JAVA M.Tech 2013 Domain Wise Title List

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

M.

TECH JAVA-2013

DATA MINING

S.NO TITLE

1 A Fast Clustering-Based Feature Subset Selection Algorithm for High


Dimensional Data

2 A New Algorithm for Inferring User Search Goals with Feedback Sessions

3 M-Privacy for Collaborative Data Publishing

4 Annotating Search Results from Web Databases

5 Crowd sourcing Predictors of Behavioral Outcomes

6 Anomaly Detection via Online Over-Sampling Principal Component Analysis

7 Spatial Approximate String Search

8 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor


Networks

9 Facilitating Document Annotation using Content and Querying Value

10 Protecting Sensitive Labels in Social Network Data Anonymization

11 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting


System Development

12 A Generalized Flow-Based Method for Analysis of Implicit Relationships on


Wikipedia

13 A System to Filter Unwanted Messages from OSN User Walls

14 Anonymization of Centralized and Distributed Social Networks Sequential


Clustering

15 Document Clustering for Forensic Analysis: An Approach for Improving

For further Details Contact: A.VINAY-0877-2261612, 9030333433


Computer Inspection

16 A Method for Mining Infrequent Causal Associations and Its Application in


Finding Adverse Drug Reaction Signal Pairs

17 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering


Algorithm

18 Intrusion Detection Technique by using K-means, Fuzzy Neural Network and


SVM classifiers

19 Preventing Private Information Inference Attacks on Social Networks

20 Multiparty Access Control for Online Social Networks Model and Mechanisms

21 Incentive Compatible Privacy-Preserving Data Analysis

22 Comparable Entity Mining from Comparative Questions

23 Facilitating Effective User Navigation through Website Structure


Improvement

24 Focus Learning to Crawl Web Forums

25 PMSE A Personalized Mobile Search Engine

26 Robust Module Based Data Management

27 Sensitive Label Privacy Protection on Social Network Data

28 Privacy Preserving Mining of Association Rules

29 SeDas A Self Destructing Data System Based on Active Storage Framework

30 Supporting Search As-You-Type Using SQL in Databases

CLOUD COMPUTING

For further Details Contact: A.VINAY-0877-2261612, 9030333433


1 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS
Cloud Computing Systems

2 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

3 CloudMoV Cloud-based Mobile Social TV

4 Privacy-Preserving Public Auditing for Secure Cloud Storage

5 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing


Environment

6 Error-Tolerant Resource Allocation and Payment Minimization for Cloud


System

7 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear


Equations

8 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

9 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

10 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing
Storage Systems

11 Optimizing Cloud Resources for Delivering IPTV Services Through


Virtualization

12 Privacy Preserving Delegated Access Control in Public Clouds

13 Attribute-Based Encryption With Verifiable Outsourced Decryption

14 Mining Contracts for Business Events and Temporal Constraints in Service


Engagements

15 Winds of Change: From Vendor Lock-In to the Meta Cloud

16 Privacy-Preserving Public Auditing for Secure Cloud Storage

17 AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient


For further Details Contact: A.VINAY-0877-2261612, 9030333433
Social Video Sharing in the Clouds

SECURE COMPUTING

1 EAACK—A Secure Intrusion-Detection System for MANETs

2 Privacy Preserving Data Sharing With Anonymous ID Assignment

3 Identity-Based Secure Distributed Data Storage Schemes

4 Security Analysis of a Single Sign-On Mechanism for Distributed Computer


Networks

5 Modeling the Pairwise Key Predistribution Scheme in the Presence of


Unreliable Links

6 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

7 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual


Network Systems

8 Securing Class Initialization in Java-like Languages

9 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in


Twitter Stream

10 Two tales of privacy in online social networks

11 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and


Tradeoffs

12 Twitsper: Tweeting Privately

13 Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless


Networks

14 Cross-Domain Privacy-Preserving Cooperative Firewall Optimization

15 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

For further Details Contact: A.VINAY-0877-2261612, 9030333433


16 Extracting Spread-Spectrum Hidden Data from Digital Media

17 Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach

NETWORKING

1 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

2 Delay-Based Network Utility Maximization

3 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs

4 Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols

5 On the Node Clone Detection in Wireless Sensor Networks

6 Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power

7 Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication


Networks

8 Fast Transmission to Remote Cooperative Groups: A New Key Management


Paradigm

9 Participatory Privacy: Enabling Privacy in Participatory Sensing

10 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service


for High-Speed Networks

11 Access Policy Consolidation for Event Processing Systems

12 Fully Anonymous Profile Matching in Mobile Social Networks

13 Privacy-Preserving Distributed Profile Matching in Proximity Based Mobile


Social Networks

14 Price Differentiation for Communication Networks

For further Details Contact: A.VINAY-0877-2261612, 9030333433


15 A Decentralized Privacy Preserving Reputation Protocol For The Malicious

16 Efficient Load Re Balancing Algorithm for Distributed File Systems

MOBILE COMPUTING

1 Content Sharing over Smartphone-Based Delay-Tolerant Networks

2 DCIM: Distributed Cache Invalidation Method for Maintaining Cache


Consistency in Wireless Mobile Networks

3 Discovery and Verification of Neighbor Positions in Mobile AdHoc Networks

4 Efficient Rekeying Framework for Secure Multicast with Diverse


Subscription-Period Mobile Users

5 Toward a Statistical Framework for Source Anonymity in Sensor Networks

6 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks

7 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks

8 Toward Privacy Preserving and Collusion Resistance in a Location Proof


Updating System

9 A Framework for Mining Signatures from Event Sequences and Its


Applications in Healthcare Data

10 A Scalable Server Architecture for Mobile

11 Distributed Cooperative Caching in Social Wireless Networks

PARALLEL & DISTRIBUTED SYSTEMS

1 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

For further Details Contact: A.VINAY-0877-2261612, 9030333433


2 Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-
Based Encryption Scheme

3 IP-Geolocation Mapping for Moderately Connected Internet Regions

4 Optimal Client-Server Assignment for Internet Distributed Systems

5 Social Tube P2P-assisted Video Sharing in Online Social Networks

6 A System for Denial-of-Service Attack Detection Based on Multivariate


Correlation Analysis

7 Dynamic Resource Allocation using Virtual Machines for Cloud Computing


Environment

8 Scalable and Secure Sharing of Personal Health Records in Cloud Computing


Using Attribute-Based Encryption

9 Towards Differential Query Services in Cost-Efficient Clouds

SOFTWARE ENGINEERING

1 Whole Test Suite Generation

2 Towards Secure Multi Keyword Top-K Retrieval Over encrypted Cloud Data

SERVICE COMPUTING

1 A Decentralized Service Discovery Approach on Peer-to-Peer Networks

2 Personalized QoS-Aware Web Service Recommendation and Visualization

3 Privacy-Enhanced Web Service Composition

PATTERN ANALYSIS AND MACHINE INTELLIGENCE

1 A Frame Work For Mining Signatures From Event Sequences and Its
Applications in HealthCare Data

For further Details Contact: A.VINAY-0877-2261612, 9030333433


MULTIMEDIA

1 Understanding the External Links of Video Sharing Sites Measurement and


Analysis

For further Details Contact: A.VINAY-0877-2261612, 9030333433

You might also like