S.No |
Code |
Title |
Category |
---|---|---|---|
1 |
LSJ1301 |
Privacy Preserving Public Auditing for Secure Cloud Storage |
CLOUD COMPUTING |
2 |
LSJ1302 |
Winds of Change from Vendor Lock-In to the Meta Cloud |
CLOUD COMPUTING |
3 |
LSJ1303 |
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds |
CLOUD COMPUTING |
4 |
LSJ1304 |
A Fast Clustering-Based Feature Subset Selection algorithm for High Dimensional Data |
DATA MINING |
5 |
LSJ1305 |
A System to Filter Unwanted Messages from OSN User Walls |
DATA MINING |
6 |
LSJ1306 |
CloudMoV: Cloud-based Mobile Social TV |
CLOUD COMPUTING |
7 |
LSJ1307 |
Comparable Entity Mining from Comparative Questions |
DATA MINING |
8 |
LSJ1308 |
Crowd sourcing Predictors of Behavioral Outcomes |
DATA MINING |
9 |
LSJ1309 |
Facilitating Effective User Navigation through Website Structure Improvement |
DATA MINING |
10 |
LSJ1310 |
Focus Learning to Crawl Web Forums |
DATA MINING |
11 |
LSJ1311 |
Incentive Compatible Privacy-Preserving Data Analysis |
DATA MINING |
12 |
LSJ1312 |
PMSE: A Personalized Mobile Search Engine |
DATA MINING |
13 |
LSJ1313 |
Sensitive Label Privacy Protection on Social Network Data |
DATA MINING |
14 |
LSJ1314 |
Robust Module Based Data Management |
DATA MINING |
15 |
LSJ1315 |
Spatial Approximate String Search |
DATA MINING |
16 |
LSJ1316 |
Mobile Relay Configuration in Data-intensive Wireless Sensor Networks. |
MOBILE COMPUTING |
17 |
LSJ1317 |
Vampire attacks: Draining life from wireless ad-hoc sensor networks. |
MOBILE COMPUTING |
18 |
LSJ1318 |
Towards a Statistical Framework for Source Anonymity in Sensor Networks |
MOBILE COMPUTING |
19 |
LSJ1319 |
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications |
MOBILE COMPUTING |
20 |
LSJ1320 |
Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks |
MOBILE COMPUTING |
21 |
LSJ1321 |
Distributed Cooperative Caching in Social Wireless Networks |
MOBILE COMPUTING |
22 |
LSJ1322 |
Optimizing Cloud Resources for Delivering IPTV Services through Virtualization |
NETWORKING |
23 |
LSJ1323 |
Access Policy Consolidation for Event Processing Systems |
NETWORKING |
24 |
LSJ1324 |
Mining Contracts for Business Events and Temporal Constraint in Service Engagements |
NETWORKING |
25 |
LSJ1325 |
Fully Anonymous Profile Matching in Mobile Social Networks |
NETWORKING |
26 |
LSJ1326 |
Price Differentiation for Communication Networks |
NETWORKING |
27 |
LSJ1327 |
Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment |
PARALLEL AND DISTRIBUTED SYSTEMS |
28 |
LSJ1328 |
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. |
SECURE COMPUTING |
29 |
LSJ1329 |
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption |
PARALLEL AND DISTRIBUTED SYSTEMS |
30 |
LSJ1330 |
Extracting Spread-Spectrum Hidden Data from Digital Media |
SECURE COMPUTING |
31 |
LSJ1331 |
Two tales of privacy in online social networks |
SECURE COMPUTING |
32 |
LSJ1332 |
Utility-Privacy Tradeoff in Databases An Information-theoretic Approach |
SECURE COMPUTING |
33 |
LSJ1333 |
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Development |
CLOUD COMPUTING |
34 |
LSJ1334 |
Privacy Preserving Delegated Access Control in Public Cloud |
SECURE COMPUTING |
35 |
LSJ1335 |
Super Resolution Based In painting |
IMAGE PROCESSING |
36 |
LSJ1336 |
Collaboration in Multi Cloud Computing Environments Framework & Security Issues |
CLOUD COMPUTING |
37 |
LSJ1337 |
Social Tube P2P-assisted Video Sharing in Online Social Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
38 |
LSJ1338 |
Towards Differential Query Services in Cost-Efficient Clouds |
PARALLEL & DISTRIBUTED SYSTEMS |
39 |
LSJ1339 |
Beyond Text QA Multimedia Answer Generation by Harvesting Web Information |
IMAGE PROCESSING |
40 |
LSJ1340 |
IP-Geo location Mapping for Moderately Connected Internet Regions |
PARALLEL & DISTRIBUTED SYSTEMS |
41 |
LSJ1341 |
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation |
PARALLEL & DISTRIBUTED SYSTEMS |
42 |
LSJ1342 |
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks |
NETWORKING |
43 |
LSJ1343 |
Delay-Based Network Utility Maximization |
NETWORKING |
44 |
LSJ1344 |
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks |
NETWORKING |
45 |
LSJ1345 |
Privacy Preserving Data Sharing With Anonymous ID Assignment |
SECURE COMPUTING |
46 |
LSJ1346 |
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links |
SECURE COMPUTING |
47 |
LSJ1347 |
Load Rebalancing for Distributed File Systems in Clouds |
CLOUD COMPUTING |
48 |
LSJ1348 |
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud |
CLOUD COMPUTING |
49 |
LSJ1349 |
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System |
CLOUD COMPUTING |
50 |
LSJ1350 |
On the Node Clone Detection in Wireless Sensor Networks |
NETWORKING |
51 |
LSJ1351 |
Optimal Client-Server Assignment for Internet Distributed Systems |
PARALLEL & DISTRIBUTED SYSTEMS |
52 |
LSJ1352 |
EAACK—A Secure Intrusion-Detection System for MANETs. |
SECURE COMPUTING |
53 |
LSJ1353 |
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks. |
SECURE COMPUTING |
54 |
LSJ1354 |
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words |
IMAGE PROCESSING |
55 |
LSJ1355 |
Cloud computing for mobile users can off loading computation save energy |
CLOUD COMPUTING |
56 |
LSJ1356 |
Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems |
PARALLEL AND DISTRIBUTED SYSTEMS |
57 |
LSJ1357 |
m-Privacy for Collaborative Data Publishing |
DATA MINING |
58 |
LSJ1358 |
Facilitating Document Annotation Using Content And Querying Value |
DATA MINING |
59 |
LSJ1359 |
Secure Mining of Association Rules in Horizontally Distributed Databases |
DATA MINING |
60 |
LSJ1360 |
Anomaly Detection via Online Oversampling Principal Component Analysis |
DATA MINING |
61 |
LSJ1361 |
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia |
DATA MINING |
62 |
LSJ1362 |
Annotating Search Results From Web Databases |
DATA MINING |
63 |
LSJ1363 |
Preventing Private Information Inference Attacks on Social Networks |
DATA MINING |
64 |
LSJ1364 |
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing |
SECURE COMPUTING |
65 |
LSJ1365 |
Discovery and Verification of neighbor Positions in Mobile Adhoc Networks |
MOBILE COMPUTING |
66 |
LSJ1366 |
Security Analysis in Single Sign on Mechanism for Distributed Computer Networks |
INDUSTRIAL INFORMATICS |
67 |
LSJ1367 |
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments |
KNOWLEDGE & DATA ENGINEERING |