You are on page 1of 12

S-Logix

#9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)
Ph:28343467 Mobile: 9841268578 E-Mail: slogix.india@yahoo.in

Web/Internet Technology
1 A Personalized Ontology Model for Web Information Gathering, IEEE Transactions on Knowledge and Data Engineering, April
2011[J2EE/.NET]
2 TEXT: Automatic Template Extraction from Heterogeneous Web Pages, IEEE Transactions on Knowledge and Data
Engineering, April 2011[J2EE/.NET]
3 Efficient Techniques for Online Record Linkage, IEEE Transactions on Knowledge and Data Engineering, March
2011[J2EE/.NET]
4 A Dual Framework and Algorithms for Targeted Online Data Delivery, IEEE Transactions on Knowledge and Data
Engineering, Jan 2011[J2EE/.NET]
5 Usher: Improving Data Quality with Dynamic Forms, IEEE Transactions on Knowledge and Data Engineering, Aug
2011[J2EE/.NET]
6 Automatic Discovery of Personal Name Aliases from the Web, IEEE Transactions on Knowledge and Data Engineering, Aug
2011[J2EE/.NET]
7 Improving Application Placement for Cluster-Based Web Applications, IEEE Transactions on Network and Service
Management, June 2011 [J2EE/.NET]
8 Textual Query of Personal Photos Facilitated by Large-Scale Web Data, IEEE Transactions on Pattern Analysis and Machine
Intelligence, May 2011 [J2EE/.NET]
9 Harvesting Image Databases from the Web, IEEE Transactions on Pattern Analysis and Machine Intelligence, April 2011
[J2EE/.NET]
10 A Delegation Solution for Universal Identity Management in SOA, IEEE Transactions on Services Computing, Jan.
2011[J2EE/.NET]
11 An Adaptive and Intelligent SLA Negotiation System for Web Services, IEEE Transactions on Services Computing, Jan.
2011[J2EE/.NET]
12 Expressive and Deployable Access Control in Open Web Service Applications, IEEE Transactions on Services Computing,
April 2011[J2EE/.NET]
13 QoS-Aware Web Service Recommendation by Collaborative Filtering, IEEE Transactions on Services Computing, April
2011[J2EE/.NET]
14 Item Recommendation in Collaborative Tagging Systems, IEEE Transactions on Systems, Man and Cybernetics, Part A:
Systems and Humans, July 2011[J2EE/.NET]
15 Mining and Representing User Interests: The Case of Tagging Practices, IEEE Transactions on Systems, Man and Cybernetics,
Part A: Systems and Humans, July 2011[J2EE/.NET]
16 Gender Classification for Web Forums, IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans,
July 2011[J2EE/.NET]
17 On Popularity in the Blogosphere, IEEE Internet Computing, 2011[J2EE/.NET]
18 Mining Web Graphs for Recommendations, IEEE Transactions on Knowledge and Data Engineering, 2011[J2EE/.NET]
19 A Web Search Engine-Based Approach to Measure Semantic Similarity between Words, IEEE Transactions on Knowledge
and Data Engineering, 2011[J2EE/.NET]

20 Googling the Internet: Profiling Internet Endpoints via the World Wide Web, IEEE/ACM Transactions on Networking, April
2010 (J2EE)
21 Record Matching over Query Results from Multiple Web Databases, IEEE Transactions on Knowledge and Data Engineering,
April 2010 (J2EE/.NET)
22 Web-Services-Based Resource Discovery Model and Service Deployment on HealthGrids, IEEE Transactions on Information
Technology in Biomedicine, May 2010 (J2EE)
23 Querying the Data Web: The MashQL Approach, IEEE Internet Computing, June 2010 (J2EE)
24 Queueing-Model-Based Adaptive Control of Multi-Tiered Web Applications, IEEE Transactions on Network and Service
Management, Sep 2008 ( J2EE/.NET )
25 Truth Discovery with Multiple Conflicting Information Providers on the Web, IEEE Transactions on Knowledge and Data
Engineering, June 2008 ( J2EE / .NET )
26 Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies, IEEE Transactions on
Software Engineering, Jan.-Feb. 2008( J2EE )
27 WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation, IEEE Transactions on Software
Engineering, Feb. 2008 ( J2EE )
28 Building a Multiple-Criteria Negotiation Support System, IEEE Transactions on Knowledge and Data Engineering June 2007(
J2EE / .NET )
29 Resource Allocation for Session-Based Two-Dimensional Service Differentiation on e-Commerce Servers IEEE Transactions
on Parallel and Distributed Systems Aug. 2006 ( J2EE / .NET)
30 UNIT: User-centric Transaction Management in Web-Database Systems , ICDE April 2006, IEEE Computer Society 2006
(J2EE / .NET)

S-Logix
#9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)
Ph:28343467 Mobile: 9841268578 E-Mail: slogix.india@yahoo.in

Wired Networks
1 Explicit Congestion Control Algorithms for Time Varying Capacity Media, IEEE Transactions on Mobile Computing, Jan 2011(
NS2)
2 A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows, IEEE/ACM Transactions on
Networking, Feb 2011(NS2)
3 Using Link Gradients to Predict the Impact of Network Latency on Multitier Applications, IEEE/ACM Transactions on
Networking, June 2011(Java/NS2)
4 Measuring Multipath Routing in the Internet, IEEE/ACM Transactions on Networking, June 2011(NS2)
5 Using Link Gradients to Predict the Impact of Network Latency on Multitier Applications, IEEE/ACM Transactions on
Networking, June 2011(Java/NS2)
6 Parametric Methods for Anomaly Detection in Aggregate Traffic, IEEE/ACM Transactions on Networking, April 2011(NS2)
7 Impact of File Arrivals and Departures on Buffer Sizing in Core Routers, IEEE/ACM Transactions on Networking, April
2011(NS2)
8 Optimal service pricing for a cloud cache, IEEE Transactions on Knowledge and Data Engineering, 2011[Java]
9 Valuable Detours: Least-Cost Anypath Routing, IEEE/ACM Transactions on Networking, April 2011(NS2)
10 Efficient Network Modification to Improve QoS Stability at Failures, IEEE Transactions on Network and Service
Management, June 2011 (Java/NS2)

11 The Small World of File Sharing, IEEE Transactions on Parallel and Distributed Systems, July 2011(Java/NS2)
12 Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing, IEEE Transactions on Parallel and
Distributed Systems, June 2011(Java)
13 Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and
Distributed Systems, May 2011(Java)
14 Delaying Transmissions in Data Communication Networks to Improve Transport-Layer Performance, IEEE Journal on
Selected Areas in Communications, May 2011(NS2)
15 Performance Improvement of Delay-Based TCPs in Asymmetric Networks, IEEE Communications Letters, Mar 2011(NS2)
16 An Objective Approach to Measuring Video Playback Quality in Lossy Networks using TCP, IEEE Communications Letters,
Jan 2011(NS2)
17 Anomalous Loss Performance for Mixed Real-Time and TCP Traffic in Routers With Very Small Buffers, IEEE/ACM
Transactions on Networking, 2011(NS2)
18 Data Leakage Detection, IEEE Transactions on Knowledge and Data Engineering, January 2011 (Java)
19 Fast Recovery From Dual-Link or Single-Node Failures in IP Networks Using Tunneling, IEEE/ACM Transactions on
Networking, December 2010( Java/NS2)
20 Formula-based TCP throughput prediction with available bandwidth: IEEE Communications Letters, April 2010( NS2 )
21 Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis, IEEE Transactions on Dependable
and Secure Computing, April-June 2009 ( Java / NS2 )
22 The Effects of Active Queue Management and Explicit Congestion Notification on Web Performance, IEEE/ACM
Transactions on Networking, Dec. 2007( NS2)
23 Experimental evaluation of TCP protocols for high-speed networks, IEEE/ACM Transactions on Networking, Oct 2008( NS2)
24 Maintaining Strong Cache Consistency for the Domain Name System, IEEE Transactions on Knowledge and Data Engineering
Aug. 2007( Java)
25 COPACC: An Architecture of Cooperative Proxy-Client Caching System for On-Demand Media Streaming, IEEE
Transactions on Parallel and Distributed Systems Jan. 2007, Multimedia ( Java )

S-Logix
#9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)
Ph:28343467 Mobile: 9841268578 E-Mail: slogix.india@yahoo.in

Wireless Networks ( Mobile, Adhoc, WLAN, Sensor)


1 An Improved Efficient Secret Handshakes Scheme with Unlinkability, IEEE Communications Letters, Feb 2011[NS2]
2 Relay Station Placement Strategy in IEEE 802.16j WiMAX Networks, IEEE Communications Letters, Jan 2011[NS2]
3 Load Shedding in Mobile Systems with MobiQual, IEEE Transactions on Knowledge and Data Engineering, Feb 2011[NS2]
4 Modeling and Improving TCP Performance over Cellular Link with Variable Bandwidth, IEEE Transactions on Mobile
Computing, August 2011[NS2]
5 Integration Gain of Heterogeneous WiFi/WiMAX Networks, IEEE Transactions on Mobile Computing, August 2011[NS2]
6 A Control-Theoretic Approach to Distributed Optimal Configuration of 802.11 WLANs, IEEE Transactions on Mobile
Computing, June 2011[NS2]

7 Endpoint-Based Call Admission Control and Resource Management for VoWLAN, IEEE Transactions on Mobile Computing,
May 2011[NS2]
8 Spatial-Temporal Coverage Optimization in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, April
2011[NS2]
9 A Cooperative Clustering Protocol for Energy Saving of Mobile Devices with WLAN and Bluetooth Interfaces, IEEE
Transactions on Mobile Computing, April 2011[NS2]
10 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing,
April 2011[NS2]
11 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks, IEEE/ACM Transactions on
Networking, Feb 2011(NS2)
12 Efficient Data Collection in Wireless Sensor Networks with Path-Constrained Mobile Sinks, IEEE Transactions on Mobile
Computing, April 2011[NS2]
13 Flexible Broadcasting of Scalable Video Streams to Heterogeneous Mobile Devices, IEEE Transactions on Mobile Computing,
March 2011[Java/NS2]
14 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention, IEEE Transactions on Mobile
Computing, Feb 2011[NS2]
15. An Improved Geocast for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, Feb 2011[NS2]
16. Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization, IEEE Transactions on Mobile
Computing, Feb 2011[Java]
17. Energy-Efficient Multicasting of Scalable Video Streams Over WiMAX Networks, IEEE Transactions on Multimedia, Feb
2011 [NS2]
18. An Optimal Algorithm for Relay Node Assignment in Cooperative Ad Hoc Networks, IEEE/ACM Transactions on
Networking, June 2011[NS2]
19. Energy-Efficient Protocol for Cooperative Networks, IEEE/ACM Transactions on Networking, April 2011[NS2]
20. Buffer Sizing for 802.11-Based Networks, IEEE/ACM Transactions on Networking, Feb 2011[NS2]
21. The Limit of Information Propagation Speed in Large-Scale Multihop Wireless Networks, IEEE/ACM Transactions on
Networking, Feb 2011[NS2]
22. Video Streaming Distribution in VANETs, IEEE Transactions on Parallel and Distributed Systems, July 2011[Java/NS2]
23. Performance Modeling of Message Dissemination In Vehicular Ad Hoc Networks with Priority, IEEE Journal on Selected
Areas in Communications, March 2011 [Java/NS2]
24. A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas
in Communications, March 2011[NS2]
25. Revisiting an RFID Identification-Free Batch Authentication Approach, IEEE Communications Letters, June 2011[Java]
26. Incentivising Fairness and Policing Nodes in WiFi, IEEE Communications Letters, May 2011[NS2]
27. Distribution of high-definition video in 802.11 wireless home networks, IEEE Transactions on Consumer Electronics, Feb
2011[NS2]
28. Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and Cross-Layer Optimization for Scalable Video
Streaming, IEEE Transactions on mobile Computing, 2011[NS2]
29. Modeling Nonsaturated IEEE 802.11 DCF Networks Utilizing an Arbitrary Buffer Size, IEEE Transactions on mobile
Computing, 2011[NS2]

30. Wireless Fountain Coding with IEEE 802.11e Block ACK for Media Streaming in Wireline-cum-WiFi Network: A
Performance Study, IEEE Transactions on mobile Computing, 2011[NS2]
31. An Analysis of IEEE 802.11 DCF and Its Application to Energy-Efficient Relaying in Multi-Hop Ad-Hoc Networks, IEEE
Transactions on mobile Computing, 2011[NS2]
32. A Practical Adaptive Pacing Scheme for TCP in Multihop Wireless Networks, IEEE/ACM Transactions on Networking,
2011[NS2]
33. Detecting Communities in Sparse MANETs, IEEE/ACM Transactions on Networking, 2011[NS2]
34. A Simple Critical-Load-Based CAC Scheme for IEEE 802.11 DCF Networks, IEEE/ACM Transactions on Networking,
2011[NS2]
35. SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile IEEE Transactions on Mobile
Computing, June 2010 (Java /NS2)
36. Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing,
Feb. 2010 (NS2)
37. A hybrid reservation/contention-based MAC for video streaming over wireless networks, IEEE Journal on Selected Areas in
Communications, April 2010 (NS2)
38. Model-Based Techniques for Data Reliability in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, April
2009 ( NS2 )
39.Cell Breathing Techniques for Load Balancing in Wireless LANs, IEEE Transactions on Mobile Computing, June 2009( NS2 )
40. Improving TCP/IP Performance over Third-Generation Wireless Networks, IEEE Transactions on Mobile Computing, April
2008 (NS2)
41. Benefit-Based Data Caching in Ad Hoc Networks, IEEE Transactions on Mobile Computing, March 2008 (Java / NS2)
42. COACS: A Cooperative and Adaptive Caching System for MANETs, IEEE Transactions on Mobile Computing, Aug. 2008 (
NS2 / JAVA )
43. Data Dissemination with Ring-Based Index for Wireless Sensor Networks, IEEE Transactions on Mobile Computing, July
2007 ( NS2 / Java)

S-Logix
#9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)
Ph:28343467 Mobile: 9841268578 E-Mail: slogix.india@yahoo.in

Data Mining / Database


1. Database Access Pattern Protection Without Full-Shuffles, IEEE Transactions on Information Forensics and Security, March
2011[Java]
2. Effective Navigation of Query Results Based on Concept Hierarchies, IEEE Transactions on Knowledge and Data Engineering,
April 2011[Java]
3. Text Clustering with Seeds Affinity Propagation, IEEE Transactions on Knowledge and Data Engineering, April 2011[Java]
4. A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification, IEEE Transactions on Knowledge and Data
Engineering, March 2011[Java]
5. Ranking Spatial Data by Quality Preferences, IEEE Transactions on Knowledge and Data Engineering, March 2011 [Java]
6. Selecting Attributes for Sentiment Classification Using Feature Relation Networks, IEEE Transactions on Knowledge and Data
Engineering, March 2011[Java]
7. Collaborative Filtering with Personalized Skylines, IEEE Transactions on Knowledge and Data Engineering, Feb 2011[Java]

8. Constrained Skyline Query Processing against Distributed Data Sites, IEEE Transactions on Knowledge and Data
Engineering, Feb 2011[Java]
9. Mining Group Movement Patterns for Tracking Moving Objects Efficiently, IEEE Transactions on Knowledge and Data
Engineering, Feb 2011[Java]
10. Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations, IEEE Transactions on
Knowledge and Data Engineering, Feb 2011[Java]
11. Data Leakage Detection, IEEE Transactions on Knowledge and Data Engineering, Jan 2011[Java]
12. Efficient Periodicity Mining in Time Series Databases Using Suffix Trees, IEEE Transactions on Knowledge and Data
Engineering, Jan 2011[Java]
13. Missing Value Estimation for Mixed-Attribute Data Sets, IEEE Transactions on Knowledge and Data Engineering, Jan
2011[Java]
14. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques, IEEE Transactions on Knowledge and
Data Engineering, 2011
15. Learning Semi-Riemannian Metrics for Semisupervised Feature Extraction, IEEE Transactions on Knowledge and Data
Engineering, April 2011[J2EE/.NET]
16. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases, IEEE Transactions on
Knowledge and Data Engineering, 2011[J2EE/.NET]
17. Publishing Search Logs A Comparative Study of Privacy Guarantees, IEEE Transactions on Knowledge and Data
Engineering, 2011[Java]
18. Privacy-Preserving OLAP: An Information-Theoretic Approach, IEEE Transactions on Knowledge and Data Engineering,
Jan 2011[Java]
19. Continuous Monitoring of Distance-Based Range Queries, IEEE Transactions on Knowledge and Data Engineering, Aug
2011[Java]
20. Making Aggregation Work in Uncertain and Probabilistic Databases, IEEE Transactions on Knowledge and Data
Engineering, Aug 2011[Java]
21. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts, IEEE Transactions on Knowledge
and Data Engineering, June 2011[Java]
22. Automatic Enrichment of Semantic Relation Network and Its Application to Word Sense Disambiguation, IEEE Transactions
on Knowledge and Data Engineering, June 2011[Java]
23. Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints, IEEE Transactions on
Knowledge and Data Engineering, June 2011[Java]
24. Design and Implementation of an Intrusion Response System for Relational Databases, IEEE Transactions on Knowledge and
Data Engineering, June 2011[Java]
25. Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments, IEEE Transactions on
Knowledge and Data Engineering, June 2011[Java]
26. Processing Continuous Range Queries with Spatiotemporal Tolerance, IEEE Transactions on Mobile Computing, March
2011[Java]
27. Fast and Cost-Effective Online Load-Balancing in Distributed Range-Queriable Systems, IEEE Transactions on Parallel and
Distributed Systems, Aug 2011[Java]
28. Term Weighting Schemes for Question Categorization, IEEE Transactions on Pattern Analysis and Machine Intelligence,
May 2011 [Java]
29. Revisiting Linear Discriminant Techniques in Gender Recognition, IEEE Transactions on Pattern Analysis and Machine
Intelligence, April 2011 [Java]

30. Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models, IEEE Transactions on Pattern Analysis
and Machine Intelligence, April 2011 [Java]
31. Context-Dependent Kernels for Object Classification, IEEE Transactions on Pattern Analysis and Machine Intelligence, April
2011 [Java]
32. A New and Efficient Intelligent Collaboration Scheme for Fashion Design, IEEE Transactions on Systems, Man and
Cybernetics, Part A: Systems and Humans, May 2011[Java]
33. Privacy-Preserving Updates to Anonymous and Confidential Databases, IEEE Transactions on Dependable and Secure
Computing, Aug 2011[Java]
34. Creating Evolving User Behavior Profiles Automatically, IEEE Transactions on Knowledge and Data Engineering,
2011[Java]
35. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis, IEEE Transactions on Knowledge and Data
Engineering, 2011[Java]
36. Mining Online Reviews for Predicting Sales Performance: A Case Study in the Movie Domain, IEEE Transactions on
Knowledge and Data Engineering, 2011[Java/J2EE]
37. A Temporal Pattern Search Algorithm for Personal History Event Visualization, IEEE Transactions on Knowledge and Data
Engineering, 2011[Java]
38. Organizing User Search Histories, IEEE Transactions on Knowledge and Data Engineering, 2011[Java]
39. Topic Mining over Asynchronous Text Sequences, IEEE Transactions on Knowledge and Data Engineering, 2011[Java]
40. Incremental Information Extraction Using Relational Databases, IEEE Transactions on Knowledge and Data Engineering,
2011[Java]
41. Effective Pattern Discovery for Text Mining, IEEE Transactions on Knowledge and Data Engineering, 2011[Java]
42. On the Design and Analysis of the Privacy-Preserving SVM Classifier, IEEE Transactions on Knowledge and Data
Engineering, 2011[Java]
43. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies, IEEE Transactions On Knowledge And
Data Engineering, June 2010 ( J2EE)
44. Assessment of the Risk Factors of Coronary Heart Events Based on Data Mining With Decision Trees, IEEE Transactions on
Information Technology in Biomedicine, May 2010 [J2EE/.NET)
45. Deriving Concept-Based User Profiles from Search Engine Logs, IEEE Transactions on Knowledge and Data Engineering,
July 2010 [Java]
46. Web User-Session Inference by Means of Clustering Techniques, IEEE/ACM Transactions on Networking, April 2009
[J2EE /.NET]
47. Predicting Missing Items in Shopping Carts, IEEE Transactions on Knowledge and Data Engineering, July 2009 [
J2EE/.NET ]
48. Exact Knowledge Hiding through Database Extension, IEEE Transactions on Knowledge and Data Engineering May 2009 [
Java ]
49. Integrating Data Warehouses with Web Data, IEEE Transactions on Knowledge and Data Engineering, July 2008, [ J2EE /
.NET ]
50. A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Sites, IEEE Transactions on
Knowledge and Data Engineering, Feb. 2008, [ Java ]
51. Watermarking Relational Databases Using Optimization-Based Techniques, IEEE Transactions on Knowledge and Data
Engineering, Jan. 2008, [Java]
52. Protection of Database Security via Collaborative Inference Detection, IEEE Transactions on Knowledge and Data
Engineering, Aug. 2008 Database Security [Java / J2EE]

53. Mining E-Commerce Data to Analyze the Target Customer Behavior, Third International Conference on Knowledge
Discovery and Data Mining, Jan. 2008, [J2EE / .NET]
54. Service-mining Based on the Knowledge and Customer Databases, IEEE/ACIS Intl Confrence on Computer and Information
Science, ICIS July 2007, [ J2EE / .NET]

S-Logix
#9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)
Ph:28343467 Mobile: 9841268578 E-Mail: slogix.india@yahoo.in

Network Security (Wired /Wireless )


1. New Key Management Approach for Broadcast and Multicast Services, IEEE Communications Letters, Feb 2011[Java]
2. Towards Situational Awareness of Large-Scale Botnet Probing Events, IEEE Transactions on Information Forensics and
Security, March 2011[Java]
3. A Privacy-Preserving BuyerSeller Watermarking Protocol Based on Priced Oblivious Transfer, IEEE Transactions on
Information Forensics and Security, March 2011[Java]
4. A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting, IEEE Transactions on Information
Forensics and Security, March 2011[Java]
5. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure, IEEE Transactions on Mobile Computing,
August 2011[Java/NS2]
6. On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks, IEEE Transactions on Mobile
Computing, August 2011[NS2]
7. Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing, IEEE
Transactions on Mobile Computing, June 2011[Java/NS2]
8. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks, IEEE Transactions on
Dependable and Secure Computing, April 2011[Java/NS2]
9. Secure and Practical Outsourcing of Linear Programming in Cloud Computing, IEEE INFOCOM, April 2011[Java]
10 Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE Transactions on Mobile Computing, May
2011[NS2]
11. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients, IEEE Transactions on
Mobile Computing, Feb 2011[Java/NS2]
12. Secure Multihop Network Programming with Multiple One-Way Key Chains, IEEE Transactions on Mobile Computing, Jan
2011[Java/NS2]
13. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks, IEEE Transactions on Mobile Computing,
Jan 2011[Java/NS2]
14. On the Price of Security in Large-Scale Wireless Ad Hoc Networks, IEEE/ACM Transactions on Networking, April
2011[Java/NS2]
15. Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks, IEEE Transactions on Network
and Service Management, June 2011 [Java/NS2]
16. On the Impact of Security Protocols on the Performance of SNMP, IEEE Transactions on Network and Service Management,
June 2011[Java]
17. Mechanism Design-Based Secure Leader Election Model Intrusion Detection in MANET, IEEE Transactions on Dependable
and Secure Computing, Feb 2011[NS2]

18. Modeling and Detection of Camouflaging Worm, IEEE Transactions on Dependable and Secure Computing, June
2011[Java/NS2]
19. A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems, IEEE
Transactions on Parallel and Distributed Systems, Aug 2011[Java]
20 Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and
Distributed Systems, July 2011[Java]
21. ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks, IEEE Journal
on Selected Areas in Communications, March 2011[Java/NS2]
22. Comparative Evaluation of Spoofing Defenses, IEEE Transactions on Dependable and Secure Computing, April 2011(NS2)
23. Data Integrity Proofs in Cloud Storage, Third International Conference on Communication Systems and Networks,Jan
2011[Java]
24. Efficient Certificate Revocation List Organization and Distribution, IEEE Journal on Selected Areas in Communications,
March 2011[Java]
25. P2DAP Sybil Attacks Detection in Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in Communications,
March 2011[Java/NS2]
26. Privacy in VoIP Networks: Flow Analysis Attacks and Defense, IEEE Transactions on Parallel and Distributed Systems, April
2011[NS2]
27. RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications, IEEE Journal on
Selected Areas in Communications, March 2011[Java/NS2]
28. Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks, IEEE Communications Letters, April
2011[Java/NS2]
29. FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks, IEEE Transactions on Computers,
July 2011[Java/NS2]
30. On Ultralightweight RFID Authentication Protocols, IEEE Transactions on Dependable and Secure Computing, Aug
2011[Java]
31. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks, IEEE Transactions on Dependable and Secure Computing,
June 2011[Java/NS2]
32. Nymble: Blocking Misbehaving Users in Anonymizing Networks, IEEE Transactions on Dependable and Secure Computing,
April 2011[Java/NS2]
33. Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET, IEEE Transactions on
Dependable and Secure Computing, Feb 2011[NS2]
34. Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids, IEEE Transactions on Information
Technology in Biomedicine, March 2011[Java]
35. Improving Security and Efficiency in Attribute-Based Data Sharing, IEEE Transactions on Knowledge and Data Engineering,
2011[Java]
36. Resilient Identity Crime Detection, IEEE Transactions on Knowledge and Data Engineering, 2011[Java]
37. Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data, IEEE Transactions on Knowledge and Data
Engineering, 2011[Java]
38. Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes, IEEE Transactions on Vehicular
Technology, June 2009 (NS2)
39. Vulnerability Discovery with Attack Injection, IEEE Transactions on Software Engineering, May2010 (Java)

40. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems, IEEE Transactions on Parallel and
Distributed Systems, August 2010 (NS2)
41. A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory, IEEE Transactions on Dependable and
Secure Computing, March 2010 ( J2EE/.NET)
42. Dynamic rekeying in 3GPP multimedia broadcast/multicast service (MBMS) IEEE Communications Letters, April 2010
(JAVA)
43. Authenticated Group Key Transfer Protocol Based on Secret Sharing, IEEE Transactions on Computers, June 2010
( JAVA)
44. An Advanced Hybrid Peer-to-Peer Botnet, IEEE Transactions on Dependable and Secure Computing, June 2010 ( JAVA)
45. Using Web-Referral Architectures to Mitigate Denial-of-Service Threats, IEEE Transactions on Dependable and Secure
Computing, June 2010 ( J2EE/.NET)
46. Blind Authentication: A Secure Crypto-Biometric Verification Protocol, IEEE Transactions on Information Forensics and
Security, June 2010 ( JAVA)
47. An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, IEEE Transactions on Information Forensics and
Security, March 2010 (JAVA )
48. MABS: Multicast Authentication Based on Batch Signature, IEEE Transactions on Mobile Computing, July 2010 (Java)
49. Provably Secure Steganography, IEEE Transactions on Computers, May 2009 ( Java )
50. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers, IEEE Transactions on Dependable and Secure
Computing, Jan.-March 2009 ( J2EE )
51. Monitoring the Application-Layer DDoS Attacks for Popular Websites, IEEE/ACM Transactions on Networking, Feb. 2009(
J2EE/.NET )
52. Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET, IEEE Transactions on
Dependable and Secure Computing, June 2009 (NS2)
53. A Gen2-Based RFID Authentication Protocol for Security and Privacy, IEEE Transactions on Mobile Computing, Aug. 2009 (
Java )
54. Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices, IEEE Transactions on
Computers, June 2008 ( Java )
55. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting, IEEE Transactions on Dependable
and Secure Computing, April-June 2008 ( Java )
56. Controlling IP Spoofing through Interdomain Packet Filters, IEEE Transactions on Dependable and Secure Computing, Jan.March 2008 ( NS2 )
57. Credit Card Fraud Detection Using Hidden Markov Model, IEEE Transactions on Dependable and Secure Computing, Jan.March 2008 (J2EE/.NET)
58. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, IEEE
Transactions on Parallel and Distributed Systems, May 2008( Java )
59. Keep Passwords Away from Memory: Password Caching and Verification Using TPM, 22nd Intl Conf on
Advanced Information Networking and Applications, March 2008( Java )
60. Agent Based Architecture for Secure Access from Multiple Hospitals, Seventh IEEE/ACIS Intl Conf on Computer and
Information Science, May 2008( .NET )
61. Wallet Based E-Cash System for Secured Multi-hop Cash Exchange, 3rd Intl Conference on Information and Communication
Technologies: Theory to Applications, April 2008 ( J2EE )

10

62. Intelligent Phishing Website Detection System using Fuzzy Techniques, 3rd Intl Conf on Information and Communication
Technologies:Theory to Applications, April 2008( J2EE / .NET)
63. Collaborative Detection of DDoS Attacks over Multiple Network Domains, IEEE Transactions on Parallel and Distributed
Systems, Dec. 2007(NS2)
64. Secure Internet Banking Authentication, IEEE Security and Privacy April 2006(J2EE)
65. A Practical Password-Based Two-Server Authentication and Key Exchange System, IEEE Transactions On Dependable And
Secure Computing, June 2006( J2EE )

S-Logix
#9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)
Ph:28343467 Mobile: 9841268578 E-Mail: slogix.india@yahoo.in

Peer to Peer Networks


1. Superchunk-Based Efficient Search in P2P-VoD System, IEEE Transactions on Multimedia,
April. 2011 (NS2/JAVA)
2. Simple Model for Chunk-Scheduling Strategies in P2P Streaming, IEEE/ACM Transactions on Networking, Feb
2011(NS2/JAVA)
3. Monitoring the Impact of P2P Users on a Broadband Operator's Network over Time, IEEE Transactions on Network and
Service Management, June 2011 (NS2/JAVA)
4. Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks, IEEE Transactions on Parallel and Distributed
Systems, Aug 2011(NS2/JAVA)
4. Load Balance with Imperfect Information in Structured Peer-to-Peer Systems, IEEE Transactions on Parallel and Distributed
Systems, April 2011(NS2/JAVA)
5. The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks, IEEE Journal on Selected
Areas in Communications, May 2011(NS2/JAVA)
6. The CoQUOS Approach to Continuous Queries in Unstructured Overlays, IEEE Transactions on Knowledge and Data
Engineering, April 2011[Java]
7. Design and Evaluation of a Proxy Cache for Peer-to-Peer Traffic, IEEE Transactions on Computers, July 2011(NS2/JAVA)
8. Exploiting Heterogeneity in P2P Video Streaming IEEE Transactions on Computers, May 2011(NS2/JAVA)
9. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks, IEEE Transactions on Dependable and Secure
Computing, Aug 2011(NS2/JAVA)
10. Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword Searching, IEEE Transactions on Knowledge and Data
Engineering, 2011(NS2/JAVA)
11. Energy Efficient Data Access in Mobile P2P Networks, IEEE Transactions on Knowledge and Data Engineering,
2011(NS2/JAVA)
12. IRM: Integrated File Replication and Consistency Maintenance in P2P Systems, IEEE Transactions on Parallel and
Distributed Systems, Jan. 2010(NS2/JAVA)
13. Efficient Range Query Processing in Peer-to-Peer Systems, IEEE Transactions on Knowledge and Data Engineering, Jan.
2009( Java/NS2 )

11

14. Distributed Throughput Maximization on P2P VOD Applications, IEEE Transactions on Multimedia, April 2009(Java/NS2)
15. Investigating the Scheduling Sensitivity of P2P Video Streaming: An Experimental Study, IEEE Transactions on Multimedia,
April 2009 ( Java/NS2 )
16. Peer Assisted Video Streaming With Supply-Demand-Based Cache Optimization IEEE Transactions on Multimedia, April
2009( Java )
17. Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks, IEEE Transactions on Parallel and Distributed Systems,
May 2009( Java )
18. Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs, IEEE Transactions on Parallel
and Distributed Systems, Feb. 2009( Java )
19. Collusive Piracy Prevention in P2P Content Delivery Networks, IEEE Transactions on Computers, July 2009 (Java)
20. Efficient Skyline Computation in Structured Peer-to-Peer Systems IEEE Transactions on Knowledge and Data Engineering,
July 2009 ( Java )
21. The Server Reassignment Problem for Load Balancing in Structured P2P Systems, IEEE Transactions on Parallel and
Distributed Systems, Feb. 2008(Java )
22. Minimizing File Download Time in Stochastic Peer-to-Peer Networks, IEEE/ACM Transactions on Networking, April 2008(
Java / NS2)

S-Logix
#9, First Floor, Krishnabai St, T.Nagar, Chennai-600017 (Opp:HDFC Bank, Habibullah Road)
Ph:28343467 Mobile: 9841268578 E-Mail: slogix.india@yahoo.in

Imaging / Multimedia
1. Efficient Relevance Feedback for Content-Based Image Retrieval by Mining User Navigation Patterns, IEEE Transactions on
Knowledge and Data Engineering, March 2011[Java]
2. Semi-Automatic Tagging of Photo Albums via Exemplar Selection and Tag Inference, IEEE Transactions on Multimedia, Feb
2011[Java]
3. Matching Forensic Sketches to Mug Shot Photos, IEEE Transactions on Pattern Analysis and Machine Intelligence, March
2011[Java]
4. Texture Classification Using Refined Histogram, IEEE Transactions on Image Processing, May 2010 [Java]
5. Versatile Transcoding Proxy for Internet Content Adaptation, IEEE Transactions on Multimedia, June 2008, [ Java ]
6. Multiquality Data Replication in Multimedia Databases, IEEE Transactions on Knowledge and Data Engineering May 2007, [
Java ]
7. Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery, IEEE
Transactions On Knowledge And Data Engineering, May 2006( Java )
8. ViBE: A Compressed Video Database Structured for Active Browsing and Search, IEEE Transactions On Multimedia,
February 2004, [ Java ]

12

You might also like