SlideShare a Scribd company logo
1 of 5
Download to read offline
JAVA IEEE TITLES 2015
S.NO Project Title Domain
1 A Hybrid Cloud Approach for Secure Authorized
Deduplication
Cloud Computing
2 A Profit Maximization Scheme with Guaranteed Quality of
Service in Cloud Computing
Cloud Computing
3 A Scalable and Reliable Matching Service for Content-Based
Publish/Subscribe Systems
Cloud Computing
4 A Secure and Dynamic Multi-keyword Ranked Search
Scheme over Encrypted Cloud Data
Cloud Computing
5 A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
Cloud Computing
6 An Authenticated Trust and Reputation Calculation and
Management System for Cloud and Sensor Networks
Integration
Cloud Computing
7 Audit-Free Cloud Storage via Deniable Attribute-based
Encryption
Cloud Computing
8 Circuit Ciphertext-policy Attribute-based Hybrid Encryption
with Verifiable Delegation in Cloud Computing
Cloud Computing
9 Cloud Armor: Supporting Reputation-based Trust
Management for Cloud Services
Cloud Computing
10 Control Cloud Data Access Privilege and Anonymity with
Fully Anonymous Attribute-Based Encryption
Cloud Computing
11 Enabling Cloud Storage Auditing With Key-Exposure
Resistance
Cloud Computing
12 Enabling Fine-grained Multi-keyword Search Supporting
Classified Sub-dictionaries over Encrypted Cloud Data
Cloud Computing
13 Identity-Based Encryption with Outsourced Revocation in
Cloud Computing
Cloud Computing
14 Key-Aggregate Searchable Encryption (KASE) for Group
Data Sharing via Cloud Storage
Cloud Computing
15 Privacy Preserving Ranked Multi-Keyword Search for
Multiple Data Owners in Cloud Computing
Cloud Computing
16 Privacy-Preserving Public Auditing for Regenerating-Code-
Based Cloud Storage
Cloud Computing
17 Provable Multi copy Dynamic Data Possession in Cloud
Computing Systems
Cloud Computing
18 Public Integrity Auditing for Shared Dynamic Cloud Data
with Group User Revocation
Cloud Computing
19 Secure Auditing and Deduplicating Data in Cloud Cloud Computing
20 Stealthy Denial of Service Strategy in Cloud Computing Cloud Computing
21 Mobi Context: A Context-aware Cloud-Based Venue Cloud Computing
Recommendation Framework
22 SAE: Toward Efficient Cloud Data Analysis Service for
Large-Scale Social Networks
Cloud Computing
23 Understanding the Performance and Potential of Cloud
Computing for Scientific Applications
Cloud Computing
24 Towards Optimized Fine-Grained Pricing of IaaS Cloud
Platform
Cloud Computing
25 Service Operator-aware Trust Scheme for Resource
Matchmaking across Multiple Clouds
Cloud Computing
26 Reactive Resource Provisioning Heuristics for Dynamic
Dataflows on Cloud Infrastructure
Cloud Computing
27 A Profit Maximization Scheme with Guaranteed Quality of
Service in Cloud Computing
Cloud Computing
28 OPoR: Enabling Proof of Retrievability in Cloud Computing
with Resource-Constrained Devices
Cloud Computing
29 Best Keyword Cover Search Data Mining
30 Co-Extracting Opinion Targets and Opinion Words from
Online Reviews Based on the Word Alignment Model
Data Mining
31 Context-Based Diversification for Keyword Queries over
XML Data
Data Mining
32 Discovery of Ranking Fraud for Mobile Apps Data Mining
33 Malware Propagation in Large-Scale Networks Data Mining
34 On Summarization and Timeline Generation for Evolutionary
Tweet Streams
Data Mining
35 Privacy Policy Inference of User-Uploaded Images on Content
Sharing Sites
Data Mining
36 Progressive Duplicate Detection Data Mining
37 Reverse Nearest Neighbors in Unsupervised Distance-Based
Outlier Detection
Data Mining
38 Route-Saver: Leveraging Route APIs for Accurate and
Efficient Query Processing at Location-Based Services
Data Mining
39 Scalable Constrained Spectral Clustering Data Mining
40 Towards Effective Bug Triage with Software Data Reduction
Techniques
Data Mining
41 Tweet Segmentation and Its Application to Named Entity
Recognition
Data Mining
42 Subgraph Matching with Set Similarity in a Large Graph
Database
Data Mining
43 Structured Learning from Heterogeneous Behavior for Social
Identity Linkage
Data Mining
44 Making Digital Artifacts on the Web Verifiable and Reliable Data Mining
45 Anonymizing Collections of Tree-Structured Data Data Mining
46 FOCS: Fast Overlapped Community Search Data Mining
47 Sparsity Learning Formulations for Mining Time-Varying
Data
Data Mining
48 K-Nearest Neighbor Classification over Semantically Secure
Encrypted Relational
Data Mining
49 The Impact of View Histories on Edit Recommendations Data Mining
50 Agent-based Interactions and Economic Encounters in an
Intelligent Inter Cloud
Data Mining
51 A Distortion-Resistant Routing Framework for Video Traffic
in Wireless Multihop Networks
Data Mining
52 Detecting Malicious Facebook Applications Data Mining
53 Maximizing P2P File Access Availability in Mobile Ad Hoc
Networks though Replication for Efficient File Sharing
Data Mining
54 A Proximity-Aware Interest-Clustered P2P File Sharing
System
Data Mining
55 Dynamic Routing for Data Integrity and Delay Differentiated
Services in Wireless Sensor Networks
Mobile Computing
56 Friend book: A Semantic-Based Friend Recommendation
System for Social Networks
Mobile Computing
57 Privacy-Preserving and Truthful Detection of Packet Dropping
Attacks in Wireless Ad Hoc Networks
Mobile Computing
58 User-Defined Privacy Grid System for Continuous Location-
Based Services
Mobile Computing
59 Maximizing Energy Efficiency in Multiple Access Channels
by Exploiting Packet Dropping and Transmitter Buffering
Mobile Computing
60 Tracking Temporal Community Strength in Dynamic
Networks
Mobile Computing
61 Modeling and Analysis of Communication Traffic
Heterogeneity in Opportunistic Networks
Mobile Computing
62 Towards Information Diffusion in Mobile Social Networks Mobile Computing
63 User-Defined Privacy Grid System for Continuous Location-
Based Services
Mobile Computing
64 A Computational Dynamic Trust Model for User
Authorization
Secure Computing
65 A Lightweight Secure Scheme for Detecting Provenance
Forgery and Packet Drop Attacks in Wireless Sensor
Networks
Secure Computing
66 Continuous and Transparent User Identity Verification for
Secure Internet Services
Secure Computing
67 Contributory Broadcast Encryption with Efficient Encryption
and Short Cipher texts
Secure Computing
68 DDSGA: A Data-Driven Semi-Global Alignment Approach
for Detecting Masquerade Attacks
Secure Computing
69 Improved Privacy-Preserving P2P Multimedia Distribution Secure Computing
Based on Recombined Fingerprints
70 Secure Data Aggregation Technique for Wireless Sensor
Networks in the Presence of Collusion Attacks
Secure Computing
71 Secure Spatial Top-k Query Processing via Untrusted
Location- Based Service Providers
Secure Computing
72 Smart Crawler: A Two-stage Crawler for Efficiently
Harvesting Deep-Web Interfaces
Secure Computing
73 Collusion-Tolerable Privacy-Preserving Sum and Product
Calculation without Secure Channel
Secure Computing
74 Formalization and Verification of Group Behavior Interactions Secure Computing
75 Group Key Agreement with Local Connectivity Secure Computing
76 Data Lineage in Malicious Environments Secure Computing
77 Privacy-Preserving Public Auditing for Regenerating-Code-
Based Cloud Storage
Secure Computing
78 Improving Privacy and Security in Decentralized Ciphertext-
Policy Attribute-Based Encryption
Secure Computing
79 Formalization and Verification of Group Behavior Interactions Secure Computing
80 Enabling Cloud Storage Auditing with Key-Exposure
Resistance
Secure Computing
81 Control Cloud Data Access Privilege and Anonymity With
Fully Anonymous Attribute-Based Encryption
Secure Computing
82 nonymity-based Privacy-preserving Data Reporting for
Participatory Sensing
Secure Computing
83 Asymmetric Social Proximity Based Private Matching
Protocols for Online Social Networks
Parallel & Distributed
Systems
84 Cost-Effective Authentic and Anonymous Data Sharing with
Forward Security
Parallel & Distributed
Systems
85 Secure Distributed Deduplication Systems with Improved
Reliability
Parallel & Distributed
Systems
86 Service Operator-aware Trust Scheme for Resource
Matchmaking across Multiple Clouds
Parallel & Distributed
Systems
87 A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
Parallel & Distributed
Systems
88 A Computational Dynamic Trust Model for User
Authorization
Parallel & Distributed
Systems
89 Secure Distributed Deduplication Systems with Improved
Reliability
Parallel & Distributed
Systems
90 Collusion-Tolerable Privacy-Preserving Sum and Product
Calculation without Secure Channel
Parallel & Distributed
Systems
91 Control Cloud Data Access Privilege and Anonymity With
Fully Anonymous Attribute-Based Encryption
Parallel & Distributed
Systems
92 A Framework for Secure Computations with Two Non-
Colluding Servers and Multiple Clients, Applied to
Information Forensics
And Security
Recommendations
93 Effective Key Management in Dynamic Wireless Sensor
Networks
Information Forensics
And Security
94
Key Updating for Leakage Resiliency with Application to
AES Modes of Operation
Information
Forensics And
Security
95
Passive IP Trace back: Disclosing the Locations of IP
Spoofers from Path Backscatter
Information
Forensics And
Security
96
Software Puzzle: A Countermeasure to Resource-Inflated
Denial of- Service Attacks
Information
Forensics And
Security
97 An Attribute-Assisted Reranking Model for Web Image
Search
Image Processing
98 EMR: A Scalable Graph-based Ranking Model for Content-
based Image Retrieval
Image Processing
99 Learning to Rank Image Tags With Limited Training
Examples
Image Processing
100 Multiview Alignment Hashing for Efficient Image Search Image Processing
101 YouTube Video Promotion by Cross-network Image Processing
102 Semantic-Improved Color Imaging Applications: It Is All
About Context
Image Processing
103 Geolocalized Modeling for Dish Recognition Image Processing
104 Automatic Face Naming by Learning Discriminative Affnity
Matrices From Weakly Labeled Image
Image Processing
105 Multiview Alignment Hashing for Efficient Image Image Processing
106 The Impact of View Histories on Edit Recommendations Software Engineering
107 Designing High Performance Web-Based Computing Services
to Promote Telemedicine Database Management System
Service Computing
(Web Service)
108 Location-Aware and Personalized Collaborative Filtering for
Web Service Recommendation
Service Computing
(Web Service)
109 A Fuzzy Preference Tree-Based Recommender System for
Personalized Business-to-Business E-Services
Fuzzy Systems

More Related Content

What's hot

2015 and 2016 ieee projects list
2015 and 2016 ieee projects list2015 and 2016 ieee projects list
2015 and 2016 ieee projects listTmks Infotech
 
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALURIEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALURkrish madhi
 
2015 and 2016 IEEE Projects for Cloud Computing
2015 and 2016 IEEE Projects for Cloud Computing2015 and 2016 IEEE Projects for Cloud Computing
2015 and 2016 IEEE Projects for Cloud ComputingManju Nath
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list Mumbai Academisc
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaperMumbai Academisc
 
2014 and 2015 IEEE Projects
2014 and 2015 IEEE Projects 2014 and 2015 IEEE Projects
2014 and 2015 IEEE Projects Tmks Infotech
 
2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects 2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects MSR PROJECTS
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaAdz91 Digital Ads Pvt Ltd
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects listMumbai Academisc
 
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS InfotechNetwork Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS InfotechManju Nath
 

What's hot (12)

2015 and 2016 ieee projects list
2015 and 2016 ieee projects list2015 and 2016 ieee projects list
2015 and 2016 ieee projects list
 
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALURIEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
 
2015 and 2016 IEEE Projects for Cloud Computing
2015 and 2016 IEEE Projects for Cloud Computing2015 and 2016 IEEE Projects for Cloud Computing
2015 and 2016 IEEE Projects for Cloud Computing
 
2014 list
2014 list2014 list
2014 list
 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
2014 and 2015 IEEE Projects
2014 and 2015 IEEE Projects 2014 and 2015 IEEE Projects
2014 and 2015 IEEE Projects
 
2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects 2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS InfotechNetwork Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
 

Similar to CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra Pradesh

Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects listVenkat Projects
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
 
Java IEEE Projects 2012-2011-2010
Java IEEE Projects 2012-2011-2010Java IEEE Projects 2012-2011-2010
Java IEEE Projects 2012-2011-2010java projects IEEE
 
cse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellorecse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nelloreGreen Corner Tech,Nellore
 
Global tech project list
Global tech project listGlobal tech project list
Global tech project listJayesh Buwa
 
final year ieee project centre in chennai
final year ieee project centre in chennaifinal year ieee project centre in chennai
final year ieee project centre in chennaiAishwarya Rajesh
 
dotnet project centre in chennai
dotnet project centre in chennaidotnet project centre in chennai
dotnet project centre in chennaiAishwarya Rajesh
 
ieee project centre in chennai
ieee project centre in chennaiieee project centre in chennai
ieee project centre in chennaiAishwarya Rajesh
 
be project centre in chennai
be project centre in chennaibe project centre in chennai
be project centre in chennaiAishwarya Rajesh
 
java project centre in chennai
java project centre in chennaijava project centre in chennai
java project centre in chennaiAishwarya Rajesh
 
best project centre in chennai titles 2014
best project centre in chennai titles 2014best project centre in chennai titles 2014
best project centre in chennai titles 2014Aishwarya Rajesh
 
cse project centre in chennai
cse project centre in chennai cse project centre in chennai
cse project centre in chennai Aishwarya Rajesh
 
best ieee project centre in chennai
best ieee project centre in chennaibest ieee project centre in chennai
best ieee project centre in chennaiAishwarya Rajesh
 
ece project centre in chennai titles 2014
ece project centre in chennai titles 2014ece project centre in chennai titles 2014
ece project centre in chennai titles 2014Aishwarya Rajesh
 
Java projects 2013 14
Java projects 2013 14Java projects 2013 14
Java projects 2013 14MSR PROJECTS
 

Similar to CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra Pradesh (20)

Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Java IEEE Projects 2012-2011-2010
Java IEEE Projects 2012-2011-2010Java IEEE Projects 2012-2011-2010
Java IEEE Projects 2012-2011-2010
 
CSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.NelloreCSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.Nellore
 
Hb services java ieee 2015 - 16
Hb services java ieee 2015 - 16Hb services java ieee 2015 - 16
Hb services java ieee 2015 - 16
 
cse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellorecse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellore
 
Global tech project list
Global tech project listGlobal tech project list
Global tech project list
 
Java IEEE 2013 Projects list
Java IEEE 2013 Projects list Java IEEE 2013 Projects list
Java IEEE 2013 Projects list
 
final year ieee project centre in chennai
final year ieee project centre in chennaifinal year ieee project centre in chennai
final year ieee project centre in chennai
 
dotnet project centre in chennai
dotnet project centre in chennaidotnet project centre in chennai
dotnet project centre in chennai
 
ieee project centre in chennai
ieee project centre in chennaiieee project centre in chennai
ieee project centre in chennai
 
be project centre in chennai
be project centre in chennaibe project centre in chennai
be project centre in chennai
 
java project centre in chennai
java project centre in chennaijava project centre in chennai
java project centre in chennai
 
best project centre in chennai titles 2014
best project centre in chennai titles 2014best project centre in chennai titles 2014
best project centre in chennai titles 2014
 
cse project centre in chennai
cse project centre in chennai cse project centre in chennai
cse project centre in chennai
 
best ieee project centre in chennai
best ieee project centre in chennaibest ieee project centre in chennai
best ieee project centre in chennai
 
ece project centre in chennai titles 2014
ece project centre in chennai titles 2014ece project centre in chennai titles 2014
ece project centre in chennai titles 2014
 
Java projects 2013 14
Java projects 2013 14Java projects 2013 14
Java projects 2013 14
 
Java 2015
Java 2015Java 2015
Java 2015
 

More from Green Corner Tech,Nellore

More from Green Corner Tech,Nellore (8)

Vlsi Projects titles 2018 19
Vlsi Projects titles 2018 19Vlsi Projects titles 2018 19
Vlsi Projects titles 2018 19
 
Matlab ECE ieee titles 2018 2019
Matlab ECE ieee titles 2018 2019Matlab ECE ieee titles 2018 2019
Matlab ECE ieee titles 2018 2019
 
Diploma projects Mini projects list
Diploma projects Mini projects listDiploma projects Mini projects list
Diploma projects Mini projects list
 
Embedded Projects b.tech 2018-19
Embedded Projects b.tech 2018-19Embedded Projects b.tech 2018-19
Embedded Projects b.tech 2018-19
 
Eee titles2018 2019
Eee titles2018 2019Eee titles2018 2019
Eee titles2018 2019
 
Java ieee titles2016 student
Java ieee titles2016  studentJava ieee titles2016  student
Java ieee titles2016 student
 
Embedded b tech projects nellore
Embedded b tech projects nelloreEmbedded b tech projects nellore
Embedded b tech projects nellore
 
Btech eee projects Nellore,Greencornertech
Btech eee projects Nellore,GreencornertechBtech eee projects Nellore,Greencornertech
Btech eee projects Nellore,Greencornertech
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 

CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra Pradesh

  • 1. JAVA IEEE TITLES 2015 S.NO Project Title Domain 1 A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing 2 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing Cloud Computing 3 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems Cloud Computing 4 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Cloud Computing 5 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Cloud Computing 6 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration Cloud Computing 7 Audit-Free Cloud Storage via Deniable Attribute-based Encryption Cloud Computing 8 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing Cloud Computing 9 Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services Cloud Computing 10 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption Cloud Computing 11 Enabling Cloud Storage Auditing With Key-Exposure Resistance Cloud Computing 12 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data Cloud Computing 13 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Cloud Computing 14 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage Cloud Computing 15 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Cloud Computing 16 Privacy-Preserving Public Auditing for Regenerating-Code- Based Cloud Storage Cloud Computing 17 Provable Multi copy Dynamic Data Possession in Cloud Computing Systems Cloud Computing 18 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Cloud Computing 19 Secure Auditing and Deduplicating Data in Cloud Cloud Computing 20 Stealthy Denial of Service Strategy in Cloud Computing Cloud Computing 21 Mobi Context: A Context-aware Cloud-Based Venue Cloud Computing
  • 2. Recommendation Framework 22 SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks Cloud Computing 23 Understanding the Performance and Potential of Cloud Computing for Scientific Applications Cloud Computing 24 Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform Cloud Computing 25 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds Cloud Computing 26 Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure Cloud Computing 27 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing Cloud Computing 28 OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices Cloud Computing 29 Best Keyword Cover Search Data Mining 30 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model Data Mining 31 Context-Based Diversification for Keyword Queries over XML Data Data Mining 32 Discovery of Ranking Fraud for Mobile Apps Data Mining 33 Malware Propagation in Large-Scale Networks Data Mining 34 On Summarization and Timeline Generation for Evolutionary Tweet Streams Data Mining 35 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining 36 Progressive Duplicate Detection Data Mining 37 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection Data Mining 38 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services Data Mining 39 Scalable Constrained Spectral Clustering Data Mining 40 Towards Effective Bug Triage with Software Data Reduction Techniques Data Mining 41 Tweet Segmentation and Its Application to Named Entity Recognition Data Mining 42 Subgraph Matching with Set Similarity in a Large Graph Database Data Mining 43 Structured Learning from Heterogeneous Behavior for Social Identity Linkage Data Mining 44 Making Digital Artifacts on the Web Verifiable and Reliable Data Mining 45 Anonymizing Collections of Tree-Structured Data Data Mining 46 FOCS: Fast Overlapped Community Search Data Mining
  • 3. 47 Sparsity Learning Formulations for Mining Time-Varying Data Data Mining 48 K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data Mining 49 The Impact of View Histories on Edit Recommendations Data Mining 50 Agent-based Interactions and Economic Encounters in an Intelligent Inter Cloud Data Mining 51 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks Data Mining 52 Detecting Malicious Facebook Applications Data Mining 53 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Data Mining 54 A Proximity-Aware Interest-Clustered P2P File Sharing System Data Mining 55 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks Mobile Computing 56 Friend book: A Semantic-Based Friend Recommendation System for Social Networks Mobile Computing 57 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Mobile Computing 58 User-Defined Privacy Grid System for Continuous Location- Based Services Mobile Computing 59 Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering Mobile Computing 60 Tracking Temporal Community Strength in Dynamic Networks Mobile Computing 61 Modeling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks Mobile Computing 62 Towards Information Diffusion in Mobile Social Networks Mobile Computing 63 User-Defined Privacy Grid System for Continuous Location- Based Services Mobile Computing 64 A Computational Dynamic Trust Model for User Authorization Secure Computing 65 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks Secure Computing 66 Continuous and Transparent User Identity Verification for Secure Internet Services Secure Computing 67 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts Secure Computing 68 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks Secure Computing 69 Improved Privacy-Preserving P2P Multimedia Distribution Secure Computing
  • 4. Based on Recombined Fingerprints 70 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Secure Computing 71 Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers Secure Computing 72 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces Secure Computing 73 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel Secure Computing 74 Formalization and Verification of Group Behavior Interactions Secure Computing 75 Group Key Agreement with Local Connectivity Secure Computing 76 Data Lineage in Malicious Environments Secure Computing 77 Privacy-Preserving Public Auditing for Regenerating-Code- Based Cloud Storage Secure Computing 78 Improving Privacy and Security in Decentralized Ciphertext- Policy Attribute-Based Encryption Secure Computing 79 Formalization and Verification of Group Behavior Interactions Secure Computing 80 Enabling Cloud Storage Auditing with Key-Exposure Resistance Secure Computing 81 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Secure Computing 82 nonymity-based Privacy-preserving Data Reporting for Participatory Sensing Secure Computing 83 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks Parallel & Distributed Systems 84 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Parallel & Distributed Systems 85 Secure Distributed Deduplication Systems with Improved Reliability Parallel & Distributed Systems 86 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds Parallel & Distributed Systems 87 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Parallel & Distributed Systems 88 A Computational Dynamic Trust Model for User Authorization Parallel & Distributed Systems 89 Secure Distributed Deduplication Systems with Improved Reliability Parallel & Distributed Systems 90 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel Parallel & Distributed Systems 91 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Parallel & Distributed Systems 92 A Framework for Secure Computations with Two Non- Colluding Servers and Multiple Clients, Applied to Information Forensics And Security
  • 5. Recommendations 93 Effective Key Management in Dynamic Wireless Sensor Networks Information Forensics And Security 94 Key Updating for Leakage Resiliency with Application to AES Modes of Operation Information Forensics And Security 95 Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path Backscatter Information Forensics And Security 96 Software Puzzle: A Countermeasure to Resource-Inflated Denial of- Service Attacks Information Forensics And Security 97 An Attribute-Assisted Reranking Model for Web Image Search Image Processing 98 EMR: A Scalable Graph-based Ranking Model for Content- based Image Retrieval Image Processing 99 Learning to Rank Image Tags With Limited Training Examples Image Processing 100 Multiview Alignment Hashing for Efficient Image Search Image Processing 101 YouTube Video Promotion by Cross-network Image Processing 102 Semantic-Improved Color Imaging Applications: It Is All About Context Image Processing 103 Geolocalized Modeling for Dish Recognition Image Processing 104 Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image Image Processing 105 Multiview Alignment Hashing for Efficient Image Image Processing 106 The Impact of View Histories on Edit Recommendations Software Engineering 107 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Service Computing (Web Service) 108 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation Service Computing (Web Service) 109 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services Fuzzy Systems