SOFTWARE DATAMINING 1. Integrating Human Behavior Modeling and Data Mining Techniques to Predict Human Errors in Numerical Typing. 2. Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care. 3. i2MapReduce: Incremental Map Reduce for Mining Evolving Big Data. 4. RANWAR: Rank-Based Weighted Association Rule Mining From Gene Expression and Methylation Data. 5. Data Mining of Online Diagnosed Waveforms for Probabilistic Condition Assessment of SF6Circuit Breakers. 6. Data Mining Framework for Power Quality Event Characterization of Iron and Steel Plants. 7. Raw Wind Data Pre processing: A Data-Mining Approach. 8. Fast HEVC Encoding Decisions Using Data Mining. 9. A Novel Data-Mining Approach Leveraging Social Media to Monitor Consumer Opinion of Sitaglipting. 10.Data-Mining-Based Intelligent Differential Relaying for Transmission Lines Including UPFC and Wind Farms. 11.Data-Mining Model Based Intelligent Differential Micro grid Protection Scheme. 12. Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support. 13.Robust Laser Speckle Authentication System Through Data Mining Techniques. 14. Sparsity Learning Formulations for Mining Time-Varying Data. 15. Mining the Situation: Spatiotemporal Traffic Prediction with Big Data. 16. Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study. 17.Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Item sets. 18.Data Fusion by Matrix Factorization. 19.Statistical Comparison of Fault Detection Models for Semiconductor Manufacturing Processes. 20.Predicting the Pro-Longevity or Anti-Longevity Effect of Model Organism Genes with New Hierarchical Feature Selection Methods. 21.Pipelined Decision Tree Classification Accelerator Implementation in FPGA (DT-CAIF). 22.An Expert CAD Flow for Incremental Functional Diagnosis of Complex Electronic Boards. 23.Distributed Multi-Agent Online Learning Based on Global Feedback. 24. CPCDN: Content Delivery Powered by Context and User Intelligence. 25. Nonparametric Regression-Based Failure Rate Model for Electric Power Equipment Using Lifecycle Data. 26. A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection. 27. The Impact of View Histories on Edit Recommendations. 28. Communication Theoretic Data Analytics. 29. E-Tree: An Efficient Indexing Structure for Ensemble Models on Data Streams. CLOUD COMPUTING 1. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage 2. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 3. Identity-Based Encryption with Outsourced Revocation in Cloud Computing 4. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud 5. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing 6. T-broker A Trust-aware Service Brokering Scheme for Multiple Cloud Collaborative Services 7. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 8. Governance Model for Cloud Computing in Building Information Management 9. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing 10. Proof of ownership in deduplicated cloud storage with mobile device efficiency BIG DATA 1. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud 2. Research Directions for Engineering Big Data Analytics Software 3. Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors 4. Privacy-Preserving Cipher text Sharing Mechanism for Big Data Storage 5. Stochastic Decision Making for Adaptive Crowd sourcing in Medical BigData Platforms 6. Predicting Asthma-Related Emergency Department Visits Using Big Data PARELL DISTRIBUTED 1. Distributed Sensing for High-Quality Structural Health Monitoring Using WSN. 2. A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks. 3. Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks. 4. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design. 5. Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks. 6. Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs. 7. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks. 8. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. 9. Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks. 10. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things. 11. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks. 12. Decentralized Computation Offloading Game for Mobile Cloud Computing. 13. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications. 14. Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm. 15. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks. MOBILE COMPUTING 1. Decentralized Computation Offloading Game for Mobile Cloud Computing 2. Joint Cloud and Wireless Networks Operations in Mobile Cloud Computing Environments with Telecom Operator Cloud. 3. A Multi-Granularity FPGA With Hierarchical Interconnects for Efficient and Flexible Mobile Computing. 4. Dynamic Operations of Cloud Radio Access Networks(C-RAN) for Mobile Cloud Computing Systems. 5. Integrated Inertial Sensors and Mobile Computing for Real-Time Cycling Performance Guidance via Pedaling Profile Classification. 6. Optimal Wideband LPDA Design for Efficient Multimedia Content Delivery Over Emerging Mobile Computing Systems. 7. Collaborative Task Execution in Mobile Cloud Computing Under a Stochastic Wireless Channel. 8. Context-Aware QOE Modeling, Measurement, and Prediction in Mobile Computing Systems. 9. Task Scheduling with Dynamic Voltage and Frequency Scaling for Energy Minimization in the Mobile Cloud Computing Environment. 10. Rescue Wings: Mobile Computing and Active Services Support for Disaster Rescue. 11. Quality of Contributed Service and Market Equilibrium for Participatory Sensing. 12. A Television Channel Real-Time Detector using Smart phones. 13.Joint Scheduling of Tasks and Messages for Energy Minimization in Interference-Aware Real-Time Sensor Networks. 14.On Learning Navigation Behaviors for Small Mobile Robots With Reservoir Computing Architectures. 15. Harnessing Technology for Promoting Undergraduate Art Education: A Novel Model that Streamlines Learning between Classroom, Museum, and Home. NETWORKING AND NETWORK SECURITY 1. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming. 2. Proposed Security Mechanism for XMPP-Based Communications of ISO/IEC/IEEE 21451 Sensor Networks. 3. A Survey of Security Attacks in Information-Centric Networking. 4. Relay Selection for Security Enhancement in Cognitive Relay Networks. 5. Physical Layer Network Security in the Full-Duplex Relay System. 6. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes. 7. Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs. 8. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN. 9. A Semantics-Aware Approach to the Automated Network Protocol Identification. 10.On the Security of Cognitive Radio Networks. 11. Cyber Security Analysis of Power Networks by Hyper graph Cut Algorithms. 12.VANDER: Efficient Cooperative Watchdog Monitoring for Lossy Wireless Network Coding. 13. Privacy-Preserving Detection of Sensitive Data Exposure. 14. Passive IP Trace back: Disclosing the Locations of IP Spoofers From Path Backscatter. 15.Malware Propagation in Large-Scale Networks. 16.LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking. 17. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce. 18. An Efficient and Trustworthy P2P and Social Network Integrated File Sharing System. 19. A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations. 20. Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures Using Ensemble Modeling. 21.Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks. 22.Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyber space. 23. MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks. 24.Field Test of Measurement-Device-Independent Quantum Key Distribution. 25. Joint Beam forming and Power Allocation for Secrecy in Peer-to-Peer Relay Networks. 26.Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach. IMAGE PROCESSING 1. A Methodology For Visually Lossless JPEG2000 Compression Of Monochrome Stereo Images. 2. A Multiscale Wavelet-Based Test For Isotropy Of Random Fields On A Regular Lattice. 3. A No-Reference Texture Regularity Metric Based On Visual Saliency. 4. A Novel Image Representation Via Local Frequency Analysis For Illumination Invariant Stereo Matching. 5. A Novel SURE-Based Criterion For Parametric PSF Estimation. 6. A Probabilistic Approach For Color Correction In Image Mosaicking Applications. 7. A Regularization Approach To Blind Deblurring And Denoising Of QR Barcodes. 8. A Very Fast Algorithm For Simultaneously Performing ConnectedComponent Labeling And Euler Number Computing. 9. Accurate And Robust Line Segment Extraction Using Minimum Entropy With Hough Transform. 10. Accurate Vessel Segmentation With Constrained B-Snake. 11. Adaptive Image Denoising By Targeted Databases. 12. Adaptive Regularization With The Structure Tensor. 13. Alternating Direction Method Of Multipliers For Nonlinear Image Restoration Problems. 14. An Approach Toward Fast Gradient-Based Image Segmentation. 15. An Efficient MRF Embedded Level Set Method For Image Segmentation. 16. An Innovative Lossless Compression Method For Discrete-Color Images. 17. Approximation And Compression With Sparse Orthonormal Transforms. 18. Blind Inpainting Using _0 And Total Variation Regularization. 19. Depth-Preserving Warping For Stereo Image Retargeting. 20. Discriminative Shared Gaussian Processes For Multiview And ViewInvariant Facial Expression Recognition. 21. Disparity Estimation On Stereo Mammograms. 22. Entropy-Based Evaluation Of Context Models For Wavelet-Transformed Images. 23. Face Recognition Across Non-Uniform Motion Blur, Illumination, And Pose. 24. Fractal Analysis For Reduced Reference Image Quality Assessment. 25. Full-Reference Quality Assessment Of Stereoscopic Images By Learning Binocular Receptive Field Properties. 26. Fusing Inertial Sensor Data In An Extended Kalman Filter For 3D Camera Tracking. 27. High Dynamic Range Image Compression By Optimizing Tone Mapped Image Quality Index. 28. High-Resolution Face Verification Using Pore-Scale Facial Features. 29. Image Super-Resolution Based On Structure-Modulated Sparse Representation. 30. Learning Compact Feature Descriptor And Adaptive Matching Framework For Face Recognition. 31. Low-Complexity Topological Derivative-Based Segmentation. 32. Multi-Level Discriminative Dictionary Learning With Application To Large Scale Image Classification. 33. Multiscale Image Blind Denoising. 34. Multiscale Logarithm Difference Edgemaps For Face Recognition Against Varying Lighting Conditions. 35. Neighborhood Discriminant Hashing For Large-Scale Image Retrieval. 36. Nonparametric Multiscale Blind Estimation Of Intensity-FrequencyDependent Noise. 37. Panorama View With Spatiotemporal Occlusion Compensation For 3D Video Coding. 38. Pareto-Depth For Multiple-Query Image Retrieval. 39. PM-PM: Patchmatch With Potts Model For Object Segmentation And Stereo Matching. 40. Recursive Approximation Of The Bilateral Filter. 41. Robust Representation And Recognition Of Facial Emotions Using Extreme Sparse Learning. 42. Single Image Superresolution Based On Gradient Profile Sharpness. 43. Steganography Using Reversible Texture Synthesis. 44. Stochastic Blind Motion Deblurring. 45. Template-Free Wavelet-Based Detection Of Local Symmetries. 46. Toward Naturalistic 2D-To-3D Conversion. 47. Undersampled Face Recognition Via Robust Auxiliary Dictionary Learning.