0% found this document useful (0 votes)
29 views

Java Titles

The document lists 20 titles of research papers categorized under three domains: cloud, data mining, and networking. The majority of the titles (10) fall under cloud computing and focus on topics like role-based access control, auditing protocols, data sharing, and resource allocation in cloud storage systems. Seven titles address various data mining challenges including temporal pattern discovery, spatial search, clustering, and querying over uncertain data streams. The remaining three titles relate to networking issues such as routing protocols, firewall optimization, and key distribution in wireless sensor networks.

Uploaded by

apexhrmail
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Java Titles

The document lists 20 titles of research papers categorized under three domains: cloud, data mining, and networking. The majority of the titles (10) fall under cloud computing and focus on topics like role-based access control, auditing protocols, data sharing, and resource allocation in cloud storage systems. Seven titles address various data mining challenges including temporal pattern discovery, spatial search, clustering, and querying over uncertain data streams. The remaining three titles relate to networking issues such as routing protocols, firewall optimization, and key distribution in wireless sensor networks.

Uploaded by

apexhrmail
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

S.

NO

TITLES

DOMAIN

1 Achieving Secure Role-Based Access Control On
Encrypted Data in Cloud Storage
CLOUD
2 An Efficient and Secure Dynamic Auditing Protocol
for Data Storage in Cloud Computing
CLOUD
3 Enabling Dynamic Data and Indirect Mutual Trust for
Cloud Computing Storage Systems
CLOUD
4 Harnessing the Cloud for Securely Outsourcing
Large-Scale Systems of Linear Equations
CLOUD
5 Improving Security and Efficiency in Attribute -Based
Data Sharing
CLOUD
6 Load Rebalancing for Distributed
File Systems in Clouds

CLOUD
7 Scalable and Secure Sharing of Personal Health Records in
Cloud Computing UsingAttribute-Based Encryption

CLOUD
8 Dynamic Resource Allocation Using Virtual
Machines for Cloud Computing Environment

CLOUD
9 Constrained Text Coclustering with Supervised
and Unsupervised Constraints
DATA MINING

10 Discovering Temporal Change Patterns
in the Presence of Taxonomies

DATA MINING

11 Spatial Approximate String Search

DATA MINING

12 The Impact of Cluster Representatives on the
Convergence of theK-Modes Type Clustering
DATA MINING

13 Clustering Spatiotemporal Data: An Augmented
Fuzzy C-Means

DATA MINING

14 Optimizing Multi-Top-k Queries over
Uncertain Data Streams

DATA MINING

15 ALERT: An Anonymous Location-Based
Efficient Routing Protocol in MANETs

NETWORKING

16 Cross-Domain Privacy-Preserving Cooperative
Firewall Optimization

NETWORKING

17 Efficient All Top-kComputationA Unified
Solution for All Top-k, Reverse Top-k
and Top-mInfluential Queries

NETWORKING

18 Gaussian versus Uniform Distribution
for Intrusion Detection in Wireless
Sensor Networks

NETWORKING

19 Pairwise and Triple Key Distribution in
Wireless Sensor Networks with Applications

NETWORKING

20 Vampire Attacks NETWORKING

You might also like