You are on page 1of 6

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.

com email :





1. 2. 3. 4. 5. 6. 7. 8. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data A service oriented livestock management system using occasionally connected mobile-cloud architecture Privacy Preserving Access Control with Authentication for Securing Data in Clouds Data Outsourcing Simplified: Generating Data Connectors from Confidentiality and Access Policies Towards bringing real-time online applications on Clouds An analysis of requirements to supporting mobility in Body Area Networks JD001 JD002 JD003 JD004 JD005 JD006 JD007 JD008 2012 2012 2012 2012 2012 2012 2012 2012

9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. Answering General Time-Sensitive Queries Creating Evolving User Behaviour Profiles Automatically Effective Pattern Discovery for Text Mining Extending Attribute Information for Small Data Set Classification Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis Organizing User Search Histories Outsourced Similarity Search on Metric Data Assets Practical Efficient String Mining Ranking Model Adaptation for Domain-Specific Search Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings Slicing: A New Approach for Privacy Preserving Data Publishing SPIRE: Efficient Data Inference and Compression over RFID Streams ROAD: A New Spatial Object Search Framework for Road Networks JD009 JD010 JD011 JD012 JD013 JD014 JD015 JD016 JD017 JD018 JD019 JD020 JD021 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012

Further more details visit : send your request to :

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email :

22. 23.

Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems Segmentation and Sampling of Moving Object Trajectories Based on Representativeness

JD022 JD023

2012 2012

24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. Approximation Algorithms for Data Broadcast in Wireless Networks Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks Mobile Data Offloading through Opportunistic Communications and Social Participation A New Mobile Spatial Information Service Grid Computing Model Based on Mobile Agent Mobile Computing Systems Programming: A Graduate Distributed Computing Course Mobile cloud computing service based on heterogeneous wireless and mobile P2P networks Mobile computing scheduling mechanism based on self ranking algorithm Reducing location management costs in hierarchical-based model of mobile and wireless computing systems A proposal of a memory management architecture for mobile computing environments Real-time transaction management in mobile computing systems A Distributed Cache Management Architecture for Mobile Computing Environments Trusted Management for Mobile Computing Entities Enabled by Fuzzy Logic Approach Monitoring and detecting abnormal behaviour in mobile cloud infrastructure JD024 JD025 JD026 JD027 JD028 JD029 JD030 JD031 JD032 JD033 JD034 JD035 JD036 JD037 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012

38. 39. 40. 41. 42. 43. 44. Scalable Video Multicast with Adaptive Modulation and Coding in Broadband Wireless Data Systems Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Exploiting Data Fusion to Improve the Coverage of Wireless Sensor Networks Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks Insights on Media Streaming Progress Using BitTorrent-Like Protocols for On-Demand Streaming Bit Rate Reduction Video Transcoding with Distributed Computing Distributed S-Net: Cluster and Grid Computing without the Hassle JD038 JD039 JD040 JD041 JD042 JD043 JD044 2012 2012 2012 2012 2012 2012 2012

Further more details visit : send your request to :

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email :

45. 46. 47. 48. 49. 50. 51. Multi-rate combination of opportunistic routing and network coding: An optimization perspective LRNC: Lifetime-aware routing using network coding in wireless sensor network A Multipath Layered Cluster Based Routing for Ad Hoc Networks Comparison of routing and network coding in undirected network group communications Measurement-Aware Monitor Placement and Routing: A Joint Optimization Approach for Network-Wide Measurements On dynamics of field based anycast routing in wireless mesh networks Multipath routing backbones for load balancing in Mobile Ad hoc Networks JD045 JD046 JD047 JD048 JD049 JD050 JD051 2012 2012 2012 2012 2012 2012 2012

52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. Knowledge-independent traffic monitoring: Unsupervised detection of network attacks An efficient sequential watermark detection model for tracing network attack flows FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks Detection and prevention of SIP flooding attacks in voice over IP networks The Model — Dynamic and Flexible Intrusion Detection Protocol for high error rate Wireless Sensor Networks based on data flow Alert over the attacks of data packet and detect the intruders Privacy-preserving anomaly detection across multi-domain networks Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks Port-based traffic verification as a paradigm for anomaly detection On detecting malicious behaviors in interactive networks: Algorithms and analysis Genetic algorithm and artificial immune systems: A combinational approach for network intrusion detection JD052 JD053 JD054 JD055 JD056 JD057 JD058 JD059 JD060 JD061 JD062 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012

63. 64. 65. Network traffic anomaly detection using machine learning approaches Analysis and provisioning of network traffic in cloud environment using Markov model Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective JD063 JD064 JD065 2012 2012 2012

Further more details visit : send your request to :

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email :

66. 67.

Detecting anomalies in network traffic using Entropy and Mahalanobis distance Traffic Engineering for Multicast Connections in Multiservice Cellular Networks

JD066 JD067

2012 2012

68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. Data Mining method based on Lattice Application of data mining in educational databases for predicting academic trends and patterns Data mining based network intrusion detection system: A database centric approach Fuzzy Modeling Built Through a Data Mining Process Visual data mining over a video wall Relevance Matters: Capitalizing on Less (Top-k Matching in Publish/Subscribe) Multidimensional Analysis of Atypical Events in Cyber-Physical Data The eICU Research Institute - A Collaboration Between Industry, HealthCare Providers, and Academia Deciphering human language [information extraction] Architecture for the management and presentation of communication network performance data Smart shopper: an agent-based web-mining approach to Internet shopping JD068 JD069 JD070 JD071 JD072 JD073 JD074 JD075 JD076 JD077 JD078 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012

79. 80. 81. 82. 83. Interactive Video Indexing With Statistical Active Learning Sparse Ensemble Learning for Concept Detection A Matrix-Based Approach to Unsupervised Human Action Categorization Robust Image Coding Based Upon Compressive Sensing Web Video Geolocation by Geotagged Social Resources JD079 JD080 JD081 JD082 JD083 2012 2012 2012 2012 2012

84. 85. 86. Video Distribution Techniques over WiMAX Networks for m-Health Applications Secure Management of Biomedical Data With Cryptographic Hardware Mobile Medical Visual Information Retrieval JD084 JD085 JD086 2012 2012 2012


Further more details visit : send your request to :

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email :

87. 88. 89.

Scene-Oriented Hierarchical Classification of Blurry and Noisy Images Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers Game-Theoretic Pricing for Video Streaming in Mobile Networks

JD087 JD088 JD089

2012 2012 2012

90. 91. 92. 93. Multiple kernel fuzzy C-means algorithm with ALS method for satellite and medical image segmentation Leap segmentation for recovering image surface layout A Scale-Synthesis Method for High Spatial Resolution Remote Sensing Image Segmentation Multistage Image Clustering and Segmentation with Normalised Cuts JD090 JD091 JD093 JD093 2012 2012 2012 2012

94. 95. 96. Autonomic Placement of Mixed Batch and Transactional Workloads An Online Data Access Prediction and Optimization Approach for Distributed Systems Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths JD094 JD095 JD096 2012 2012 2012

97. 98. 99. QoS Assurance for Dynamic Reconfiguration of Component-Based Software JD097 Systems JD098 StakeRare: Using Social Networks and Collaborative Filtering for LargeScale Requirements Elicitation Comparing Semi-Automated Clustering Methods for Personal Development JD099 JD100 JD101 JD102 2012 2012 2012 2012 2012 2012

100. Invariant-Based Automatic Testing of Modern Web Applications 101. Automatically Generating Test Cases for Specification Mining 102. Aspectizing Java Access Control

103. Automatic Reconfiguration for Large-Scale Reliable Storage Systems 104. Detecting and Resolving Firewall Policy Anomalies 105. DoubleGuard: Detecting Intrusions in Multitier Web Applications 106. JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks 107. Incentive Compatible Privacy-Preserving Distributed Classification JD103 JD104 JD105 JD106 JD107 2012 2012 2012 2012 2012

Further more details visit : send your request to :

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email :

108. Web 2.0 content extraction 109. Automated Security Test Generation with Formal Threat Models 110. Improving the Automation of Security Information Management: A Collaborative Approach 111. Optimal Aviation Security Screening Strategies With Dynamic Passenger Risk Updates JD108 JD109 JD110 JD111 2012 2012 2012 2012

112. Routing characterization in volatile connectivity environments JD112 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012

113. A Distributed Reliable and Energy-Efficient Topology Control Algorithm in JD113 Wireless Sensor Network 114. A method of tree network topology inference based on hierarchical host table JD114 115. Topology management for mission critical networks: Applying supply and demand to manage public safety networks 116. SNMP-based network topology discovery algorithm and implementation 117. Overlaid Mesh Topology Design and Deadlock Free Routing in Wireless Network-on-Chip 118. Topology Enhancements in Wireless Multihop Networks: A Top-Down Approach 119. A dynamic detective method against ROP attack on ARM platform 120. Countering entropy measure attacks on packed software detection 121. Performance Modeling and Analysis of Network Firewalls 122. Research on Malicious Code Detection Based on Least-squares Estimation 123. Stochastic analysis of horizontal IP scanning JD115 JD116 JD117 JD118 JD119 JD120 JD121 JD122 JD123

Further more details visit : send your request to :