KNOWLEDGE AND DATA ENGINEERING (DATA MINING)
1.
A Fast Clustering-Based
Feature
Subset Selection Algorithm for
High
Dimensional Data
2.
CloudMoV: Cloud-based Mobile Social TV
3.
M-Privacy for
Collaborative Data
Publishing
4.
Crowd sourcing Predictors
of Behavioral Outcomes.
5.
Spatial Approximate
String Search
6.
Facilitating Document
Annotation Using Content and Querying Value
7.
Incentive Compatible
Privacy-Preserving Data Analysis
8.
Focus Learning to
Crawl
Web Forums
9.
Robust Module Based Data
Management
10. A Probabilistic Approach
to String Transformation
11. Comparable
Entity Mining from Comparative Questions
12. Facilitating Effective User Navigation through
Website
Structure
Improvement
13. PMSE: A Personalized Mobile
Search
Engine
14. Fast nearest Neighbor
Search
with
Keywords
15. Secure Mining of Association Rules
in Horizontally Distributed
Databases
16. A System to Filter Unwanted
Messages from OSN User
Walls
CLOUD COMPUTING
17. A Load Balancing Model
Based on Cloud Partitioning for the Public
Cloud.
18. Privacy-Preserving Public Auditing for Secure Cloud
Storage
19. Winds of Change from
Vendor
Lock-In
to the Meta
Cloud
20. Cloud computing for mobile
users can offloading COMPUTATION SAVE
ENERGY
21. AMES-Cloud: A
Framework of Adaptive
Mobile Video Streaming and
Efficient
Social
Video Sharing in
the Clouds
22. Mining Contracts for Business
Events
and Temporal
Constraints
in Service
Engagements
23. Collaboration in Multicloud Computing Environments: Framework and
Security Issues
IMAGE PROCESSING
24. Super-Resolution-based Inpainting
25. Beyond
Text QA: Multimedia Answer Generation by Harvesting Web
Information
26. Scalable Face
Image Retrieval using Attribute-Enhanced Sparse Codewords
SECURE COMPUTING
27. CAM: Cloud-Assisted Privacy Preserving Mobile
Health Monitoring.
28. Secure Encounter-based Mobile
Social
Networks Requirements Designs
and
Tradeoffs
29. Two tales of privacy in
online social
networks
30. Extracting Spread-Spectrum Hidden Data from Digital
Media
31. Utility-Privacy Tradeoff
in Databases An
Information-theoretic Approach.
PARALLEL AND DISTRIBUTED SYSTEMS
32. Enabling Data Dynamic and Indirect Mutual
Trust for Cloud Computing
Storage Systems.
33. A Privacy Leakage
Upper-bound
Constraint based
Approach
for Cost- effective
Privacy Preserving of Intermediate
Datasets
in Cloud
34. Dynamic Resource
Allocation using Virtual
Machines for
Cloud
Computing
Environment
35. Towards Differential
Query Services
in
Cost-Efficient
Clouds
36. Geo-Community-Based
Broadcasting for Data
Dissemination in
Mobile Social
Networks
MOBILE COMPUTING – WIRELESSCOMMUNICATIONS
37. Mobile Relay Configuration
in Data-intensive Wireless Sensor
Networks.
38. Vampire attacks: Draining life
from wireless
ad-hoc
sensor
networks.
39. Towards a Statistical Framework for Source Anonymity in Sensor Networks
40. A Scalable
Server Architecture
for Mobile Presence
Services
in Social
Network Applications
41. Privacy-Preserving Distributed
Profile Matching in Proximity-based Mobile
Social Networks
42. Distributed
Cooperative
Caching in
Social
Wireless Networks
43. Community-Aware
Opportunistic
Routing in Mobile
Social
Networks
NETWORKING
44. Price Differentiation for
Communication
Networks
45. Participatory
Privacy Enabling Privacy in Participatory Sensing
46. Optimizing Cloud Resources for Delivering IPTV Services through
Virtualization
47. Access Policy Consolidation
for Event Processing Systems
48. Sink Trail: A Proactive
Data Reporting Protocol
for Wireless Sensor Networks
No comments:
Post a Comment