Documente Academic
Documente Profesional
Documente Cultură
InfoTech, Bangalore
#1510,Sri Gowri Shankara Complex, 2nd Floor,MKK Road, Near Harishchandra Ghat,
Mariyappanapalya, Rajajinagar 2nd Stage, Bangalore - 560021.
Contact :: K.Manjunath -- 09535866270
Sl.
Project Title
Yea
No
Cloud Computing
1
2015
Computing
Cloud Armor Supporting Reputation-based Trust Management for
2015
Cloud Services
SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale
2015
Social Networks
Space-efficient Verifiable
Polynomial
2015
Interpolation
Service Operator-aware Trust Scheme for Resource Matchmaking
2015
2015
2015
2015
Cloud Computing
A Secure and Dynamic Multi-keyword Ranked Search Scheme over
2015
10
11
2015
2015
12
High Availability
Demystifying the Clouds: Harnessing Resource Utilization Models for
2015
Secret
Sharing
Using
13
2015
14
2015
15
Mobile Cloud
Combining Efficiency, Fidelity, and
Resource
2015
16
Information Services
Cost-Effective Authentic and Anonymous Data Sharing with Forward
2015
17
18
Security
Enabling Cloud Storage Auditing with Key Exposure Resistance
Energy-aware Load Balancing and Application Scaling for the Cloud
2015
2015
19
Ecosystem
Key-Aggregate Searchable Encryption (KASE) for Group Data
2015
20
2015
21
Resource-Constrained Devices
Privacy Preserving Public Auditing for Regenerating Code Based
2015
22
Cloud Storage
Panda: Public Auditing for Shared Data with Efficient User
2015
23
2015
24
Systems
Public Integrity Auditing for Shared Dynamic Cloud Data with Group
2015
25
User Revocation
Reactive Resource Provisioning Heuristics for Dynamic Data flows on
2015
26
Cloud Infrastructure
Shared Authority Based Privacy-preserving Authentication Protocol in
2015
27
Cloud Computing
Reducing Fragmentation for In-line De duplication Backup Storage
2015
Flexibility
in
28
29
30
2015
2015
2015
31
Modification
A Scalable and Reliable Matching Service for Content-Based
2015
32
Publish/Subscribe Systems
Cloud-Trust a Security Assessment Model for Infrastructure as a
2015
33
34
35
2015
2015
2015
36
37
38
Storage
A Hybrid Cloud Approach for Secure Authorized De duplication
Stealthy Denial of Service Strategy in Cloud Computing
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in
2015
2015
2015
39
the Cloud
An Authenticated Trust and Reputation Calculation and Management
2015
40
2015
41
2015
42
2015
43
Providers
Guest Editorial: Recommendation Techniques for Services Computing
2015
44
2015
45
Computing System
MobiContext: A Context-aware Cloud-Based Venue Recommendation
2015
46
Framework
Innovative Schemes for Resource Allocation in the Cloud for Media
2015
47
Streaming Applications
A Secure and Dynamic Multi-keyword Ranked Search Scheme over
2015
48
2015
49
2015
50
Cloud
On the Security of Data Access Control for Multi Authority cloud
2015
storage systems
51
52
2015
2015
Systems
CoCoWa: A Collaborative Contact-Based Watchdog for Detecting
2015
Selfish Nodes
My Privacy My Decision Control of Photo Sharing on Online Social
2015
Networks
Passive IP Trace back: Disclosing the Locations of IP Spoofers from
2015
Path Backscatter
Generating Searchable Public-Key Cipher texts with Hidden
2015
2015
8
9
Service Attacks
Secure Distributed De duplication Systems with Improved Reliability
Vote Trust: Leveraging Friend Invitation Graph to Defend against
2015
2015
10
11
2015
2015
12
13
of Operation
A Computational Dynamic Trust Model for User Authorization
Contributory Broadcast Encryption with Efficient Encryption and
2015
2015
14
2015
15
2015
16
17
Internet Services
Data Lineage in Malicious Environments
Secure Spatial Top-k Query Processing via Un trusted Location-
2015
2015
18
2015
19
2015
Recombined Fingerprints
More Titles Updating Soon!!!
Data Mining
1
2015
2
3
4
Techniques
Active Learning for Ranking through Expected Loss Optimization
Discovery of Ranking Fraud for Mobile Apps
k-Nearest Neighbor Classification over Semantically Secure
2015
2015
2015
2015
6
7
8
Solutions
PAGE: A Partition Aware Engine for Parallel Graph Computation
Query Aware Determinization of Uncertain Objects
RRW - A Robust and Reversible Watermarking Technique for
2015
2015
2015
9
10
11
Relational Data
Rule-Based Method for Entity Resolution
Secure Distributed De duplication Systems with Improved Reliability
Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-
2015
2015
2015
12
13
Web Interfaces
Best Keyword Cover Search
Co-Extracting Opinion Targets and Opinion Words from Online
2015
2015
14
15
16
2015
2015
2015
17
Streams
Privacy Policy Inference of User-Uploaded Images on Content
2015
18
Sharing Sites
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier
2015
19
Detection
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query
2015
20
21
2015
2015
22
23
24
25
2015
2015
2015
2015
26
Sites
Structured Learning from Heterogeneous Behavior for Social Identity
2015
27
28
Linkage
Sub graph Matching with Set Similarity in a Large Graph Database
Tweet Segmentation and Its Application to Named Entity Recognition
2015
2015
Mobile Computing
1
2015
2015
Applications
Dynamic Routing for Data Integrity and Delay Differentiated Services
2015
2015
2015
Services
Mobile Data Gathering with Load Balanced Clustering and Dual Data
2015
7
8
2015
2015
2015
2015
2015
Sensor Networks
Data Collection in Multi Application Sharing Wireless Sensor
2015
Networks
A Lightweight Secure Scheme for Detecting Provenance Forgery and
2015
2015
5
6
2015
2015
Network
Dynamic Routing for Data Integrity and Delay Differentiated Services
2015
2015
9
10
Sensor Networks
An Efficient Distributed Trust Model for Wireless Sensor Networks
Opportunistic Routing Algorithm for Relay Node Selection in
2015
2015
11
Watchdog
2015
12
2015
13
2015
Trust
System
Through
14
15
2015
2015
Android Projects
1
2015
Networks
Friend book A Semantic-based Friend Recommendation System for
2015
Social Networks
Innovative Schemes for Resource Allocation in the Cloud for Media
2015
4
5
Streaming Applications
A Location and Diversity aware News Feed System for Mobile Users
ALTERDROID: Differential Fault Analysis of Obfuscated
2015
2015
Smartphone Malware
Energy-Efficient Fault-Tolerant Data Storage and Processing in
2015
Mobile Cloud
Privacy-Preserving Relative Location Based Services for Mobile
2015
Users
Smartphone-Based Wound Assessment System for Patients with
2015
9
10
Diabetes
User Privacy and Data Trustworthiness in Mobile Crowd Sensing
User-Defined Privacy Grid System for Continuous Location-Based
2015
2015
11
Services
VULHUNTER: Toward Discovering Vulnerabilities in Android
2015
12
Applications
The Impact of API Change- and Fault-Proneness on the User Ratings
2015
13
of Android Apps
Time-and-Energy-Aware
2015
Computation
Offloading
in
Handheld
14
15
16
2015
2015
2015
2015
Social Networks
Defending Against Collaborative Attacks by Malicious Nodes in
2015
2015
4
5
2015
2015
2015
2015
2015
2015
Web Interfaces
Generating Searchable Public-Key Cipher texts with Hidden
2015
2015
4
5
2015
2015
6
7
8
2015
2015
2015
2015
10
Networks
Location-Aware and Personalized Collaborative Filtering for Web
2015
11
Service Recommendation
Revealing the Trace of High-Quality JPEG Compression Through
2015
2015
2015
2015
4
5
6
7
Image Retrieval
Steganography Using Reversible Texture Synthesis
Query Aware Determinization of Uncertain Objects
Detection and Rectification of Distorted Fingerprints
Learning Fingerprint Reconstruction: From Minutiae to Image
2015
2015
2015
2015
8
9
2015
2015
2015
2015
2015
2015
Systems
Cost-Effective Authentic and Anonymous Data Sharing with Forward
2015
Security
Cost-Minimizing Dynamic Migration of Content Distribution Services
2015
2015
Networks
Reducing Fragmentation for In-line De duplication Backup Storage
2015
2015
9
10
2015
2015
11
12
Cloud
Dominating Set and Network Coding-based Routing in Wireless Mesh
Networks
More Titles Updating Soon !!!
SERVICE COMPUTING
1
2015
Recommendation
A Fuzzy Preference Tree-Based Recommender System for Personalized Business-
2015
to-Business E-Services
Guest Editorial: Recommendation Techniques for Services Computing and Cloud
2015
Computing
Diversifying Web Service Recommendation Results via Exploring Service Usage
2015
5
6
History
A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web
2015
2015
Interfaces
Diversifying Web Service Recommendation Results via Exploring Service Usage
2015
History
More Titles Updating Soon !!!