S.No |
Code |
Title |
Category |
---|---|---|---|
1 |
LSJ1201 |
A Network Coding Equivalent Content Distribution Scheme For Efficient Peer To Peer Interactive Vod Streaming |
PARALLEL & DISTRIBUTED SYSTEMS |
2 |
LSJ1202 |
On Optimizing Overlay Topologies For Search In Unstructed Peer To Peer Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
3 |
LSJ1203 |
Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences |
KNOWLEDGE & DATA ENGINEERING |
4 |
LSJ1204 |
Cloud Data Production for Masses |
CLOUD COMPUTING |
5 |
LSJ1205 |
Clustering With Multi View Point – Based Similarity Measure |
KNOWLEDGE & DATA ENGINEERING |
6 |
LSJ1206 |
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage |
PARALLEL & DISTRIBUTED SYSTEMS |
7 |
LSJ1207 |
Distributed Packet Buffers For High Band Width Switches & Routers |
PARALLEL & DISTRIBUTED SYSTEMS |
8 |
LSJ1208 |
Efficient Fuzzy Type – A Head Search In Xml Data |
KNOWLEDGE & DATA ENGINEERING |
9 |
LSJ1209 |
Fast Data Collection in Tree-Based Wireless Sensor Networks |
MOBILE COMPUTING |
10 |
LSJ1210 |
Foot Print Detecting Sybil Attacks In Urban Vehicular Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
11 |
LSJ1211 |
Game-Theoretic Pricing for Video Streaming in Mobile Networks |
MOBILE COMPUTING |
12 |
LSJ1212 |
Hand Written Chinese Text Recognition By Integrating Multiple Contexts |
PATTERN ANALYSIS & MACHINE INTELLIGENCE |
13 |
LSJ1213 |
In Tags We Trust: Trust modeling in social tagging of multimedia content |
SIGNAL PROCESSING |
14 |
LSJ1214 |
Learn to Personalized Image Search from the Photo Sharing Websites |
MULTIMEDIA |
15 |
LSJ1215 |
MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS |
KNOWLEDGE & DATA ENGINEERING |
16 |
LSJ1216 |
Online Modeling of Proactive Moderation System for Auction Fraud Detection |
SECURE COMPUTING |
17 |
LSJ1217 |
Organizing User Search Histories |
KNOWLEDGE & DATA ENGINEERING |
18 |
LSJ1218 |
Packet Loss Control Using Tokens at the Network Edge |
NETWORKING |
19 |
LSJ1219 |
Packet-Hiding Methods for Preventing Selective Jamming Attacks |
SECURE COMPUTING |
20 |
LSJ1220 |
Ranking Model Adaptation for Domain-Specific Search |
KNOWLEDGE & DATA ENGINEERING |
21 |
LSJ1221 |
Risk-Aware Mitigation for MANET Routing Attacks |
SECURE COMPUTING |
22 |
LSJ1222 |
Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks |
MOBILE COMPUTING |
23 |
LSJ1223 |
Slicing: A New Approach to Privacy Preserving Data Publishing |
KNOWLEDGE & DATA ENGINEERING |
24 |
LSJ1224 |
Ensuring Distributed Accountability For Data Sharing In The Cloud |
SECURE COMPUTING |
25 |
LSJ1225 |
Adaptive Opportunistic Routing for Wireless Ad Hoc Networks |
NETWORKING |
26 |
LSJ1226 |
Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks |
NETWORKING |
27 |
LSJ1227 |
Catching Packet Droppers and Modifiers in Wireless Sensor Networks |
PARALLEL AND DISTRIBUTED SYSTEMS |
28 |
LSJ1228 |
Energy-Efficient Cooperative Distribution with Statistical QoS Provisions Video Over Wireless Networks |
NETWORKING |
29 |
LSJ1229 |
CCD A Distributed Publish Subscribe Framework for Rich Content Format |
PARALLEL AND DISTRIBUTED SYSTEMS |
30 |
LSJ1230 |
Confucius: A Tool Supporting Collaborative Scientific Workflow Composition |
SECURE COMPUTING |
31 |
LSJ1231 |
An Efficient and Secure Solution for the Problems of ARP Cache Poisoning Attacks |
SECURE COMPUTING |
32 |
LSJ1232 |
An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System |
WIRELESS COMMUNICATIONS |
33 |
LSJ1233 |
Cut Detection in Wireless Sensor Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
34 |
LSJ1234 |
Bootstrapping Ontologies for Web Services |
SERVICE COMPUTING |
35 |
LSJ1235 |
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper |
MOBILE COMPUTING |
36 |
LSJ1236 |
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding |
CLOUD COMPUTING |
37 |
LSJ1237 |
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing |
CLOUD COMPUTING |
38 |
LSJ1238 |
Outsourced Similarity Search on Metric Data Assets |
CLOUD COMPUTING |
39 |
LSJ1239 |
Bloom Cast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks |
PARALLEL AND DISTRIBUTED SYSTEMS |
40 |
LSJ1240 |
Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters |
NETWORKING |
41 |
LSJ1241 |
Independent Directed Acyclic Graphs for Resilient Multipath Routing |
NETWORKING |
42 |
LSJ1242 |
Measure Routing: A Framework for Routing Assisted Traffic Monitoring |
NETWORKING |
43 |
LSJ1243 |
RIHT: A Novel Hybrid IP Trace back Scheme |
NETWORKING |
44 |
LSJ1244 |
Detecting and Resolving Firewall Policy Anomalies |
SECURE COMPUTING |
45 |
LSJ1245 |
Detecting Spam Zombies by Monitoring Outgoing Messages |
SECURE COMPUTING |
46 |
LSJ1246 |
Handling Selfishness in Replica Allocation over a Mobile Adhoc Networks |
MOBILE COMPUTING |
47 |
LSJ1247 |
Latency Equalization as a New Network Service Primitive |
NETWORKING |
48 |
LSJ1248 |
Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks |
MOBILE COMPUTING |
49 |
LSJ1249 |
Toward Secure and Dependable Storage Services in Cloud Computing |
SERVICES COMPUTING |
50 |
LSJ1250 |
Load-Balancing Multipath Switching System with Flow Slice |
CLOUD COMPUTING |
51 |
LSJ1251 |
Incremental Information Extraction Using Relational Databases |
KNOWLEDGE & DATA ENGINEERING |
52 |
LSJ1252 |
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption |
PARALLEL & DISTRIBUTED SYSTEMS |
53 |
LSJ1253 |
Double Guard: Detecting Intrusions in Multitier Web Applications |
SECURE COMPUTING |
54 |
LSJ1254 |
Cloud Computing Security From Single to Multi Clouds |
CLOUD COMPUTING |
55 |
LSJ1255 |
Optimal Source-Based Filtering of Malicious Traffic |
NETWORKING |
56 |
LSJ1256 |
Effective Pattern Discovery for Text Mining |
KNOWLEDGE & DATA ENGINEERING |
57 |
LSJ1257 |
Enabling Multilevel Trust in Privacy Preserving Data Mining |
KNOWLEDGE & DATA ENGINEERING |
58 |
LSJ1258 |
BibPro A Citation Parser Based on sequence alignment |
KNOWLEDGE & DATA ENGINEERING |
59 |
LSJ1259 |
Document Clustering in Correlation Similarity Measure Space |
KNOWLEDGE & DATA ENGINEERING |
60 |
LSJ1260 |
Horizontal Aggregations in SQL to Prepare Data |
KNOWLEDGE & DATA ENGINEERING |
61 |
LSJ1261 |
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs |
SECURE COMPUTING |
62 |
LSJ1262 |
Efficient and Accurate Discovery of Patterns in Sequence Datasets |
DATA MINING |