MIJ1701 |
ACHIEVING SECURE, UNIVERSAL, AND FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1702 |
RAAC: ROBUST AND AUDITABLE ACCESS CONTROL WITH MULTIPLE ATTRIBUTE AUTHORITIES FOR PUBLIC CLOUD STORAGE |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1703 |
A LIGHTWEIGHT SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1704 |
A NEW SERVICE MECHANISM FOR PROFIT OPTIMIZATIONS OF A CLOUD PROVIDER AND ITS USERS |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1705 |
A NOVEL EFFICIENT REMOTE DATA POSSESSION CHECKING PROTOCOL IN CLOUD STORAGE |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1706 |
A ROBUST REPUTATION MANAGEMENT MECHANISM IN THE FEDERATED CLOUD |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1707 |
ACHIEVING EFFICIENT AND SECURE DATA ACQUISITION FOR CLOUD- SUPPORTED INTERNET OF THINGS IN SMART GRID |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1708 |
A CROSS TENANT ACCESS CONTROL (CTAC) MODEL FOR CLOUD COMPUTING: FORMAL SPECIFICATION AND VERIFICATION |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1709 |
ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1710 |
CUSTOMER-SATISFACTION-AWARE OPTIMAL MULTI SERVER CONFIGURATION FOR PROFIT MAXIMIZATION IN CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1711 |
EFFICIENT AND EXPRESSIVE KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1712 |
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1713 |
IDENTITY-BASED DATA OUTSOURCING WITH COMPREHENSIVE AUDITING IN CLOUDS |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1714 |
IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1715 |
IDENTITY-BASED PRIVATE MATCHING OVER OUTSOURCED ENCRYPTED DATASETS |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1716 |
IDENTITY-BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1717 |
ON THE SECURITY OF DATA ACCESS CONTROL FOR MULTI-AUTHORITY CLOUD STORAGE SYSTEMS |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1718 |
PRIVACY PROTECTION AND INTRUSION AVOIDANCE FOR CLOUDLET-BASED MEDICAL DATA SHARING |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1719 |
PRIVACY PROTECTION BASED ACCESS CONTROL SCHEME IN CLOUD-BASED SERVICES |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1720 |
PRIVACY-PRESERVING MULTIKEY WORD SIMILARITY SEARCH OVER OUTSOURCED CLOUD DATA |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1721 |
PROVABLY SECURE KEY-AGGREGATE CRYPTOSYSTEMS WITH BROADCAST AGGREGATE KEYS FOR ONLINE DATA SHARING ON THE CLOUD |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1722 |
A MODIFIED HIERARCHICAL ATTRIBUTE-BASED ENCRYPTION ACCESS CONTROL METHOD FOR MOBILE CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1723 |
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED ENCRYPTION |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1724 |
SECURING CLOUD DATA UNDER KEY EXPOSURE |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1725 |
TAFC: TIME AND ATTRIBUTE FACTORS COMBINED ACCESS CONTROL FOR TIME-SENSITIVE DATA IN PUBLIC CLOUD |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1726 |
TEES: AN EFFICIENT SEARCH SCHEME OVER ENCRYPTED DATA ON MOBILE CLOUD |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1727 |
TWO-CLOUD SECURE DATABASE FOR NUMERIC-RELATED SQL RANGE QUERIES WITH PRIVACY PRESERVING |
CLOUD COMPUTING |
JAVA |
|
|
MIJ1728 |
AN ITERATIVE CLASSIFICATION SCHEME FOR SANITIZING LARGE-SCALE DATASETS |
DATA MINING |
JAVA |
|
|
MIJ1729 |
ANALYZING SENTIMENTS IN ONE GO: A SUPERVISED JOINT TOPIC MODELING APPROACH |
DATA MINING |
JAVA |
|
|
MIJ1730 |
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING |
DATA MINING |
JAVA |
|
|
MIJ1731 |
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS |
DATA MINING |
JAVA |
|
|
MIJ1732 |
DETECTING STRESS BASED ON SOCIAL INTERACTIONS IN SOCIAL NETWORKS |
DATA MINING |
JAVA |
|
|
MIJ1733 |
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES |
DATA MINING |
JAVA |
|
|
MIJ1734 |
EFFICIENT CLUE-BASED ROUTE SEARCH ON ROAD NETWORKS |
DATA MINING |
JAVA |
|
|
MIJ1735 |
EFFICIENT KEYWORD-AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION |
DATA MINING |
JAVA |
|
|
MIJ1736 |
ENERGY-EFFICIENT QUERY PROCESSING IN WEB SEARCH ENGINES |
DATA MINING |
JAVA |
|
|
MIJ1737 |
GENERATING QUERY FACETS USING KNOWLEDGE BASES |
DATA MINING |
JAVA |
|
|
MIJ1738 |
INFLUENTIAL NODE TRACKING ON DYNAMIC SOCIAL NETWORK: AN INTERCHANGE GREEDY APPROACH |
DATA MINING |
JAVA |
|
|
MIJ1739 |
L-INJECTION: TOWARD EFFECTIVE COLLABORATIVE FILTERING USING UNINTERESTING ITEMS |
DATA MINING |
JAVA |
|
|
MIJ1740 |
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS |
DATA MINING |
JAVA |
|
|
MIJ1741 |
MODELING INFORMATION DIFFUSION OVER SOCIAL NETWORKS FOR TEMPORAL DYNAMIC PREDICTION |
DATA MINING |
JAVA |
|
|
MIJ1742 |
PERSONAL WEB REVISITATION BY CONTEXT AND CONTENT KEYWORDS WITH RELEVANCE FEEDBACK |
DATA MINING |
JAVA |
|
|
MIJ1743 |
PPRANK: ECONOMICALLY SELECTING INITIAL USERS FOR INFLUENCE MAXIMIZATION IN SOCIAL NETWORKS |
DATA MINING |
JAVA |
|
|
MIJ1744 |
QDA: A QUERY-DRIVEN APPROACH TO ENTITY RESOLUTION |
DATA MINING |
JAVA |
|
|
MIJ1745 |
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING FOLKSONOMY DATA |
DATA MINING |
JAVA |
|
|
MIJ1746 |
RAPARE: A GENERIC STRATEGY FOR COLD-START RATING PREDICTION PROBLEM |
DATA MINING |
JAVA |
|
|
MIJ1747 |
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS |
DATA MINING |
JAVA |
|
|
MIJ1748 |
TOWARDS REAL-TIME, COUNTRY-LEVEL LOCATION CLASSIFICATION OF WORLDWIDE TWEETS |
DATA MINING |
JAVA |
|
|
MIJ1749 |
TRAJECTORY COMMUNITY DISCOVERY AND RECOMMENDATION BY MULTI- SOURCE DIFFUSION MODELING |
DATA MINING |
JAVA |
|
|
MIJ1750 |
UNDERSTAND SHORT TEXTS BY HARVESTING AND ANALYZING SEMANTIC KNOWLEDGE |
DATA MINING |
JAVA |
|
|
MIJ1751 |
USER VITALITY RANKING AND PREDICTION IN SOCIAL NETWORKING SERVICES: A DYNAMIC NETWORK PERSPECTIVE |
DATA MINING |
JAVA |
|
|
MIJ1752 |
USER-CENTRIC SIMILARITY SEARCH |
DATA MINING |
JAVA |
|
|
MIJ1753 |
WHEN TO MAKE A TOPIC POPULAR AGAIN? A TEMPORAL MODEL FOR TOPIC RE-HOTTING PREDICTION IN ONLINE SOCIAL NETWORKS |
DATA MINING |
JAVA |
|
|
MIJ1754 |
AN OVERLAY ARCHITECTURE FOR THROUGHPUT OPTIMAL MULTIPATH ROUTING |
NETWORKING |
JAVA |
|
|
MIJ1755 |
FACECHANGE: ATTAINING NEIGHBOR NODE ANONYMITY IN MOBILE OPPORTUNISTIC SOCIAL NETWORKS WITH FINE-GRAINED CONTROL |
NETWORKING |
JAVA |
|
|
MIJ1756 |
NETWORK CAPABILITY IN LOCALIZING NODE FAILURES VIA END-TO-END PATH MEASUREMENTS |
NETWORKING |
JAVA |
|
|
MIJ1757 |
PRIVACY AND INTEGRITY PRESERVING TOP-K QUERY PROCESSING FOR TWO- TIERED SENSOR NETWORK |
NETWORKING |
JAVA |
|
|
MIJ1758 |
ROUTING IN ACCUMULATIVE MULTI-HOP NETWORKS |
NETWORKING |
JAVA |
|
|
MIJ1759 |
SWEET: SERVING THE WEB BY EXPLOITING EMAIL TUNNELS |
NETWORKING |
JAVA |
|
|
MIJ1760 |
A PROXY-BASED COLLABORATION SYSTEM TO MINIMIZE CONTENT DOWNLOAD TIME AND ENERGY CONSUMPTION |
MOBILE COMPUTING |
JAVA |
|
|
MIJ1761 |
DETECTING MOBILE MALICIOUS WEBPAGES IN REAL TIME |
MOBILE COMPUTING |
JAVA |
|
|
MIJ1762 |
QUANTIFYING INTERDEPENDENT PRIVACY RISKS WITH LOCATION DATA |
MOBILE COMPUTING |
JAVA |
|
|
MIJ1763 |
SEARCHING TRAJECTORIES BY REGIONS OF INTEREST |
MOBILE COMPUTING |
JAVA |
|
|
MIJ1764 |
SUPERMAN: SECURITY USING PRE-EXISTING ROUTING FOR MOBILE AD HOC NETWORKS |
MOBILE COMPUTING |
JAVA |
|
|
MIJ1765 |
IASK: A DISTRIBUTED Q&A SYSTEM INCORPORATING SOCIAL COMMUNITY AND GLOBAL COLLECTIVE INTELLIGENCE |
PARALLEL AND DISTRIBUTED SYSTEMS |
JAVA |
|
|
MIJ1766 |
A CREDIBILITY ANALYSIS SYSTEM FOR ASSESSING INFORMATION ON TWITTER |
SECURE COMPUTING |
JAVA |
|
|
MIJ1767 |
EFFICIENT AND PRIVACY-PRESERVING MIN AND K-TH MIN COMPUTATIONS IN MOBILE SENSING SYSTEMS |
SECURE COMPUTING |
JAVA |
|
|
MIJ1768 |
FASTGEO: EFFICIENT GEOMETRIC RANGE QUERIES ON ENCRYPTED SPATIAL DATA |
SECURE COMPUTING |
JAVA |
|
|
MIJ1769 |
MY PRIVACY MY DECISION: CONTROL OF PHOTO SHARING ON ONLINE SOCIAL NETWORKS |
SECURE COMPUTING |
JAVA |
|
|
MIJ1770 |
PRIVACY-PRESERVING SELECTIVE AGGREGATION OF ONLINE USER BEHAVIOR DATA |
SECURE COMPUTING |
JAVA |
|
|
MIJ1771 |
PROGUARD: DETECTING MALICIOUS ACCOUNTS IN SOCIAL NETWORK-BASED ONLINE PROMOTIONS |
SECURE COMPUTING |
JAVA |
|
|
MIJ1772 |
SEARCH RANK FRAUD AND MALWARE DETECTION IN GOOGLE PLAY |
SECURE COMPUTING |
JAVA |
|
|
MIJ1773 |
TOWARDS DETECTING COMPROMISED ACCOUNTS ON SOCIAL NETWORKS |
SECURE COMPUTING |
JAVA |
|
|
MIJ1774 |
NETSPAM: A NETWORK-BASED SPAM DETECTION FRAMEWORK FOR REVIEWS IN ONLINE SOCIAL MEDIA |
INFORMATION FORENSICS & SECURITY |
JAVA |
|
|
MIJ1775 |
PREVENTING DISTRIBUTED DENIAL-OF-SERVICE FLOODING ATTACKS WITH DYNAMIC PATH IDENTIFIERS |
INFORMATION FORENSICS & SECURITY |
JAVA |
|
|
MIJ1776 |
TWITTER TRENDS MANIPULATION: A FIRST LOOK INSIDE THE SECURITY OF TWITTER TRENDING |
INFORMATION FORENSICS & SECURITY |
JAVA |
|
|
MIJ1777 |
A DISTRIBUTED PUBLISHER-DRIVEN SECURE DATA SHARING SCHEME FOR INFORMATION-CENTRIC IOT |
INTERNET OF THINGS (IOT) |
JAVA |
|
|
MIJ1778 |
AN EFFICIENT AND FINE-GRAINED BIG DATA ACCESS CONTROL SCHEME WITH PRIVACY-PRESERVING POLICY |
INTERNET OF THINGS (IOT) |
JAVA |
|
|
MIJ1779 |
EFFICIENT AND PRIVACY-PRESERVING POLYGONS SPATIAL QUERY FRAMEWORK FOR LOCATION-BASED SERVICES |
INTERNET OF THINGS (IOT) |
JAVA |
|
|
MIJ1780 |
FOLLOW BUT NO TRACK: PRIVACY PRESERVED PROFILE PUBLISHING IN CYBER-PHYSICAL SOCIAL SYSTEMS |
INTERNET OF THINGS (IOT) |
JAVA |
|
|
MIJ1781 |
SPFM: SCALABLE AND PRIVACY-PRESERVING FRIEND MATCHING IN MOBILE CLOUD |
INTERNET OF THINGS (IOT) |
JAVA |
|
|
MIJ1782 |
ATTRIBUTE-BASED STORAGE SUPPORTING SECURE DEDUPLICATION OF ENCRYPTED DATA IN CLOUD |
BIG DATA |
JAVA |
|
|
MIJ1783 |
SOCIALQ&A: AN ONLINE SOCIAL NETWORK BASED QUESTION AND ANSWER SYSTEM |
BIG DATA |
JAVA |
|
|
MIJ1784 |
AUTOMATIC GENERATION OF SOCIAL EVENT STORYBOARD FROM IMAGE CLICK-THROUGH DATA |
IMAGE PROCESSING |
JAVA |
|
|
MIJ1785 |
IMAGE RE-RANKING BASED ON TOPIC DIVERSITY |
IMAGE PROCESSING |
JAVA |
|
|
MIJ1786 |
TRI-CLUSTERED TENSOR COMPLETION FOR SOCIAL-AWARE IMAGE TAG REFINEMENT |
IMAGE PROCESSING |
JAVA |
|
|
MIJ1787 |
TWO-STAGE FRIEND RECOMMENDATION BASED ON NETWORK ALIGNMENT AND SERIES-EXPANSION OF PROBABILISTIC TOPIC MODEL |
MULTIMEDIA |
JAVA |
|
|
MIJ1788 |
A SYSTEM FOR PROFILING AND MONITORING DATABASE ACCESS PATTERNS BY APPLICATION PROGRAMS FOR ANOMALY DETECTION |
SOFTWARE ENGINEERING |
JAVA |
|
|
MIJ1789 |
IMPROVING AUTOMATED BUG TRIAGING WITH SPECIALIZED TOPIC MODEL |
SOFTWARE ENGINEERING |
JAVA |
|
|
MIJ1790 |
COLLABORATIVE FILTERING SERVICE RECOMMENDATION BASED ON A NOVEL SIMILARITY COMPUTATION METHOD |
SERVICE COMPUTING
(WEB SERVICES) |
JAVA |
|
|
MIJ1791 |
TRANSACTIONAL BEHAVIOR VERIFICATION IN BUSINESS PROCESS AS A SERVICE CONFIGURATION |
SERVICE COMPUTING
(WEB SERVICES) |
JAVA |
|
|
|
MIJ1601 |
A MODIFIED HIERARCHICAL ATTRIBUTE-BASED ENCRYPTION ACCESS CONTROL METHOD FOR MOBILE CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1602 |
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1603 |
AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1604 |
CDA GENERATION AND INTEGRATION FOR HEALTH INFORMATION EXCHANGE BASED ON CLOUD COMPUTING SYSTEM |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1605 |
CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION TO CLOUD EMAIL |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1606 |
CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1607 |
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1608 |
DIPLOCLOUD: EFFICIENT AND SCALABLE MANAGEMENT OF RDF DATA IN THE CLOUD |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1609 |
DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1610 |
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1611 |
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1612 |
FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1613 |
FLEXIBLE AND FINE-GRAINED ATTRIBUTE-BASED DATA STORAGE IN CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1614 |
GEOMETRIC RANGE SEARCH ON ENCRYPTED SPATIAL DATA |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1615 |
IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1616 |
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1617 |
PROTECTING YOUR RIGHT: VERIFIABLE ATTRIBUTE-BASED KEYWORD SEARCH WITH FINE-GRAINED OWNER-ENFORCED SEARCH AUTHORIZATION IN THE CLOUD |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1618 |
REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE STORAGE SYSTEMS |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1619 |
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1620 |
A NOVEL RECOMMENDATION MODEL REGULARIZED WITH USER TRUST AND ITEM RATINGS |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1621 |
AUTOMATICALLY MINING FACETS FOR QUERIES FROM THEIR SEARCH RESULTS |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1622 |
BOOSTER IN HIGH DIMENSIONAL DATA CLASSIFICATION |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1623 |
BUILDING AN INTRUSION DETECTION SYSTEM USING A FILTER-BASED FEATURE SELECTION ALGORITHM |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1624 |
CONNECTING SOCIAL MEDIA TO E-COMMERCE: COLD-START PRODUCT RECOMMENDATION USING MICROBLOGGING INFORMATION |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1625 |
CROSS-DOMAIN SENTIMENT CLASSIFICATION USING SENTIMENT SENSITIVE EMBEDDING’S |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1626 |
CROWDSOURCING FOR TOP-K QUERY PROCESSING OVER UNCERTAIN DATA |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1627 |
CYBERBULLYING DETECTION BASED ON SEMANTIC-ENHANCED MARGINALIZED DENOISING AUTO-ENCODER |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1628 |
DOMAIN-SENSITIVE RECOMMENDATION WITH USER-ITEM SUBGROUP ANALYSIS |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1629 |
EFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1630 |
EFFICIENT CACHE-SUPPORTED PATH PLANNING ON ROADS |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1631 |
LOCATION AWARE KEYWORD QUERY SUGGESTION BASED ON DOCUMENT PROXIMITY |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1632 |
MINING USER-AWARE RARE SEQUENTIAL TOPIC PATTERNS IN DOCUMENT STREAMS |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1633 |
NEAREST KEYWORD SET SEARCH IN MULTI-DIMENSIONAL DATASETS |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1634 |
QUANTIFYING POLITICAL LEANING FROM TWEETS, RETWEETS, AND RETWEETERS |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1635 |
RATING PREDICTION BASED ON SOCIAL SENTIMENT FROM TEXTUAL REVIEWS |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1636 |
SENTIMENT EMBEDDING’S WITH APPLICATIONS TO SENTIMENT ANALYSIS |
DATA MINING |
JAVA |
2016-17 |
|
|
MIJ1637 |
ANSWERING APPROXIMATE QUERIES OVER XML DATA |
FUZZY SYSTEMS |
JAVA |
2016-17 |
|
|
MIJ1638 |
A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION |
IMAGE PROCESSING |
JAVA |
2016-17 |
|
|
MIJ1639 |
A SCALABLE APPROACH FOR CONTENT-BASED IMAGE RETRIEVAL IN PEER-TO-PEER NETWORKS |
IMAGE PROCESSING |
JAVA |
2016-17 |
|
|
MIJ1640 |
LEARNING OF MULTIMODAL REPRESENTATIONS WITH RANDOM WALKS ON THE CLICK GRAPH |
IMAGE PROCESSING |
JAVA |
2016-17 |
|
|
MIJ1641 |
ONLINE MULTI-MODAL DISTANCE METRIC LEARNING WITH APPLICATION TO IMAGE RETRIEVAL |
IMAGE PROCESSING |
JAVA |
2016-17 |
|
|
MIJ1642 |
OPTIMIZED SEARCH-AND-COMPUTE CIRCUITS AND THEIR APPLICATION TO QUERY EVALUATION ON ENCRYPTED DATA |
INFORMATION FORENSICS AND SECURITY |
JAVA |
2016-17 |
|
|
MIJ1643 |
PRIVACY-PRESERVING UTILITY VERIFICATION OF THE DATA PUBLISHED BY NON-INTERACTIVE DIFFERENTIALLY PRIVATE MECHANISMS |
INFORMATION FORENSICS AND SECURITY |
JAVA |
2016-17 |
|
|
MIJ1644 |
PROFILING ONLINE SOCIAL BEHAVIORS FOR COMPROMISED ACCOUNT DETECTION |
INFORMATION FORENSICS AND SECURITY |
JAVA |
2016-17 |
|
|
MIJ1645 |
HIDDEN CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION UNDER STANDARD ASSUMPTIONS |
INFORMATION FORENSICS AND SECURITY |
JAVA |
2016-17 |
|
|
MIJ1646 |
DETECTING NODE FAILURES IN MOBILE WIRELESS NETWORKS: A PROBABILISTIC APPROACH |
MOBILE COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1647 |
ENERGY AND MEMORY EFFICIENT CLONE DETECTION IN WIRELESS SENSOR NETWORKS |
MOBILE COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1648 |
EPLQ: EFFICIENT PRIVACY-PRESERVING LOCATION-BASED QUERY OVER OUTSOURCED ENCRYPTED DATA |
MOBILE COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1649 |
SECURE OVERLAY ROUTING USING KEY PRE-DISTRIBUTION: A LINEAR DISTANCE OPTIMIZATION APPROACH |
MOBILE COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1650 |
A STABLE APPROACH FOR ROUTING QUERIES IN UNSTRUCTURED P2P NETWORKS |
NETWORKING |
JAVA |
2016-17 |
|
|
MIJ1651 |
IPATH: PATH INFERENCE IN WIRELESS SENSOR NETWORKS |
NETWORKING |
JAVA |
2016-17 |
|
|
MIJ1652 |
OPPORTUNISTIC ROUTING WITH CONGESTION DIVERSITY IN WIRELESS AD HOC NETWORKS |
NETWORKING |
JAVA |
2016-17 |
|
|
MIJ1653 |
A HOP-BY-HOP ROUTING MECHANISM FOR GREEN INTERNET |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2016-17 |
|
|
MIJ1654 |
CONTINUOUS ANSWERING HOLISTIC QUERIES OVER SENSOR NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2016-17 |
|
|
MIJ1655 |
DICTIONARY BASED SECURE PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2016-17 |
|
|
MIJ1656 |
DATA LINEAGE IN MALICIOUS ENVIRONMENTS |
SECURE COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1657 |
FRODO: FRAUD RESILIENT DEVICE FOR OFF-LINE MICRO-PAYMENTS |
SECURE COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1658 |
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER |
SECURE COMPUTING |
JAVA |
2016-17 |
|
|
MIJ1659 |
MAPPING BUG REPORTS TO RELEVANT FILES: A RANKING MODEL, A FINE-GRAINED BENCHMARK, AND FEATURE EVALUATION |
SOFTWARE ENGINEERING |
JAVA |
2016-17 |
|
|
MIJ1660 |
METAMORPHIC TESTING FOR SOFTWARE QUALITY ASSESSMENT: A STUDY OF SEARCH ENGINES |
SOFTWARE ENGINEERING |
JAVA |
2016-17 |
|
|
|
MIJ1501 |
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION |
MOBILE COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1502 |
A DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORKS |
NETWORKING |
JAVA |
2015-16 |
|
|
MIJ1503 |
A FRAMEWORK FOR SECURE COMPUTATIONS WITH TWO NON-COLLUDING SERVERS AND MULTIPLE CLIENTS, APPLIED TO RECOMMENDATION |
INFORMATION FORENSICS AND SECURITY |
JAVA |
2015-16 |
|
|
MIJ1504 |
A LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORK |
SECURE COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1505 |
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1506 |
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM |
NETWORKING |
JAVA |
2015-16 |
|
|
MIJ1507 |
A SCALABLE AND RELIABLE MATCHING SERVICE FOR CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEMS |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1508 |
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1509 |
A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1510 |
AN ATTRIBUTE-ASSISTED RERANKING MODEL FOR WEB IMAGE SEARCH |
IMAGE PROCESSING |
JAVA |
2015-16 |
|
|
MIJ1511 |
AN AUTHENTICATED TRUST AND REPUTATION CALCULATION AND MANAGEMENT SYSTEM FOR CLOUD AND SENSOR NETWORKS INTEGRATION |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1512 |
ASYMMETRIC SOCIAL PROXIMITY BASED PRIVATE MATCHING PROTOCOLS FOR ONLINE SOCIAL NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2015-16 |
|
|
MIJ1513 |
AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED ENCRYPTION |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1514 |
CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1515 |
CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1516 |
CO-EXTRACTING OPINION TARGETS AND OPINION WORDS FROM ONLINE REVIEWS BASED ON THE WORD ALIGNMENT MODEL |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1517 |
CONTEXT-BASED DIVERSIFICATION FOR KEYWORD QUERIES OVER XML DATA |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1518 |
CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION AND SHORT CIPHERTEXTS |
SECURE COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1519 |
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1520 |
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2015-16 |
|
|
MIJ1521 |
DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS |
SECURE COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1522 |
DESIGNING HIGH PERFORMANCE WEB-BASED COMPUTING SERVICES TO PROMOTE TELEMEDICINE DATABASE MANAGEMENT SYSTEM |
SERVICE COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1523 |
DETECTING MALICIOUS FACEBOOK APPLICATIONS |
NETWORKING |
JAVA |
2015-16 |
|
|
MIJ1524 |
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1525 |
DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR NETWORKS |
MOBILE COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1526 |
EMR: A SCALABLE GRAPH-BASED RANKING MODEL FOR CONTENT-BASED IMAGE RETRIEVAL |
IMAGE PROCESSING |
JAVA |
2015-16 |
|
|
MIJ1527 |
IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS |
SECURE COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1528 |
KEY UPDATING FOR LEAKAGE RESILIENCY WITH APPLICATION TO AES MODES OF OPERATION |
INFORMATION FORENSICS AND SECURITY |
JAVA |
2015-16 |
|
|
MIJ1529 |
LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES |
IMAGE PROCESSING |
JAVA |
2015-16 |
|
|
MIJ1530 |
LOCATION-AWARE AND PERSONALIZED COLLABORATIVE FILTERING FOR WEB SERVICE RECOMMENDATION |
SERVICE COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1531 |
MALWARE PROPAGATION IN LARGE-SCALE NETWORKS |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1532 |
MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING |
NETWORKING |
JAVA |
2015-16 |
|
|
MIJ1533 |
ON SUMMARIZATION AND TIMELINE GENERATION FOR EVOLUTIONARY TWEET STREAMS |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1534 |
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1535 |
PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS |
MOBILE COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1536 |
PRIVACY-PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1537 |
PROGRESSIVE DUPLICATE DETECTION |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1538 |
REAL-TIME DETECTION OF TRAFFIC FROM TWITTER STREAM ANALYSIS |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1539 |
REVERSE NEAREST NEIGHBORS IN UNSUPERVISED DISTANCE-BASED OUTLIER DETECTION |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1540 |
ROUTE-SAVER: LEVERAGING ROUTE APIS FOR ACCURATE AND EFFICIENT QUERY PROCESSING AT LOCATION-BASED SERVICES |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1541 |
SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2015-16 |
|
|
MIJ1542 |
SECURE SPATIAL TOP-K QUERY PROCESSING VIA UN TRUSTED LOCATION-BASED SERVICE PROVIDERS |
SECURE COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1543 |
STEALTHY DENIAL OF SERVICE STRATEGY IN CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
2015-16 |
|
|
MIJ1544 |
T-CLOSENESS THROUGH MICRO AGGREGATION: STRICT PRIVACY WITH ENHANCED UTILITY PRESERVATION |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1545 |
TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUES |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1546 |
TWEET SEGMENTATION AND ITS APPLICATION TO NAMED ENTITY RECOGNITION |
DATA MINING |
JAVA |
2015-16 |
|
|
MIJ1547 |
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES |
MOBILE COMPUTING |
JAVA |
2015-16 |
|
|
|
MIJ1401 |
DISCOVERING EMERGING TOPICS IN SOCIAL STREAMS VIA LINK-ANOMALY DETECTION |
DATA MINING |
JAVA |
2014-15 |
|
|
MIJ1402 |
DISTRIBUTED, CONCURRENT, AND INDEPENDENT ACCESS TO ENCRYPTED CLOUD DATABASES |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1403 |
EFFICIENT PREDICTION OF DIFFICULT KEYWORD QUERIES OVER DATABASES |
DATA MINING |
JAVA |
2014-15 |
|
|
FZIJ1404 |
DEALING WITH CONCEPT DRIFTS IN PROCESS MINING |
DATA MINING |
JAVA |
2014-15 |
|
|
FZIJ1405 |
A COCKTAIL APPROACH FOR TRAVEL PACKAGE RECOMMENDATION |
DATA MINING |
JAVA |
2014-15 |
|
|
FZIJ1406 |
A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
FZIJ1407 |
A SCALABLE TWO-PHASE TOP-DOWN SPECIALIZATION APPROACH FOR DATA ANONYMIZATION USING MAP REDUCE ON CLOUD |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
FZIJ1408 |
A STOCHASTIC MODEL TO INVESTIGATE DATA CENTER PERFORMANCE AND QOS IN IAAS CLOUD COMPUTING SYSTEMS |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
FZIJ1409 |
ACCURACY-CONSTRAINED PRIVACY-PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA |
DATA MINING |
JAVA |
2014-15 |
|
|
FZIJ1410 |
AN INCENTIVE FRAMEWORK FOR CELLULAR TRAFFIC OFFLOADING |
MOBILE COMPUTING |
JAVA |
2014-15 |
|
|
FZIJ1411 |
AUTOMATIC TEST PACKET GENERATION |
NETWORKING |
JAVA |
2014-15 |
|
|
FZIJ1412 |
BESTPEER++: A PEER-TO-PEER BASED LARGE-SCALE DATA PROCESSING PLATFORM |
DATA MINING |
JAVA |
2014-15 |
|
|
FZIJ1413 |
BOUNDARY CUTTING FOR PACKET CLASSIFICATION |
NETWORKING |
JAVA |
2014-15 |
|
|
FZIJ1414 |
BUILDING CONFIDENTIAL AND EFFICIENT QUERY SERVICES IN THE CLOUD WITH RASP DATA PERTURBATION |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
FZIJ1415 |
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS |
SECURE COMPUTING |
JAVA |
2014-15 |
|
|
FZIJ1416 |
COOPERATIVE CACHING FOR EFFICIENT DATA ACCESS IN DISRUPTION TOLERANT NETWORKS |
MOBILE COMPUTING |
JAVA |
2014-15 |
|
|
FZIJ1417 |
COST-EFFECTIVE RESOURCE ALLOCATION OF OVERLAY ROUTING RELAY NODES |
NETWORKING |
JAVA |
2014-15 |
|
|
MIJ1418 |
DATA MINING WITH BIG DATA |
DATA MINING |
JAVA |
2014-15 |
|
|
MIJ1419 |
DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1420 |
EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING |
SECURE COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1421 |
EFFICIENT AUTHENTICATION FOR MOBILE AND PERVASIVE COMPUTING |
MOBILE COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1422 |
ENABLING TRUSTWORTHY SERVICE EVALUATION IN SERVICE-ORIENTED MOBILE SOCIAL NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
MIJ1423 |
EXPLOITING SERVICE SIMILARITY FOR PRIVACY IN LOCATION-BASED SEARCH QUERIES |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
MIJ1424 |
EXPRESSIVE, EFFICIENT, AND REVOCABLE DATA ACCESS CONTROL FOR MULTI-AUTHORITY CLOUD STORAGE |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1425 |
FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE |
DATA MINING |
JAVA |
2014-15 |
|
|
MIJ1426 |
FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS |
DATA MINING |
JAVA |
2014-15 |
|
|
MIJ1427 |
FRIENDBOOK: A SEMANTIC-BASED FRIEND RECOMMENDATION SYSTEM FOR SOCIAL NETWORKS |
MOBILE COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1428 |
KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1429 |
LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
MIJ1430 |
ON FALSE DATA-INJECTION ATTACKS AGAINST POWER SYSTEM STATE ESTIMATION: MODELING AND COUNTERMEASURES |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
MIJ1431 |
OPTIMAL DISTRIBUTED MALWARE DEFENSE IN MOBILE NETWORKS WITH HETEROGENEOUS DEVICES |
MOBILE COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1432 |
ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1433 |
PRIVACY-ENHANCED WEB SERVICE COMPOSITION |
SERVICE COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1434 |
PRIVACY-PRESERVING AND CONTENT-PROTECTING LOCATION BASED QUERIES |
DATA MINING |
JAVA |
2014-15 |
|
|
MIJ1435 |
PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1436 |
PROFILR : TOWARD PRESERVING PRIVACY AND FUNCTIONALITY IN GEOSOCIAL NETWORKS |
SECURE COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1437 |
RRE: A GAME-THEORETIC INTRUSION RESPONSE AND RECOVERY ENGINE |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
MIJ1438 |
SCALABLE DISTRIBUTED SERVICE INTEGRITY ATTESTATION FOR SOFTWARE-AS-A-SERVICE CLOUDS |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1439 |
SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS |
NETWORKING |
JAVA |
2014-15 |
|
|
MIJ1440 |
SECURE OUT SOURCED ATTRIBUTE-BASED SIGNATURES |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
MIJ1441 |
SECURING BROKER-LESS PUBLISH/SUBSCRIBE SYSTEMS USING IDENTITY-BASED ENCRYPTION |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
MIJ1442 |
SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK |
DATA MINING |
JAVA |
2014-15 |
|
|
MIJ1443 |
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
MIJ1444 |
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH |
DATA MINING |
JAVA |
2014-15 |
|
|
MIJ1445 |
THE CLIENT ASSIGNMENT PROBLEM FOR CONTINUOUS DISTRIBUTED INTERACTIVE APPLICATIONS: ANALYSIS, ALGORITHMS, AND EVALUATION |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
MIJ1446 |
THE DESIGN AND EVALUATION OF AN RMATION SHARING SYSTEM FOR HUMAN NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
MIJ1447 |
TOP-K QUERY RESULT COMPLETENESS VERIFICATION IN TIERED SENSOR NETWORKS |
SECURE COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1448 |
TOWARDS DIFFERENTIAL QUERY SERVICES IN COST-EFFICIENT CLOUDS |
CLOUD COMPUTING |
JAVA |
2014-15 |
|
|
MIJ1449 |
TOWARDS ONLINE SHORTEST PATH COMPUTATION |
DATA MINING |
JAVA |
2014-15 |
|
|
MIJ1450 |
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2014-15 |
|
|
|
MIJ1301 |
MONA SECURE MULTI-OWNER DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD |
CLOUD COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1302 |
DYNAMIC RESOURCE ALLOCATION USING VIRTUAL MACHINES FOR CLOUD COMPUTING ENVIRONMENT |
CLOUD COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1303 |
CLOUDMOV - CLOUD-BASED MOBILE SOCIAL TV |
CLOUD COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1304 |
PACK - PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM |
CLOUD COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1305 |
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE |
CLOUD COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1306 |
SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION |
CLOUD COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1307 |
A LOAD BALANCING MODEL BASED ON CLOUD PARTITIONING FOR THE PUBLIC CLOUD |
CLOUD COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1308 |
OPTIMIZING CLOUD RESOURCES FOR DELIVERING IPTV SERVICES THROUGH VIRTUALIZATION |
CLOUD COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1309 |
PRIVACY PRESERVING DELEGATED ACCESS CONTROL IN PUBLIC CLOUDS |
CLOUD COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1310 |
ATTRIBUTE-BASED ENCRYPTION WITH VERIFIABLE OUTSOURCED DECRYPTION |
CLOUD COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1311 |
A GENERALIZED FLOW-BASED METHOD FOR ANALYSIS OF IMPLICIT RELATIONSHIPS ON WIKIPEDIA |
DATA MINING |
JAVA |
2013-14 |
|
|
MIJ1312 |
A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS |
DATA MINING |
JAVA |
2013-14 |
|
|
MIJ1313 |
PREVENTING PRIVATE INFORMATION INFERENCE ATTACKS ON SOCIAL NETWORKS |
DATA MINING |
JAVA |
2013-14 |
|
|
MIJ1314 |
TWO TALES OF PRIVACY IN ONLINE SOCIAL NETWORKS |
SECURE COMPUTING |
JAVA |
2013-14 |
|
|
MIJ1315 |
BACK-PRESSURE-BASED PACKET-BY-PACKET ADAPTIVE ROUTING IN COMMUNICATION NETWORKS |
NETWORKING |
JAVA |
2013-14 |
|
|
MIJ1316 |
FAST TRANSMISSION TO REMOTE COOPERATIVE GROUPS A NEW KEY MANAGEMENT PARADIGM |
NETWORKING |
JAVA |
2013-14 |
|
|
MIJ1317 |
OPTIMAL CLIENT-SERVER ASSIGNMENT FOR INTERNET DISTRIBUTED SYSTEMS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2013-14 |
|
|
MIJ1318 |
DISCOVERY AND VERIFICATION OF NEIGHBOR POSITIONS IN MOBILE AD HOC NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2013-14 |
|
|
MIJ1319 |
MOBILE RELAY CONFIGURATION IN DATA-INTENSIVE WIRELESS SENSOR NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2013-14 |
|
|
MIJ1320 |
A FAST CLUSTERING-BASED FEATURE SUBSET SELECTION ALGORITHM FOR HIGH DIMENSIONAL DATA |
DATA MINING |
JAVA |
2013-14 |
|
|