Anda di halaman 1dari 4

S.

N o 1 2 3 4 5 6 7 8 9 10 11 12 13

P.Code

Titles 2012-13 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Discovering Characterizations of the Behavior of Anomalous Sub-populations Efficient Audit Service Outsourcing for Data Integrity in Clouds Ensuring Distributed Accountability for Data Sharing in the Cloud Optimizing Cloud Resources for Delivering IPTV Services through Virtualization Personalized image search Privacy- and Integrity-Preserving Range Queries in Sensor Networks Privacy- Preserving public Auditing for secure cloud storage Ranking Model Adaptation for Domain-Specific Search Probalistic model of (tn) Visual Cryptography scheme with Dynamic group Reliable Re-encryption in Unreliable Clouds ROAD A New Spatial Object Search Scalable and Secure Sharing of Personal Health Records in Cloud Computing document

DNDN21 DN3 DN4 DN5 DN6 DN7 DN8 DN9 DN10 DN11 DN12 DN13 DN14

14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

DN15 DN16 DN17 DN18 DN19 DN20 DN21 DN22 DN22 DN23 DN24 DN25 DN26 DN27 DN28 DN29

The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks Topology Control in Mobile Ad Hoc Networks with Cooperative Communications A SECURE ERASURE CODE BASED SYSTEM Ensuring Distributed Accountability mininig web grap Persuasive cued-click points Design implementation and evaluation of knowledge based authentication mechanism Probalistic model of (tn) Visual Cryptography scheme with Dynamic group Robust_Face-Name_Graph_Matching_for_Movie_Character_I dentification._bp SPOC A Secure and Privacy-preserving view invariant action Active Visual Segmentation Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis Optimal source based filtering malacion tra Privacy- Preserving public Auditing for secure cloud storage three tire security view invariant action

JAVA 30 31 32 33 34 35 36 37 38 39 40 41 42 43 JA1 JA2 JA3 JA4 JA5 JA6 JA7 JA8 JA9 DN30 DN31 DN32 DN33 DN34 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad Cloud Computing Security From Single to Multi-Clouds Efficient Audit Service Outsourcing for Data Integrity in Clouds Ensuring Distributed Accountability for Data Sharing in the Cloud Fast Data Collection in Tree-Based Wireless Sensor Networks Load Balancing Multipath Switching System with Flow Slice Online System for Grid Resource Monitoring Privacy- and Integrity-Preserving Range Queries in Sensor Networks Visual Cryptography DOTNET AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies Cooperative Download in Vehicular Environments Mining Web Graphs for Recommendations Personlizing-Web directories_Last Privacy- and Integrity-Preserving Range Queries in Sensor Networks

44 45 46

DN35 DN36 DN37

A New Spatial Object Search Framework for Road Networks Continuous Top-k Dominating Queries 2012 A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems

DOTNET 47

DN38 JA10 JA11 JA12 JA13 JA14

An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks

JAVA 48 49 50 51 52 Ranking Model Adaptation for a frame work for routing performance analysis

Learn to Personalized Image Search from the Photo Sharing Websites Handwritten Chinese Text Recognition by Integrating Multiple Contexts A Stochastic Model of Multivirus Dynamics

Anda mungkin juga menyukai