IEEE 2014 JAVA / J2EE /DOT NET TITLES
OCULAR SYSTEMS LLP
OFFICE NO 01, SWAGAT CORNER BUILDING, NEAR NARAYANI DHAM,
KATRAJ, PUNE-46
020 30858066/ 9970186685
S.NO TITLE TECHNOLOGY MONTH/
YEAR
KNOWLEDGE AND DATA ENGINEERING / DATA MINING
1 Supporting Privacy Protection in Personalized Web Search JAVA/J2EE Feb 2014
2 Fast Nearest Neighbor Search with Keywords JAVA April 2014
3 Approximate Shortest Distance Computing: A Query-Dependent
Local Landmark Scheme
JAVA/J2EE Jan 2014
4 LARS: An Efficient and Scalable Location-Aware Recommender
System
JAVA/J2EE June 2014
5 Dynamic Query Forms for Database Queries JAVA/J2EE Preprint
6 Privacy Preserving Delegated Access Control in Public Clouds JAVA/J2EE Preprint
7 m-Privacy for Collaborative Data Publishing JAVA/J2EE Preprint
8 Scalable Keyword Search on Large RDF Data JAVA/J2EE Preprint
IMAGE PROCESSING
9 Designing an Efficient Image Encryption-Then-Compression
System via Prediction Error Clustering and Random Permutation
- Information Forensics and Security
JAVA Jan 2014
10 Fingerprint Compression Based on Sparse Representation JAVA Feb 2014
11 Hierarchical Prediction and Context Adaptive Coding for Lossless
Color Image Compression
JAVA Jan 2014
CLOUD COMPUTING
12 Oruta: Privacy-Preserving Public Auditing for Shared Data in the
Cloud
JAVA/J2EE Jan- Mar
2014
13 Decentralized Access Control with Anonymous Authentication of
Data Stored in Clouds - Parallel Distributed Systems
Feb 2014
14 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud
Storage - Parallel Distributed Systems
Feb 2014
15 On the Knowledge Soundness of a Cooperative Provable Data
Possession Scheme in Multicloud Storage - Parallel Distributed
Systems
Jan 2014
16 Privacy Preserving Back-Propagation Neural Network Learning
Made Practical with Cloud Computing
JAVA/J2EE Jan 2014
17 Identity-Based Distributed Provable Data Possession in Multi-
Cloud Storage- Services Computing
DOT NET Jan 2014
NETWORKING
18 Secure Data Retrieval for Decentralized Disruption-Tolerant
Military Networks
Feb 2014
WIRELESS COMMUNICATIONS
19 Incentive Based Data Sharing in Delay Tolerant Mobile Networks JAVA Jan 2014
DEPENDABLE SECURE COMPUTING / NETWORK SECURITY
20 Hiding in the Mobile Crowd: Location Privacy through
Collaboration
JAVA May – June
2014
MOBILE COMPUTING
21 Energy-Efficient Reliable Routing Considering Residual Energy
in Wireless Ad Hoc Networks
Feb 2014
22 Video Dissemination over Hybrid Cellular and Ad Hoc Networks
Feb 2014
23 Energy-optimum Throughput and Carrier Sensing Rate in
CSMA-based Wireless Networks
JAVA June 2014
24 Cooperative Caching for Efficient Data Access in Disruption
Tolerant Networks
JAVA March
2014
25 Privacy-Preserving and Truthful Detection of Packet Dropping
Attacks in Wireless Ad Hoc Networks
JAVA Preprint
2014
PARALLEL DISTRIBUTED SYSTEMS
26 Securing Broker-Less Publish/Subscribe Systems Using Identity-
Based Encryption
Feb 2014
27 Traffic pattern-based content leakage detection for trusted
content delivery networks
Feb 2014
28 A System for Denial-of-Service Attack Detection Based on
Multivariate Correlation Analysis
JAVA Feb 2014
29 Cross-Layer Approach for Minimizing Routing Disruption in IP
Networks
JAVA July 2014
SECURITY AND PRIVACY
30 Bandwidth Distributed Denial of Service: Attacks and Defenses JAVA Jan – Feb
2014