- Network Security and Intrusion Detection
- Software System Performance and Reliability
- IPv6, Mobility, Handover, Networks, Security
- Internet Traffic Analysis and Secure E-voting
- Network Packet Processing and Optimization
- Scheduling and Timetabling Solutions
- Video Analysis and Summarization
- Advanced Image and Video Retrieval Techniques
- Anomaly Detection Techniques and Applications
- Advanced Authentication Protocols Security
- Educational Technology and Assessment
Vellore Institute of Technology University
2017
In many software applications, logs serve as the only interface between application and developer. However, navigating through of long-running applications is often challenging. Logs from previously successful runs can be leveraged to automatically identify errors provide users with that are relevant debugging process. We describe a privacy-preserving framework employed by Platform Service (PaaS) providers utilize user generated on platform while protecting potentially sensitive logged data....
To implement a novel approach to recommend jobs and colleges based on résumé of freshly graduated students. Job postings are crawled from web using crawler stored in customized database. College lists also retrieved for post-graduation streams Student is parsed natural language processing methods form model. Text mining algorithms applied this model extract useful information (i.e., degree, technical skills, extracurricular current location, hobbies). This used suggest matching the candidate.
In many software applications, logs serve as the only interface between application and developer. However, navigating through of long-running applications is often challenging. Logs from previously successful runs can be leveraged to automatically identify errors provide users with that are relevant debugging process. We describe a privacy preserving framework which employed by Platform Service (PaaS) providers utilize user generated on platform while protecting potentially sensitive logged...