logicsystemsprojects@gmail.com
Logo
SNo. Code TITLE DOMAIN DOWNLOAD
1 LSJ1401 A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing
2 LSJ1402 Behavioral Malware Detection in Delay Tolerant Networks Cloud Computing
3 LSJ1403 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Cloud Computing
4 LSJ1404 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Cloud Computing
5 LSJ1405 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Cloud Computing
6 LSJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Cloud Computing
7 LSJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Cloud Computing
8 LSJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Cloud Computing
9 LSJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing
10 LSJ1410 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System Cloud Computing
11 LSJ1411 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Cloud Computing
12 LSJ1412 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Cloud Computing
13 LSJ1413 Towards Differential Query Services in Cost-Efficient Clouds Cloud Computing
14 LSJ1414 A Cocktail Approach for Travel Package Recommendation Data Mining
15 LSJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Data Mining
16 LSJ1416 BestPeer++ A Peer-to-Peer Based Large-Scale Data Processing Platform Data Mining
17 LSJ1417 Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments Data Mining
18 LSJ1418 Dealing With Concept Drifts in Process Mining Data Mining
19 LSJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detection Data Mining
20 LSJ1420 Efficient Prediction of Difficult Keyword Queries over Databases Data Mining
21 LSJ1421 Facilitating Document Annotation Using Content and Querying Value Data Mining
22 LSJ1422 Fast Nearest Neighbor Search with Keywords Data Mining
23 LSJ1423 Keyword Query Routing Data Mining
24 LSJ1424 Privacy-Preserving and Content-Protecting Location Based Queries Data Mining
25 LSJ1425 Security Evaluation of Pattern Classifiers under Attack Data Mining
26 LSJ1426 Supporting Privacy Protection in Personalized Web Search Data Mining
27 LSJ1427 Towards Online Shortest Path Computation Data Mining
28 LSJ1428 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Secure Computing
29 LSJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Secure Computing
30 LSJ1430 PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks Secure Computing
31 LSJ1431 Top-k Query Result Completeness Verification in Tiered Sensor Networks Secure Computing
32 LSJ1432 Automatic Test Packet Generation Networking
33 LSJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Networking
34 LSJ1434 Boundary Cutting for Packet Classification Networking
35 LSJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks Networking
36 LSJ1436 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Parallel & Distributed Systems
37 LSJ1437 Consistency as a Service: Auditing Cloud Consistency Networking
38 LSJ1438 Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images Image Processing
39 LSJ1439 Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks Parallel & Distributed Systems
40 LSJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine Parallel & Distributed Systems
41 LSJ1441 Securing Broker-Less PublishSubscribe Systems Using Identity-Based Encryption Parallel & Distributed Systems
42 LSJ1442 SOS A Distributed Mobile Q&A System Based on Social Networks Parallel & Distributed Systems
43 LSJ1443 The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Eva Parallel & Distributed Systems
44 LSJ1444 The Design and Evaluation of An Information Sharing System for Human Networks Parallel & Distributed Systems
45 LSJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks Parallel & Distributed Systems
46 LSJ1446 Secure Outsourced Attribute-based Signatures Parallel & Distributed Systems
47 LSJ1447 An Incentive Framework for Cellular Traffic Offloading Mobile Computing
48 LSJ1448 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing
49 LSJ1449 Efficient Authentication for Mobile and Pervasive Computing Mobile Computing
50 LSJ1450 Friendbook A Semantic-based Friend Recommendation System for Social Networks Mobile Computing
51 LSJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Mobile Computing
52 LSJ1452 Privacy-Enhanced Web Service Composition Secure Computing
53 LSJ1453 Web Service Recommendation via Exploiting Location and QoS Information Secure Computing
54 LSJ1454 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Parallel & Distributed Systems
55 LSJ1455 Secure Mining of Association Rules in Horizontally Distributed Databases Data Mining
56 LSJ1456 Privacy Preserving Delegated Access Control in Public Clouds Cloud Computing
57 LSJ1457 m-Privacy for Collaborative Data Publishing Data Mining
58 LSJ1458 Personalized Web Search Using Browsing History and Domain Knowledge Intelligent Computing
59 LSJ1459 SocialTube: P2P-Assisted Video Sharing in Online Social Networks Parallel & Distributed Systems
60 LSJ1460 On the Use of Side Information for Mining Text Data Data Mining
61 LSJ1461 Secure kNN Query Processing in Untrusted Cloud Environments Data Mining
62 LSJ1462 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality Data Mining
63 LSJ1463 XSPath: Navigation on XML Schemas Made Easy Data Mining
64 LSJ1464 Dynamic Query Forms for Database Queries Data Mining
65 LSJ1465 Video Dissemination over Hybrid Cellular and Ad Hoc Networks Mobile Computing
66 LSJ1466 Mapping XML to a Wide Sparse Table Data Mining
67 LSJ1467 A Cloud Enviroment for Backup and Data Storage Cloud Computing
68 LSJ1468 Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks Secure Computing
69 LSJ1469 Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation Data Mining
70 LSJ1470 A Scientometric Analysis of Cloud Computing Literature Cloud Computing
71 LSJ1471 Best Keyword Cover Search Data Mining
72 LSJ1472 A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks Parallel & Distributed Systems
73 LSJ1473 Incremental Affinity Propagation Clustering Based on Message Passing Data Mining
74 LSJ1474 A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network Networking
75 LSJ1475 Personalized Geo-Specific Tag Recommendation for Photos on Social Websites MULTIMEDIA
76 LSJ1476 A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks SERVICE COMPUTING
77 LSJ1477 Image Search Reranking With Query-Dependent Click-Based Relevance Feedback Image Processing
78 LSJ1478 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding Image Processing
79 LSJ1479 LARS*: An Efficient and Scalable Location-Aware Recommender System Data Mining
80 LSJ1480 A Two-stage Deonoymization Attack Against Anonymized Social Networks Parallel & Distributed Systems
81 LSJ1481 Privacy Preserving Enhance Collaborative Tagging Data Mining
82 LSJ1482 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing Parallel & Distributed Systems
83 LSJ1483 E-MACs: Towards More Secure and More Efficient Constructions of Secure Channels Secure Computing
84 LSJ1484 A Tag Encoding Scheme against Pollution Attack to Linear Network Coding Parallel & Distributed Systems
85 LSJ1485 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices Mobile Computing
86 LSJ1486 Preserving location privacy in geo social application Mobile Computing
87 LSJ1487 Identity Based Distributed Provable Data Possession in Multi Cloud Storage Cloud Computing
Call us : (+91) 9030211322 / 040-40274843
Mail us : logicsystemsprojects@gmail.com
Mail us : info@logicsystems.org.in