Call Us On : 044 4203 2818 / 9751800789
KNOWLEDGE AND DATA ENGINEERING(DATA MINING)
  • A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
  • Cloud MoV: Cloud-based Mobile Social TV
  • Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
  • M-Privacy for Collaborative Data Publishing
  • Crowd sourcing Predictors of Behavioral Outcomes
  • Spatial Approximate String Search
  • Facilitating Document Annotation Using Content And Querying Value
  • Incentive Compatible Privacy-Preserving Data Analysis
  • Focus Learning to Crawl Web Forums
  • Robust module based data management
  • A Probabilistic Approach to String Transformation
  • Comparable Entity Mining from Comparative Questions
  • Facilitating Effective User Navigation through Website Structure Improvement
  • PMSE A Personalized Mobile Search Engine
  • Fast nearest Neighbor Search with Keywords
  • Secure Mining of Association Rules in Horizontally Distributed Databases
  • A System to Filter Unwanted Messages from OSN User Walls
  • Anomaly Detection via Online Oversampling Principal Component Analysis
  • Spatial Approximate String SearchA Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
  • A Data-Mining Model for Protection of FACTS-Based Transmission Line
  • Sensitive Label Privacy Protection on Social Network Data.
  • Preventing Private Information Inference Attacks on Social Networks
  • Privacy against Aggregate Knowledge Attacks
  • Ranking on Data Manifold with Sink Points
  • Secure Logging as a Service—Delegating Log Management to the Cloud
  • Sybil Defender Defend Against Sybil Attacks in Large Social Networks
  • A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
  • Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
  • Improving Security and Efficiency in Attribute-Based Data Sharing
  • Dynamic Personalized Recommendation on Sparse Data
  • Efficient Algorithms for Mining High Utility Item sets from Transactional Databases
  • User Action Interpretation for Online Content Optimization
  • Annotating Search Results from Web Databases
  • A Survey of XML Tree Patterns
  • Dynamic Query Forms for Database Queries.
  • A Learning Approach to SQL Query Results Ranking Using Skyline and Users’ Current Navigational Behavior
  • Co-Occurrence-Based Diffusion for Expert Search on the Web
  • Spatial Query Integrity with Voronoi Neighbors
  • Anomaly Detection Approach Using Hidden Markov Model
  • Efficient Evaluation of SUM Queries over Probabilistic Data
  • Vickrey-Clarke-Groves for privacy-preserving collaborative classification
  • Efficient Evaluation of SUM Queries over Probabilistic Data
  • Location Based Intelligent Mobile Organizer. (Using Android-2011)

CLOUD COMPUTING
  • Storing Shared Data on the Cloud via Security-Mediator.
  • CloudFTP A Case Study of Migrating Traditional Applications to the Cloud.
  • Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
  • MFramework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
  • A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
  • A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
  • Outsourcing Privacy-Preserving Social Networks to a Cloud
  • Privacy-Preserving Public Auditing for Secure Cloud Storage
  • Winds of Change from Vendor Lock-In to the Meta Cloud
  • Cloud computing for mobile users can offloading computation save energy
  • AMES-Cloud:A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
  • Mining Contracts for Business Events and Temporal Constraints in Service Engagements
  • Collaboration in Multi cloud Computing Environments: Framework and Security Issues
  • Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud

IMAGE PROCESSING - MULTIMEDIA
  • Understanding the External Links of Video Sharing Sites Measurement and Analysis
  • Circular Reranking for Visual Search.
  • Super-Resolution-based In painting
  • Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
  • Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words
  • Bootstrapping Visual Categorization with Relevant Negatives
  • An extended visual cryptography scheme without pixel expansion for halftone images
  • Image Authentication Using Stochastic Diffusion

SECURE COMPUTING
  • CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
  • Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs
  • Two tales of privacy in online social networks
  • Extracting Spread-Spectrum Hidden Data from Digital Media
  • Utility-Privacy Tradeoff in Databases an Information-theoretic Approach.
  • TrPF A Trajectory Privacy-Preserving Framework for Participatory Sensing
  • Craigslist Scams and Community Composition Investigating Online Fraud Victimization
  • Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
  • SORT A Self-Organizing Trust Model for Peer-to-Peer Systems
  • Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
  • NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
  • Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data.
  • Efficiently Outsourcing Multiparty Computation under Multiple Keys
  • Security Using Colors and Armstrong Numbers
  • Document Clustering for Forensic Analysis an Approach for Improving Computer Inspection

PARALLEL AND DISTRIBUTED SYSTEMS
  • Hint-based Execution of Workloads in Clouds with Nefeli
  • Load Rebalancing for Distributed File Systems in Clouds
  • Qos Ranking Prediction for Cloud Services
  • IP-Geolocation Mapping for Moderately Connected Internet Regions
  • Identity-Based Secure Distributed Data Storage Schemes.
  • Efficient Two-Server Password-Only Authenticated Key Exchange
  • Social Tube P2P-assisted Video Sharing in Online Social Networks
  • Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
  • Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
  • Priority-Based Consolidation of Parallel Workloads in the Cloud
  • Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
  • Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
  • A Privacy Leakage Upper-bound Constraint based Approach for Costeffective Privacy Preserving of Intermediate Datasets in Cloud
  • Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
  • Towards Differential Query Services in Cost-Efficient Clouds

MOBILE COMPUTING – WIRELESSCOMMUNICATIONS
  • Mobile Relay Configuration in Data-intensive Wireless Sensor Networks 
  • Vampire attacks: Draining life from wireless ad-hoc sensor networks
  • Towards a Statistical Framework for Source Anonymity in Sensor Networks
  • A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
  • Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks.
  • Distributed Cooperative Caching in Social Wireless Networks
  • Community-Aware Opportunistic Routing in Mobile Social Networks
  • Search Me If You Can Privacy-preserving Location Query Service
  • Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networkss
  • Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users

NETWORKING
  • Cross-Domain Privacy-Preserving Protocol for Cooperative Firewall Optimization.
  • Price Differentiation for Communication Networks.
  • Fault Node Recovery Algorithm for a Wireless Sensor Network.
  • On the Role of Mobility for Multi-message Gossip
  • Topological Conditions for In-Network Stabilization of Dynamical Systems
  • Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
  • Participatory Privacy Enabling Privacy in Participatory Sensing
  • Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
  • Access Policy Consolidation for Event Processing Systems
  • Fully Anonymous Profile Matching in Mobile Social Networks
  • A Fast Re-Route Method
  • Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
  • Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud Computing
  • Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks

SOFTWARE ENGINEERING
  • A Decentralized Self-Adaptation Mechanism for Service-Based Applications in the cloud

  • ENQUIRY

    Name
    Email-Id
    Mobile No
    City