You are on page 1of 10

Elysium Technologies Private Limited

Singapore | Madurai | Chennai | Trichy | Coimbatore | Ramnad


Pondicherry | Salem | Erode | Tirunelveli
http://www.elysiumtechnologies.com, info@elysiumtechnologies.com

Elysium Technologies Private Limited


Singapore | Madurai | Chennai | Trichy | Coimbatore | Ramnad
Pondicherry | Salem | Erode | Tirunelveli
http://www.elysiumtechnologies.com, info@elysiumtechnologies.com
ETPL NT-001
ETPL NT-002
ETPL NT-003
ETPL NT-004
ETPL NT-005
ETPL NT-006
ETPL NT-007
ETPL NT-008
ETPL NT-009
ETPL NT-010
ETPL NT-011
ETPL NT-012
ETPL NT-013
ETPL NT-014
ETPL NT-015
ETPL NT-016
ETPL NT-017
ETPL NT-018
ETPL NT-019
ETPL NT-020
ETPL NT-021
ETPL NT-022
ETPL NT-023
ETPL NT-024
ETPL NT-025
ETPL NT-026
ETPL NT-027
ETPL NT-028
ETPL NT-029
ETPL NT-030
ETPL NT-031
ETPL NT-032
ETPL NT-033
ETPL NT-034
ETPL NT-035
ETPL NT-036
ETPL NT-037

Answering What-If Deployment and Configuration Questions With WISE: Techniques and
Deployment Experience
Complexity Analysis and Algorithm Design for Advance Bandwidth Scheduling in Dedicated
Networks
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based
Learning
Delay-Based Network Utility Maximization
A Distributed Control Law for Load Balancing in Content Delivery Networks
Efficient Algorithms for Neighbor Discovery in Wireless Networks
Stochastic Game for Wireless Network Virtualization
ABC: Adaptive Binary Cuttings for Multidimensional Packet Classification,
A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless
Cellular Networks
Achieving Efficient Flooding by Utilizing Link Correlation in Wireless Sensor Networks,
Random Walks and Green's Function on Digraphs: A Framework for Estimating Wireless
Transmission Costs
"A Flexible Platform for Hardware-Aware Network Experiments and a Case Study on Wireless
Network Coding
Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
Secondary Spectrum TradingAuction-Based Framework for Spectrum Allocation and Profit
Sharing
Towards Practical Communication in Byzantine-Resistant DHTs
Semi-Random Backoff: Towards Resource Reservation for Channel Access in Wireless LANs
Entry and Spectrum Sharing Scheme Selection in Femtocell Communications Markets
On Replication Algorithm in P2P VoD,
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
Scheduling in a Random Environment: Stability and Asymptotic Optimality
An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
On Downlink Capacity of Cellular Data Networks With WLAN/WPAN Relays
Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
Control of Wireless Networks With Secrecy
ICTCP: Incast Congestion Control for TCP in Data-Center Networks
Context-Aware Nanoscale Modeling of Multicast Multihop Cellular Networks
Moment-Based Spectral Analysis of Large-Scale Networks Using Local Structural Information
Internet-Scale IPv4 Alias Resolution With MIDAR
Time-Bounded Essential Localization for Wireless Sensor Networks
Stability of FIPP -Cycles Under Dynamic Traffic in WDM Networks
Cooperative Carrier Signaling: Harmonizing Coexisting WPAN and WLAN Devices
Mobility Increases the Connectivity of Wireless Networks
Topology Control for Effective Interference Cancellation in Multiuser MIMO Networks
Distortion-Aware Scalable Video Streaming to Multinetwork Clients
Combined Optimal Control of Activation and Transmission in Delay-Tolerant Networks
A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless

Elysium Technologies Private Limited


Singapore | Madurai | Chennai | Trichy | Coimbatore | Ramnad
Pondicherry | Salem | Erode | Tirunelveli
http://www.elysiumtechnologies.com, info@elysiumtechnologies.com

Elysium Technologies Private Limited


Singapore | Madurai | Chennai | Trichy | Coimbatore | Ramnad
Pondicherry | Salem | Erode | Tirunelveli
http://www.elysiumtechnologies.com, info@elysiumtechnologies.com
TITLE ID
ETPLJ - 001
ETPLJ - 002
ETPLJ - 003
ETPLJ - 004
ETPLJ - 005
ETPLJ - 006
ETPLJ - 007
ETPLJ - 008
ETPLJ - 009
ETPLJ - 010
ETPLJ - 011
ETPLJ - 012
ETPLJ - 013
ETPLJ - 014
ETPLJ - 015
ETPLJ - 016
ETPLJ - 017
ETPLJ - 018
ETPLJ - 019
ETPLJ - 020
ETPLJ - 021
ETPLJ - 022
ETPLJ - 023
ETPLJ - 024
ETPLJ - 025

JAVA TITLE 2014 -2015


A General Technique for Top-k Geometric Intersection Query
Problems
A group incremental approach to feature selection applying
rough set Tevhnique
Accuracy-Constrained Privacy-Preserving Access Control
Mechanism for Relational Data
An Empirical Performance Evaluation of Relational Keyword
Search Techniques
Bestpeer++:Peer to peer Based large scale data processing
platform
Centroid Ratio for a Pairwise Random Swap Clustering
Algorithm
Computing Spatial Distance Histograms for Large Scientific
Datasets On-the-Fly
CoRE: A Context-Aware RelationExtraction Method for
Relation Completion
Discovering Emerging Topics in Social Streams via LinkAnomaly Detection
Efficiently Supporting Edit Distance based String Similarity
Search Using B+-trees
Evaluating Wiki Collaborative Features in Ontology Authoring
Mining Weakly Labeled Web Facial Images for Search-Based
Face Annotation
OCCT: A One-Class Clustering Tree for Implementing One-toMany Data Linkage
Preserving Clinical Decision Support System using Gaussian
Kernel based Classication
Supporting Privacy Protection in personalized web search
TopicMachine: Conversion Prediction in Search Advertising
using Latent Topic Models
Towards Online Shortest Path Computation
Trinity on using trinary tree
E-Tree: An Efficient Indexing Structure for Ensemble Models
on Data Streams
Infrequent Weighted Itemset Mining Using Frequent Pattern
Growth
Mining Probabilistically Frequent Sequential Patterns in Large
Uncertain Databases
A Group Incremental Approach to Feature Selection Applying
Rough Set Technique
A Cocktail Approach for Travel Package Recommendation
Facilitating Document Annotation Using Content and Querying
Value
Active Learning of Constraints for Semi-Supervised Clustering

DOMAIN
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining

Elysium Technologies Private Limited


Singapore | Madurai | Chennai | Trichy | Coimbatore | Ramnad
Pondicherry | Salem | Erode | Tirunelveli
http://www.elysiumtechnologies.com, info@elysiumtechnologies.com
TITLE ID
ETPLJ - 026
ETPLJ - 027
ETPLJ - 028
ETPLJ - 029
ETPLJ - 030
ETPLJ - 031
ETPLJ - 032
ETPLJ - 033
ETPLJ - 034
ETPLJ - 035
ETPLJ - 036
ETPLJ - 037
ETPLJ - 038

ETPLJ - 039
ETPLJ - 040
ETPLJ - 041
ETPLJ - 042
ETPLJ - 043
ETPLJ - 044
ETPLJ - 045
ETPLJ - 046
ETPLJ - 047
ETPLJ - 048

JAVA TITLE 2014 -2015


Approximate Shortest Distance Computing: A QueryDependent Local Landmark Scheme
Decision Trees for Mining Data Streams Based on the Gaussian
Approximation
Computing Spatial Distance Histograms for Large Scientic
Datasets On-the-Fly
Further Observations on Smart-Card-Based passwordauthenticated key agreement in distributed systems
Ensembles of -Trees for Imbalanced Classification Problems
Discovering the Top-k Unexplained Sequences in TimeStamped Observation Data
An Automated Framework for Incorporating News into Stock
Trading Strategies
Efficiently Supporting Edit Distance based String Similarity
Search Using B+-trees
Privacy-Preserving and Content-Protecting Location Based
Queries
Trustworthiness Management in the Social Internet of Things
Rough Sets, Kernel Set, and Spatiotemporal Outlier Detection
A Unifying Model and Analysis of P2P VoD Replication and
Scheduling
CompactDFA: Scalable Pattern Matching Using Longest Prefix
Match Solutions
EDAL: An Energy-Efficient, Delay-Aware, and LifetimeBalancing Data Collection Protocol for Heterogeneous
Wireless Sensor Networks
Secure Data Retrieval for Decentralized Disruption-Tolerant
Military Networks
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction
System
OSA: An Optical Switching Architecture for Data Center
Networks With Unprecedented Flexibility
Retransmission Delays With Bounded Packets: Power-Law
Body and Exponential Tail
Secure Data Retrieval for Decentralized Disruption-Tolerant
Military Networks
Decentralized Coded Caching Attains Order-Optimal MemoryRate Tradeoff
Network Under Joint Node and Link Attacks: Vulnerability
Assessment Methods and Analysis
Ensuring Predictable Contact Opportunity for Scalable
Vehicular Internet Access on the Go
MFTS: A Multi-level Fault-tolerant Archiving Storage with
Optimized Maintenance Bandwidth

DOMAIN
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Networking
Networking

Networking
Networking
Networking
Networking
Networking
Networking
Networking
Networking
Networking
Dependable and
Secure Computing

Elysium Technologies Private Limited

TITLE ID
ETPLJ - 048
ETPLJ - 049
ETPLJ - 050
ETPLJ - 051
ETPLJ - 052
ETPLJ - 053
ETPLJ - 054
ETPLJ - 055
ETPLJ - 056
ETPLJ - 057
ETPLJ - 058
ETPLJ - 059
ETPLJ - 060
ETPLJ - 061
ETPLJ - 062
ETPLJ - 063
ETPLJ - 064
ETPLJ - 065
ETPLJ - 066
ETPLJ - 067
ETPLJ - 068
ETPLJ - 069
ETPLJ - 070

Singapore | Madurai | Chennai | Trichy | Coimbatore | Ramnad


Pondicherry | Salem | Erode | Tirunelveli
http://www.elysiumtechnologies.com, info@elysiumtechnologies.com
JAVA TITLE 2014 -2015
DOMAIN
MFTS: A Multi-level Fault-tolerant Archiving Storage with
Dependable and
Optimized Maintenance Bandwidth
Secure Computing
Private Searching on Streaming Data Based on Keyword
Dependable and
Frequency
secure computing
Risk Aware Query Replacement Approach For Secure
Dependable and
Databases Performance Management
secure computing
Secure Data Aggregation Technique for Wireless Sensor
Dependable and
Networks in the Presence of Collusion Attacks
Secure Computing
STARS: A Statistical Traffic Pattern Discovery System for
Dependable and
MANETs
Secure Computing
Dependable and
Behaviour rule specification based intrusion detection system
Secure Computing
Dependable and
Mobiflage: Deniable Storage Encryptionfor Mobile Devices
Secure Computing
k-Zero Day Safety: A Network Security Metric for Measuring
Dependable and
the Risk of Unknown Vulnerabilities
Secure Computing
CipherXRay: Exposing Cryptographic Operations and
Dependable and
Transient Secrets from Monitored Binary Execution
Secure Computing
Secure Two-Party Differentially Private Data Release for
Dependable and
Vertically Partitioned Data
Secure Computing
Hiding in the Mobile Crowd: LocationPrivacy through
Dependable and
Collaboration
Secure Computing
PRGA: Privacy-preserving Recording & Gateway-assisted
Dependable and
Authentication of Power Usage Information for Smart Grid
Secure Computing
Extending the Agile Development Approach to Develop
Dependable and
Acceptably Secure Software
Secure Computing
SIP Flooding Attack Detection with a Multi-Dimensional
Dependable and
Sketch Design
Secure Computing
Dependable and
Meeting Cardinality Constraints in Role Mining
Secure Computing
Securing Broker-Less Publish/Subscribe Systems Using
Parallel and
Identity-Based Encryption
distributed
A Novel Economic Sharing Model in a Federation of Selfish
Parallel and
Cloud Providers
distributed
A Scalable and Modular Architecture for High-Performance
Parallel and
Packet Classification
distributed
ALBA-R Load-Balancing Geographic Routing Around
parallel and
Connectivity Holes in Wireless Sensor Networks
distributed
Application-Aware Local-Global Source Deduplication for
Parallel and
Cloud Backup Services of Personal Storage
distributed
Enabling Trustworthy Service Evaluation in Service-Oriented
Parallel and
Mobile Social Networks
distributed
Panda: Public Auditing for Shared Data with Efficient User
Parallel and
Revocation in the Cloud
distributed
Privacy-Preserving Multi-Keyword Ranked Search over
Parallel and
Encrypted Cloud Data
distributed

Elysium Technologies Private Limited


Singapore | Madurai | Chennai | Trichy | Coimbatore | Ramnad
Pondicherry | Salem | Erode | Tirunelveli
http://www.elysiumtechnologies.com, info@elysiumtechnologies.com
TITLE ID

ETPLJ - 073

JAVA TITLE 2014 -2015


TRACON: Interference-Aware Schedulingfor Data-Intensive
Applicationsin Virtualized Environments
Decentralized Access Control with Anonymous Authentication
of Data Stored in Clouds
Key-Aggregate Cryptosystem for Scalable Data Sharing in
Cloud Storage

ETPLJ - 074

Signature Seraching in a Networked Collection of files

ETPLJ - 075

Containing byzantine failures with control zones


CRESP: Towards Optimal Resource Provisioning for
MapReduce Computing in Public Clouds
ADAPT-POLICY: Task Assignment in Server Farms when the
Service Time Distributionof Tasks is Not Known A Priori
A Hyper-Heuristic Scheduling Algorithm for Cloud
A Mechanism Design Approach to Resource Procurement in
Cloud Computing
Budget-Driven Scheduling Algorithms for Batches of
MapReduce Jobs in Heterogeneous Clouds
Identity-Based Distributed Provable Data Possession in MultiCloud Storage
Oruta:Privacy Preserving Public Auditing For Shared Data In
The Cloud
Secure kNN Query Processing in Untrusted Cloud
Environments
Swiper: Exploiting Virtual Machine Vulnerability in ThirdParty
Enabling Trustworthy Service Evaluation in Service-Oriented
Mobile Social Networks
Thermal-Aware Scheduling of Batch Jobs in Geographically
Distributed Data Centers
A Novel Model for Competition and Cooperation Among
Cloud Providers
Real-Time Tasks Oriented Energy-Aware Scheduling in
Virtualized Clouds
Workload-Aware Credit Scheduler for Improving Network I/O
Performance in Virtualization Environment
Performance and cost evaluation of an adaptive encryption
architecture for cloud database services
Performance and cost evaluation of an adaptive architecture for
cloud database services
Analysis, Modeling and Simulation of Workload Patterns in a
Large-Scale Utility Cloud
Scalable Analytics for IaaS Cloud Availability

ETPLJ - 071
ETPLJ - 072

ETPLJ - 076
ETPLJ - 077
ETPLJ - 078
ETPLJ - 079
ETPLJ - 080
ETPLJ - 081
ETPLJ - 082
ETPLJ - 083
ETPLJ - 084
ETPLJ - 085
ETPLJ - 086
ETPLJ - 087
ETPLJ - 088
ETPLJ - 089
ETPLJ - 090
ETPLJ - 091
ETPLJ - 092
ETPLJ - 093

DOMAIN
Parallel and
distributed
Parallel and
distributed
Parallel and
distributed
Parallel and
distributed
Parallel and
distributed
Parallel and
distributed
Parallel and
distributed
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing

Elysium Technologies Private Limited

TITLE ID
ETPLJ - 094
ETPLJ - 095
ETPLJ - 096
ETPLJ - 097
ETPLJ - 098
ETPLJ - 099
ETPLJ - 100
ETPLJ - 101
ETPLJ - 102
ETPLJ - 103
ETPLJ - 104
ETPLJ - 105
ETPLJ - 106
ETPLJ - 107
ETPLJ - 108
ETPLJ - 109
ETPLJ - 110
ETPLJ - 111
ETPLJ - 112
ETPLJ - 113
ETPLJ - 114
ETPLJ - 115
ETPLJ - 116
ETPLJ - 117
ETPLJ - 118

Singapore | Madurai | Chennai | Trichy | Coimbatore | Ramnad


Pondicherry | Salem | Erode | Tirunelveli
http://www.elysiumtechnologies.com, info@elysiumtechnologies.com
JAVA TITLE 2014 -2015
DOMAIN
A Social Compute Cloud: Allocating and Sharing Infrastructure
Resources via Social Networks
Cloud Computing
(K) NN Query Processing Methods in Mobile Ad Hoc
Networks
Mobile Computing
A Novel and Lightweight System to Secure Wireless Medical
Wireless Sensor
Sensor Networks
Network
Efficient Authentication for Mobile and Pervasive Computing
Mobile Computing
Friendbook: A Semantic-based Friend Recommendation
System for Social Networks
Mobile Computing
GreenBSN: Enabling Energy-Proportional Cellular Base
Station Networks
Mobile Computing
Iterative Group Splitting Algorithm for Opportunistic
Scheduling Systems
Mobile Computing
Mobiflage: Deniable Storage Encryptionfor Mobile Devices
Mobile Computing
Optimal Distributed Malware Defense in Mobile Networks
with Heterogeneous Devices
Mobile Computing
PSaD: A Privacy-preserving Social-assisted Content
Dissemination Scheme in DTNs
Mobile Computing
Wormhole Attack Detection Algorithms in WirelessNetwork
Coding Systems
Mobile Computing
A Mean Field Game Theoretic Approach for Security
Wireless
Enhancements in Mobile Ad hoc Networks
Communications
Data Retrieval Scheduling for Multi-Item Requests in MultiChannel WirelessBroadcast Environments
Mobile Computing
ZiFi: Exploiting Cross-Technology Interference Signatures for
Wireless LAN Discovery,
Mobile Computing
Distributed Algorithms for Energy-Efficient Even SelfDeployment in Mobile Sensor Networks
Mobile Computing
A Framework of Joint Mobile Energy Replenishment and Data
Gathering in Wireless Rechargeable Sensor Networks
Mobile Computing
Dynamic Routing for Data Integrity and Delay Differentiated
Services in Wireless Sensor Networks
Mobile Computing
Attack-resilient Mix-zones over Road Networks: Architecture
and Algorithm
Mobile Computing
Techniques to Minimize State Transfer Costs for Dynamic
Execution Offloading in Mobile Cloud Computing
Mobile Computing
DOTS: A Propagation Delay-AwareOpportunistic MAC
Protocol for MobileUnderwater Networks
Mobile Computing
On the Design of Mutually Aware OptimalPricing and Load
Balancing Strategiesfor Grid Computing Systems
Grid Computing
Performability Evaluation of Grid Environments using
Stochastic Reward Nets
Grid Computing
Fingerprint Compression Based on Sparse Representation
Image Processing
Information
Building a Scalable System for Stealthy P2P-Botnet Detection
Forensics
Gradient Histogram Estimation and Preservation for Texture
Enhanced Image Denoising
Image Processing

Elysium Technologies Private Limited


Singapore | Madurai | Chennai | Trichy | Coimbatore | Ramnad
Pondicherry | Salem | Erode | Tirunelveli
http://www.elysiumtechnologies.com, info@elysiumtechnologies.com

TITLE ID
ETPLJ - 119
ETPLJ - 120
ETPLJ - 121
ETPLJ - 122

ETPLJ - 123
ETPLJ - 124
ETPLJ - 125
ETPLJ - 126
ETPLJ - 127
ETPLJ - 128
ETPLJ - 129
ETPLJ - 130
ETPLJ - 131
ETPLJ - 132
ETPLJ - 133
ETPLJ - 134
ETPLJ - 135
ETPLJ - 136
ETPLJ - 137
ETPLJ - 138
ETPLJ - 139
ETPLJ - 140
ETPLJ - 141
ETPLJ - 142

JAVA TITLE 2014 -2015


Multilabel Image Classification via High-Order Label
Correlation Driven Active Learning
Multilabel Image Classification via High-Order Label
Correlation Driven Active Learning
Topic-Sensitive Influencer Mining in Interest-Based Social
Media Networks via Hypergraph Learning
Facilitating Document Annotation UsingContent and Querying
Value
Confidentiality-Preserving Image Search:A Comparative Study
Between Homomorphic Encryption and Distance-Preserving
Randomization
Cross-Indexing of Binary SIFT Codes for Large-Scale Image
Search
Reputation Measurement and Malicious Feedback Rating
Prevention in Web Service Recommendation Systems
SanGA: A Self-Adaptive Network-Aware Approach to Service
Composition
QoS-Aware Dynamic Composition of Web Services Using
Numerical Temporal Planning
TransCom: A Virtual Disk-Based Cloud Computing Platform
for Heterogeneous Services
Security as a Service Model for Cloud Environment
Information Flow Control for Secure Cloud Computing
Proactive Workload Management in Hybrid Cloud Computing
An Advanced MapReduce: Cloud MapReduce, Enhancements
and Applications
Requirements-Driven Self-Optimization of Composite Services
using Feedback Control
Trustworthy Stigmergic Service Composition and Adaptation
in Decentralized Environments
MonPaaS: An Adaptive Monitoring Platform as a Service for
Cloud Computing Infrastructures and Services
Top K Query for QoS-Aware Automatic Service Composition
Cost Minimization for Big Data Processing in Geo-Distributed
Data Centers
ClubCF: A Clustering-based Collaborative Filtering Approach
for Big Data Application
Large Iterative Multitier Ensemble Classifiers for Security of
Big Data
An Incremental and Distributed Inference Method for LargeScale Ontologies Based on MapReduce Paradigm
Extending MapReduce across Clouds with Bstream
DynamicMR: A Dynamic Slot Allocation Optimization
Framewor k for MapReduce Clusters

DOMAIN
Image Processing
Image Processing
Multimedia
NLP

Image Processing
Image Processing
Web Services
Web Services
Web Services
Services Computing
Services Computing
Services Computing
Services Computing
Services Computing
Services Computing
Services Computing
Services Computing
Services Computing
Big data
Big data
Big data
Big data
Big data
Big data

Elysium Technologies Private Limited


Singapore | Madurai | Chennai | Trichy | Coimbatore | Ramnad
Pondicherry | Salem | Erode | Tirunelveli
http://www.elysiumtechnologies.com, info@elysiumtechnologies.com
TITLE ID
ETPLJ - 143
ETPLJ - 144
ETPLJ - 145
ETPLJ - 146
ETPLJ - 147
ETPLJ - 148
ETPLJ - 149
ETPLJ - 150

JAVA TITLE 2014 -2015


Dache: A data aware caching for big-data applications using the
MapReduce framework
KASR: A Keyword-Aware Service Recommendation Method
on MapReduce for Big Data Application
Budget-Driven Scheduling Algorithms for Batches of
MapReduce Jobs in Heterogeneous Clouds
Bayesian Networks For Evidence-Based Decision-Making in
Software Engineering
GossipKit: A Unified ComponentFramework for Gossip
Active Learning of Constraints for Semi-Supervised Clustering
iTree: Efciently Discovering High-Coverage Congurations
Using Interaction Trees
Researcher Bias The Use of Machine Learning in Software
Defect Prediction

DOMAIN
Big data
Big data
Big data
Software Engineering
Software Engineering
Software Engineering
Software Engineering
Software Engineering

Thank You !

You might also like