2014 UPDATED LIST
- Keyword Query Routing
- An Empirical Performance Evaluation of Relational Keyword Search Systems.
- Consistency as a Service Auditing Cloud Consistency.
- Prediction-Based Cloud Bandwidth and Cost Reduction System
- Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
- Trusted DB: A Trusted Hardware based Database with Privacy and Data Confidentiality
- Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
- Secure Mining of Association Rules in Horizontally Distributed Databases
CLOUD COMPUTING
- Collaboration-Based Cloud Computing Security Management Framework
- CDA: A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures
- A Self-tuning Failure Detection Scheme for Cloud Computing Service
- STAR: A proposed architecture for cloud computing applications
- Rethinking Vehicular Communications: Merging VANET with cloud computing
- Scalable and secure of personal health records in cloud computing using Attribute-based encryption.
- Data Integrity Proofs in Cloud Storage
- Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
- Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
- Data Integrity Proofs in Cloud Storage
- Next Generation Cloud Computing Architecture.
WEB MINING
- Association rule- extracting knowledge using Market Basket Analysis
- A Collaborative Decentralized Approach to Web Search
- Adaptive Provisioning of Human Expertise in Service-oriented Systems
WIRELESS SENSOR NETWORKING
- An Ant Colony Optimization Approach for Maximizing the Lifetime of Heterogeneous Wireless Sensor Networks
- Maximizing Lifetime Vector in Wireless Sensor Networks
- Framework of a national level electronic health record system
- A rainfall prediction model using artificial neural network
- A VANET based Intelligent Road Traffic Signaling System
- Security in Wireless Sensor Networks with Public Key Techniques
- On maximizing the Lifetime of WSN using virtual backbone scheduling
- Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis.
- A Cluster Allocation and Routing Algorithm based on Node Density for Extending Lifetime in WSN
- The Cluster head Chaining Scheme considering scalability of the WSN
MOBILE COMPUTING
NETWORK
- Caching strategies based on information Density estimation in wireless ad Hoc network
- Random Cast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks
- FARMERS BUDDY
- Benefit-based data caching in ad hoc networks.
- Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking
NETWORK + SECURITY
- A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
- An Elliptic Curve Cryptography Based on Matrix Scrambling Method.
- Hybrid Intrusion Detection Systems (HIDS) using Fuzzy Logic
- Network Problem Notification Via SMS
- Credit Card Fraud Detection Using Hidden Markov Model
- A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors(2009)
- Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection(2011)
- Data Leakage Detection
- Enhanced Security for Online Exams Using Group Cryptography
- Host Based Intrusion Detection and Prevention System
- DDOS Tracking and Monitoring System Using HMM