Java Titles
Java Titles
NO
TITLES
DOMAIN
1 Achieving Secure Role-Based Access Control On
Encrypted Data in Cloud Storage
CLOUD
2 An Efficient and Secure Dynamic Auditing Protocol
for Data Storage in Cloud Computing
CLOUD
3 Enabling Dynamic Data and Indirect Mutual Trust for
Cloud Computing Storage Systems
CLOUD
4 Harnessing the Cloud for Securely Outsourcing
Large-Scale Systems of Linear Equations
CLOUD
5 Improving Security and Efficiency in Attribute -Based
Data Sharing
CLOUD
6 Load Rebalancing for Distributed
File Systems in Clouds
CLOUD
7 Scalable and Secure Sharing of Personal Health Records in
Cloud Computing UsingAttribute-Based Encryption
CLOUD
8 Dynamic Resource Allocation Using Virtual
Machines for Cloud Computing Environment
CLOUD
9 Constrained Text Coclustering with Supervised
and Unsupervised Constraints
DATA MINING
10 Discovering Temporal Change Patterns
in the Presence of Taxonomies
DATA MINING
11 Spatial Approximate String Search
DATA MINING
12 The Impact of Cluster Representatives on the
Convergence of theK-Modes Type Clustering
DATA MINING
13 Clustering Spatiotemporal Data: An Augmented
Fuzzy C-Means
DATA MINING
14 Optimizing Multi-Top-k Queries over
Uncertain Data Streams
DATA MINING
15 ALERT: An Anonymous Location-Based
Efficient Routing Protocol in MANETs
NETWORKING
16 Cross-Domain Privacy-Preserving Cooperative
Firewall Optimization
NETWORKING
17 Efficient All Top-kComputationA Unified
Solution for All Top-k, Reverse Top-k
and Top-mInfluential Queries
NETWORKING
18 Gaussian versus Uniform Distribution
for Intrusion Detection in Wireless
Sensor Networks
NETWORKING
19 Pairwise and Triple Key Distribution in
Wireless Sensor Networks with Applications
NETWORKING
20 Vampire Attacks NETWORKING