cse dot net java & android

13

Click here to load reader

Upload: bharath-chandra-nagalla

Post on 06-May-2015

303 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Cse dot net java & android

 

 

 

 

 

 

 

 

 

 

 

Academic Projects for

CSE (2013-2014)

 

We will develop your ideas and your papers also,

For any Further information call-9603150547

e-mail [email protected]

Page 2: Cse dot net java & android

 

DOTNET

DATA MINING

1. Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional

Data. [SMS001]

2.Secure Mining of Association Rules in Horizontally Distributed Databases. [SMS002]

3.A Novel Profit Maximizing Metric for Measuring Classification Performance of

Customer Churn Prediction Models. [SMS003]

4.ELCA: Evaluation for Keyword Search on Probabilistic XML a Data. [SMS004]

5.Dynamic Query Forms for Database Queries. [SMS005]

6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors. [SMS006]

7.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled

Data Warehouse. [SMS007]

8. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering

Algorithm. [SMS008]

9. Optimal Route Queries with Arbitrary Order Constraints. [SMS009]

10.Failure-Aware Cascaded Suppression in Wireless Sensor Networks. [SMS010]

NETWORKING AND NETWORK SECURITY

11.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System. [SMS011]

12. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless

Mesh Network. [SMS012]

13.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming

Systems. [SMS013]

14.Diffusion Dynamics of Network Technologies With Bounded Rational Users:

Aspiration-Based Learning. [SMS014]

15.Delay-Based Network Utility Maximization. [SMS015]

16.Answering “What-If” Deployment and Configuration Questions With WISE:

Techniques and Deployment Experience. [SMS016]

17.An Empirical Interference Modeling for Link Reliability Assessment in Wireless

Networks. [SMS017]

Page 3: Cse dot net java & android

 

18.A Rank Correlation Based Detection against Distributed Reflection DoS

Attacks. [SMS018]

CLOUD COMPUTING

19.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud. [SMS019]

20.Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS020]

21.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using

Attribute-Based Encryption. [SMS021]

22.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage

Systems. [SMS022]

23.CloudMoV: Cloud-based Mobile Social TV. [SMS023]

24.Privacy Preserving Delegated Access Control in Public Clouds. [SMS024]

25.Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing

Networks. [SMS025]

MOBILE COMPUTING

26.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead

in Mobile Ad Hoc Networks. [SMS026]

27.EAACK—A Secure Intrusion-Detection System for MANETs D. [SMS027]

28.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period

Mobile Users. [SMS028]

29.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating

System. [SMS029]

30.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in

Mobile Ad Hoc Networks. [SMS030]

31.On Quality of Monitoring for Multi-channel Wireless Infrastructure

Networks. [SMS031]

32.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks. [SMS032]

33.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS033]

34.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period

Mobile Users. [SMS034]

Page 4: Cse dot net java & android

 

35.EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc

Networks. [SMS035]

PARALLEL DISTRIBUTED SYSTEMS

36.A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices. [SMS036]

37.Exploiting Service Similarity for Privacy in Location Based Search Queries. [SMS037]

38.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS038]

39.GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor

Networks. [SMS039]

40.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing

Environment. [SMS040]

41.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing

Clouds. [SMS041]

42.BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City

Environments. [SMS042]

43.ASAP: An Adaptive Sampling Approach to Data Collection in Sensor

Networks. [SMS043]

44.A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem

and Its Efficient Parallelization. [SMS044]

45.A General Framework for Efficient Continuous Multidimensional Top-k Query

Processing in Sensor Networks. [SMS045]

SERVICECOMPUTING

46.Privacy-EnhancedWebServiceComposition. [SMS046]

47.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed

InformationSharing. [SMS047]

48.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network

Systems. [SMS048]

Page 5: Cse dot net java & android

 

49.Document Clustering for Forensic Analysis: An Approach for Improving Computer

Inspection. [SMS049]

50.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed

Information Sharing. [SMS050]

IMAGEPROCESSING

51.Face Recognition and Verification Using Photometric Stereo: The Photo face Database

and a Comprehensive Evaluation. [SMS051]

Page 6: Cse dot net java & android

 

JAVA

DATA MINING

1.A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional

Data.[SMS001]

2.A Framework for Mining Signatures from Event Sequences and Its Applications in

Healthcare Data.[SMS002]

3.A Novel Profit Maximizing Metric for Measuring Classification Performance of

Customer Churn Prediction Models.[SMS003]

4.A Survey of XML Tree Patterns.[SMS004]

5.Change Detection in Streaming Multivariate Data Using Likelihood Detectors.[SMS005]

6.Dynamic Personalized Recommendation on Sparse Data.[SMS006]

7.Mining User Queries with Markov Chains: Application to Online Image

Retrieval.[SMS007]

8. Optimal Route Queries with Arbitrary Order Constraints.[SMS008]

9.Failure-Aware Cascaded Suppression in Wireless Sensor Networks.[SMS009]

10.Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-

Based Model.[SMS010]

11.A System to Filter Unwanted Messages from OSN User Walls.[SMS011]

12.M-Privacy for Collaborative Data Publishing.[SMS012]

13.Comparable Entity Mining from Comparative Questions.[SMS013]

14.Spatial Approximate String Search.[SMS014]

15.Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled

Data Warehouse.[SMS015]

NETWORKING AND NETWORK SECURITY

16.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System.[SMS016]

17.Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless

Mesh Networks.[SMS017]

18.Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging

Quality.[SMS018]

Page 7: Cse dot net java & android

 

19.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming

Systems.[SMS019]

20.Efficient Algorithms for Neighbor Discovery in Wireless Networks.[SMS020]

21.Diffusion Dynamics of Network Technologies With Bounded Rational Users:

Aspiration-Based Learning.[SMS021]

22.Answering “What-If” Deployment and Configuration Questions With WISE:

Techniques and Deployment Experience.[SMS022]

23.An Empirical Interference Modeling for Link Reliability Assessment in Wireless

Networks.[SMS023]

24.An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc

Networks.[SMS024]

25.A Rank Correlation Based Detection against Distributed Reflection DoS

Attacks.[SMS025]

26.Optimizing Cloud Resources for Delivering IPTV Services through

Virtualization.[SMS026]

27.Participatory Privacy Enabling Privacy in Participatory Sensing.[SMS027]

CLOUD COMPUTING

28.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud.[SMS028]

29.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS029]

30.Winds of Change From Vendor Lock-In to the Meta Cloud.[SMS030]

31.Cloud computing for mobile users can offloading compution save energy.[SMS031]

32.On Data Staging Algorithms for Shared Data Accesses in Clouds.[SMS032]

33.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage

Systems.[SMS033]

34.AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social

Video Sharing in the Clouds.[SMS034]

35.CloudMoV: Cloud-based Mobile Social TV.[SMS035]

36.QoS Ranking Prediction for Cloud Services.[SMS036]

37.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS037]

Page 8: Cse dot net java & android

 

38.Collaboration in Multicloud Computing Environments: Framework and

Security Issues.[SMS038]

39.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS039]

40.Towards Differential Query Services in Cost-Efficient Clouds.[SMS040]

MOBILE COMPUTING

41.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead

in Mobile Ad Hoc Networks.[SMS041]

42.EAACK :A Secure Intrusion-Detection System for MANETs.[SMS042]

43.Vampire attacks:Draining life from wireless ad-hoc sensor networks.[SMS043]

44.Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor

Networks.[SMS044]

45.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in

Mobile Ad Hoc Networks.[SMS045]

46.On Quality of Monitoring for Multi-channel Wireless Infrastructure

Networks.[SMS046]

47.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.[SMS047]

48.A Scalable Server Architecture for Mobile Presence Services in Social Network

Applications.[SMS048]

49.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period

Mobile Users.[SMS049]

50.EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc

Networks.[SMS050]

51.Adaptive Position Update for Geographic Routing in Mobile Ad Hoc

Networks.[SMS051]

52.Community-Aware Opportunistic Routing in Mobile Social Networks.[SMS052]

53.Distributed Cooperative Caching in Social Wireless Networks.[SMS053]

54.Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference

Cancellation.[SMS054]

55.Toward a Statistical Framework for Source Anonymity in Sensor Networks.[SMS055]

Page 9: Cse dot net java & android

 

PARALLEL DISTRIBUTED SYSTEMS

56.Covering Points of Interest with Mobile Sensors.[SMS056]

57.A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.[SMS057]

58.Analysis of Distance-Based Location Management in Wireless Communication

Networks.[SMS058]

59.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor

Networks.[SMS059]

60.Error-Tolerant Resource Allocation and Payment Minimization for Cloud

System.[SMS060]

61.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage

Systems.[SMS061]

62.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing

Environment.[SMS062]

63.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing

Clouds.[SMS063]

64.BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City

Environments.[SMS064]

65.Towards Differential Query Services in Cost-Efficient Clouds.[SMS065]

66.A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy

Preserving of Intermediate Datasets in Cloud.[SMS066]

67.Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage

Systems.[SMS067]

68.ASAP: An Adaptive Sampling Approach to Data Collection in Sensor

Networks.[SMS068]

69.Detection and Localization of Multiple Spoofing Attackers in Wireless

Networks.[SMS069]

70.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed

Information Sharing.[SMS070]

Page 10: Cse dot net java & android

 

SERVICE COMPUTING

71.Privacy-Enhanced Web Service Composition.[SMS071]

72.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network

Systems.[SMS072]

73.Document Clustering for Forensic Analysis: An Approach for Improving Computer

Inspection.[SMS073]

SECURE COMPUTING

74.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS074]

75.Secure Encounter-based Mobile Social Networks Requirements Designs and

Tradeoffs.[SMS075]

76.Two tales of privacy in online social networks.[SMS076]

Page 11: Cse dot net java & android

 

ANDROID

DATA MINING

1.Finding Rare Classes Active Learning with Generative and Discriminative

Models. [SMS001]

2.A Generalized Flow-Based Method for Analysis of Implicit Relationships on

Wikipedia . [SMS002]

3.A Survey of XML Tree Patterns. [SMS003]

4.Anonymization of Centralized and Distributed Social Networks by Sequential

Clustering . [SMS004]

5.T-Drive Enhancing Driving Directions with Taxi Driversâc Intelligence. [SMS005]

6.Region-Based Foldings in Process Discovery. [SMS006]

7.Ranking on Data Manifold with Sink Points. [SMS007]

8.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled

Data Warehouse. [SMS008]

CLOUD COMPUTING

9. Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS009]

10. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using

Attribute-Based Encryption. [SMS010]

11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage

Systems. [SMS011]

12. CloudMoV: Cloud-based Mobile Social TV. [SMS012]

Page 12: Cse dot net java & android

 

MOBILE COMPUTING

13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc

Networks. [SMS013]

14.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating

System. [SMS014]

15.SSD A Robust RF Location Fingerprint Addressing Mobile Devicesa

Heterogeneity. [SMS015]

16.A Scalable Server Architecture for Mobile Presence Services in Social Network

Applications. [SMS016]

17.Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. [SMS017]

PARALLEL DISTRIBUTED SYSTEMS

18.Distributed Web Systems Performance Forecasting Using Turning Bands

Method. [SMS018]

19.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using

Attribute-Based Encryption. [SMS019]

20.Security Analysis of a Single Sign-On Mechanism for Distributed Computer

Networks. [SMS020]

21.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor

Networks. [SMS021]

22.Analysis of Distance-Based Location Management in Wireless Communication

Networks. [SMS022]

Page 13: Cse dot net java & android

 

SERVICE COMPUTING

23.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed

Information Sharing. [SMS023]

24.Document Clustering for Forensic Analysis: An Approach for Improving Computer

Inspection. [SMS024]

25.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed

Information Sharing. [SMS025]