SlideShare a Scribd company logo
1. A Decentralized Service discovery approach on peer-to-network 
2. A Fast Clustering Based Feature Subset Selection Algorithm For High Dimensional Data 
3. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 
4. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 
5. A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse 
Drug Reaction Signal Pairs 
6. A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK 
SESSIONS 
7. A new approach for FEC decoding based on the BP alogaritham in LTE and WIMAX system 
8. A Study and implementation on use search Histories 
9. A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS 
10. Adding Temporal constraints to Xml 
11. Annotating Search Results from Web Databases 
12. ANOMALY DETECTION VIA ONLINE OVER-SAMPLING PRINCIPAL COMPONENT 
ANALYSIS 
13. A-secure protocol for spontaneous wireless Adhoc Networks Creation 
14. Attribute Based Encryption for scalable and secure Sharing of medical records in cloud 
computing desing and implementation 
15. Automatic discovery of association orders between name and aliasis 
16. Back-Pressure-Based-Packet-by-Packet-Adaptive-Routing- in-Communication-Networks-docx 
17. CLOUD COMPUTING SECURITY: FROM SINGLE TO MULTI-CLOUDS 
18. CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING 
19. CloudMoV: Cloud-based Mobile Social TV 
20. Clustering With multi view point Based similarity measure 
21. Clustering-Sentence-Level-Text-Using-a-Novel-Fuzzy-Relational-Clustering-Algorithm-docx-not 
there 
22. Combining-Cryptographic-Primitives-to-Prevent-Jamming-Attacks- in-Wireless-Networks-not 
there 
23. Cut Detection In Wireless Sensor Networks 
24. Distributed-Processing-of-Probabilistic-Top-k-Queries- in-Wireless-Sensor-Networks-docx 
25. DoubleGuard Detecting Intrusions in multitier web application 
26. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 
27. EAACK--A Secure Intrusion-Detection System for MANETs. 
28. Efficient algorithm for high utility item sets for trasactional data bases-2012 
29. Enabling-Dynamic-Data-and-Indirect-Mutual-Trust-for-Cloud-Computing-Storage-Systems 
30. ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD 
31. FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS 
32. Fully Anonymous Profile Matching in Mobile Social Networks 
33. IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES 
34. Intrusion-detection technique by using K-means,fuzzy neural networks and SVM calssifiers 
35. IP-Geo Location Mapping For Moderately Connected Internet Regions 
36. MeasuRouting :A Framework for Routing Assisted Traffic Monitoring 
37. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
38. On-the-Node-Clone-Detection-in-Wireless-Sensor-Networks-docx 
39. Optimal Client Server Assignment For Internet Distributed Systems 
40. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 
41. Participatory Privacy: Enabling Privacy in participatory sensing 
42. PMSE: A Personalized Mobile Search Engine 
43. Preventing-Private-Information-Inference-Attacks-on-Social-Networks-docx 
44. PRIVACY PRESERVING DATA SHARING WITH ANYONYMOUS ID ASSIGNMENT 
45. PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE 
46. Protecting sensitive labels in social network data anonmyzation-docx 
47. SECURE MULTI-OWNER DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD 
48. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 
49. Self Adaptive Contention Aware Routing protocol for intermittently connected mobile 
Network 
50. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems-56-Java-Network Security- 
2013- 
51. Spatial-Approximate-String-Search-docx 
52. Toward-Privacy-Preserving-and-Collusion-Resistance-in-a-Location-Proof-Updating-System-docx- 
not there 
53. Towards a Statistical Framework for Source Anonymity in Sensor Networks 
54. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System 
Development-34-Data Mining-2013 Java List 
55. Two tales of privacy in online social networks 
56. Vampire attacks: Draining life from wireless ad-hoc sensor networks 
57. Warning Bird-not there 
Enabling dynamic data and index mutual trust for cloud computing storage systems(JAVA) 
65-Networking-2013-Java 
EAACK: A secure intrusion detection sytem for MANET(JAVA) 
47-Network Security-2013-Java 
AMES CLOUD:A Framework of adaptive mobile video streaming and efficient social video sharing in the 
clouds(JAVA) 
3-cloud computing-2013-Java
Optimal client-server assignment for internet distributed Systems(JAVA) 
68-networking-Java 
Optimal multi server configuration for profit maximization in cloud computing(.NET) 
8-DotNet-Cloud Computing 
A highly scalable key predestration schema for wireless sensor networks(JAVA) 
60-networking-2013 
A secure protocol for spontaneous wireless adhoc networks creation (JAVA) 
61-networking-2013 
Securing class Initialize in java-like languages(JAVA) 
Privacy preserving public auditing for secure cloud storage(JAVA) 
12-cloud computing-2013 
MONA: Secure multiowner data sharing for dynamic groups in the cloud(.NET) 
10-cloud computing-2013 
Security analysis of a single sign on mechanism for distributed computer networks(JAVA)
55-Network Security 
IP-geolocation mapping for moderately connected internet regions(JAVA) 
67-Networking-2013

More Related Content

PDF
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
DOC
Ieee 2014 java projects list
DOC
Novel secure communication protocol basepaper
DOC
Dotnet application-non-ieee
DOC
Ieee 2013 java projects list
DOC
Ieee java projects list
DOC
Ieee 2013 dot net projects list
DOC
Ieee 2014 dot net projects list
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
Ieee 2014 java projects list
Novel secure communication protocol basepaper
Dotnet application-non-ieee
Ieee 2013 java projects list
Ieee java projects list
Ieee 2013 dot net projects list
Ieee 2014 dot net projects list

What's hot (14)

PDF
CSE Dot net ieee projects 2015.Nellore
DOCX
Pvr technologies 2013 java ieee project titles
DOC
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
PDF
Final year IEEE projects for 2013-14
PDF
IEEE PROJECTS 2013 for me
DOC
Java IEEE 2013 Projects list
DOCX
2013 2014 ieee project titles
DOC
Global tech project list
PDF
Ieee project title_2013-2014
PDF
Ieee project title_2013-2014
DOCX
2014 and 2015 ieee final list
DOC
Java non ieee project titles 2014-2015
PPTX
Internet of things (io t)
PDF
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Dot net ieee projects 2015.Nellore
Pvr technologies 2013 java ieee project titles
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
Final year IEEE projects for 2013-14
IEEE PROJECTS 2013 for me
Java IEEE 2013 Projects list
2013 2014 ieee project titles
Global tech project list
Ieee project title_2013-2014
Ieee project title_2013-2014
2014 and 2015 ieee final list
Java non ieee project titles 2014-2015
Internet of things (io t)
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
Ad

Similar to CREC List.docx (20)

DOC
Java IEEE Projects 2012-2011-2010
DOCX
2013 2014 bulk ieee projects
DOCX
2013 and 2014 ieee projects list
PDF
msc projects in chennai
PDF
Java titles 2017 2018
DOCX
Parallel and Distributed Systems,2014 and 2015 ieee projects @TMKS Infotech
DOCX
Android,2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
Mobile Computing,2014 and 2015 ieee projects @ TMKS Infotech
DOCX
2014 and 2015 Java,Android,Dotnet ieee projects list @TMKS Infotech
DOCX
2014 and 2015 ieee projects list in Karnataka @ Bangalore
DOCX
2015 java ieee projects list
DOCX
2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
2014 and 2015 ieee projects list in Bangalore
PDF
Cse dot net java & android
DOC
Ieee 2014 completd dotnet java projects
DOCX
Java project 2013
DOC
Ieee 2012 dot net projects list
DOC
2015 dot net ieee projects list
DOCX
2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar
Java IEEE Projects 2012-2011-2010
2013 2014 bulk ieee projects
2013 and 2014 ieee projects list
msc projects in chennai
Java titles 2017 2018
Parallel and Distributed Systems,2014 and 2015 ieee projects @TMKS Infotech
Android,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Mobile Computing,2014 and 2015 ieee projects @ TMKS Infotech
2014 and 2015 Java,Android,Dotnet ieee projects list @TMKS Infotech
2014 and 2015 ieee projects list in Karnataka @ Bangalore
2015 java ieee projects list
2014 and 2015 ieee projects list @ TMKS Infotech
2014 and 2015 ieee projects list in Bangalore
Cse dot net java & android
Ieee 2014 completd dotnet java projects
Java project 2013
Ieee 2012 dot net projects list
2015 dot net ieee projects list
2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar
Ad

More from Bhavanislide2 (20)

PPSX
ppsx2.ppsx
POTX
format.potx
PPT
PPT
Mobile Do Not Delete.ppt
PPT
PPT
RTF
PDF
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
DOCX
CREC List.docx
DOCX
CREC List.docx
DOCX
Must read
PPTX
Approval
DOCX
DOCX
PDF
Fluentlenium Functional tests hang.pdf
PPTX
from app
DOCX
POTX
ODT
format.odt.odt
PPT
Sample.ppt
ppsx2.ppsx
format.potx
Mobile Do Not Delete.ppt
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
CREC List.docx
CREC List.docx
Must read
Approval
Fluentlenium Functional tests hang.pdf
from app
format.odt.odt
Sample.ppt

CREC List.docx

  • 1. 1. A Decentralized Service discovery approach on peer-to-network 2. A Fast Clustering Based Feature Subset Selection Algorithm For High Dimensional Data 3. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 4. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 5. A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 6. A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONS 7. A new approach for FEC decoding based on the BP alogaritham in LTE and WIMAX system 8. A Study and implementation on use search Histories 9. A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS 10. Adding Temporal constraints to Xml 11. Annotating Search Results from Web Databases 12. ANOMALY DETECTION VIA ONLINE OVER-SAMPLING PRINCIPAL COMPONENT ANALYSIS 13. A-secure protocol for spontaneous wireless Adhoc Networks Creation 14. Attribute Based Encryption for scalable and secure Sharing of medical records in cloud computing desing and implementation 15. Automatic discovery of association orders between name and aliasis 16. Back-Pressure-Based-Packet-by-Packet-Adaptive-Routing- in-Communication-Networks-docx 17. CLOUD COMPUTING SECURITY: FROM SINGLE TO MULTI-CLOUDS 18. CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING 19. CloudMoV: Cloud-based Mobile Social TV 20. Clustering With multi view point Based similarity measure 21. Clustering-Sentence-Level-Text-Using-a-Novel-Fuzzy-Relational-Clustering-Algorithm-docx-not there 22. Combining-Cryptographic-Primitives-to-Prevent-Jamming-Attacks- in-Wireless-Networks-not there 23. Cut Detection In Wireless Sensor Networks 24. Distributed-Processing-of-Probabilistic-Top-k-Queries- in-Wireless-Sensor-Networks-docx 25. DoubleGuard Detecting Intrusions in multitier web application 26. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 27. EAACK--A Secure Intrusion-Detection System for MANETs. 28. Efficient algorithm for high utility item sets for trasactional data bases-2012 29. Enabling-Dynamic-Data-and-Indirect-Mutual-Trust-for-Cloud-Computing-Storage-Systems 30. ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD 31. FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS 32. Fully Anonymous Profile Matching in Mobile Social Networks 33. IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES 34. Intrusion-detection technique by using K-means,fuzzy neural networks and SVM calssifiers 35. IP-Geo Location Mapping For Moderately Connected Internet Regions 36. MeasuRouting :A Framework for Routing Assisted Traffic Monitoring 37. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
  • 2. 38. On-the-Node-Clone-Detection-in-Wireless-Sensor-Networks-docx 39. Optimal Client Server Assignment For Internet Distributed Systems 40. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 41. Participatory Privacy: Enabling Privacy in participatory sensing 42. PMSE: A Personalized Mobile Search Engine 43. Preventing-Private-Information-Inference-Attacks-on-Social-Networks-docx 44. PRIVACY PRESERVING DATA SHARING WITH ANYONYMOUS ID ASSIGNMENT 45. PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE 46. Protecting sensitive labels in social network data anonmyzation-docx 47. SECURE MULTI-OWNER DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD 48. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 49. Self Adaptive Contention Aware Routing protocol for intermittently connected mobile Network 50. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems-56-Java-Network Security- 2013- 51. Spatial-Approximate-String-Search-docx 52. Toward-Privacy-Preserving-and-Collusion-Resistance-in-a-Location-Proof-Updating-System-docx- not there 53. Towards a Statistical Framework for Source Anonymity in Sensor Networks 54. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development-34-Data Mining-2013 Java List 55. Two tales of privacy in online social networks 56. Vampire attacks: Draining life from wireless ad-hoc sensor networks 57. Warning Bird-not there Enabling dynamic data and index mutual trust for cloud computing storage systems(JAVA) 65-Networking-2013-Java EAACK: A secure intrusion detection sytem for MANET(JAVA) 47-Network Security-2013-Java AMES CLOUD:A Framework of adaptive mobile video streaming and efficient social video sharing in the clouds(JAVA) 3-cloud computing-2013-Java
  • 3. Optimal client-server assignment for internet distributed Systems(JAVA) 68-networking-Java Optimal multi server configuration for profit maximization in cloud computing(.NET) 8-DotNet-Cloud Computing A highly scalable key predestration schema for wireless sensor networks(JAVA) 60-networking-2013 A secure protocol for spontaneous wireless adhoc networks creation (JAVA) 61-networking-2013 Securing class Initialize in java-like languages(JAVA) Privacy preserving public auditing for secure cloud storage(JAVA) 12-cloud computing-2013 MONA: Secure multiowner data sharing for dynamic groups in the cloud(.NET) 10-cloud computing-2013 Security analysis of a single sign on mechanism for distributed computer networks(JAVA)
  • 4. 55-Network Security IP-geolocation mapping for moderately connected internet regions(JAVA) 67-Networking-2013