ...
 
Supporting search as-you-type using sql in databases
Supporting search as-you-type using sql in databasesSupporting search as-you-type using sql in databases
Supporting search as-you-type using sql in databases
 
Optimal multiserver configuration for profit maximization in cloud computing
Optimal multiserver configuration for profit maximization in cloud computingOptimal multiserver configuration for profit maximization in cloud computing
Optimal multiserver configuration for profit maximization in cloud computing
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 

Similar to 2013 2014 ieee project titles

2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
Ecwaytechnoz
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
Ecway2004
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
Ecway2004
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
Ecwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
Ecwaytechnoz
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
Ecwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
Ecwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
Ecway2004
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
Ecwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
Ecwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
Ecway2004
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
Ecwaytech
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
Ecwaytech
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
Ecway2004
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
Ecwaytechnoz
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
Ecwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
Ecwayt
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
Ecway2004
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
Ecwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
Ecwayt
 

Similar to 2013 2014 ieee project titles (20)

2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

2013 2014 ieee project titles

  • 1. 2013 - 2014 IEEE Projects @ JP iNFOTeCH JAVA CLOUD COMPUTING A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems CloudMoV: Cloud-based Mobile Social TV Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Privacy-Preserving Public Auditing for Secure Cloud Storage Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers KNOWLEDGE AND DATA ENGINEERING A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data A New Algorithm for Inferring User Search Goals with Feedback Sessions Annotating Search Results from Web Databases
  • 2. Anomaly Detection via Online Over-Sampling Principal Component Analysis Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks m-Privacy for Collaborative Data Publishing Protecting Sensitive Labels in Social Network Data Anonymization Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development SECURE COMPUTING EAACK—A Secure Intrusion-Detection System for MANETs Identity-Based Secure Distributed Data Storage Schemes Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Privacy Preserving Data Sharing With Anonymous ID Assignment Securing Class Initialization in Java-like Languages Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream
  • 3. NETWORKING A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Delay-Based Network Utility Maximization Dynamic Control of Coding for Progressive Packet Arrivals in DTNs PARALLEL AND DISTRIBUTED SYSTEMS A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems IP-Geolocation Mapping for Moderately Connected Internet Regions Optimal Client-Server Assignment for Internet Distributed Systems MOBILE COMPUTING Content Sharing over Smartphone-Based Delay-Tolerant Networks DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
  • 4. PATTERN ANALYSIS AND MACHINE INTELLIGENCE A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data SERVICES COMPUTING A Decentralized Service Discovery Approach on Peer-to-Peer Networks Personalized QoS-Aware Web Service Recommendation and Visualization Privacy-Enhanced Web Service Composition SOFTWARE ENGINEERING Whole Test Suite Generation
  • 5. 2013 - 2014 IEEE Projects @ JP iNFOTeCH DOT NET CLOUD COMPUTING A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud An Adaptive Cloud Downloading Service Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud On Data Staging Algorithms for Shared Data Accesses in Clouds Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Privacy-Preserving Public Auditing for Secure Cloud Storage QoS Ranking Prediction for Cloud Services Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
  • 6. KNOWLEDGE AND DATA ENGINEERING A New Algorithm for Inferring User Search Goals with Feedback Sessions A Survey of XML Tree Patterns Dynamic Personalized Recommendation on Sparse Data Mining User Queries with Markov Chains: Application to Online Image Retrieval TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality SECURE COMPUTING A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. EAACK—A Secure Intrusion-Detection System for MANETs Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links Privacy Preserving Data Sharing With Anonymous ID Assignment SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems NETWORKING A Distributed Control Law for Load Balancing in Content Delivery Networks A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
  • 7. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments Efficient Algorithms for Neighbor Discovery in Wireless Networks Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality Resource Allocation for QoS Support in Wireless Mesh Networks PARALLEL AND DISTRIBUTED SYSTEMS A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Multicast Capacity in MANET with Infrastructure Support SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency MOBILE COMPUTING Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Optimal Multicast Capacity and Delay Tradeoffs in MANETs Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
  • 8. IMAGE PROCESSING Query-Adaptive Image Search With Hash Codes Reversible Data Hiding With Optimal Value Transfer Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting Local Directional Number Pattern for Face Analysis: Face and Expression Recognition Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage