S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
CLOUD COMPUTING | |||
1 | CTJV801 | A Practical Public Key Encryption Scheme Based on Learning Parity with Noise | |
2 | CTJV802 | An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers | |
3 | CTJV803 | CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics | |
4 | CTJV804 | Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing | |
5 | CTJV805 | A Power-of-Two Choices Based Algorithm for Fog Computing | |
6 | CTJV806 | virtFlow: Guest Independent Execution Flow Analysis Across Virtualized Environments | |
7 | CTJV807 | Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras | |
8 | CTJV808 | Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment | |
9 | CTJV809 | Minimal Cost Server Configuration for Meeting Time-Varying Resource Demands in Cloud Centers | |
10 | CTJV810 | Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets | |
11 | CTJV811 | Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment |
|
12 | CTJV812 | Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center | |
13 | CTJV813 | A tight estimate of job completion time in vehicular clouds | |
14 | CTJV814 | HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems | |
15 | CTJV815 | An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers | |
16 | CTJV816 | Dynamic VM Scaling: Provisioning and Pricing through an Online Auction | |
17 | CTJV817 | Price-based Resource Allocation for Edge Computing: A Market Equilibrium Approach | |
18 | CTJV818 | Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing | |
19 | CTJV819 | An Efficient and Secured Framework for Mobile Cloud Computing | |
20 | CTJV820 | Efficient Traceable Authorization Search System for Secure Cloud Storage | |
21 | CTJV821 | A Robust Formulation for Efficient Application Offloading to Clouds | |
22 | CTJV822 | A Planning Approach for Reassigning Virtual Machines in IaaS Clouds | |
23 | CTJV823 | Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing | |
24 | CTJV873 | A Lightweight secure data sharing scheme for mobile cloud computing | |
DATA MINING | |||
1 | CTJV824 | CoDetect: Financial Fraud Detection With Anomaly Feature detection | |
2 | CTJV825 | Complementary Aspect-based Opinion Mining | |
3 | CTJV826 | Emotion Recognition on Twitter: Comparative Study and Training a Unison Model | |
4 | CTJV827 | Frequent Itemsets Mining With Differential Privacy Over Large- Scale Data | |
5 | CTJV828 | Health Monitoring on Social Media over Time | |
6 | CTJV829 | Online Product Quantization | |
7 | CTJV830 | Privacy Characterization and Quantification in Data Publishing | |
8 | CTJV831 | Road Traffic Speed Prediction: A Probabilistic Model Fusing multi secure data | |
9 | CTJV832 | Scalable Content-Aware Collaborative Filtering for Location Recommendation | |
10 | CTJV833 | SDE: A Novel Clustering Framework Based on Sparsity-Density Entropy | |
11 | CTJV834 | Search Result Diversity Evaluation based on Intent Hierarchies | |
12 | CTJV835 | When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks | |
13 | CTJV836 | A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection and Word Embeddings | |
14 | CTJV837 | Automated Phrase Mining from Massive Text Corpora | |
15 | CTJV838 | A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining | |
16 | CTJV839 | Supervised Topic Modeling using Hierarchical Dirichlet Process-based Inverse Regression: Experiments on E-Commerce Applications |
|
17 | CTJV840 | Bayesian Nonparametric Learning for Hierarchical and Sparse Topics | |
18 | CTJV841 | Comments Mining With TF-IDF: The Inherent Bias and Its Removal | |
19 | CTJV842 | A Correlation-based Feature Weighting Filter for Naive Bayes | |
20 | CTJV843 | A Weighted Frequent Item set Mining Algorithm for Intelligent Decision in Smart Systems | |
21 | CTJV844 | An Efficient Method for High Quality and Cohesive Topical Phrase Mining | |
MACHINE LEARNING | |||
1 | CTJV845 | A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining | |
2 | CTJV846 | A Credibility Analysis System for Assessing Information on Twitter | |
3 | CTJV847 | A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing | |
4 | CTJV848 | Credit Card Fraud Detection Using AdaBoost and Majority Voting | |
5 | CTJV849 | Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection |
|
6 | CTJV950 | Using Data Mining to Predict Hospital Admissions From the Emergency Department | |
SECURE COMPUTING | |||
1 | CTJV951 | Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices | |
2 | CTJV952 | Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks | |
NETWORKING | |||
1 | CTJV953 | Energy Efficient Link-Delay Aware Routing in Wireless Sensor networks | |
2 | CTJV954 | GeTrust: A guarantee-based trust model in Chord-based P2P networks | |
3 | CTJV955 | PROVEST: Provenance-based Trust Model for Delay Tolerant networks | |
4 | CTJV956 | Traffic and Energy Aware Routing for Heterogeneous Wireless networks | |
SOCIAL NETWORKING | |||
1 | CTJV857 | 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in social networks | |
2 | CTJV858 | Analyzing and Detecting Money-Laundering Accounts in Online social networks | |
3 | CTJV859 | Detection of suicide-related posts in Twitter data streams | |
4 | CTJV860 | Risk Assessment in Social Networks based on User Anomalous Behaviours | |
5 | CTJV861 | Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter | |
MOBILE COMPUTING | |||
1 | CTJV862 | Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis | |
2 | CTJV863 | Efficient Privacy-Aware Authentication Scheme for Mobile Cloud | |
3 | CTJV864 | Identifying On-site Users for Social Events: Mobility, Content, and Social Relationship | |
4 | CTJV865 | Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing | |
5 | CTJV866 | Traffic-Aware Efficient Mapping of Wireless Body Area Networks to Health Cloud Service Providers in Critical Emergency Situations |
|
WEB MINING | |||
1 | CTJV867 | Relevant Feedback Based Accurate and Intelligent Retrieval on Capturing User Intention for Personalized Websites | |
SECURE COMPUTING | |||
1 | CTJV868 | A Hybrid Approach for Detecting Automated Spammers in twitter | |
2 | CTJV869 | A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network | |
3 | CTJV870 | Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t- Closeness | |
4 | CTJV871 | Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage | |
INFORMATION FORENSIC SECURITY | |||
1 | CTJV872 | Trust-based Collaborative Privacy Management in Online Social networks | |
INTERNET OF THINGS | |||
1 | CTJV874 | Cloud-based Fine-grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation |
|
2 | CTJV875 | Light-Weight Security and Data Provenance for Multi-Hop Internet of Things | |
IMAGE PROCESSING | |||
1 | CTJV876 | Automatic Generation of Social Event Storyboard From Image Click-Through Data | |
2 | CTJV877 | Query-free Clothing Retrieval via Implicit Relevance Feedback | |
SOFTWARE ENGINEERING | |||
1 | CTJV878 | A Developer Centered Bug Prediction Model | |
SERVICE COMPUTING(WEB SERVICES) | |||
1 | CTJV879 | Lightweight Fine-Grained Search over Encrypted Data in Fog Computing | |
2 | CTJV880 | Semantic-based Compound Keyword Search over Encrypted Cloud Data | |
3 | CTJV881 | Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach | |
4 | CTJV882 | Optimizing Autonomic Resources for the Management of Large Service-Based Business Processes | |
5 | CTJV883 | Scheduling Inter-Datacenter Video Flows for Cost Efficiency | |
6 | CTJV884 | Migration Modeling and Learning Algorithms for Containers in Fog Computing | |
7 | CTJV885 | Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing | |
8 | CTJV886 | Achieving Fairness-aware Two-level Scheduling for Heterogeneous Distributed Systems | |
BIG DATA | |||
1 | CTJV887 | A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds | |
2 | CTJV888 | AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers | |
3 | CTJV889 | Structural Balance Theory-based E-commerce Recommendation over Big Rating Data | |
4 | CTJV890 | Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage | |
CONSUMER ELECTRONICS , INDUSTRIAL ELECTRONICS | |||
1 | CTJV891 | RRPhish Anti-Phishing via Mining Brand Resources Request | |
2 | CTJV892 | Confidence-interval Fuzzy Model-based Indoor Localization | |
INFORMATION AND COMMUNICATION SYSTEM | |||
1 | CTJV893 | A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumpti | |
PATTERN ANALYSIS AND MACHINE INTELLIGENCE | |||
1 | CTJV894 | Detecting Regions of Maximal Divergence for Spatio-Temporal Anomaly Detection | |
2 | CTJV895 | Ordinal Constraint Binary Coding for Approximate Nearest Neighbor Search | |
SOFTWARE ENGINEERING, COMPUTER GRAPHICS | |||
1 | CTJV896 | Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection | |
2 | CTJV897 | EVA: Visual Analytics to Identify Fraudulent Events | |
INFORMATION AND SECURITY SYSTEMS | |||
1 | CTJV898 | FraudFind: Financial Fraud Detection by Analyzing Human Behavior | |
2 | CTJV899 | FraudVis: Understanding Unsupervised Fraud Detection Algorithms | |
3 | CTJV900 | Machine Learning Applied to Rotating Check Fraud Detection |
S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTJV701 | A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification | |
2 | CTJV702 | A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing | |
3 | CTJV703 | A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing | |
4 | CTJV704 | A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users | |
5 | CTJV105 | A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage | |
6 | CTJV706 | A robust reputation management mechanism in the federated cloud | |
7 | CTJV707 | Achieving Efficient and Secure Data Acquisition for Cloudsupported Internet of Things in Smart Grid | |
8 | CTJV708 | Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data | |
9 | CTJV709 | Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems | |
10 | CTJV710 | Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing | |
11 | CTJV711 | Efficient and Expressive Keyword Search Over Encrypted Data in Cloud | |
12 | CTJV712 | Fast Phrase Search for Encrypted Cloud Storage | |
13 | CTJV713 | Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds | |
14 | CTJV714 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | |
15 | CTJV715 | Identity-Based Private Matching over Outsourced Encrypted Datasets | |
16 | CTJV716 | Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage | |
17 | CTJV717 | On the Security of Data Access Control for Multi-authority Cloud Storage Systems | |
18 | CTJV718 | Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing | |
19 | CTJV719 | Privacy Protection based Access Control Scheme in Cloud-based Services | |
20 | CTJV720 | Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data | |
21 | CTJV721 | Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud | |
22 | CTJV722 | RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage | |
23 | CTJV723 | Secure Data Sharing in Cloud Computing Using RevocableStorage Identity-Based Encryption | |
24 | CTJV724 | Securing Cloud Data under Key Exposure | |
25 | CTJV725 | TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud | |
26 | CTJV726 | TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud | |
27 | CTJV727 | Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving | |
28 | CTJV728 | An Efficient Privacy-Preserving Ranked Keyword Search Method | |
29 | CTJV729 | Cda Generation And Integration For Health Information Exchange Based On Cloud Computing System | |
30 | CTJV730 | Conditional Identity-Based Broadcast Proxy Re-Encryption And Its Application To Cloud Email | |
31 | CTJV731 | Conjunctive Keyword Search With Designated Tester AndTiming Enabled Proxy Re Encryption Function For E-Health Clouds | |
32 | CTJV732 | Deypos: Deduplicatable Dynamic Proof Of Storage For MultiUse Environments | |
33 | CTJV733 | Diplocloud: Efficient And Scalable Management Of Rdf Data In The Cloud | |
34 | CTJV734 | Dual-Server Public-Key Encryption With Keyword Search For Secure CloudStorage | |
35 | CTJV735 | Dynamic And Public Auditing With Fair Arbitration For Cloud Data | |
36 | CTJV736 | Enabling Cloud Storage Auditing With Verifiable Outsourcing Of Keyupdates | |
37 | CTJV737 | Fine-Grained Two-Factor Access Control For Web-Based Cloud Computing Services | |
38 | CTJV738 | Flexible And Fine-Grained Attribute-Based Data Storage In Cloud Computing | |
39 | CTJV739 | Geometric Range Search On Encrypted Spatial Data | |
40 | CTJV740 | Identity-Based Encryption With Cloud Revocation Authority And Its Applications | 41 | CTJV741 | Identity-Based Proxy-Oriented Data Uploading And Remote Data Integrity Checking In Public Cloud | 42 | CTJV742 | Protecting Your Right: Verifiable Attribute-Based Keyword Serch With Fine-Grained Owner-Enforced Search Authorization In The Cloud |
43 | CTJV743 | Building An Intrusion Detection System Using A Filter-Based Feature Selection Algorithm | |
44 | CTJV744 | Connecting Social Media To E-Commerce: Cold-Start Product Recommendation Using Microblogging Information | |
45 | CTJV745 | Cyberbullying Detection Based On Semantic-Enhanced Marginalized Denoising Auto-Encoder | |
46 | CTJV746 | Domain-Sensitive Recommendation With User-Item Subgroup Analysis | |
47 | CTJV747 | Efficient Algorithms For Mining Top-K High Utility Itemsets | |
48 | CTJV748 | Efficient Cache-Supported Path Planning On Roads | |
49 | CTJV749 | Location Aware Keyword Query Suggestion Based On Document Proximity | |
50 | CTJV750 | Nearest Keyword Set Search In Multi-Dimensional Datasets | |
51 | CTJV751 | Answering Approximate Queries Over Xml Data | |
52 | CTJV752 | An Iterative Classification Scheme for Sanitizing Large-Scale Datasets | |
53 | CTJV753 | Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach | |
54 | CTJV754 | Collaborative Filtering-Based Recommendation of Online Social Voting | |
55 | CTJV755 | Computing Semantic Similarity of Concepts in Knowledge Graphs | |
56 | CTJV756 | Detecting Stress Based on Social Interactions in Social Networks | |
57 | CTJV757 | Dynamic Facet Ordering for Faceted Product Search Engines | |
58 | CTJV758 | Efficient Clue-based Route Search on Road Networks | |
59 | CTJV759 | Efficient Keyword-aware Representative Travel Route Recommendation | |
60 | CTJV760 | Energy-efficient Query Processing in Web Search Engines | |
61 | CTJV761 | Generating Query Facets using Knowledge Bases | |
62 | CTJV762 | Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach | |
63 | CTJV763 | l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items | |
64 | CTJV764 | Mining Competitors from Large Unstructured Datasets | |
65 | CTJV765 | Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction | |
66 | CTJV766 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | |
67 | CTJV767 | PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks | |
68 | CTJV768 | QDA: A Query-Driven Approach to Entity Resolution | |
69 | CTJV769 | Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data | |
70 | CTJV770 | RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem | |
71 | CTJV771 | SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors | |
72 | CTJV772 | Towards Real-Time, Country-Level Location Classification of Worldwide Tweets | |
73 | CTJV773 | Trajectory Community Discovery and Recommendation by Multi- source Diffusion Modeling | |
74 | CTJV774 | Understand Short Texts by Harvesting and Analyzing Semantic Knowledge | |
75 | CTJV775 | User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective | |
76 | CTJV776 | User-Centric Similarity Search | |
77 | CTJV777 | When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks | |
78 | CTJV778 | An Overlay Architecture for Throughput Optimal Multipath Routing | |
79 | CTJV779 | FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control | |
80 | CTJV780 | Network Capability in Localizing Node Failures via End-to-End Path Measurements | |
81 | CTJV781 | Privacy and Integrity Preserving Top-k Query Processing for Two- Tiered Sensor Network | |
82 | CTJV782 | Routing in Accumulative Multi-Hop Networks | |
83 | CTJV783 | SWEET: Serving the Web by Exploiting Email Tunnels | |
84 | CTJV784 | Ipath: Path Inference In Wireless Sensor Networks | |
85 | CTJV785 | A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption | |
86 | CTJV786 | Detecting Mobile Malicious Webpages in Real Time | |
87 | CTJV787 | Quantifying Interdependent Privacy Risks with Location Data | |
88 | CTJV788 | Searching Trajectories by Regions of Interest | |
89 | CTJV789 | SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks | |
90 | CTJV790 | Detecting Node Failures In Mobile Wireless Networks: A Probabilistic Approach | |
91 | CTJV791 | Energy And Memory Efficient Clone Detection In Wireless Sensor Networks | |
92 | CTJV792 | iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence | |
93 | CTJV793 | A Credibility Analysis System for Assessing Information on twitter | |
94 | CTJV794 | Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems | |
95 | CTJV795 | FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data | |
96 | CTJV796 | My Privacy My Decision: Control of Photo Sharing on Online Social Networks | |
97 | CTJV797 | Privacy-Preserving Selective Aggregation of Online User Behavior Data | |
98 | CTJV798 | ProGuard: Detecting Malicious Accounts in Social-NetworkBased Online Promotions | |
99 | CTJV799 | Search Rank Fraud and Malware Detection in Google Play | |
100 | CTJV800 | Towards Detecting Compromised Accounts on Social Networks | |
101 | CTJV801 | Data Lineage In Malicious Environments | |
102 | CTJV802 | Frodo: Fraud Resilient Device For Off-Line Micro-Payments | |
103 | CTJV803 | Inference Attack On Browsing History Of Twitter | |
104 | CTJV804 | NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media | |
105 | CTJV805 | Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers | |
106 | CTJV806 | Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending | |
107 | CTJV807 | Privacy-Preserving Utility Verification Of The Data Published By Non-Interactive Differentially Private Mechanisms | |
108 | CTJV808 | A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT | |
109 | CTJV809 | An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy | |
110 | CTJV810 | Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services | |
111 | CTJV811 | Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems | |
112 | CTJV812 | SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud | |
113 | CTJV813 | Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud | |
114 | CTJV814 | SocialQ&A: An Online Social Network Based Question and Answer System | |
115 | CTJV815 | Automatic Generation of Social Event Storyboard from Image Click-through Data | |
116 | CTJV816 | Image Re-ranking based on Topic Diversity | |
117 | CTJV817 | Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement | |
118 | CTJV818 | A Scalable Approach For Content-Based Image Retrieval In Peer-To- Peer Networks | |
119 | CTJV819 | Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model | |
120 | CTJV820 | A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection | |
121 | CTJV821 | Improving Automated Bug Triaging with Specialized Topic Model | |
122 | CTJV822 | Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method | |
123 | CTJV823 | Transactional Behavior Verification in Business Process as a Service Configuration |
S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTJV601 | A MODIFIED HIERARCHICAL ATTRIBUTE-BASED ENCRYPTION ACCESS CONTROL METHOD FOR MOBILE CLOUD COMPUTING |
|
2 | CTJV602 | AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING | |
3 | CTJV603 | AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD | |
4 | CTJV604 | CDA GENERATION AND INTEGRATION FOR HEALTH INFORMATION EXCHANGE BASED ON CLOUD COMPUTING SYSTEM |
|
5 | CTJV605 | CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION TO CLOUD EMAIL |
|
6 | CTJV606 | CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS |
|
7 | CTJV607 | DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS | |
8 | CTJV608 | DIPLOCLOUD: EFFICIENT AND SCALABLE MANAGEMENT OF RDF DATA IN THE CLOUD | |
9 | CTJV609 | DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE | |
10 | CTJV610 | DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA | |
11 | CTJV611 | ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES | |
12 | CTJV612 | FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES | |
13 | CTJV613 | FLEXIBLE AND FINE-GRAINED ATTRIBUTE-BASED DATA STORAGE IN CLOUD COMPUTING | |
14 | CTJV614 | GEOMETRIC RANGE SEARCH ON ENCRYPTED SPATIAL DATA | |
15 | CTJV615 | IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS | |
16 | CTJV616 | IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD |
|
17 | CTJV617 | PROTECTING YOUR RIGHT: VERIFIABLE ATTRIBUTE-BASED KEYWORD SEARCH WITH FINE-GRAINED OWNER-ENFORCED SEARCH AUTHORIZATION IN THE CLOUD |
|
18 | CTJV618 | REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE STORAGE SYSTEMS |
|
19 | CTJV619 | SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING |
|
20 | CTJV620 | A NOVEL RECOMMENDATION MODEL REGULARIZED WITH USER TRUST AND ITEM RATINGS | |
21 | CTJV621 | AUTOMATICALLY MINING FACETS FOR QUERIES FROM THEIR SEARCH RESULTS | |
22 | CTJV622 | BOOSTER IN HIGH DIMENSIONAL DATA CLASSIFICATION | |
23 | CTJV623 | BUILDING AN INTRUSION DETECTION SYSTEM USING A FILTER-BASED FEATURE SELECTION ALGORITHM |
|
24 | CTJV624 | CONNECTING SOCIAL MEDIA TO E-COMMERCE: COLD-START PRODUCT RECOMMENDATION USING MICROBLOGGING INFORMATION |
|
25 | CTJV625 | CROSS-DOMAIN SENTIMENT CLASSIFICATION USING SENTIMENT SENSITIVE EMBEDDING’S | |
26 | CTJV626 | CROWDSOURCING FOR TOP-K QUERY PROCESSING OVER UNCERTAIN DATA | |
27 | CTJV627 | CYBERBULLYING DETECTION BASED ON SEMANTIC-ENHANCED MARGINALIZED DENOISING AUTO-ENCODER | |
28 | CTJV628 | DOMAIN-SENSITIVE RECOMMENDATION WITH USER-ITEM SUBGROUP ANALYSIS | |
29 | CTJV629 | EFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS | |
30 | CTJV630 | EFFICIENT CACHE-SUPPORTED PATH PLANNING ON ROADS | |
31 | CTJV631 | LOCATION AWARE KEYWORD QUERY SUGGESTION BASED ON DOCUMENT PROXIMITY | |
32 | CTJV632 | MINING USER-AWARE RARE SEQUENTIAL TOPIC PATTERNS IN DOCUMENT STREAMS | |
33 | CTJV633 | NEAREST KEYWORD SET SEARCH IN MULTI-DIMENSIONAL DATASETS | |
34 | CTJV634 | QUANTIFYING POLITICAL LEANING FROM TWEETS, RETWEETS, AND RETWEETERS | |
35 | CTJV635 | RATING PREDICTION BASED ON SOCIAL SENTIMENT FROM TEXTUAL REVIEWS | |
36 | CTJV636 | SENTIMENT EMBEDDING’S WITH APPLICATIONS TO SENTIMENT ANALYSIS | |
37 | CTJV637 | ANSWERING APPROXIMATE QUERIES OVER XML DATA | |
38 | CTJV638 | A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION | |
39 | CTJV639 | A SCALABLE APPROACH FOR CONTENT-BASED IMAGE RETRIEVAL IN PEER-TO-PEER NETWORKS | |
40 | CTJV640 | LEARNING OF MULTIMODAL REPRESENTATIONS WITH RANDOM WALKS ON THE CLICK GRAPH | |
41 | CTJV641 | ONLINE MULTI-MODAL DISTANCE METRIC LEARNING WITH APPLICATION TO IMAGE RETRIEVAL | |
42 | CTJV642 | OPTIMIZED SEARCH-AND-COMPUTE CIRCUITS AND THEIR APPLICATION TO QUERY EVALUATION ON ENCRYPTED DATA |
|
43 | CTJV643 | PRIVACY-PRESERVING UTILITY VERIFICATION OF THE DATA PUBLISHED BY NON-INTERACTIVE DIFFERENTIALLY PRIVATE MECHANISMS |
|
44 | CTJV644 | PROFILING ONLINE SOCIAL BEHAVIORS FOR COMPROMISED ACCOUNT DETECTION | |
45 | CTJV645 | HIDDEN CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION UNDER STANDARD ASSUMPTIONS | |
46 | CTJV646 | DETECTING NODE FAILURES IN MOBILE WIRELESS NETWORKS: A PROBABILISTIC APPROACH | |
47 | CTJV647 | ENERGY AND MEMORY EFFICIENT CLONE DETECTION IN WIRELESS SENSOR NETWORKS | |
48 | CTJV648 | EPLQ: EFFICIENT PRIVACY-PRESERVING LOCATION-BASED QUERY OVER OUTSOURCED ENCRYPTED DATA | |
49 | CTJV649 | SECURE OVERLAY ROUTING USING KEY PRE-DISTRIBUTION: A LINEAR DISTANCE OPTIMIZATION APPROACH | |
50 | CTJV650 | A STABLE APPROACH FOR ROUTING QUERIES IN UNSTRUCTURED P2P NETWORKS | |
51 | CTJV651 | IPATH: PATH INFERENCE IN WIRELESS SENSOR NETWORKS | |
52 | CTJV652 | OPPORTUNISTIC ROUTING WITH CONGESTION DIVERSITY IN WIRELESS AD HOC NETWORKS | |
53 | CTJV653 | A HOP-BY-HOP ROUTING MECHANISM FOR GREEN INTERNET | |
54 | CTJV654 | CONTINUOUS ANSWERING HOLISTIC QUERIES OVER SENSOR NETWORKS | |
55 | CTJV655 | DICTIONARY BASED SECURE PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORKS | |
56 | CTJV656 | DATA LINEAGE IN MALICIOUS ENVIRONMENTS | |
57 | CTJV657 | FRODO: FRAUD RESILIENT DEVICE FOR OFF-LINE MICRO-PAYMENTS | |
58 | CTJV658 | INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER | |
59 | CTJV659 | MAPPING BUG REPORTS TO RELEVANT FILES: A RANKING MODEL, A FINE-GRAINED BENCHMARK, AND FEATURE EVALUATION |
|
60 | CTJV660 | METAMORPHIC TESTING FOR SOFTWARE QUALITY ASSESSMENT: A STUDY OF SEARCH ENGINES | |
61 | CTJV661 | A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION | |
62 | CTJV662 | A DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORKS |
|
63 | CTJV663 | A FRAMEWORK FOR SECURE COMPUTATIONS WITH TWO NON-COLLUDING SERVERS AND MULTIPLE CLIENTS, APPLIED TO RECOMMENDAT |
|
64 | CTJV664 | A LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORK |
|
65 | CTJV665 | A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMPUTING | |
66 | CTJV666 | A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM | |
67 | CTJV667 | A SCALABLE AND RELIABLE MATCHING SERVICE FOR CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEMS | |
68 | CTJV668 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA | |
69 | CTJV669 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA | |
70 | CTJV670 | AN ATTRIBUTE-ASSISTED RERANKING MODEL FOR WEB IMAGE SEARCH | |
71 | CTJV671 | AN AUTHENTICATED TRUST AND REPUTATION CALCULATION AND MANAGEMENT SYSTEM FOR CLOUD AND SENSOR NETWORKS INTEGRATI |
|
72 | CTJV672 | ASYMMETRIC SOCIAL PROXIMITY BASED PRIVATE MATCHING PROTOCOLS FOR ONLINE SOCIAL NETWORKS | |
73 | CTJV673 | AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED ENCRYPTION | |
74 | CTJV674 | CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING |
|
75 | CTJV675 | CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES | |
76 | CTJV676 | CO-EXTRACTING OPINION TARGETS AND OPINION WORDS FROM ONLINE REVIEWS BASED ON THE WORD ALIGNMENT MODEL |
|
77 | CTJV677 | CONTEXT-BASED DIVERSIFICATION FOR KEYWORD QUERIES OVER XML DATA | |
78 | CTJV678 | CONTEXT-BASED DIVERSIFICATION FOR KEYWORD QUERIES OVER XML DATA | |
79 | CTJV679 | CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION AND SHORT CIPHERTEXTS | |
80 | CTJV680 | CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION |
|
81 | CTJV681 | COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY | |
82 | CTJV682 | DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS | |
83 | CTJV683 | DESIGNING HIGH PERFORMANCE WEB-BASED COMPUTING SERVICES TO PROMOTE TELEMEDICINE DATABASE MANAGEMENT SYSTEM |
|
84 | CTJV684 | DETECTING MALICIOUS FACEBOOK APPLICATIONS | |
85 | CTJV685 | DISCOVERY OF RANKING FRAUD FOR MOBILE APPS | |
86 | CTJV686 | DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR NETWORKS |
|
87 | CTJV687 | EMR: A SCALABLE GRAPH-BASED RANKING MODEL FOR CONTENT-BASED IMAGE RETRIEVAL | |
88 | CTJV688 | IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS | |
89 | CTJV689 | KEY UPDATING FOR LEAKAGE RESILIENCY WITH APPLICATION TO AES MODES OF OPERATION | |
90 | CTJV690 | LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES | |
91 | CTJV691 | LOCATION-AWARE AND PERSONALIZED COLLABORATIVE FILTERING FOR WEB SERVICE RECOMMENDATION | |
92 | CTJV692 | MALWARE PROPAGATION IN LARGE-SCALE NETWORKS | |
93 | CTJV693 | MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING |
|
94 | CTJV694 | ON SUMMARIZATION AND TIMELINE GENERATION FOR EVOLUTIONARY TWEET STREAMS | |
95 | CTJV695 | PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES | |
96 | CTJV696 | PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS |
|
97 | CTJV697 | PRIVACY-PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE | |
98 | CTJV698 | PROGRESSIVE DUPLICATE DETECTION | |
99 | CTJV699 | REAL-TIME DETECTION OF TRAFFIC FROM TWITTER STREAM ANALYSIS | |
100 | CTJV700 | REVERSE NEAREST NEIGHBORS IN UNSUPERVISED DISTANCE-BASED OUTLIER DETECTION | |
101 | CTJV701 | ROUTE-SAVER: LEVERAGING ROUTE APIS FOR ACCURATE AND EFFICIENT QUERY PROCESSING AT LOCATION-BASED SERVICES |
|
102 | CTJV702 | SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY | |
103 | CTJV703 | SECURE SPATIAL TOP-K QUERY PROCESSING VIA UN TRUSTED LOCATION-BASED SERVICE PROVIDERS | |
104 | CTJV704 | STEALTHY DENIAL OF SERVICE STRATEGY IN CLOUD COMPUTING | |
105 | CTJV705 | T-CLOSENESS THROUGH MICRO AGGREGATION: STRICT PRIVACY WITH ENHANCED UTILITY PRESERVATION | |
106 | CTJV706 | TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUES | |
107 | CTJV707 | TWEET SEGMENTATION AND ITS APPLICATION TO NAMED ENTITY RECOGNITION | |
108 | CTJV708 | USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES | |
109 | CTJV709 | CIRCUIT CIPHER TEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING |
|
110 | CTJV710 | PROVABLE MULTI COPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEM | |
111 | CTJV711 | SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD | |
112 | CTJV712 | STEGANOGRAPHY USING REVERSIBLE TEXTURE SYNTHESIS | |
113 | CTJV713 | A LOAD BALANCING MODEL BASED ON CLOUD PARTITIONING FOR THE PUBLIC CLOUD | |
114 | CTJV714 | A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION | |
115 | CTJV715 | DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS | |
116 | CTJV716 | KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE | |
117 | CTJV717 | ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD | |
118 | CTJV718 | BEST KEYWORD COVER SEARCH | |
119 | CTJV719 | PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS | |
120 | CTJV720 | DETECTING MALICIOUS FACE BOOK APPLICATIONS |
S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTJV001 | A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION | |
2 | CTJV002 | A DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORKS | |
3 | CTJV003 | A FRAMEWORK FOR SECURE COMPUTATIONS WITH TWO NON-COLLUDING SERVERS AND MULTIPLE CLIENTS, APPLIED TO RECOMMENDAT |
|
4 | CTJV004 | A LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORK |
|
5 | CTJV005 | A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMPUTING | |
6 | CTJV006 | A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM | |
7 | CTJV007 | A SCALABLE AND RELIABLE MATCHING SERVICE FOR CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEMS | |
8 | CTJV008 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA | |
9 | CTJV009 | A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD | |
10 | CTJV010 | AN ATTRIBUTE-ASSISTED RERANKING MODEL FOR WEB IMAGE SEARCH | |
11 | CTJV011 | AN AUTHENTICATED TRUST AND REPUTATION CALCULATION AND MANAGEMENT SYSTEM FOR CLOUD AND SENSOR NETWORKS INTEGRATI |
|
12 | CTJV012 | ASYMMETRIC SOCIAL PROXIMITY BASED PRIVATE MATCHING PROTOCOLS FOR ONLINE SOCIAL NETWORKS | |
13 | CTJV013 | AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED ENCRYPTION | |
14 | CTJV014 | CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING |
|
15 | CTJV015 | CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES | |
16 | CTJV016 | CO-EXTRACTING OPINION TARGETS AND OPINION WORDS FROM ONLINE REVIEWS BASED ON THE WORD ALIGNMENT MODEL |
|
17 | CTJV017 | CONTEXT-BASED DIVERSIFICATION FOR KEYWORD QUERIES OVER XML DATA | |
18 | CTJV018 | DATA MINIING WITH BIG DATA | |
19 | CTJV019 | CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION AND SHORT CIPHERTEXTS | |
20 | CTJV020 | CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION |
|
21 | CTJV021 | COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY | |
22 | CTJV022 | DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS | |
23 | CTJV023 | DESIGNING HIGH PERFORMANCE WEB-BASED COMPUTING SERVICES TO PROMOTE TELEMEDICINE DATABASE MANAGEMENT SYSTEM |
|
24 | CTJV024 | DETECTING MALICIOUS FACEBOOK APPLICATIONS | |
25 | CTJV025 | DISCOVERY OF RANKING FRAUD FOR MOBILE APPS | |
26 | CTJV026 | DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR NETWORKS |
|
27 | CTJV027 | EMR: A SCALABLE GRAPH-BASED RANKING MODEL FOR CONTENT-BASED IMAGE RETRIEVAL | |
28 | CTJV028 | IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS | |
29 | CTJV029 | KEY UPDATING FOR LEAKAGE RESILIENCY WITH APPLICATION TO AES MODES OF OPERATION | |
30 | CTJV030 | LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES | |
31 | CTJV031 | LOCATION-AWARE AND PERSONALIZED COLLABORATIVE FILTERING FOR WEB SERVICE RECOMMENDATION | |
32 | CTJV032 | MALWARE PROPAGATION IN LARGE-SCALE NETWORKS | |
33 | CTJV033 | MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING |
|
34 | CTJV034 | ON SUMMARIZATION AND TIMELINE GENERATION FOR EVOLUTIONARY TWEET STREAMS | |
35 | CTJV035 | PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES | |
36 | CTJV036 | PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS |
|
37 | CTJV037 | PRIVACY-PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE | |
38 | CTJV038 | PROGRESSIVE DUPLICATE DETECTION | |
39 | CTJV039 | REAL-TIME DETECTION OF TRAFFIC FROM TWITTER STREAM ANALYSIS | |
40 | CTJV040 | REVERSE NEAREST NEIGHBORS IN UNSUPERVISED DISTANCE-BASED OUTLIER DETECTION | |
41 | CTJV041 | ROUTE-SAVER: LEVERAGING ROUTE APIS FOR ACCURATE AND EFFICIENT QUERY PROCESSING AT LOCATION-BASED SERVICES |
|
42 | CTJV042 | SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY | |
43 | CTJV043 | SECURE SPATIAL TOP-K QUERY PROCESSING VIA UN TRUSTED LOCATION-BASED SERVICE PROVIDERS | |
44 | CTJV044 | STEALTHY DENIAL OF SERVICE STRATEGY IN CLOUD COMPUTING | |
45 | CTJV045 | T-CLOSENESS THROUGH MICRO AGGREGATION: STRICT PRIVACY WITH ENHANCED UTILITY PRESERVATION | |
46 | CTJV046 | TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUES | |
47 | CTJV047 | TWEET SEGMENTATION AND ITS APPLICATION TO NAMED ENTITY RECOGNITION | |
48 | CTJV048 | USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES | |
49 | CTJV049 | DISCOVERING EMERGING TOPICS IN SOCIAL STREAMS VIA LINK-ANOMALY DETECTION | |
50 | CTJV050 | DISTRIBUTED, CONCURRENT, AND INDEPENDENT ACCESS TO ENCRYPTED CLOUD DATABASES | |
51 | CTJV051 | EFFICIENT PREDICTION OF DIFFICULT KEYWORD QUERIES OVER DATABASES | |
52 | CTJV052 | DEALING WITH CONCEPT DRIFTS IN PROCESS MINING | |
53 | CTJV053 | A COCKTAIL APPROACH FOR TRAVEL PACKAGE RECOMMENDATION | |
54 | CTJV054 | A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION | |
55 | CTJV055 | A SCALABLE TWO-PHASE TOP-DOWN SPECIALIZATION APPROACH FOR DATA ANONYMIZATION USING MAP REDUCE ON CLOUD |
|
56 | CTJV056 | A STOCHASTIC MODEL TO INVESTIGATE DATA CENTER PERFORMANCE AND QOS IN IAAS CLOUD COMPUTING SYSTEMS |
|
57 | CTJV057 | ACCURACY-CONSTRAINED PRIVACY-PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA | |
58 | CTJV058 | AN INCENTIVE FRAMEWORK FOR CELLULAR TRAFFIC OFFLOADING | |
59 | CTJV059 | AUTOMATIC TEST PACKET GENERATION | |
60 | CTJV060 | BESTPEER++: A PEER-TO-PEER BASED LARGE-SCALE DATA PROCESSING PLATFORM | |
61 | CTJV061 | BOUNDARY CUTTING FOR PACKET CLASSIFICATION | |
62 | CTJV062 | BUILDING CONFIDENTIAL AND EFFICIENT QUERY SERVICES IN THE CLOUD WITH RASP DATA PERTURBATION | |
63 | CTJV063 | CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS | |
64 | CTJV064 | COOPERATIVE CACHING FOR EFFICIENT DATA ACCESS IN DISRUPTION TOLERANT NETWORKS | |
65 | CTJV065 | COST-EFFECTIVE RESOURCE ALLOCATION OF OVERLAY ROUTING RELAY NODES | |
66 | CTJV066 | TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY NETWORKS | |
67 | CTJV067 | DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS | |
68 | CTJV068 | EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING | |
69 | CTJV069 | EFFICIENT AUTHENTICATION FOR MOBILE AND PERVASIVE COMPUTING | |
70 | CTJV070 | ENABLING TRUSTWORTHY SERVICE EVALUATION IN SERVICE-ORIENTED MOBILE SOCIAL NETWORKS | |
71 | CTJV071 | EXPLOITING SERVICE SIMILARITY FOR PRIVACY IN LOCATION-BASED SEARCH QUERIES | |
72 | CTJV072 | EXPRESSIVE, EFFICIENT, AND REVOCABLE DATA ACCESS CONTROL FOR MULTI-AUTHORITY CLOUD STORAGE | |
73 | CTJV073 | FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE | |
74 | CTJV074 | FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS | |
75 | CTJV075 | FRIENDBOOK: A SEMANTIC-BASED FRIEND RECOMMENDATION SYSTEM FOR SOCIAL NETWORKS | |
76 | CTJV076 | KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE | |
77 | CTJV077 | LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM | |
78 | CTJV078 | ON FALSE DATA-INJECTION ATTACKS AGAINST POWER SYSTEM STATE ESTIMATION: MODELING AND COUNTERMEASURES |
|
79 | CTJV079 | OPTIMAL DISTRIBUTED MALWARE DEFENSE IN MOBILE NETWORKS WITH HETEROGENEOUS DEVICES | |
80 | CTJV080 | ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD | |
81 | CTJV081 | PRIVACY-ENHANCED WEB SERVICE COMPOSITION | |
82 | CTJV082 | PRIVACY-PRESERVING AND CONTENT-PROTECTING LOCATION BASED QUERIES | |
83 | CTJV083 | PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA | |
84 | CTJV084 | PROFILR : TOWARD PRESERVING PRIVACY AND FUNCTIONALITY IN GEOSOCIAL NETWORKS | |
85 | CTJV085 | RRE: A GAME-THEORETIC INTRUSION RESPONSE AND RECOVERY ENGINE | |
86 | CTJV086 | SCALABLE DISTRIBUTED SERVICE INTEGRITY ATTESTATION FOR SOFTWARE-AS-A-SERVICE CLOUDS | |
87 | CTJV087 | SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS | |
88 | CTJV088 | SECURE OUT SOURCED ATTRIBUTE-BASED SIGNATURES | |
89 | CTJV089 | SECURING BROKER-LESS PUBLISH/SUBSCRIBE SYSTEMS USING IDENTITY-BASED ENCRYPTION | |
90 | CTJV090 | SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK | |
91 | CTJV091 | SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS | |
92 | CTJV092 | SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH | |
93 | CTJV093 | THE CLIENT ASSIGNMENT PROBLEM FOR CONTINUOUS DISTRIBUTED INTERACTIVE APPLICATIONS: ANALYSIS, ALGORITHMS, AND EVALUATION |
|
94 | CTJV094 | THE DESIGN AND EVALUATION OF AN INFORMATION SHARING SYSTEM FOR HUMAN NETWORKS | |
95 | CTJV095 | TOP-K QUERY RESULT COMPLETENESS VERIFICATION IN TIERED SENSOR NETWORKS | |
96 | CTJV096 | TOWARDS DIFFERENTIAL QUERY SERVICES IN COST-EFFICIENT CLOUDS | |
97 | CTJV097 | TOWARDS ONLINE SHORTEST PATH COMPUTATION |
© 2011-20 Conscience Technologies - All Rights Reserved