2012 JAVA /.
NET PROJECTS
SNO TITLE DOMAIN
1. Cashing in on the Cache in the Cloud CC
2. Enabling Secure and Efficient Ranked Keyword Search over CC
Outsourced Cloud Data
3. Cooperative Provable Data Possession for Integrity Verification in CC
Multi-Cloud Storage
4. pCloud: A Distributed System for Practical PIR CC
5. Adding Temporal Constraints to XML Schema DM
6. Clustering with Multi viewpoint-Based Similarity Measure DM
7. Combining Tag and Value Similarity for Data Extraction and DM
Alignment
8. Coupled Behavior Analysis with Applications DM
9. Data Mining for XML Query-Answering Support DM
10. Document Clustering in Correlation Similarity Measure Space DM
11. Efficient and Effective Duplicate Detection in Hierarchical Data DM
12. Efficient Extended Boolean Retrieval DM
13. Efficient Fuzzy Type-Ahead Search in XML Data DM
14. Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword DM
Searching
15. Organizing User Search Histories DM
16. Publishing Search Logs—A Comparative Study of Privacy Guarantees DM
17. Slicing: A New Approach for Privacy Preserving Data Publishing DM
18. A Blur-Robust Descriptor with Applications to Face Recognition IP
19. Automatic Image Equalization and Contrast Enhancement Using IP
Gaussian Mixture Modeling
20. Handwritten Chinese Text Recognition by Integrating Multiple IP
Contexts
21. Moderated Group Authoring System for Campus-Wide Workgroups MC
22. Optimization-Based Distributed Algorithms for Mobile Data MC
Gathering in Wireless Sensor Networks
23. A Hybrid Approach to Private Record Matching NS
24. A Trapdoor Hash-Based Mechanism for Stream Authentication NS
25. DoubleGuard: Detecting Intrusions in Multitier Web Applications NS
26. Ensuring Distributed Accountability for Data Sharing in the Cloud NS
27. On Privacy of Encrypted Speech Communications NS
28. Persuasive Cued Click-Points: Design, Implementation, and Evaluation NS
of a Knowledge-Based Authentication Mechanism
29. Privacy-Preserving Enforcement of Spatially Aware RBAC NS
30. Revisiting Defenses against Large-Scale Online Password Guessing NS
Attacks
31. Scalable and Secure Sharing of Personal Health Records in Cloud NS
Computing using Attribute-based Encryption
32. Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key NS
Management Scheme for Secure Broadcasting
33. A Network Coding Equivalent Content Distribution Scheme for NW
Efficient Peer-to-Peer Interactive VoD Streaming
34. BGP Churn Evolution: A Perspective From the Core NW
35. Design, Implementation, and Performance of a Load Balancer for SIP NW
Server Clusters
36. Distributed Packet Buffers for High-Bandwidth Switches and Routers NW
37. Efficient Error Estimating Coding: Feasibility and Applications NW
38. Footprint: Detecting Sybil Attacks in Urban Vehicular Networks NW
39. Insights on Media Streaming Progress Using BitTorrent-Like Protocols NW
for On-Demand Streaming
40. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring NW
41. On Optimizing Overlay Topologies for Search in Unstructured Peer-to- NW
Peer Networks
42. Self Adaptive Contention Aware Routing Protocol for Intermittently NW
Connected Mobile Networks