SlideShare a Scribd company logo
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
M.TECH JAVA 2014-15 List
S.No
Project
Code
Project Title Domain Year
1 J1401
A Hybrid Cloud Approach for Secure
Authorized Deduplication
Cloud
Computing
2014
2 J1402
A Scalable Two-Phase Top-Down
Specialization Approach for
Data Anonymization Using MapReduce on
Cloud
Cloud
Computing 2014
3 J1403
A Stochastic Model to Investigate Data
Center Performance and QoS in IaaS Cloud
Computing Systems
Cloud
Computing
2014
4
J1404
Building Confidential and Efficient Query
Services in the Cloud with RASP Data
Perturbation
Cloud
Computing 2014
5
J1405
Decentralized Access Control with
Anonymous Authentication of Data
Stored in Clouds
Cloud
Computing 2014
6
J1406
Distributed, Concurrent, and Independent
Access to Encrypted Cloud Databases
Cloud
Computing 2014
7
J1407
Expressive, Efficient, and Revocable Data
Access Control for Multi-Authority Cloud
Storage
Cloud
Computing 2014
8
J1408
Key-Aggregate Cryptosystem for Scalable
Data Sharing in Cloud Storage
Cloud
Computing
2014
9 J1409 Oruta: Privacy-Preserving Public Auditing
for Shared Data in the Cloud
Cloud
Computing
2014
10 J1410 PACK: Prediction-Based Cloud Bandwidth
and Cost Reduction System
Cloud
Computing
2014
11
J1411
Privacy-Preserving Multi-Keyword Ranked
Search over Encrypted Cloud Data
Cloud
Computing
2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
12 J1412 Scalable Distributed Service Integrity
Attestation for Software-as-Service Clouds
Cloud
Computing
2014
13
J1413
Towards Differential Query Services in
Cost-Efficient Clouds
Cloud
Computing
2014
14 J1414
On the Knowledge Soundness of a
Cooperative Provable Data Possession
Scheme in Multicloud Storage - Parallel
Distributed Systems
Cloud
Computing
2014
15 J1415
Privacy Preserving Back-Propagation
Neural Network Learning Made Practical
with Cloud Computing
Cloud
Computing
2014
16 J1416 CLOUDQUAL A Quality Model for Cloud
Services
Cloud
Computing
2014
17 J1417
Enabling Smart Cloud Services Through
Remote Sensing An Internet of Everything
Enabler
Cloud
Computing
2014
18 J1418 Quality of Service Provision in Cloud-based
Storage System for Multimedia Delivery
Cloud
Computing
2014
19
J1419
A Cocktail Approach for Travel Package
Recommendation
DATA MINING 2014
20 J1420
Accuracy-Constrained Privacy-Preserving
Access Control Mechanism for Relational
Data
DATA MINING 2014
21 J1421
BestPeer++: A Peer-to-Peer Based Large-
Scale Data Processing Platform
DATA MINING 2014
22 J1422 Data Mining with Big Data DATA MINING 2014
23
J1423
Dealing With Concept Drifts in Process
Mining
DATA
MINING 2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
24 J1424
Discovering Emerging Topics in Social
Streams via Link-Anomaly
DATA
MINING
2014
25
J1425
Efficient Prediction of Difficult Keyword
Queries over Databases
DATA
MINING
2014
26
J1426
Facilitating Document Annotation Using
Content and Querying Value
DATA
MINING
2014
27 J1427
Fast Nearest Neighbor Search with
Keywords
DATA
MINING
2014
28 J1428 Keyword Query Routing
DATA
MINING 2014
29 J1429 Privacy-Preserving and Content-Protecting
Location Based Queries
DATA
MINING 2014
30 J1430 Security Evaluation of Pattern Classifiers
under Attack
DATA
MINING 2014
31 J1431 Supporting Privacy Protection in
Personalized Web Search
DATA
MINING 2014
32 J1432 Towards Online Shortest Path Computation
DATA
MINING 2014
33 J1433
Approximate Shortest Distance Computing:
A Query-Dependent Local Landmark
Scheme
DATA
MINING 2014
34 J1434 LARS: An Efficient and Scalable Location-
Aware Recommender System
DATA
MINING 2014
35 J1435 Dynamic Query Forms for Database
Queries
DATA
MINING 2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
36 J1436 Privacy Preserving Delegated Access
Control in Public Clouds
DATA
MINING 2014
37 J1437 m-Privacy for Collaborative Data
Publishing
DATA
MINING 2014
38 J1438 Scalable Keyword Search on Large RDF
Data
DATA
MINING 2014
39 J1439 Decision Trees for Mining Data Streams
Based on the Gaussian Approximation
DATA
MINING 2014
40 J1440
Captcha as Graphical Passwords—A New
Security Primitive Based on Hard AI
Problems
SECURE
COMPUTING 2014
41 J1441 Efficient and Privacy-Aware Data
Aggregation in Mobile Sensing
SECURE
COMPUTING 2014
42 J1442 PROFILR: Toward Preserving Privacy and
Functionality in Geosocial Networks
SECURE
COMPUTING 2014
43 J1443 Top-k Query Result Completeness
Verification in Tiered Sensor Networks
SECURE
COMPUTING
2014
44 J1444 Bandwidth Distributed Denial of Service:
Attacks and Defenses
SECURE
COMPUTING
2014
45 J1445 Automatic Test Packet Generation NETWORKING 2014
46 J1446 Cost-Effective Resource Allocation of
Overlay Routing Relay Nodes
NETWORKING 2014
47 J1447 Boundary Cutting for Packet Classification NETWORKING 2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
48 J1448 Secure Data Retrieval for Decentralized
Disruption-Tolerant Military Networks
NETWORKING 2014
49 J1449 Hiding in the Mobile Crowd: Location
Privacy through Collaboration
NETWORKING 2014
50 J1450
A General Self-Organized Tree-Based
Energy-Balance Routing Protocol for
Wireless Sensor Network
NETWORKING 2014
51 J1451 Behavioral Malware Detection in Delay
Tolerant Networks
NETWORKING 2014
52 J1452
Secure Data Aggregation in Wireless
Sensor Networks Filtering out the
Attacker’s Impact
NETWORKING 2014
53 J1453
Joint Routing and Medium Access Control
in Fixed Random Access Wireless Multihop
Networks
NETWORKING
2014
54 J1454
Joint Routing and Resource Allocation for
Delay Minimization in Cognitive Radio
Based Mesh Networks
NETWORKING 2014
55 J1455 Joint Topology-Transparent Scheduling and
QoS Routing in Ad Hoc Networks
NETWORKING 2014
56 J1456
Tradeoff Between Reliability and Security
in Multiple Access Relay Networks Under
Falsified Data Injection Attack
NETWORKING 2014
57 J1457 Enabling Trustworthy Service Evaluation in
Service-Oriented Mobile Social Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
58 J1458
Exploiting Service Similarity for
Privacy in Location-Based Search
Queries
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
59 J1459
LocaWard: A Security and Privacy
Aware Location-Based Rewarding
System
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
60 J1460
On False Data-Injection Attacks against
Power System State Estimation:
Modeling and Countermeasures
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
61 J1461
RRE: A Game-Theoretic Intrusion
Response and Recovery Engine
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
62 J1462
Securing Broker-Less
Publish/Subscribe Systems Using
Identity- Based Encryption
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
63 J1463
SOS: A Distributed Mobile Q&A System
Based on Social Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
64 J1464
The Client Assignment Problem for
Continuous Distributed Interactive
Applications: Analysis, Algorithms, and
Evaluation
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
65 J1465
The Design and Evaluation of An
Information Sharing System for
Human Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
66 J1466
Traffic Pattern-Based Content Leakage
Detection for Trusted Content Delivery
Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
67 J1467
Secure Outsourced Attribute-based
Signatures
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
68 J1468
A System for Denial-of-Service Attack
Detection Based on Multivariate
Correlation Analysis
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
69 J1469
Multi-Core Embedded Wireless Sensor
Networks Architecture and Applications
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
70 J1470
Cross-Layer Approach for Minimizing
Routing Disruption in IP Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
71 J1471
Multicast Capacity in MANET with
Infrastructure Support
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
72 J1472
Efficient Data Collection for Large-
Scale Mobile Monitoring Applications
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
73 J1473
Hop-by-Hop Message
Authenticationand Source Privacy in
WirelessSensor Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
74 J1474
Optimized multicast routing algorithm
based on tree structure in MANETs
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
75 J1475 An Incentive Framework for Cellular
Traffic Offloading
MOBILE
COMPUTING
2014
76 J1476 Cooperative Caching for Efficient Data
Access in Disruption Tolerant Networks
MOBILE
COMPUTING
2014
77 J1477 Efficient Authentication for Mobile and
Pervasive Computing
MOBILE
COMPUTING
2014
78 J1478
Friendbook: A Semantic-based Friend
Recommendation System for Social
Networks
MOBILE
COMPUTING
2014
79 J1479
Optimal Distributed Malware Defense in
Mobile Networks with Heterogeneous
Devices
MOBILE
COMPUTING
2014
80 J1480
Energy-Efficient Reliable Routing
Considering Residual Energy in Wireless
Ad Hoc Networks
MOBILE
COMPUTING
2014
81 J1481
Energy-optimum Throughput and Carrier
Sensing Rate in CSMA-based Wireless
Networks
MOBILE
COMPUTING
2014
82 J1482
Privacy-Preserving and Truthful Detection
of Packet Dropping Attacks in Wireless Ad
Hoc Networks
MOBILE
COMPUTING
2014
83 J1483 Fairness Analysis of Routing in
Opportunistic Mobile Networks
MOBILE
COMPUTING
2014
84 J1484 Video Dissemination over Hybrid Cellular
and Ad Hoc Networks
MOBILE
COMPUTING
2014
85 J1485 Privacy-Enhanced Web Service
Composition
SERVICE
COMPUTING
(Web Service)
2014
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
86 J1486 Web Service Recommendation via
Exploiting Location and QoS Information
SERVICE
COMPUTING
(Web Service)
2014
87 J1487
Designing an Efficient Image Encryption-
Then-Compression System via Prediction
Error Clustering and Random Permutation
- Information Forensics and Security
IMAGE
PROCESSING
2014
88 J1488 Fingerprint Compression Based on Sparse
Representation
IMAGE
PROCESSING
2014
89 J1489
Hierarchical Prediction and Context
Adaptive Coding for Lossless Color Image
Compression
IMAGE
PROCESSING
2014
90 J1490 Congestion Aware Routing in Nonlinear
Elastic Optical Networks
NETWORKING
Security
2014
91 J1491 Security Analysis of Handover Key
Management in 4G LTESAE Networks
NETWORKING
2014
92 J1492 Distributed Mobile Sink Routing for
Wireless Sensor Networks A Survey
NETWORKING
2014

More Related Content

PDF
M.tech .net 2014 15 list
PDF
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
DOCX
2015 and 2016 ieee projects list
PDF
Final Year Project Titles 2013 2014
PDF
ieee 2016 Java project list
DOCX
IEEE 2014 .Net & Java Projects List
DOC
Java ieee projects titles 2014 2015
DOCX
2014 and 2015 IEEE Projects
M.tech .net 2014 15 list
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
2015 and 2016 ieee projects list
Final Year Project Titles 2013 2014
ieee 2016 Java project list
IEEE 2014 .Net & Java Projects List
Java ieee projects titles 2014 2015
2014 and 2015 IEEE Projects

Viewers also liked (15)

PPTX
Jora ppt
DOCX
PDF
M.tech embedded 2013 14 list
PDF
M.tech embedded list 2014 15
PDF
M.tech vlsi list 2014 15
PDF
Arm 7 m.tech list
PPTX
PDF
M.tech java list 2013
PPSX
Mersin’in nüfus özellikleri sunu
PDF
M.tech eee list 2014 15
PPSX
İdrarda Mikroskobik Analiz
PDF
Kti skripsi no.59 gambaran pengetahuan petugas kesehatan tentang mutu pelayan...
PPTX
Logistics Consulting Firm LLC
PPT
Ppt menajmen logistik
Jora ppt
M.tech embedded 2013 14 list
M.tech embedded list 2014 15
M.tech vlsi list 2014 15
Arm 7 m.tech list
M.tech java list 2013
Mersin’in nüfus özellikleri sunu
M.tech eee list 2014 15
İdrarda Mikroskobik Analiz
Kti skripsi no.59 gambaran pengetahuan petugas kesehatan tentang mutu pelayan...
Logistics Consulting Firm LLC
Ppt menajmen logistik
Ad

Similar to M.tech java 2014 15 list (20)

PDF
M.tech dsp list 2014 15
PDF
2013 2014 ieee java project titles
PDF
final year ieee projects in pondicherry
PDF
2013 ieee java project titles for cse, it and mca
PDF
ieee projects 2013 for m.tech.
PDF
ieee 2013 best project titles with latest techniques
PDF
Java 2015 project list
PDF
Java 2015
PDF
msc projects in chennai
PDF
2013 IEEE PROJECT TITLES FOR CSE
DOC
VTU Computer Science Engineering & Information Science Engineering Project Ti...
DOCX
JAVA & .NET IEEE B.E/B.Tech PROJECT TITLES 2014-15
DOCX
Java ieee 2020 21 projects list
DOCX
Java ieee 2020 21 projects list
PDF
ieee projects for cse 2013
DOCX
Android,2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
Mobile Computing,2014 and 2015 ieee projects @ TMKS Infotech
DOCX
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
DOCX
2014 and 2015 ieee projects list @ TMKS Infotech
M.tech dsp list 2014 15
2013 2014 ieee java project titles
final year ieee projects in pondicherry
2013 ieee java project titles for cse, it and mca
ieee projects 2013 for m.tech.
ieee 2013 best project titles with latest techniques
Java 2015 project list
Java 2015
msc projects in chennai
2013 IEEE PROJECT TITLES FOR CSE
VTU Computer Science Engineering & Information Science Engineering Project Ti...
JAVA & .NET IEEE B.E/B.Tech PROJECT TITLES 2014-15
Java ieee 2020 21 projects list
Java ieee 2020 21 projects list
ieee projects for cse 2013
Android,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Mobile Computing,2014 and 2015 ieee projects @ TMKS Infotech
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
2014 and 2015 ieee projects list @ TMKS Infotech
Ad

More from SAK Informatics (7)

PDF
Vlsi b.tech 2014 15
PDF
Dsp b.tech 2014 15
PDF
M.tech dsp list 2014 15
PDF
Dsp mini list 2014
PDF
Embedded mini list 2014
PDF
M.Tech NS2 List
PDF
M.Tech VLSI List of new titles for the year 2014
Vlsi b.tech 2014 15
Dsp b.tech 2014 15
M.tech dsp list 2014 15
Dsp mini list 2014
Embedded mini list 2014
M.Tech NS2 List
M.Tech VLSI List of new titles for the year 2014

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Approach and Philosophy of On baking technology
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
KodekX | Application Modernization Development
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
Approach and Philosophy of On baking technology
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
MIND Revenue Release Quarter 2 2025 Press Release
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Diabetes mellitus diagnosis method based random forest with bat algorithm
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KodekX | Application Modernization Development
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing

M.tech java 2014 15 list

  • 1. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com M.TECH JAVA 2014-15 List S.No Project Code Project Title Domain Year 1 J1401 A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing 2014 2 J1402 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud Cloud Computing 2014 3 J1403 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Cloud Computing 2014 4 J1404 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Cloud Computing 2014 5 J1405 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Cloud Computing 2014 6 J1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Cloud Computing 2014 7 J1407 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Cloud Computing 2014 8 J1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Cloud Computing 2014 9 J1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing 2014 10 J1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Cloud Computing 2014 11 J1411 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Cloud Computing 2014
  • 2. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 12 J1412 Scalable Distributed Service Integrity Attestation for Software-as-Service Clouds Cloud Computing 2014 13 J1413 Towards Differential Query Services in Cost-Efficient Clouds Cloud Computing 2014 14 J1414 On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage - Parallel Distributed Systems Cloud Computing 2014 15 J1415 Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing Cloud Computing 2014 16 J1416 CLOUDQUAL A Quality Model for Cloud Services Cloud Computing 2014 17 J1417 Enabling Smart Cloud Services Through Remote Sensing An Internet of Everything Enabler Cloud Computing 2014 18 J1418 Quality of Service Provision in Cloud-based Storage System for Multimedia Delivery Cloud Computing 2014 19 J1419 A Cocktail Approach for Travel Package Recommendation DATA MINING 2014 20 J1420 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data DATA MINING 2014 21 J1421 BestPeer++: A Peer-to-Peer Based Large- Scale Data Processing Platform DATA MINING 2014 22 J1422 Data Mining with Big Data DATA MINING 2014 23 J1423 Dealing With Concept Drifts in Process Mining DATA MINING 2014
  • 3. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 24 J1424 Discovering Emerging Topics in Social Streams via Link-Anomaly DATA MINING 2014 25 J1425 Efficient Prediction of Difficult Keyword Queries over Databases DATA MINING 2014 26 J1426 Facilitating Document Annotation Using Content and Querying Value DATA MINING 2014 27 J1427 Fast Nearest Neighbor Search with Keywords DATA MINING 2014 28 J1428 Keyword Query Routing DATA MINING 2014 29 J1429 Privacy-Preserving and Content-Protecting Location Based Queries DATA MINING 2014 30 J1430 Security Evaluation of Pattern Classifiers under Attack DATA MINING 2014 31 J1431 Supporting Privacy Protection in Personalized Web Search DATA MINING 2014 32 J1432 Towards Online Shortest Path Computation DATA MINING 2014 33 J1433 Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme DATA MINING 2014 34 J1434 LARS: An Efficient and Scalable Location- Aware Recommender System DATA MINING 2014 35 J1435 Dynamic Query Forms for Database Queries DATA MINING 2014
  • 4. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 36 J1436 Privacy Preserving Delegated Access Control in Public Clouds DATA MINING 2014 37 J1437 m-Privacy for Collaborative Data Publishing DATA MINING 2014 38 J1438 Scalable Keyword Search on Large RDF Data DATA MINING 2014 39 J1439 Decision Trees for Mining Data Streams Based on the Gaussian Approximation DATA MINING 2014 40 J1440 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems SECURE COMPUTING 2014 41 J1441 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing SECURE COMPUTING 2014 42 J1442 PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks SECURE COMPUTING 2014 43 J1443 Top-k Query Result Completeness Verification in Tiered Sensor Networks SECURE COMPUTING 2014 44 J1444 Bandwidth Distributed Denial of Service: Attacks and Defenses SECURE COMPUTING 2014 45 J1445 Automatic Test Packet Generation NETWORKING 2014 46 J1446 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes NETWORKING 2014 47 J1447 Boundary Cutting for Packet Classification NETWORKING 2014
  • 5. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 48 J1448 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks NETWORKING 2014 49 J1449 Hiding in the Mobile Crowd: Location Privacy through Collaboration NETWORKING 2014 50 J1450 A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network NETWORKING 2014 51 J1451 Behavioral Malware Detection in Delay Tolerant Networks NETWORKING 2014 52 J1452 Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attacker’s Impact NETWORKING 2014 53 J1453 Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks NETWORKING 2014 54 J1454 Joint Routing and Resource Allocation for Delay Minimization in Cognitive Radio Based Mesh Networks NETWORKING 2014 55 J1455 Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks NETWORKING 2014 56 J1456 Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack NETWORKING 2014 57 J1457 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 58 J1458 Exploiting Service Similarity for Privacy in Location-Based Search Queries PARALLEL & DISTRIBUTED SYSTEMS 2014 59 J1459 LocaWard: A Security and Privacy Aware Location-Based Rewarding System PARALLEL & DISTRIBUTED SYSTEMS 2014
  • 6. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 60 J1460 On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures PARALLEL & DISTRIBUTED SYSTEMS 2014 61 J1461 RRE: A Game-Theoretic Intrusion Response and Recovery Engine PARALLEL & DISTRIBUTED SYSTEMS 2014 62 J1462 Securing Broker-Less Publish/Subscribe Systems Using Identity- Based Encryption PARALLEL & DISTRIBUTED SYSTEMS 2014 63 J1463 SOS: A Distributed Mobile Q&A System Based on Social Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 64 J1464 The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation PARALLEL & DISTRIBUTED SYSTEMS 2014 65 J1465 The Design and Evaluation of An Information Sharing System for Human Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 66 J1466 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 67 J1467 Secure Outsourced Attribute-based Signatures PARALLEL & DISTRIBUTED SYSTEMS 2014 68 J1468 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis PARALLEL & DISTRIBUTED SYSTEMS 2014 69 J1469 Multi-Core Embedded Wireless Sensor Networks Architecture and Applications PARALLEL & DISTRIBUTED SYSTEMS 2014 70 J1470 Cross-Layer Approach for Minimizing Routing Disruption in IP Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 71 J1471 Multicast Capacity in MANET with Infrastructure Support PARALLEL & DISTRIBUTED SYSTEMS 2014
  • 7. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 72 J1472 Efficient Data Collection for Large- Scale Mobile Monitoring Applications PARALLEL & DISTRIBUTED SYSTEMS 2014 73 J1473 Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks PARALLEL & DISTRIBUTED SYSTEMS 2014 74 J1474 Optimized multicast routing algorithm based on tree structure in MANETs PARALLEL & DISTRIBUTED SYSTEMS 2014 75 J1475 An Incentive Framework for Cellular Traffic Offloading MOBILE COMPUTING 2014 76 J1476 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks MOBILE COMPUTING 2014 77 J1477 Efficient Authentication for Mobile and Pervasive Computing MOBILE COMPUTING 2014 78 J1478 Friendbook: A Semantic-based Friend Recommendation System for Social Networks MOBILE COMPUTING 2014 79 J1479 Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices MOBILE COMPUTING 2014 80 J1480 Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks MOBILE COMPUTING 2014 81 J1481 Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless Networks MOBILE COMPUTING 2014 82 J1482 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks MOBILE COMPUTING 2014 83 J1483 Fairness Analysis of Routing in Opportunistic Mobile Networks MOBILE COMPUTING 2014 84 J1484 Video Dissemination over Hybrid Cellular and Ad Hoc Networks MOBILE COMPUTING 2014 85 J1485 Privacy-Enhanced Web Service Composition SERVICE COMPUTING (Web Service) 2014
  • 8. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 86 J1486 Web Service Recommendation via Exploiting Location and QoS Information SERVICE COMPUTING (Web Service) 2014 87 J1487 Designing an Efficient Image Encryption- Then-Compression System via Prediction Error Clustering and Random Permutation - Information Forensics and Security IMAGE PROCESSING 2014 88 J1488 Fingerprint Compression Based on Sparse Representation IMAGE PROCESSING 2014 89 J1489 Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image Compression IMAGE PROCESSING 2014 90 J1490 Congestion Aware Routing in Nonlinear Elastic Optical Networks NETWORKING Security 2014 91 J1491 Security Analysis of Handover Key Management in 4G LTESAE Networks NETWORKING 2014 92 J1492 Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey NETWORKING 2014