1 LSJ1301 Privacy Preserving Public Auditing for Secure Cloud Storage Cloud Computing
2 LSJ1302 Winds of Change from Vendor Lock-In to the Meta Cloud Cloud Computing
3 LSJ1303 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds Cloud Computing
4 LSJ1304 A Fast Clustering-Based Feature Subset Selection algorithm for High Dimensional Data Data Mining
5 LSJ1305 A System to Filter Unwanted Messages from OSN User Walls Data Mining
6 LSJ1306 CloudMoV: Cloud-based Mobile Social TV Cloud Computing
7 LSJ1307 Comparable Entity Mining from Comparative Questions Data Mining
8 LSJ1308 Crowd sourcing Predictors of Behavioral Outcomes Data Mining
9 LSJ1309 Facilitating Effective User Navigation through Website Structure Improvement Data Mining
10 LSJ1310 Focus Learning to Crawl Web Forums Data Mining
11 LSJ1311 Incentive Compatible Privacy-Preserving Data Analysis Data Mining
12 LSJ1312 PMSE: A Personalized Mobile Search Engine Data Mining
13 LSJ1313 Sensitive Label Privacy Protection on Social Network Data Data Mining
14 LSJ1314 Robust Module Based Data Management Data Mining
15 LSJ1315 Spatial Approximate String Search Data Mining
16 LSJ1316 Mobile Relay Configuration in Data-intensive Wireless Sensor Networks. Mobile Computing
17 LSJ1317 Vampire attacks: Draining life from wireless ad-hoc sensor networks. Mobile Computing
18 LSJ1318 Towards a Statistical Framework for Source Anonymity in Sensor Networks Mobile Computing
19 LSJ1319 A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Mobile Computing
20 LSJ1320 Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks Mobile Computing
21 LSJ1321 Distributed Cooperative Caching in Social Wireless Networks Mobile Computing
22 LSJ1322 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization Networking
23 LSJ1323 Access Policy Consolidation for Event Processing Systems Networking
24 LSJ1324 Mining Contracts for Business Events and Temporal Constraint in Service Engagements Networking
25 LSJ1325 Fully Anonymous Profile Matching in Mobile Social Networks Networking
26 LSJ1326 Price Differentiation for Communication Networks Networking
27 LSJ1327 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment Parallel & Distributed Systems
28 LSJ1328 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
Secure Computing
29 LSJ1329 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Parallel & Distributed Systems
30 LSJ1330 Extracting Spread-Spectrum Hidden Data from Digital Media Secure Computing
31 LSJ1331 Two tales of privacy in online social networks Secure Computing
32 LSJ1332 Utility-Privacy Tradeoff in Databases An Information-theoretic Approach Secure Computing
33 LSJ1333 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Development Cloud Computing
34 LSJ1334 Privacy Preserving Delegated Access Control in Public Cloud Secure Computing
35 LSJ1335 Super Resolution Based In painting Image Processing
36 LSJ1336 Collaboration in Multi Cloud Computing Environments Framework & Security Issues Cloud Computing
37 LSJ1337 Social Tube P2P-assisted Video Sharing in Online Social Networks Parallel & Distributed Systems
38 LSJ1338 Towards Differential Query Services in Cost-Efficient Clouds Parallel & Distributed Systems
39 LSJ1339 Beyond Text QA Multimedia Answer Generation by Harvesting Web Information Image Processing
40 LSJ1340 IP-Geo location Mapping for Moderately Connected Internet Regions Parallel & Distributed Systems
41 LSJ1341 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Parallel & Distributed Systems
42 LSJ1342 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks Networking
43 LSJ1343 Delay-Based Network Utility Maximization Networking
44 LSJ1344 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Networking
45 LSJ1345 Privacy Preserving Data Sharing With Anonymous ID Assignment Secure Computing
46 LSJ1346 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links Secure Computing
47 LSJ1347 Load Rebalancing for Distributed File Systems in Clouds Cloud Computing
48 LSJ1348 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Cloud Computing
49 LSJ1349 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Cloud Computing
50 LSJ1350 On the Node Clone Detection in Wireless Sensor Networks Networking
51 LSJ1351 Optimal Client-Server Assignment for Internet Distributed Systems Parallel & Distributed Systems
52 LSJ1352 EAACK—A Secure Intrusion-Detection System for MANETs. Secure Computing
53 LSJ1353 Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks. Secure Computing
54 LSJ1354 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words Image Processing
55 LSJ1355 Cloud computing for mobile users can off loading computation save energy Cloud Computing
56 LSJ1356 Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems Parallel & Distributed Systems
57 LSJ1357 m-Privacy for Collaborative Data Publishing Data Mining
58 LSJ1358 Facilitating Document Annotation Using Content And Querying Value Data Mining
59 LSJ1359 Secure Mining of Association Rules in Horizontally Distributed Databases Data Mining
60 LSJ1360 Anomaly Detection via Online Oversampling Principal Component Analysis Data Mining
61 LSJ1361 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia Data Mining
62 LSJ1362 Annotating Search Results From Web Databases Data Mining
63 LSJ1363 Preventing Private Information Inference Attacks on Social Networks Data Mining
64 LSJ1364 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Secure Computing
65 LSJ1365 Discovery and Verification of neighbor Positions in Mobile Adhoc Networks Mobile Computing
66 LSJ1366 Security Analysis in Single Sign on Mechanism for Distributed Computer Networks Industrial Informatics
67 LSJ1367 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Knowledge & Data Engineering
Call us : (+91) 9030211322 / 040-40274843
Mail us : logicsystemsprojects@gmail.com
Mail us : info@logicsystems.org.in