S.No |
Code |
Title |
Category |
---|---|---|---|
1 |
LSD1501 |
Collision Tolerant and Collision Free Packet Scheduling for
Underwater Acoustic Localization |
NETWORKING |
2 |
LSD1502 |
Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis |
NETWORKING |
3 |
LSD1503 |
Universal Network Coding-Based Opportunistic Routing for Unicast |
NETWORKING |
4 |
LSD1504 |
Discovery of Ranking Fraud for Mobile Apps |
DATA MINING |
5 |
LSD1505 |
PAGE: A Partition Aware Engine for Parallel Graph Computation |
DATA MINING |
6 |
LSD1506 |
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites |
DATA MINING |
7 |
LSD1507 |
Query Aware Determinization of Uncertain Objects |
DATA MINING |
8 |
LSD1508 |
An Attribute-Assisted Reranking Model for Web Image Search |
IMAGE PROCESSING |
9 |
LSD1509 |
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images |
ING IMAGE PROCESSING |
10 |
LSD1510 |
Detection and Rectification of Distorted Fingerprints |
IMAGE PROCESSING |
11 |
LSD1511 |
Eye Gaze Tracking With a Web Camera in a Desktop Environment |
IMAGE PROCESSING |
12 |
LSD1512 |
Learning Fingerprint Reconstruction: From Minutiae to Image |
IMAGE PROCESSING |
13 |
LSD1513 |
Multi view Alignment Hashing for Efficient Image Search |
IMAGE PROCESSING |
14 |
LSD1514 |
Single Image Super resolution Based on Gradient Profile Sharpness |
IMAGE PROCESSING |
15 |
LSD1515 |
Steganography Using Reversible Texture Synthesis |
IMAGE PROCESSING |
16 |
LSD1516 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
CLOUD COMPUTING |
17 |
LSD1517 |
Cloud-Based Multimedia Content Protection System |
CLOUD COMPUTING |
18 |
LSD1518 |
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
CLOUD COMPUTING |
19 |
LSD1519 |
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds |
CLOUD COMPUTING |
20 |
LSD1520 |
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
CLOUD COMPUTING |
21 |
LSD1521 |
Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem |
CLOUD COMPUTING |
22 |
LSD1522 |
Identity-Based Distributed Provable Data Possession in Multicloud Storage |
CLOUD COMPUTING |
23 |
LSD1523 |
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud |
CLOUD COMPUTING |
24 |
LSD1524 |
PSMPA: Patient Self-Controllable and Multi-Level Privacy- Preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System |
CLOUD COMPUTING |
25 |
LSD1525 |
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers |
CLOUD COMPUTING |
26 |
LSD1526 |
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks |
MOBILE COMPUTING |
27 |
LSD1527 |
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks |
MOBILE COMPUTING |
28 |
LSD1528 |
Optimal Configuration of Network Coding in Ad Hoc Networks |
MOBILE COMPUTING |
29 |
LSD1529 |
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
SECURE COMPUTING |
30 |
LSD1530 |
Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems |
SECURE COMPUTING |
31 |
LSD1531 |
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search |
SECURE COMPUTING |
32 |
LSD1532 |
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints |
SECURE COMPUTING |
33 |
LSD1533 |
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System |
SECURE COMPUTING |
34 |
LSD1534 |
Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |
SERVICE COMPUTING |
35 |
LSD1535 |
Authenticated Key Exchange Protocols for Parallel Network File Systems |
PARALLEL & DISTRIBUTED SYSTEMS |