Base Paper, Abstract@www.chennaisunday.com

jeanscricketInternet and Web Development

Nov 3, 2013 (4 years and 6 days ago)

164 views

Base Paper, Abstract
@www.chennaisunday.com



IEEE 2012 Dot Net Projects



Image Processing

1. View
-
invariant action recognition based on Artificial Neural Networks

2. Altered Fingerprints: Analysis and Detecti
on.

3. Improving Color Constancy by Photometric Edge Weighting.

4.
Intent Search
: Capturing User Intention for One
-
Click Internet Image
Search.

5. User
-
aware Image Tag Refinement via Ternary Semantic Analysis.

6. Separable Reversible Data Hiding in Encrypt
ed Image.

7. Robust Watermarking of Compressed and Encrypted JPEG2000 Images


8.

Compressed
-
Sensing
-
Enabled Video Streaming for Wireless Multimedia
Sensor Networks

9. Robust Face
-
Name Graph Matching for Movie Character Identify.

10. Defenses against Large
Scale Online Password Guessing Attacks by
using Persuasive click Points.

11. Exploring the Design Space of Social Network
-
Based Sybil Defenses.

12. Semi supervised Biased Maximum Margin Analysis for Interactive
Image Retrieval.

13. AnnoSearch: Image Auto
-
A
nnotation by Search
.



Cloud Computing

14. HOMOMORPHIC AUTHENTICATION WITH RANDOM MASKING
TECHNIQUE ENSURING PRIVACY & SECURITY IN CLOUD COMPUTING.


15. Automatic Protocol Blocker for Privacy
-
Preserving Public Auditing in
Cloud

Computing.


16. Privacy Preserving Delegated Access Control in Public Clouds.

17. Automatic Protocol Blocker for Privacy
-
Preserving Public Auditing in
Cloud Computing.

18. Preserving Integrity of Data and Public Auditing for Dat
a Storage
Security in Cloud Computing.

19. Efficient Audit Service Outsourcing for Data Integrity in Clouds.

20. Heuristics Based Query Processing for Large RDF Graphs Using Cloud
Computing.

21. Towards Secure and Dependable Storage Services in Cloud Compu
ting.

22. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute
-
based Encryption.

23. Enabling Secure and Efficient Ranked Keyword Search over Outsourced
Cloud Data.


KNOWLEDGE AND DATA ENGINEER
ING





(DATA MINING)


24
. Computing

Structural Statistics by Keywords in Databases.

25. Combined Mining: Discovering Informative Knowledge in Complex
Data.

26. Survey of Indexing Techniques for Scalable Record Linkage

and
Deduplication.

27
. Efficient

Data Mining for XML Queries


Answering Support.

28. Decentralized Probabilistic Text Clustering.

29. Answering General Time
-
Sensitive Queries

30. Altered Fingerprints: Analysis and Detection

31. Generative Models for Item

Adoptions Using Social Correlation

32. Scalable Scheduling of Updates in Streaming Data Warehouses.

33. Ranking Model Adaptation for Domain
-
Specific Search.

34. Bridging Social and Data Networks.

35. Effective Pattern Discovery for Text Mining

36. Query P
lanning for Continuous Aggregation Queries over a Network of
Data Aggregators.

37. Scalable Learning of Collective Behavior.

38
. Outsourced

Similarity Search on Metric Data Assets.

39. Bridging Social and Data Networks.

40. Identifying Content for Planned
Events
across

Social Media Sites.

41. A Query Formulation Language for the data web.

42. Efficient and Discovery of Patterns in Sequence Data Sets.

43. Organizing User Search Histories.

44. Mining Web Graphs for Recommendations.

45. Optimization of Horizon
tal Aggregation in SQL by Using K
-
Means
Clustering.

46. Improving Aggregate Recommendation Diversity Using Ranking
-
Based
Techniques

47. Joint Top
-
K Spatial Keyword Query Processing





SOFTWARE ENGINEERING

48
. Measuring Code Quality to
Improve Specification Mining.

49. Comparing the Defect Reduction Benefits of Code Inspection and Test
-
Driven Development.


WIRELESS COMMUNICATIONS

50
. Cooperative Data Dissemination via Roadside WLANs.

51
. AMPLE An Adaptive
Traffic Engineering System Based on Virtual
Routing Topologies.

52
. Cooperative Data Dissemination via Roadside WLANs.

53
. Topology Control in Mobile Ad Hoc Networks with Cooperative
Communications.




I'EEE TRANSACTIONS ON MOBILE C
OMPUTING

54
. Fast Release/Capture Sampling in Large
-
Scale Sensor Networks.

55
. Hop
-
by
-
Hop Routing in Wireless Mesh Networks with Bandwidth
Guarantees.


56
. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the
Number of Transmissions.

57
. Co
operative
downloads

in vehicular environments.

58
. Network Assisted Mobile Computing with Optimal Uplink Query
Processing.

59
. Protecting Location Privacy in Sensor Networks Against a Global
Eavesdropper.

60
. Topology control in mobile ad hoc networks with

cooperative
communications.




SECURE COMPUTING

61
. On

Privacy of Encrypted Speech
Communications.

62
. Review
: Steganography


Bit Plane Complexity Segmentation (BPCS)
Techniq
ue.

63
. Access control for online social networks third party applications.

64
. ROAuth: Recommendation Based Open Authorization.

65
. Packet
-
Hiding Methods for Preventing Selective Jamming Attacks.

66
. OAuth Web Authorization Protocol.

67
. Recommendation Mo
dels for Open Authorization.

68
. Design and Implementation of TARF A Trust
-
Aware Routing Framework
for WSNs.

69
. Automatic Reconfiguration for Large
-
Scale Reliable Storage Systems.

70
. Fast Matrix Embedding by Matrix Extending.

71
. Joint Relay and Jammer S
election for Secure Two
-
Way Relay Networks.

72
. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching.

73
. A Probabilistic Model of (t,n) Visual Cryptography Scheme With
Dynamic Group.



SERVICE COMPUTING (SOA) & ONTOLOGY

74
. Expert

Discovery and Interactions in Mixed Service
-
Oriented Systems.

75
. Query Access Assurance in Outsourced Databases.

76
. Dynamic Authentication for Cross
-
Realm SOA
-
Based Business
Processes.

77
. Random4
: An Application Specific Randomized Encryption Algorithm

to
prevent SQL injection.


NETWORKING

78
. A Security
-
Enhanced Key Authorization Management Scheme for
Trusted computing Platform.

79
. A Reliable Multi
-
Grid Routing Protocol for Tactical MANETs.

80
. View
-
invari
ant action recognition based on Artificial Neural Networks.

81
. A New Cell Counting Based Attack Against Tor.

82
. Load Balancing Multipath Switching System with Flow Slice.

83
. Optimal Power Allocation in Multi
-
Relay MIMO Cooperative Networks:
Theory and A
lgorithms.

84
. Assessing the Veracity of Identity Assertions via OSNs.

85
. SPREAD
: Improving network security by multipath routing in mobile ad
hoc networks

86
. A

Keyless Approach to Image Encryption



I'EEE PARALLEL AND DISTRIBUTED SYSTEMS

8
7
. In Cloud, Can Scientific Communities Benefit from the Economies of
Scale?

88
. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL
CRYPTOGRAPHY

89
. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute
-
based Encryption.

90
. Balancing the Tradeoffs between Query Delay and Data Availability in
MANETs.

91
. BECAN: A Bandwidth
-
Efficient Cooperative Authentication Scheme for
Filtering Injected False Data in Wireless Sensor Networks.

9
2
. Resource
-
Aware Application State Monitoring
.

9
3
. SPOC: A Secure and Privacy
-
preserving Opportunistic Computing
Framework for Mobile
-
Healthcare Emergency

9
4
. In Cloud, Can Scientific Communities Benefit from the Economies of
Scale?

9
5
.

Improving Color Constancy by Photometric Edge Weighting

9
6
.

Bloo
m Cast
: Efficient and Effective Full
-
Text Retrieval in Unstructured
P2P
Networks.


I'EEE 2012 INTERNATIONAL CONFERENCE

9
7
. Integrating Web Content Mining into Web Usage Mining for Finding
Patterns and Predicting Users’ Behaviors.

9
8
. De
tecting and Validating Sybil Groups in the Wild.

89
. Investigation and Analysis of New Approach of Intelligent Semantic
Web Search Engines.

9
9
. Hiding Sensitive Association Rule for Privacy Preservation.

100
. Efficient load balancing and QoS
-
based location

aware service
discovery protocol for vehicular ad hoc networks.

101
. Assessing the Veracity of Identity Assertions via OSNs

102
. Association Rule


Extracting Knowledge Using Market Basket
Analysis.

103
. A Secure Intrusion detection system against DDOS at
tack in Wireless
Mobile Ad1.

104
. Securing Node Capture Attacks for Hierarchical Data Aggregation in
Wireless Sensor Networks.

105
. Development of Certificate Authority Services for Web Applications.



OTHERS

106
. An
Approach to Detect and Prevent SQL Injection Attacks in Database
Using Web Service.

107
. Linear and Differential Cryptanalysis.

108. Remote

Display Solutions for Mobile Cloud Computing