View
163
Download
0
Category
Preview:
Citation preview
VDOT SOFTWARE SOLUTION
JAVA-DATA MINING
VDDM01 A Framework for Similarity Search of Time Series Cliques with Natural Relations
VDDM02 A Genetic Programming Approach to Record Deduplication
VDDM03 A Probabilistic Scheme for Keyword-Based Incremental Query Construction
VDDM04 A Unified Probabilistic Framework for Name Disambiguation in Digital Library
VDDM05 Anomaly Detection for Discrete Sequences A Survey
VDDM06 Anónimos An LP-Based Approach for Anonymizing Weighted Social Network Graphs
VDDM07 Answering General Time-Sensitive Queries
VDDM08 Clustering with Multiviewpoint-Based Similarity Measure
VDDM09 Cluster-Oriented Ensemble Classifier Impact of Multicluster Characterization on EnsembleClassifier Learning
VDDM10 Design and Application of a Generic Clinical Decision Support System for Multiscale Data
VDDM11 Effective Pattern Discovery for Text Mining
VDDM12 Efficient Fuzzy Type-Ahead Search in XML Data
VDDM13 Efficiently Indexing Large Sparse Graphs for Similarity Search
VDDM14 Feature Selection Based on Class-Dependent Densities for High-Dimensional Binary Data
VDDM15 Feedback Matching Framework for Semantic Interoperability of Product Data
VDDM16 Fractal-Based Intrinsic Dimension Estimation and Its Application in DimensionalityReduction
VDDM17 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA-DATA MININGVDDM18 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
VDDM19 Learning Bregman Distance Functions for Semi-Supervised Clustering
VDDM20 Low-Rank Kernel Matrix Factorization for Large-Scale Evolutionary Clustering
VDDM21 Mining Online Reviews for Predicting Sales Performance A Case Study in the MovieDomain
VDDM22 Mining Web Graphs for Recommendations
VDDM23 On Group Nearest Group Query Processing
VDDM24 On the Complexity of View Update Analysis and Its Application to Annotation Propagation
VDDM25 Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching
VDDM26 Practical Efficient String Mining
VDDM27 Privacy Preserving Decision Tree Learning Using Unrealized Data Sets
VDDM28 Publishing Search Logs—A Comparative Study of Privacy Guarantees
VDDM29 Ranking Model Adaptation for Domain-Specific Search
VDDM30 Resilient Identity Crime Detection
VDDM31 Scalable Learning of Collective Behavior
VDDM32 Slicing A New Approach for Privacy Preserving Data Publishing
VDDM33 Topic Mining over Asynchronous Text Sequences
VDDM34 Towards a Formal Specification Framework for Manufacturing Execution Systems
VDDM35 TSCAN A Content Anatomy Approach to Temporal Topic Summarization
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
VDDM36 Using Rule Ontology in Repeated Rule Acquisition from Similar Web Sites
VDDM37 Visual Role Mining A Picture Is Worth a Thousand Roles
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA-MOBILE COMPUTING
VDMC01 A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks
VDMC02 A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with RandomAccess
VDMC03 Acknowledgment-Based Broadcast Protocol for Reliable and Efficient Data Disseminationin Vehicular Ad Hoc Networks
VDMC04 Characterizing the Security Implications of Third-Party Emergency Alert Systems overCellular Text Messaging Services
VDMC05 Converge Cast On the Capacity and Delay Tradeoffs
VDMC06 Cooperative Download in Vehicular Environments
VDMC07 Design and Analysis of the Gateway Relocation and Admission Control Algorithm inMobile WiMAX Networks
VDMC08 Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks
VDMC09 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation
VDMC10 Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks
VDMC11 Efficient Virtual Backbone Construction with Routing Cost Constraint in Wireless NetworksUsing Directional Antennas
VDMC12 Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols
VDMC13 Estimating Parameters of Multiple Heterogeneous Target Objects Using Composite SensorNodes
VDMC14 Fast Capture—Recapture Approach for Mitigating the Problem of Missing RFID Tags
VDMC15 Fast Data Collection in Tree-Based Wireless Sensor Networks
VDMC16 Fault Localization Using Passive End-to-End Measurements and Sequential Testing forWireless Sensor Networks
Office: 0413-2342214, 9994232214, 8883708115.
Email: info@pits.co.in www.pits.co.in
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA-MOBILE COMPUTING
VDMC17 FESCIM Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop CellularNetworks
VDMC18 Geometry and Motion-Based Positioning Algorithms for Mobile Tracking in NLOSEnvironments
VDMC19 Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network
VDMC20 Heuristic Burst Construction Algorithm for Improving Downlink Capacity in IEEE 802.16OFDMA Systems
VDMC21 Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
VDMC22 Jointly Optimal Source-Flow, Transmit-Power, and Sending-Rate Control for Maximum-Throughput Delivery of VBR Traffic over Faded Links
VDMC23 Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design
VDMC24 Local Greedy Approximation for Scheduling in Multihop Wireless Networks
VDMC25 Measurement-Based Bandwidth Scavenging in Wireless Networks
VDMC26 Mobile Ad Hoc Nanonetworks with Collision-Based Molecular Communication
VDMC27 Mobile Data Offloading through Opportunistic Communications and Social Participation
VDMC28 Moderated Group Authoring System for Campus-Wide Workgroups
VDMC29 Network Connectivity with a Family of Group Mobility Models
VDMC30 OMAN A Mobile Ad Hoc Network Design System
VDMC31 On the Cost of Knowledge of Mobility in Dynamic Networks An Information-TheoreticApproach
VDMC32 Principal Component Localization in Indoor WLAN Environments
VDMC33 Radio Resource Management of Composite Wireless Networks Predictive and ReactiveApproaches
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
VDMC34 Robust Relative Location Estimation in Wireless Sensor Networks with Inexact PositionProblems
VDMC35 Robust Topology Engineering in Multiradio Multichannel Wireless Networks
VDMC36 SenseLess A Database-Driven White Spaces Network
VDMC37 Smooth Trade-Offs between Throughput and Delay in Mobile Ad Hoc Networks
VDMC38 Spectrum-Aware Mobility Management in Cognitive Radio Cellular Networks
VDMC39 Stateless Multicast Protocol for Ad Hoc Networks
VDMC40 Understanding the Interaction between Packet Forwarding and Channel Access inMultihop Wireless Networks
VDMC41 Target Tracking in Wireless Sensor Networks Based on the Combination of KF and MLEUsing Distance Measurements
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA-NETWORK SECURITY
VDNS01 A Flexible Approach to Improving System Reliability with Virtual Lockstep
VDNS02 A Learning-Based Approach to Reactive Security
VDNS03 Automated Security Test Generation with Formal Threat Models
VDNS04 Automatic Reconfiguration for Large-Scale Reliable Storage Systems
VDNS05 Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs
VDNS06 Detecting Anomalous Insiders in Collaborative Information Systems
VDNS07 DoubleGuard Detecting Intrusions in Multitier Web Applications
VDNS08 Dynamic Security Risk Management Using Bayesian Attack Graphs
VDNS09 Enhanced Privacy ID A Direct Anonymous Attestation Scheme with Enhanced RevocationCapabilities
VDNS10 Ensuring Distributed Accountability for Data Sharing in the Cloud
VDNS11 Give2Get Forwarding in Social Mobile Wireless Networks of Selfish Individuals
VDNS12 JS-Reduce Defending Your Data from Sequential Background Knowledge Attacks
VDNS13 Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presenceof Clock Drifts
VDNS14 On the Security and Efficiency of Content Distribution via Network Coding
VDNS15 On the Security of a Ticket-Based Anonymity System with Traceability Property in WirelessMesh Networks
VDNS16 Packet-Hiding Methods for Preventing Selective Jamming Attacks
VDNS17 pCloud A Distributed System for Practical PIR
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA-NETWORK SECURITY
VDNS18 SecuredTrust A Dynamic Trust Computation Model for Secured Communication inMultiagent Systems
VDNS19 Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Schemefor Secure Broadcasting
VDNS20 Survivability Experiment and Attack Characterization for RFID
VDNS21 Persuasive Cued Click-Points Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
VDNS22 Resilient Authenticated Execution of Critical Applications in Untrusted Environments
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA-NETWORKING
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
VDNW01 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access andBroadcast Channels
VDNW02 A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization
VDNW03 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
VDNW04 Analyzing the Performance of Greedy Maximal Scheduling via Local Pooling and GraphTheory
VDNW05 Bit Weaving A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs
VDNW06 Cooperative Profit Sharing in Coalition-Based Resource Allocation in Wireless Networks
VDNW07 Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks
VDNW08 CSMACN Carrier Sense Multiple Access With Collision Notification
VDNW09 Dynamic Power Allocation Under Arbitrary Varying Channels—An Online Approach
VDNW10 Economic Issues in Shared Infrastructures
VDNW11 Exploiting Excess Capacity to Improve Robustness of WDM Mesh Networks
VDNW12 Fast Dynamic Multiple-Set Membership Testing Using Combinatorial Bloom Filters
VDNW13 Improving Energy Saving and Reliability in Wireless Sensor Networks Using a Simple CRT-Based Packet-Forwarding Solution
VDNW14 Latency Equalization as a New Network Service Primitive
VDNW15 Minimizing ISP Network Energy Cost Formulation and Solutions
VDNW16 On New Approaches of Assessing Network Vulnerability Hardness and Approximation
VDNW17 Opportunistic Flow-Level Latency Estimation Using Consistent NetFlow
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA-NETWORKING
VDNW18 Optimal Source-Based Filtering of Malicious Traffic
VDNW19 Quantifying Video-QoE Degradations of Internet Links
VDNW20 Order Matters Transmission Reordering in Wireless Networks
VDNW21 Static Routing and Wavelength Assignment for Multicast Advance Reservation in All-Optical Wavelength-Routed WDM Networks
VDNW22 System-Level Optimization in Wireless Networks Managing Interference and Uncertaintyvia Robust Optimization
VDNW23 The Case for Feed-Forward Clock Synchronization
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA- PARALLEL AND DISTRIBUTED
VDPD01 A Correlated Resource Model of Internet End Hosts
VDPD02 A Game-Theoretic Approach to the Formation of Clustered Overlay Networks
VDPD03 A Novel Parallel Scan for Multicore Processors and Its Application in Sparse Matrix-VectorMultiplication
VDPD04 A Rendezvous-Based Approach Enabling Energy-Efficient Sensory Data Collection withMobile Sinks
VDPD05 A Survey and Evaluation of Topology-Agnostic Deterministic Routing Algorithms
VDPD06 A Systematic Approach toward Automated Performance Analysis and Tuning
VDPD07 A Two-Dimensional Low-Diameter Scalable On-Chip Network for InterconnectingThousands of Cores
VDPD08 Adaptive Approximate Data Collection for Wireless Sensor Networks
VDPD09 Aho-Corasick String Matching on Shared and Distributed-Memory Parallel Architectures
VDPD10 An Efficient Approach for Mobile Asset Tracking Using Contexts
VDPD11 An Intelligent Task Allocation Scheme for Multihop Wireless Networks
VDPD12 An Online Data Access Prediction and Optimization Approach for Distributed Systems
VDPD13 Analysis of Impact of TXOP Allocation on IEEE 802.11e EDCA under Variable Network Load
VDPD14 Asymmetric Event-Driven Node Localization in Wireless Sensor Networks
VDPD15 Balancing Performance and Cost in CMP Interconnection Networks
VDPD16 BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering InjectedFalse Data in Wireless Sensor Networks
VDPD17 BloomCast Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
VDPD18 Capacity of Data Collection in Arbitrary Wireless Sensor Networks
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA- PARALLEL AND DISTRIBUTED
VDPD19 CCD A Distributed PublishSubscribe Framework for Rich Content Formats
VDPD20 Codesign of NoC and Cache Organization for Reducing Access Latency in Chip Multiprocessors
VDPD21 Comparison-Based System-Level Fault Diagnosis A Neural Network Approach
VDPD22 Coverage and Connectivity in Duty-Cycled Wireless Sensor Networks for Event Monitoring
VDPD23 Cut Detection in Wireless Sensor Networks
VDPD24 DDC A Novel Scheme to Directly Decode the Collisions in UHF RFID Systems
VDPD25 Detecting Concurrency Bugs from the Perspectives of Synchronization Intentions
VDPD26 Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
VDPD27 Distributed Throughput Optimization for ZigBee Cluster-Tree Networks
VDPD28 Dynamic Fractional Resource Scheduling versus Batch Scheduling
VDPD29 EasyPDP An Efficient Parallel Dynamic Programming Runtime System for Computational Biology
VDPD30 Efficient MasterWorker Parallel Discrete Event Simulation on Metacomputing Systems
VDPD31 Embedding Cycles and Paths in Product Networks and Their Applications to MultiprocessorSystems
VDPD32 Energy-Efficient Scheduling of Periodic Real-Time Tasks on Lightly Loaded Multicore Processors
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA- PARALLEL AND DISTRIBUTED
VDPD33 Exploiting Event-Level Parallelism for Parallel Network Simulation on Multicore Systems
VDPD34 Extrema Propagation Fast Distributed Estimation of Sums and Network Sizes
VDPD35 Fingerprinting Mobile User Positions in Sensor Networks Attacks and Countermeasures
VDPD36 GPU Acceleration of Runge-Kutta Integrators
VDPD37 High-Performance Energy-Efficient Multicore Embedded Computing
VDPD38 Implementing a Regular Register in an Eventually Synchronous Distributed System Prone toContinuous Churn
VDPD39 Interactivity-Constrained Server Provisioning in Large-Scale Distributed Virtual Environments
VDPD40 Link-Stability and Energy Aware Routing Protocol in Distributed Wireless Networks
VDPD41DOT NET- PARALLEL DISTRIBUTION
VDPD42 Mesh Decomposition for Efficient Parallel Computing of Electrical Machines by Means of FEMAccounting for Motion
VDPD43 Modeling and Analysis of Communication Networks in Multicluster Systems under Spatio-Temporal Bursty Traffic
VDPD44 On Coverage of Wireless Sensor Networks for Rolling Terrains
VDPD45 On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks
VDPD46 Online Scheduling of Dynamic Task Graphs with Communication and Contention forMultiprocessors
VDPD47 Optimal Construction of All Shortest Node-Disjoint Paths in Hypercubes with Applications
VDPD48 Optimizing Techniques for Parallel Digital Logic Simulation
VDPD49 Performance Analysis of Cloud Computing Centers Using MGmm+r Queuing Systems
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
VDPD50 Quantifying Intrinsic Parallelism Using Linear Algebra for AlgorithmArchitecture Coexploration
VDPD51 RCSMA Receiver-Based Carrier Sense Multiple Access in UHF RFID Systems
VDPD52 Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks
VDPD53 Self-Protection in a Clustered Distributed System
VDPD54 Sequence Homology Search Using Fine Grained Cycle Sharing of Idle GPUs
VDPD55 SHIP A Scalable Hierarchical Power Control Architecture for Large-Scale Data Centers
VDPD56 Stability Analysis of Reservation-Based Scheduling Policies in Wireless Networks
VDPD57 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
VDPD58 Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
VDPD59 User-Level Implementations of Read-Copy Update
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA- IMAGE PROCESSING
VDIM01 A Discriminative Model of Motion and Cross Ratio for View-Invariant Action Recognition
VDIM02 A General Fast Registration Framework by Learning Deformation–Appearance Correlation
VDIM03 A Geometric Construction of Multivariate Sinc Functions
VDIM04 A Novel Algorithm for View and Illumination Invariant Image Matching
VDIM05 A Spectral and Spatial Measure of Local Perceived Sharpness in Natural Images
VDIM06 A Unified Feature and Instance Selection Framework Using Optimum Experimental Design
VDIM07 Adaptive Distributed Source Coding
VDIM08 An Algorithm for the Contextual Adaption of SURF Octave Selection With Good MatchingPerformance Best Octaves
VDIM09 An Efficient Camera Calibration Technique Offering Robustness and Accuracy Over a WideRange of Lens Distortion
VDIM10 Bayesian Estimation for Optimized Structured Illumination Microscopy
VDIM11 Binarization of Low-Quality Barcode Images Captured by Mobile Phones Using LocalWindow of Adaptive Location and Size
VDIM12 B-Spline Explicit Active Surfaces An Efficient Framework for Real-Time 3-D Region-BasedSegmentation
VDIM13 Change Detection in Synthetic Aperture Radar Images based on Image Fusion and FuzzyClustering
VDIM14 Color Constancy for Multiple Light Sources
VDIM15 Coupled Bias–Variance Tradeoff for Cross-Pose Face Recognition
VDIM16 Depth From Motion and Optical Blur With an Unscented Kalman Filter
VDIM17 Design of Almost Symmetric Orthogonal Wavelet Filter Bank Via Direct Optimization
VDIM18 Design of Interpolation Functions for Subpixel-Accuracy Stereo-Vision Systems
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA- IMAGE PROCESSING
VDIM19 Entropy-Functional-Based Online Adaptive Decision Fusion Framework With Applicationto Wildfire Detection in Video
VDIM20 Fast Semantic Diffusion for Large-Scale Context-Based Image and Video Annotation
VDIM21 Smile Detection by Boosting Pixel Differences
VDIM22 Gradient-Based Image Recovery Methods From Incomplete Fourier Measurements
VDIM23 Groupwise Registration of Multimodal Images by an Efficient Joint Entropy MinimizationScheme
VDIM24 Higher Degree Total Variation (HDTV) Regularization for Image Recovery
VDIM25 Human Identification Using Finger Images
VDIM26 Image Fusion Using Higher Order Singular Value Decomposition
VDIM27 Image Segmentation Based on the Poincaré Map Method
VDIM28 Implicit Polynomial Representation Through a Fast Fitting Error Estimation
VDIM29 Integrating Segmentation Information for Improved MRF-Based Elastic Image Registration
VDIM30 Iterative Narrowband-Based Graph Cuts Optimization for Geodesic Active Contours WithRegion Forces (GACWRF)
VDIM31 Medical Image Segmentation by Combining Graph Cuts and Oriented Active AppearanceModels
VDIM32 Monotonic Regression A New Way for Correlating Subjective and Objective Ratings inImage Quality Research
VDIM33 Multilinear Supervised Neighborhood Embedding of a Local Descriptor Tensor forSceneObject Recognition
VDIM34 Nonlinear Approach for Enhancement of Image Focus Volume in Shape From Focus
VDIM35 Outdoor Scene Image Segmentation Based on Background Recognition and PerceptualOrganization
VDIM36 PDE-Based Enhancement of Color Images in RGB Space
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
VDIM37 Polyview Fusion A Strategy to Enhance Video-Denoising Algorithms
VDIM38 Preconditioning for Edge-Preserving Image Super Resolution
VDIM39 PSF Estimation via Gradient Domain Correlation
VDIM40 Rigid-Motion-Invariant Classification of 3-D Textures
VDIM41 Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice VectorQuantization
VDIM42 Snakes With an Ellipse-Reproducing Property
MAILTO :votmadurai@gmail.com
VDOT SOFTWARE SOLUTION
JAVA- CLOUD COMPUTING
VDCC01 Data Security and Privacy Protection Issues in Cloud Computing
VDCC02 Stochastic models of load balancing and scheduling in cloud computing clusters
VDCC03 A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack
VDCC04 Resource allocation and scheduling in cloud computing
VDCC05 Application study of online education platform based on cloud computing
VDCC06 Towards temporal access control in cloud computing
VDCC07 Privacy-Preserving DRM for Cloud Computing
VDCC08 Pricing and peak aware scheduling algorithm for cloud computing
VDCC09 Comparison of Network Intrusion Detection Systems in cloud computing environment
VDCC10 Intelligent and Active Defense Strategy of Cloud Computing
VDCC11 Distributed Shared Memory as an Approach for Integrating WSNs and Cloud Computing
VDCC12 Improving resource allocation in multi-tier cloud systems
VDCC13 Ensuring Distributed Accountability for Data Sharing in the Cloud
VDCC14 Efficient information retrieval for ranked queries in cost-effective cloud environments
MAILTO :votmadurai@gmail.com
Recommended