IEEE DOTNET 2017-2018

[vc_row][vc_column width=”1/1″][vc_tabs interval=”10″ el_class=”nav-bar-java”][vc_tab title=”Cloud” tab_id=”1506542085-1-82″][vc_column_text]

         CLOUD COMPUTING

1 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
2 Securing Cloud Data under Key Exposure
3 Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
4 Privacy Protection based Access Control Scheme in Cloud-based Services
5 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
6 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
7 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
8 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
9 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
10 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
11 Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
12 Energy-Aware Load Balancing and Application Scaling for the Cloud Ecosystem
13 kBF: Towards Approximate and Bloom Filter based Key-Value Storage for Cloud Computing Systems
14 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
15 Resource provisioning for task-batch based workflows with deadlines in public clouds
16 Cost Optimization for Dynamic Replication and Migration of Data in Cloud Data Centers
17 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
18 Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data
19 Fast Phrase Search for Encrypted Cloud Storage
20 Partial Utility-Driven Scheduling for Flexible SLA and Pricing Arbitration in Clouds
24 A New Cloud Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
25 Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks
26 Application-Aware Big Data Deduplication in Cloud Environment
27 Virtual Machine Migration Planning in Software-Defined Networks
28 Fault Tolerant Stencil Computation on Cloud-based GPU Spot Instances
29 Dynamic Resource Provisioning for Energy Efficient Cloud Radio Access Networks
30 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
31 Privacy-Preserving Location-Proximity for Mobile Apps
32 Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data
33 Resource provisioning for task-batch based workflows with deadlines in public clouds
34 Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things

[/vc_column_text][/vc_tab][vc_tab title=”DataMining” tab_id=”1506542085-2-87″][vc_column_text]

                          DATAMINING

1 Search Rank Fraud and Malware Detection in Google Play
2 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks  
3 Influence Maximization in Trajectory Databases  
4 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets  
5 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback  
6 Explaining Missing Answers to Top-k SQL Queries  
7 Designing High-Performance Web-Based Computing Services to Promote Telemedicine Database Management System  
8 Continuous Top-k Monitoring on Document Streams  
9 Generating Query Facets using Knowledge Bases  
10 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback  
11 Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data  
12 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge  
13 Influence Maximization in Trajectory Databases  
14 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback  
15 User Vitality Ranking and Prediction in Social Networking Service: a Dynamic Network Perspective  
16 Energy-efficient Query Processing in Web Search Engines  
17 Search Rank Fraud and Malware Detection in Google Play  
18 SAP: Improving Continuous Top-K Queries over Streaming Data  
19 Online Multi-task Learning Framework for Ensemble Forecasting  
20 Probabilistic Models For Ad View ability Prediction On The Web  
21 Mining Competitors from Large Unstructured Datasets  
22 GALLOP: GlobAL feature fused LOcation Prediction for Different Check-in Scenarios  
23 Efficient Clue-based Route Search on Road Networks  
24 Microscopic and Macroscopic spatio-temporal Topic Models for Check-in Data  
25 Large-scale Location Prediction for Web Pages  
26 Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction  
27 Discrete Nonnegative Spectral Clustering  
28 Managing Temporal Constraints with Preferences: Representation, Reasoning, and Querying  
29 Facilitating Time Critical Information Seeking in Social Media  
30 Stochastic Blockmodeling and Variational Bayes Learning for Signed Network Analysis  
31 Finding Related Forum Posts through Content Similarity over Intention-based Segmentation  
32 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items  
33 Towards Real-Time, Country-Level Location Classification of Worldwide Tweets  
34 Differentially Private Data Publishing and Analysis: a Survey  
35 Scalable Algorithms for CQA Post Voting Prediction  
36 Adaptive ensembling of semi-supervised clustering solutions  
37 A Multi-objective Optimization Approach for Question Routing in Community Question Answering Sevices  
41 Data-Driven Answer Selection in Community QA Systems  
42 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach  
43 Energy-efficient Query Processing in Web Search Engines  
44 Online Multi-task Learning Framework for Ensemble Forecasting  
45 Privacy-Preserving Selective Aggregation of Online User Behavior Data  
46 Privacy protection based access control scheme in cloud-based services  
47 Continuous Top-k Monitoring on Document Streams Retrieval  
48 Dynamic Facet Ordering for Faceted Product Search Engines  
49 Applying Combinatorial Testing To datamining Algorithms  
50 Assessing Invariant Mining Techniques For Cloud-Based Utility Computing Systems  
51 Dltsr: A Deep Learning Framework For Recommendations Of Long-Tail Web Services  
52 Data Center Server Provision : Distributed Asynchronous Control For Coupled Renewal Systems  
53 Outliers discovery From smart meters data Using A Statistical Based datamining approach  

[/vc_column_text][/vc_tab][vc_tab tab_id=”4f23c2b8-df2c-2″ title=”Image Processing”][vc_column_text]IMAGE PROCESSING

 

1

Temporal Dependent Rate-Distortion Optimization for Low-Delay Hierarchical Video Coding.
 

2

Scalable Image Coding Based on Epitomes  
 

3

Image Re-ranking based on Topic Diversity  
 

4

Coherent Semantic-visual Indexing for Large-scale Image Retrieval in the Cloud  
 

5

Learning the image processing pipeline  

[/vc_column_text][/vc_tab][vc_tab tab_id=”d947003a-b129-3″ title=”Security”][vc_column_text]                                                                NETWORKING AND SECURITY

 

1

An Overlay Architecture for Throughput Optimal Multipath Routing
 

2

Routing in Accumulative Multi-Hop Networks
 

3

Coding for Improved Throughput Performance in Network Switches
 

4

Power Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet Protocol
 

5

A Scalable Framework for Wireless Distributed Computing
 

6

Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels
7 Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems
8 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks
9 A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails
10 On Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional Antennas: Theoretical Foundation and Algorithm Design
11 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
12 Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks

[/vc_column_text][/vc_tab][vc_tab tab_id=”d2473b62-0647-4″ title=”Wireless Networks”][vc_column_text]

                                                    Wireless Sensor Networks

 

1

Energy –Efficient Transmission Based On Compressive Sensing In Wsn
 

2

Filtering Noisy 802.11 Time-Of-Flight Ranging Measurements From Commoditized Wifi Radios
 

3

Maximizing Lifetime In Wireless Sensor Network For Structural Health Monitoring With And Without Energy Harvesting
4 Power Efficiency And Delay Trade Off Of 10gbase-T Energy Efficient Ethernet Protocol
5 Data-Driven Faulty Node Detection Scheme for Wireless Sensor Networks

[/vc_column_text][/vc_tab][vc_tab tab_id=”122beab2-97fc-5″ title=”Secure Computing”][vc_column_text]                                                          DEPENDABLE AND SECURE COMPUTING

 

1

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

 

 

2

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

 

 

3

TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud

 

4 My Privacy My Decision: Control of Photo Sharing on Online Social Networks

 

5 Privacy-Preserving Aggregate Queries for Optimal Location Selection

 

6 MMBcloud -Tree: Authenticated Index for Verifiable Cloud Service Selection

Networking

 

7 Cloud Data Auditing Techniques with a Focus on Privacy and Security
8 A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing
9 Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
10 Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
11 Fault-Tolerant Adaptive Routing in Dragonfly Networks
12 Optimal Spot-Checking for Collusion Tolerance in Computer Grids -Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
13 Privacy-Preserving Aggregate Queries for Optimal Location Selection
14 Design and Implementation of the Ascend Secure Processor
15 Efficient Delegated Private Set Intersection on Outsourced Private Datasets
16 Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices
17 Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

[/vc_column_text][/vc_tab][vc_tab tab_id=”bdf9ecab-1854-6″ title=”Service Computing”][vc_column_text]                                                           SERVICE COMPUTING

1 Resource renting for periodical cloud workflow applications
2 Pattern-Based Design and Verification of Secure Service Compositions
3 DLTSR: A Deep Learning Framework for Recommendation of Long-tail Web Services

 

4 Optimal Task Dispatching on Multiple Heterogeneous Multiserver Systems with Dynamic Speed and Power Management

 

5 Energy Theft Detection in Multi-Tenant Data Centers with Digital Protective Relay Deployment

 

6 Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud

 

7 Resource renting for periodical cloud workflow applications
8 Time Dependent Pricing for Large-scale Mobile Networks of Urban Environment: Feasibility and Adaptability
9 TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
10 Transactional Behavior Verification in Business Process as a Service Configuration
11 FogRoute: DTN-based Data Dissemination Model in Fog Computing
12 Pattern−Based Design and Verification of Secure Service Compositions
13 LoDPD: A Location Difference-based Proximity Detection Protocol for Fog Computing
14 Resource Allocation in Vehicular Cloud Computing Systems with Heterogeneous Vehicles and Roadside Units
15 Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions
16 A Context-Aware Architecture Supporting Service Availability in Mobile Cloud Computing
17 A Light weight securedata Sharing Scheme For Mobile Cloud Computing
18 A Multi-Objectiveoptimization Approach For Question Routingin Community Question Answering Sevices

[/vc_column_text][/vc_tab][vc_tab tab_id=”6e5e16e4-c4e9-7″ title=”Mobile / Multimedia”][vc_column_text]                                                                      MOBILE COMPUITNG

1 Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
2 A Classroom Scheduling Service for Smart Classes s

 

3 Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support

 

4 Searching Trajectories by Regions of Interest

 

5 ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
6 Performance Analysis of Mobile Data Offloading in Heterogeneous Networks

 

7 Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy

 

                                                                        MULTIMEDIA

1  Cost-Effective Low-Delay Design for Multi-Party Cloud Video Conferencing
2 Image Based Appraisal of Real Estate Properties

 

3  Visual Tracking via Nonnegative Multiple Coding

 

4 Image Based Appraisal of Real Estate Properties

 

5 Cost-Effective Low-Delay Design for Multi-Party Cloud Video Conferencing

[/vc_column_text][/vc_tab][/vc_tabs][/vc_column][/vc_row]