Software engineering (SE) is the application of a systematic, disciplined, quantifiable approach to the design, development, operation, and maintenance of software, and the study of these approaches.
Domain:
- .Net / Java / Android / PHP
JAVA TITLES
S.NO
|
CODE
|
TITLE
|
YEAR
|
NETWORKING
|
|||
1
|
PTJNW01
|
A
Hierarchical Account-Aided Reputation Management System for MANETs
|
2015
|
2
|
PTJNW02
|
Optimizing
Data Plane Resources for Multipath Flows
|
2015
|
3
|
PTJNW03
|
Fair
Virtualization of 802.11 Networks
|
2015
|
4
|
PTNW04
|
Multihop-Delivery-Quality-Based
Routing in DTNs
|
2015
|
5
|
PTJNW05
|
Beamforming
Design for Joint Localization and Data Transmission in Distributed Antenna
System
|
2015
|
6
|
PTJNW06
|
Vehicle
Mobility and Communication Channel Models for Realistic and Efficient Highway
VANET Simulation
|
2015
|
7
|
PTJNW07
|
MAC-Layer
Concurrent Beamforming Protocol for Indoor Millimeter-Wave Networks
|
2015
|
8
|
PTJNW08
|
Channel
Time Allocations and Handoff Management for Fair Throughput in Wireless Mesh
Networks
|
2015
|
9
|
PTJNW09
|
Effective
Urban Traffic Monitoring by Vehicular Sensor Networks
|
2015
|
10
|
PTJNW10
|
Alternating
Optimization Algorithms for Power Adjustment and Receive Filter Design in Multihop
Wireless Sensor Networks
|
2015
|
11
|
PTJNW11
|
DPTferentiated
Performance Management in Virtualized Environments Using Nonlinear Control
|
2015
|
12
|
PTJNW12
|
CPU
Provisioning Algorithms for Service DPTferentiation in Cloud-Based
Environments
|
2015
|
13
|
PTJNW13
|
VPEF:
A Simple and Effective Incentive Mechanism in Community-Based Autonomous
Networks
|
2015
|
14
|
PTJNW14
|
Joint
Optimization for the Delivery of Multiple Video Channels in Telco-CDNs
|
2015
|
15
|
PTJNW15
|
NetVM:
High Performance and Flexible Networking Using Virtualization on Commodity
Platforms
|
2015
|
16
|
PTJNW16
|
Adaptive
Resource Management and Control in Software Defined Networks
|
2015
|
NETWORK SECURITY
|
|||
17
|
PTJNS01
|
A
Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks
in Wireless Sensor Networks
|
2015
|
18
|
PTJNS02
|
PRGA:
Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage
Information for Smart Grid
|
2015
|
19
|
PTJNS03
|
Camouflage
Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
|
2015
|
20
|
PTJNS04
|
Secure
Data Aggregation Technique for Wireless Sensor Networks in the Presence of
Collusion Attacks
|
2015
|
21
|
PTJNS05
|
Secure
Spatial Top-kQuery Processing via Untrusted Location-Based Service Providers
|
2015
|
22
|
PTJNS06
|
Risk
Aware Query Replacement Approach for Secure Databases Performance Management
|
2015
|
23
|
PTJNS07
|
Improved
Privacy-Preserving P2P Multimedia Distribution Based on Recombined
Fingerprints
|
2015
|
24
|
PTJNS08
|
Malware
Propagation in Large-Scale Networks
|
2015
|
25
|
PTJNS09
|
Fault
Injection in Virtualized Systems—Challenges and Applications
|
2015
|
26
|
PTJNS10
|
Marlin:
Mitigating Code Reuse Attacks Using Code Randomization
|
2015
|
DATAMINING
|
|||
27
|
PTJDM01
|
EMR:
A Scalable Graph-based Ranking Model for Content-based Image Retrieval
|
2015
|
28
|
PTJDM02
|
Data
Acquisition for Probabilistic Nearest-Neighbor Query
|
2015
|
29
|
PTJDM03
|
Using
Semantic Web Technologies for Exploratory OLAP: A Survey
|
2015
|
30
|
PTJDM04
|
Bridging
the Vocabulary Gap between Health Seekers and Healthcare Knowledge
|
2015
|
31
|
PTJDM05
|
Real-Time
Semiparametric Regression for Distributed Data Sets
|
2015
|
32
|
PTJDM06
|
Lossless
Selection Views under Conditional Domain Constraints
|
2015
|
33
|
PTJDM07
|
Probabilistic
Convex Hull Queries over Uncertain Data
|
2015
|
34
|
PTJDM08
|
Joint
Search by Social and Spatial Proximity
|
2015
|
35
|
PTJDM09
|
Discovering
Data Set Nature through Algorithmic Clustering Based on String Compression
|
2015
|
36
|
PTJDM10
|
Efficient
Parallel Processing of Distance Join Queries Over Distributed Graphs
|
2015
|
37
|
PTJDM11
|
Authentication
of Moving Top-k Spatial Keyword Queries
|
2015
|
38
|
PTJDM12
|
k-Nearest
Neighbor Classification over Semantically Secure Encrypted Relational Data
|
2015
|
39
|
PTJDM13
|
Scalable
Distributed Processing of K Nearest Neighbor Queries over Moving Objects
|
2015
|
40
|
PTJDM14
|
The
Composite Data Model: A Unified Approach for Combining and Querying Multiple
Data Models
|
2015
|
41
|
PTJDM15
|
Learning
Balanced and Unbalanced Graphs via Low-Rank Coding
|
2015
|
42
|
PTJDM16
|
Reverse
Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
|
2015
|
43
|
PTJDM17
|
Discovery
of Path Nearby Clusters in Spatial Networks
|
2015
|
44
|
PTJDM18
|
Pattern-based
Topics for Document Modelling in Information Filtering
|
2015
|
45
|
PTJDM19
|
GDCluster:
A General Decentralized Clustering Algorithm
|
2015
|
46
|
PTJDM20
|
In-Memory
Big Data Management and Processing: A Survey
|
2015
|
CLOUD COMPUTING
|
|||
47
|
PTJCC01
|
Improving
the Network Lifetime of MANETs through Cooperative MAC Protocol Design
|
2015
|
48
|
PTJCC02
|
Secure
and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
|
2015
|
49
|
PTJCC03
|
Routing
Pressure: A Channel-Related and Traffic-Aware Metric of Routing Algorithm
|
2015
|
50
|
PTJCC04
|
LEISURE:
Load-Balanced Network-Wide Traffic Measurement and Monitor Placement
|
2015
|
51
|
PTJCC05
|
Distributed
Database Management Techniques for Wireless Sensor Networks
|
2015
|
52
|
PTJCC06
|
Data
Collection in Multi-Application Sharing Wireless Sensor Networks
|
2015
|
53
|
PTJCC07
|
Latency
of Collaborative Target Detection for Surveillance Sensor Networks
|
2015
|
54
|
PTJCC08
|
Response
Time Based Optimal Web Service Selection
|
2015
|
55
|
PTJCC09
|
A
Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
|
2015
|
56
|
PTJCC10
|
ASN:
A Dynamic Barrier-Based Approach to Confirmation of Deadlocks from Warnings for
Large-Scale Multithreaded Programs
|
2015
|
57
|
PTJCC11
|
Incorporating
Energy Heterogeneity into Sensor Network Time Synchronization
|
2015
|
58
|
PTJCC12
|
Efficient
and Cost-Effective Hybrid Congestion Control for HPC Interconnection Networks
|
2015
|
59
|
PTJCC13
|
Social-Aware
Stateless Routing in Pocket Switched Networks
|
2015
|
60
|
PTJCC14
|
Dynamic
Channel Assignment for Wireless Sensor Networks: A Regret Matching Based
Approach
|
2015
|
61
|
PTJCC15
|
Distributed
Mutual Exclusion Algorithms for Intersection Traffic Control
|
2015
|
62
|
PTJCC16
|
Distributed
Smart-Home Decision-Making in a Hierarchical Interactive Smart Grid
Architecture
|
2015
|
63
|
PTJCC17
|
Shared
Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
|
2015
|
64
|
PTJCC18
|
Segment-Based
Anomaly Detection with Approximated Sample Covariance Matrix in Wireless
Sensor Networks
|
2015
|
65
|
PTJCC19
|
Truthful
Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in
Clouds
|
2015
|
66
|
PTJCC20
|
Energy
Cost Minimization for Distributed Internet Data Centers in Smart Microgrids
Considering Power Outages
|
2015
|
67
|
PTJCC21
|
Quality
of Energy Provisioning for Wireless Power Transfer
|
2015
|
68
|
PTJCC22
|
Distributed
Sensing for High-Quality Structural Health Monitoring Using WSNs
|
2015
|
69
|
PTJCC23
|
Stealthy
Denial of Service Strategy in Cloud Computing
|
2015
|
70
|
PTJCC24
|
Energy-Efficient
Fault-Tolerant Data Storage and Processing in Mobile Cloud
|
2015
|
71
|
FJCC25
|
SelCSP:
A Framework to Facilitate Selection of Cloud Service Providers
|
2015
|
MULTIMEDIA
|
|||
72
|
PTJMM01
|
Spatio-Temporal
Video Segmentation of Static Scenes and Its Applications
|
2015
|
73
|
PTJMM02
|
Towards
Practical Self-Embedding for JPEG-Compressed Digital Images
|
2015
|
74
|
PTJMM03
|
Query
Difficulty Estimation for Image Search With Query Reconstruction Error
|
2015
|
75
|
PTJMM04
|
Structured
Visual Feature Learning for Classification via Supervised Probabilistic
Tensor Factorization
|
2015
|
76
|
PTJMM05
|
Fine-Grained
Image Search
|
2015
|
DOTNET TITLES
|
S.NO
|
CODE
|
TITLE
|
YEAR
|
|
DATA MINING
|
|||
|
|
PTDDM01
|
Efficient Filtering Algorithms
for Location-Aware Publish/Subscribe
|
2015
|
|
|
PTDDM02
|
Review Selection Using
Micro-Reviews
|
2015
|
|
|
PTDDM03
|
Privacy Policy Inference of User-
Uploaded Images on Content Sharing Sites
|
2015
|
|
|
PTDDM04
|
GFilter: A General Gram Filter
for String Similarity Search
|
2015
|
|
|
PTDDM05
|
Customizable Point of- Interest
Queries in Road Networks
|
2015
|
|
|
PTDDM06
|
Context-Based Diversification for
Keyword Queries Over XML Data
|
2015
|
|
|
PTDDM07
|
Facilitating Document Annotation
Using Content and Querying Value
|
2015
|
|
|
PTDDM08
|
Product Aspect Ranking and Its
Applications
|
2015
|
|
|
PTDDM09
|
Interpreting the Public Sentiment
Variations on Twitter
|
2015
|
|
CLOUD COMPUTING
|
|||
|
|
PTDCC01
|
A Scalable and Reliable Matching Service for Content-Based
Publish/Subscribe Systems
|
2015
|
|
|
PTDCC02
|
Cloud Federations in the Sky: Formation Game and Mechanism
|
2015
|
|
|
PTDCC03
|
Energy-Efficient Fault-Tolerant Data Storage and Processing in
Mobile Cloud
|
2015
|
|
|
PTDCC04
|
Resisting Skew-Accumulation for Time-Stepped Applications in
the Cloud via Exploiting Parallelism
|
2015
|
|
|
PTDCC05
|
SelCSP: A Framework to Facilitate Selection of Cloud Service
Providers
|
2015
|
|
|
PTDCC06
|
Stealthy Denial of Service Strategy in Cloud Computing
|
2015
|
|
|
PTDCC07
|
Energy-aware Load Balancing and Application Scaling for the
Cloud Ecosystem
|
2015
|
|
|
PTDCC08
|
Placing Virtual Machines to Optimize Cloud Gaming Experience
|
2015
|
|
SOFTWARE ENGINEERING
|
|||
|
|
PTDSE01
|
Who Will Stay in the FLOSS Community? Modeling Participant’s
Initial Behavior
|
2015
|
|
|
PTDSE02
|
Customizing the Representation Capabilities of Process Models:
Understanding the Effects of Perceived Modeling Impediments
|
2015
|
|
|
PTDSE03
|
Exploiting Model Morphology for Event-Based Testing
|
2015
|
|
|
PTDSE04
|
Quantitative Evaluation of Model-Driven Performance Analysis
and Simulation of Component-Based Architectures
|
2015
|
|
|
PTDSE05
|
How Software Designers Interact with Sketches at the
Whiteboard
|
2015
|
|
|
PTDSE06
|
Instance Generator and Problem Representation to Improve
Object Oriented Code Coverage
|
2015
|
|
AFFECTIVE
COMPUTING
|
|||
|
|
PTDAC01
|
Neuroticism, Extraversion, Conscientiousnessand Stress:
Physiological Correlates
|
2015
|
|
|
PTDAC02
|
Correcting Time-Continuous Emotional Labels by Modeling the
Reaction Lag of Evaluators
|
2015
|
|
|
PTDAC03
|
Humans versus Computers: Impact of Emotion Expressions on
People’s Decision Making
|
2015
|
|
|
PTDAC04
|
Effects of Interactive Sonification on Emotionally Expressive
Walking Styles
|
2015
|
|
|
PTDAC05
|
Automatic Group Happiness Intensity Analysis
|
2015
|
|
|
PTDAC06
|
Modeling the Affective Content of Music with a Gaussian
Mixture Model
|
2015
|
|
|
PTDAC07
|
Predicting Mood from Punctual Emotion Annotations on Videos
|
2015
|
|
|
PTDAC08
|
I Can Already Guess Your Answer: Predicting Respondent
Reactions during Dyadic Negotiation
|
2015
|
|
|
PTDAC09
|
LIRIS-ACCEDE: A Video Database for Affective Content Analysis
|
2015
|
|
|
PTDAC10
|
Investigating the Impact of Sound AngularPosition on the
Listener Affective State
|
2015
|
|
|
PTDAC11
|
Subjective Perceptions in Wartime Negotiation
|
2015
|
|
|
PTDAC12
|
Speech Emotion Recognition Using Fourier Parameters
|
2015
|
|
|
PTDAC13
|
What Your Face Vlogs About:Expressions of Emotion and Big-Five
Traits Impressions in YouTube
|
2015
|
|
|
PTDAC14
|
Perception and Automatic Recognition of Laughter from
Whole-Body Motion: Continuous and Categorical Perspectives
|
2015
|
|
|
PTDAC15
|
Automatic Facial Expression Recognition Using Features of
Salient Facial Patches
|
2015
|
|
|
PTDDSC01
|
On the Hardness of Adding Nonmasking Fault Tolerance
|
2015
|
|
|
PTDDSC02
|
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
|
2015
|
|
|
PTDDSC03
|
Meeting Cardinality Constraints in Role Mining
|
2015
|
|
|
PTDDSC04
|
Collusion-Tolerable Privacy-Preserving Sum and Product
Calculation without Secure Channel
|
2015
|
|
|
PTDDSC05
|
Continuous and Transparent User Identity Verification for
Secure Internet Services
|
2015
|
|
|
PTDDSC06
|
A Lightweight Secure Scheme for Detecting Provenance Forgery
and Packet Drop Attacks in Wireless Sensor Networks
|
2015
|
|
|
PTDDSC07
|
hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost
|
2015
|
|
|
PTDDSC08
|
PRGA: Privacy-Preserving Recording & Gateway-Assisted
Authentication of Power Usage Information for Smart Grid
|
2015
|
|
|
PTDDSC09
|
A Computational Dynamic Trust Model for User Authorization
|
2015
|
|
|
PTDDSC10
|
Behavior Rule Specification-Based Intrusion Detection for
Safety Critical Medical Cyber Physical Systems
|
2015
|
|
|
PTDDSC11
|
Camouflage Traffic: Minimizing Message Delayfor Smart Grid
Applications under Jamming
|
2015
|
|
|
PTDDSC12
|
On the Security of A Privacy-Preserving Product Calculation
Scheme
|
2015
|
|
|
PTDDSC13
|
Marlin: Mitigating Code Reuse Attacks Using Code Randomization
|
2015
|
|
|
PTDDSC14
|
Fault Injection in Virtualized Systems—Challenges and
Applications
|
2015
|
|
|
PTDDSC15
|
An OS-level Framework for Anomaly Detection in Complex
Software Systems
|
2015
|
|
|
PTDDSC16
|
Time-Delayed Broadcasting for Defeating Inside Jammers
|
2015
|
|
|
PTDDSC17
|
DDSGA: A Data-Driven Semi-Global AlignmentApproach for
Detecting Masquerade Attacks
|
2015
|
|
|
PTDDSC18
|
A Reliability Improvement Method for SOA-Based Applications
|
2015
|
|
|
PTDDSC19
|
VM-mCheckpoint: Design, Modeling, and Assessment of
Lightweight In-Memory VM Checkpointing
|
2015
|
|
|
PTDDSC20
|
Modeling Dependability Features for Real-TimeEmbedded Systems
|
2015
|
|
|
PTDDSC21
|
Performability Evaluation of Grid Environments Using Stochastic
Reward Nets
|
2015
|
|
|
PTDDSC22
|
Context-Based Access Control Systems for Mobile Devices
|
2015
|
|
|
PTDDSC23
|
Improved Privacy-Preserving P2P MultimediaDistribution Based
on Recombined Fingerprints
|
2015
|
|
|
PTDDSC24
|
Risk Aware Query Replacement Approachfor Secure Databases
Performance Management
|
2015
|
|
|
PTDDSC25
|
Secure Spatial Top-k Query Processing via Untrusted
Location-Based Service Providers
|
2015
|
|
|
PTDDSC26
|
Secure Tag Search in RFID Systems Using Mobile Readers
|
2015
|
|
|
PTDDSC27
|
Secure Data Aggregation Technique for Wireless Sensor Networks
in the Presence of Collusion Attacks
|
2015
|
|
NETWORKING
|
|||
|
|
PTDNW01
|
PROFILR Toward Preserving Privacy and functionality in
Geosocial Networks
|
2015
|
|
|
PTDNW02
|
Towards Effective Bug Triage with Software Data education
Techniques
|
2015
|