SlideShare a Scribd company logo
1 of 15
Latest IEEE 2015-2016 Dotnet Project List for ME/ MCA/MSc/BE/BSc Students
SECURE COMPUTING (Base paper & Abstract Contact 9843360513)
1. Hacking is not random: a case-control study of webserver-compromise risk
2. Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Network
Sybil’s
3. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
4. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
5. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its
Implications
6. Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword
Search
7. Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword
Search
8. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly
Labeled Images
9. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise
Analysis
SERVICES COMPUTING (Base paper & Abstract Contact 9843360513)
1. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
2. On the Security of Data Access Control for Multi authority Cloud Storage Systems
3. Guest Editorial: Recommendation Techniques for Services Computing and Cloud
Computing
4. Diversifying Web Service Recommendation Results via Exploring Service Usage History
5. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
6. Location-Aware and Personalized Collaborative Filtering for Web Service
Recommendation
NETWORKING (Base paper & Abstract Contact 9843360513)
1. Congestion Aware Load Balancing for Multi radio Wireless Mesh Network
IMAGE PROCESSING – MULTIMEDIA (Base paper & Abstract Contact 9843360513)
1. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
2. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
3. Saliency-based color accessibility
4. Contextual Online Learning for Multimedia Content Aggregation
5. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
6. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo
Images
7. An Attribute-assisted Reranking Model for Web Image Search
8. RRW - A Robust and Reversible Watermarking
9. Steganography Using Reversible Texture Synthesis
10. Single Image Super-Resolution Based on Gradient Profile Sharpness
11. Detection and Rectification of Distorted Fingerprints
12. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Base paper & Abstract Contact 9843360513)
1. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
2. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
3. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
4. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Base
paper & Abstract Contact 9843360513)
1. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
2. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
3. Authenticated Key Exchange Protocols for Parallel Network File Systems
4. Data Collection in Multi-Application Sharing Wireless Sensor Networks
5. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over
Encrypted Cloud Data
6. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud
Data
7. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid
Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Base paper & Abstract
Contact 9843360513)
1. Optimum Power Allocation in Sensor Networks for Active Radar Applications
2. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless
Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Base paper & Abstract
Contact 9843360513)
1. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
2. Tweet Segmentation and Its Application to Named Entity Recognition
3. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
4. Automatic Group Happiness Intensity Analysis
5. RRW - A Robust and Reversible Watermarking Technique for Relational Data
6. Query Aware Determinization of Uncertain Objects
7. PAGE: A Partition Aware Engine for Parallel Graph Computation
LatestIEEE 2015-2016 Java Project List for ME/ MCA/MSc/BE/BSc Students
SECURE COMPUTING(Base paper & Abstract Contact 9843360513)
1. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
2. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure
Channel
3. Formalization and Verification of Group Behavior Interactions
4. Group Key Agreement with Local Connectivity
5. Data Lineage in Malicious Environments
6. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
7. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based
Encryption
8. Formalization and Verification of Group Behavior Interactions
9. Enabling Cloud Storage Auditing with Key-Exposure Resistance
10. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-
Based Encryption
11. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
12. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative
Services
CLOUD COMPUTING (Base paper & Abstract Contact 9843360513)
1. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
2. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
3. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
4. Understanding the Performance and Potential of Cloud Computing for Scientific
Applications
5. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
6. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple
Clouds
7. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud
Infrastructure
8. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
9. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
10. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained
Devices
11. Enabling Cloud Storage Auditing with Key-Exposure Resistance
12. Control Cloud Data Access Privilege And Anonymity With Fully Anonymous Attribute-
Based Encryption
13. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation
in Cloud Computing
14. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
15. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
16. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
17. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
18. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
19. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
20. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
21. Secure Auditing and Deduplicating Data in Cloud
22. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Base paper & Abstract
Contact 9843360513)
1. Subgraph Matching with Set Similarity in a Large Graph Database
2. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
3. Making Digital Artifacts on the Web Verifiable and Reliable
4. Anonymizing Collections of Tree-Structured Data
5. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
6. FOCS: Fast Overlapped Community Search
7. Sparsity Learning Formulations for Mining Time-Varying Data
8. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
9. The Impact of View Histories on Edit Recommendations
10. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
11. Discovery of Ranking Fraud for Mobile Apps
12. Towards Effective Bug Triage with Software Data Reduction Techniques
13. Subgraph Matching with Set Similarity in a Large Graph Database
SOFTWARE ENGINEERING (Base paper & Abstract Contact 9843360513)
1. The Impact of View Histories on Edit Recommendations
NETWORKING (Base paper & Abstract Contact 9843360513)
1. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING – MULTIMEDIA (Base paper & Abstract Contact 9843360513)
1. Multiview Alignment Hashing for Efficient Image Search
2. YouTube Video Promotion by Cross-network
3. Semantic-Improved Color Imaging Applications: It Is All About Context
4. Geolocalized Modeling for Dish Recognition
5. Learning to Rank Image Tags with Limited Training Examples
6. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly
Labeled Image
7. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Base paper & Abstract
Contact 9843360513)
1. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet
Dropping and Transmitter Buffering
2. Tracking Temporal Community Strength in Dynamic Networks
3. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic
Networks
4. Towards Information Diffusion in Mobile Social Networks
5. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Base
paper & Abstract Contact 9843360513)
1. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple
Clouds
2. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
3. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
4. A Computational Dynamic Trust Model for User Authorization
5. Secure Distributed Deduplication Systems with Improved Reliability
6. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure
Channel
7. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-
Based Encryption
Latest IEEE 2014-2015 Dotnet Project List for ME/ MCA/MSc/BE/BSc Students
MOBILE COMPUTING - WIRELESS COMMUNICATION (Base paper & Abstract
Contact 9843360513)
1. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING (Base paper & Abstract Contact 9843360513)
1. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Base paper & Abstract
Contact 9843360513)
1. Efficient Community Formation for Web Services
2. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
3. Secure Mining of Association Rules in Hor izontally Distributed Databases
4. Dynamic Query Forms for Database Queries
5. Secure kNN Query Processing in Untrusted Cloud Environments
6. An Empirical Performance Evaluation of Relational Keyword Search Systems
7. Keyword Query Routing
8. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
9. Demand Bidding Program and Its Application in Hotel Energy Management
10. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
11. Incremental Detection of Inconsistencies in Distributed Data
12. A Cocktail Approach for Travel Package Recommendation
13. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Base
paper & Abstract Contact 9843360513)
1. A Random Decision Tree Framework for Privacy-Preserving Data Mining
2. Analysis of Field Data on Web Security Vulnerabilities
3. The Client Assignment Problem for Continuous Distributed Interactive Applications
Analysis, Algorithms, and Evaluation
4. A Reliability Improvement Method for SOA-Based Applications
5. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient
Verifiable Fine-Grained Updates
6. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
7. Web Service Recommendation via Exploiting Location and QoS Information
8. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
9. Exploiting Rateless Codes in Cloud Storage Systems
10. COMIC:Cost Optimization for Internet Content Multihoming
11. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber
Physical Systems
12. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
13. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
14. Uniform Embedding for Efficient JPEG Steganography
15. Secure Deduplication with Efficient and Reliable Convergent Key Management
16. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
17. Link Quality Aware Code Dissemination in Wireless Sensor Networks
18. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING (Base paper & Abstract Contact 9843360513)
1. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
2. A secure data self-destructing scheme in cloud computing
3. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
4. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
5. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
6. Secure kNN Query Processing in Untrusted Cloud Environments
7. Exploiting Rateless Codes in Cloud Storage Systems
8. Fuzzy Authorization for Cloud Storage
9. Planning vs. dynamic control Resource allocation in corporate clouds
10. Automatic Scaling of Internet Applications for Cloud Computing Services
11. Strategy-proof Pricing for Cloud Service Composition
12. Privacy Preserving Delegated Access Control in Public Clouds
13. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social
Networks
14. Securing the cloud storage audit service: defending against frame and collude attacks of
third party auditor
15. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
16. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over
Encrypted Cloud Data Supporting Synonym Query
17. A Mechanism Design Approach to Resource Procurement in Cloud Computing
18. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
19. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
20. A Scientometric Analysis of Cloud Computing Literature
21. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING – MULTIMEDIA (Base paper & Abstract Contact 9843360513)
1. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image
Inpainting
2. Visibility Restoration of Single Hazy Images Captured in Real-World Weather
Conditions
3. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
4. FeatureMatch: A General ANNF Estimation Technique and its Applications
5. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video
Sequences for 2D to Stereoscopic 3D Conversion
6. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object
Detection for Intelligent Service Robotics
7. As-Projective-As-Possible Image Stitching with Moving DLT
8. Sharing Visual Secrets in Single Image Random Dot Stereograms
9. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
10. Image Classification Using Multiscale Information Fusion Based on Saliency Driven
Nonlinear Diffusion Filtering
11. A New Iterative Triclass Thresholding Technique in Image Segmentation
12. How to Estimate the Regularization Parameter for Spectral Regression Discriminant
Analysis and its Kernel Version?
13. Localization of License Plate Number Using Dynamic Image Processing Techniques And
Genetic Algorithms
14. An Iranian License Plate Recognition System Based on Color Features
15. Learning Layouts for Single-Page Graphic Designs
16. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field
Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
17. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional
Brownian Motion
18. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
19. Offline Text-Independent Writer Identification Based on Scale Invariant Feature
Transform
20. Fingerprint Compression Based on Sparse Representation
21. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
22. LBP-Based Edge-Texture Features for Object Recoginition
23. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving
Storage Framework
24. Toward Experiential Mobile Media Processing
25. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration
Behaviors
26. . Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING (Base paper & Abstract Contact 9843360513)
1. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
2. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers
Rationality and Fairness
3. Designing Truthful Spectrum Double Auctions with Local Markets
4. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
5. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
6. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
7. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
8. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
9. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay
Networks
INTERNATIONAL CONFERENCE (Base paper & Abstract Contact 9843360513)
1. A Study on Clinical Prediction Using Data Mining Techniques
2. Online Payment System using Steganography and Visual Cryptography
3. Efficient Instant-Fuzzy Search with Proximity Ranking
4. Attribute Based Encryption with Privacy Preserving In Clouds
5. A Secure Client Side Deduplication Scheme in Cloud Storage Environments
Latest IEEE 2014-2015 Java Project List for ME/ MCA/MSc/BE/BSc Students
MOBILE COMPUTING - WIRELESS COMMUNICATION (Base paper & Abstract
Contact 9843360513)
1. Leveraging the Tail Time for Saving Energy in Cellular Networks
2. Keylogging-resistant Visual Authentication Protocols
3. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
4. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
5. Preserving Location Privacy in Geo-Social Applications
6. Efficient Authentication for Mobile and Pervasive Computing
7. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
8. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Base paper & Abstract
Contact 9843360513)
1. Typicality-Based Collaborative Filtering Recommendation
2. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service
Recommendation Systems
3. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
4. Keyword Search Over Probabilistic RDF Graphs
5. Efficient Prediction of Difficult Keyword Queries over Databases
6. Interpreting the Public Sentiment Variations on Twitter
7. An Efficient Recommendation Method for Improving Business Process Modeling
8. Determining Process Model Precision and Generalization with Weighted Artificial
Negative Events
9. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
10. On the use of Side Information for Mining Text Data
11. Privacy Preserving and Content Protecting Location based Queries
12. Fast Nearest Neighbor Search with Keywords
13. Towards Differential Query Services in Cost-Efficient Clouds
14. Facilitating Document Annotation using Content and Querying Value
15. Decentralized Queue Balancing and Differentiated Service Scheme Based on
Cooperative Control Concept
16. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
17. Secure Outsourced Attribute-Based Signatures
18. Supporting Privacy Protection in Personalized Web Search
19. Dealing With Concept Drifts in Process Mining
20. Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
21. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
22. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark
Scheme
23. Active Learning of Constraints for Semi-Supervised Clustering
24. Best Keyword Cover Search
25. Personalized Recommendation Combining User Interest and Social Circle
26. Online Feature Selection and Its Applications
27. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data
Anonymization
28. Incremental Affinity Propagation Clustering Based on Message Passing
29. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational
Data
30. Secure kNN Query Processing in Untrusted Cloud Environments
31. Malware Propagation in Large-Scale Networks
32. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
33. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
34. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
35. Efficient Ranking on Entity Graphs with Personalized Relationships
36. Task Trail: An Effective Segmentation of User Search Behavior
37. Privacy-Preserving Enhanced Collaborative Tagging
38. XSPath Navigation on XML Schemas Made Easy
39. Security Evaluation of Pattern Classifiers under Attack
40. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
41. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Base
paper & Abstract Contact 9843360513)
1. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation
Attacks
2. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
3. Nothing is for Free: Security in Searching Shared and Encrypted Data
4. SocialTube: P2P-assisted Video Sharing in Online Social Networks
5. Behavioral Malware Detection in Delay Tolerant Networks
6. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
7. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
8. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of
Personal Storage
9. On the Security of Trustee-Based Social Authentications
10. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage
11. Asymmetric Social Proximity Based Private Matching Protocols for Online Social
Networks
12. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
13. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
14. A Two-stage Deanonymization Attack Against Anonymized Social Networks
15. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis
CLOUD COMPUTING (Base paper & Abstract Contact 9843360513)
1. Scalable architecture for multi-user encrypted SQL operations on cloud database services
2. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage
3. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
4. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of
Personal Storage
5. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
6. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
7. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
8. Secure kNN Query Processing in Untrusted Cloud Environments
9. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
10. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
11. A Hybrid Cloud Approach for Secure Authorized Deduplication
12. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
13. Performance and cost evaluation of an adaptive encryption architecture for cloud
databases
14. A Novel Model for Competition and Cooperation Among Cloud Providers
15. CLOUDQUAL: A Quality Model for Cloud Services
16. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING – MULTIMEDIA (Base paper & Abstract Contact 9843360513)
1. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View
Images
2. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
3. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING (Base paper & Abstract Contact 9843360513)
1. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
2. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
3. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
4. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
5. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE (Base paper & Abstract Contact 9843360513)
1. Enhanced Security for Association Rule Mining to secure Transactional Databases
2. Operational Pattern Revealing Technique in Text Mining
3. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
4. Personalized web search using Browsing history and domain Knowledge
5. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based
Encryption
6. Data Security the Challenge of Cloud Computing
7. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding
Cryptographic Scheme and Evaluating Its Performance
8. A Cloud Enviroment for Backup and Data Storage

More Related Content

What's hot

Java projects
Java projectsJava projects
Java projectsshahu2212
 
Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014xtreamtechnologies
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data miningijujournal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
Java ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatoreJava ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatoreabile technologies
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
Nokia Augmented Reality
Nokia Augmented RealityNokia Augmented Reality
Nokia Augmented RealityStudioSFO
 
Information Upload and retrieval using SP Theory of Intelligence
Information Upload and retrieval using SP Theory of IntelligenceInformation Upload and retrieval using SP Theory of Intelligence
Information Upload and retrieval using SP Theory of IntelligenceINFOGAIN PUBLICATION
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudIJMTST Journal
 
IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEallmightinfo
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
 

What's hot (18)

Java project 2013
Java project 2013Java project 2013
Java project 2013
 
Java projects
Java projectsJava projects
Java projects
 
Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014
 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Java ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatoreJava ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatore
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
Bvr based title (1)
Bvr  based title (1)Bvr  based title (1)
Bvr based title (1)
 
Nokia Augmented Reality
Nokia Augmented RealityNokia Augmented Reality
Nokia Augmented Reality
 
Information Upload and retrieval using SP Theory of Intelligence
Information Upload and retrieval using SP Theory of IntelligenceInformation Upload and retrieval using SP Theory of Intelligence
Information Upload and retrieval using SP Theory of Intelligence
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
 
IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSE
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
 

Similar to Latest ieee2014 2015-2016 dotnet java projects list

FINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSEFINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSEonepointer
 
FINAL PROJECT FOR ECE
FINAL PROJECT FOR ECEFINAL PROJECT FOR ECE
FINAL PROJECT FOR ECEonepointer
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014onepointer
 
FINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLESFINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLESonepointer
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-20141pointer
 
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLESIEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLESIngenious Techno Solution
 
Ieee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologiesIeee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologiesRICHBRAINTECHNOLOGIES
 
Ieee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojectsIeee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojectsRICHBRAINPROJECTS
 
Ieee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechIeee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechRICHBRAINTECH
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsHarish PG
 
2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologies2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologiesIEEEFINALYEARPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologiesRICHBRAINTECHNOLOGIES
 
2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologies2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologiesIEEEMCAPROJECTS
 
2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologies2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologiesIEEEFINALYEARPROJECTS
 
2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologiesIEEEBEBTECHPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologiesIEEEBTECHMTECHPROJECTS
 
2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologies2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologiesIEEEBTECHMTECHPROJECTS
 

Similar to Latest ieee2014 2015-2016 dotnet java projects list (20)

.Net ieee 2017 2018, Java IEEE Projects
.Net ieee 2017 2018, Java IEEE Projects.Net ieee 2017 2018, Java IEEE Projects
.Net ieee 2017 2018, Java IEEE Projects
 
FINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSEFINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSE
 
FINAL PROJECT FOR ECE
FINAL PROJECT FOR ECEFINAL PROJECT FOR ECE
FINAL PROJECT FOR ECE
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014
 
FINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLESFINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLES
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014
 
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLESIEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
 
Original titles
Original titlesOriginal titles
Original titles
 
Ieee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologiesIeee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologies
 
Ieee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojectsIeee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojects
 
Ieee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechIeee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintech
 
Ieee 2010 project titles
Ieee 2010 project titlesIeee 2010 project titles
Ieee 2010 project titles
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projects
 
2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologies2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologies2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologies
 
2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologies2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologies
 
2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologies2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologies
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

Latest ieee2014 2015-2016 dotnet java projects list

  • 1. Latest IEEE 2015-2016 Dotnet Project List for ME/ MCA/MSc/BE/BSc Students SECURE COMPUTING (Base paper & Abstract Contact 9843360513) 1. Hacking is not random: a case-control study of webserver-compromise risk 2. Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Network Sybil’s 3. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification 4. My Privacy My Decision: Control of Photo Sharing on Online Social Networks 5. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications 6. Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search 7. Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search 8. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images 9. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis SERVICES COMPUTING (Base paper & Abstract Contact 9843360513) 1. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space 2. On the Security of Data Access Control for Multi authority Cloud Storage Systems 3. Guest Editorial: Recommendation Techniques for Services Computing and Cloud Computing 4. Diversifying Web Service Recommendation Results via Exploring Service Usage History 5. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values 6. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
  • 2. NETWORKING (Base paper & Abstract Contact 9843360513) 1. Congestion Aware Load Balancing for Multi radio Wireless Mesh Network IMAGE PROCESSING – MULTIMEDIA (Base paper & Abstract Contact 9843360513) 1. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes 2. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis 3. Saliency-based color accessibility 4. Contextual Online Learning for Multimedia Content Aggregation 5. A Probabilistic Approach for Color Correction in Image Mosaicking Applications 6. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images 7. An Attribute-assisted Reranking Model for Web Image Search 8. RRW - A Robust and Reversible Watermarking 9. Steganography Using Reversible Texture Synthesis 10. Single Image Super-Resolution Based on Gradient Profile Sharpness 11. Detection and Rectification of Distorted Fingerprints 12. Learning Fingerprint Reconstruction: From Minutiae to Image CLOUD COMPUTING (Base paper & Abstract Contact 9843360513) 1. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing 2. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation 3. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem 4. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Base paper & Abstract Contact 9843360513) 1. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks 2. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud 3. Authenticated Key Exchange Protocols for Parallel Network File Systems 4. Data Collection in Multi-Application Sharing Wireless Sensor Networks
  • 3. 5. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data 6. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 7. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds MOBILE COMPUTING - WIRELESS COMMUNICATION (Base paper & Abstract Contact 9843360513) 1. Optimum Power Allocation in Sensor Networks for Active Radar Applications 2. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Base paper & Abstract Contact 9843360513) 1. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services 2. Tweet Segmentation and Its Application to Named Entity Recognition 3. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval 4. Automatic Group Happiness Intensity Analysis 5. RRW - A Robust and Reversible Watermarking Technique for Relational Data 6. Query Aware Determinization of Uncertain Objects 7. PAGE: A Partition Aware Engine for Parallel Graph Computation LatestIEEE 2015-2016 Java Project List for ME/ MCA/MSc/BE/BSc Students SECURE COMPUTING(Base paper & Abstract Contact 9843360513) 1. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces 2. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel 3. Formalization and Verification of Group Behavior Interactions 4. Group Key Agreement with Local Connectivity
  • 4. 5. Data Lineage in Malicious Environments 6. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage 7. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption 8. Formalization and Verification of Group Behavior Interactions 9. Enabling Cloud Storage Auditing with Key-Exposure Resistance 10. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute- Based Encryption 11. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 12. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services CLOUD COMPUTING (Base paper & Abstract Contact 9843360513) 1. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework 2. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks 3. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework 4. Understanding the Performance and Potential of Cloud Computing for Scientific Applications 5. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform 6. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds 7. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure 8. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 9. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage 10. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices 11. Enabling Cloud Storage Auditing with Key-Exposure Resistance 12. Control Cloud Data Access Privilege And Anonymity With Fully Anonymous Attribute- Based Encryption
  • 5. 13. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing 14. Audit-Free Cloud Storage via Deniable Attribute-based Encryption 15. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability 16. Audit-Free Cloud Storage via Deniable Attribute-based Encryption 17. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 18. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems 19. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 20. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage 21. Secure Auditing and Deduplicating Data in Cloud 22. Identity-based Encryption with Outsourced Revocation in Cloud Computing KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Base paper & Abstract Contact 9843360513) 1. Subgraph Matching with Set Similarity in a Large Graph Database 2. Structured Learning from Heterogeneous Behavior for Social Identity Linkage 3. Making Digital Artifacts on the Web Verifiable and Reliable 4. Anonymizing Collections of Tree-Structured Data 5. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 6. FOCS: Fast Overlapped Community Search 7. Sparsity Learning Formulations for Mining Time-Varying Data 8. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 9. The Impact of View Histories on Edit Recommendations 10. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud 11. Discovery of Ranking Fraud for Mobile Apps 12. Towards Effective Bug Triage with Software Data Reduction Techniques 13. Subgraph Matching with Set Similarity in a Large Graph Database SOFTWARE ENGINEERING (Base paper & Abstract Contact 9843360513) 1. The Impact of View Histories on Edit Recommendations NETWORKING (Base paper & Abstract Contact 9843360513)
  • 6. 1. FRAppE: Detecting Malicious Facebook Applications IMAGE PROCESSING – MULTIMEDIA (Base paper & Abstract Contact 9843360513) 1. Multiview Alignment Hashing for Efficient Image Search 2. YouTube Video Promotion by Cross-network 3. Semantic-Improved Color Imaging Applications: It Is All About Context 4. Geolocalized Modeling for Dish Recognition 5. Learning to Rank Image Tags with Limited Training Examples 6. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image 7. Multiview Alignment Hashing for Efficient Image MOBILE COMPUTING - WIRELESS COMMUNICATION (Base paper & Abstract Contact 9843360513) 1. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering 2. Tracking Temporal Community Strength in Dynamic Networks 3. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks 4. Towards Information Diffusion in Mobile Social Networks 5. User-Defined Privacy Grid System for Continuous Location-Based Services PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Base paper & Abstract Contact 9843360513) 1. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds 2. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 3. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 4. A Computational Dynamic Trust Model for User Authorization 5. Secure Distributed Deduplication Systems with Improved Reliability 6. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
  • 7. 7. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute- Based Encryption Latest IEEE 2014-2015 Dotnet Project List for ME/ MCA/MSc/BE/BSc Students MOBILE COMPUTING - WIRELESS COMMUNICATION (Base paper & Abstract Contact 9843360513) 1. Keylogging-resistant Visual Authentication Protocols SOFTWARE ENGINEERING (Base paper & Abstract Contact 9843360513) 1. Governing Software Process Improvements in Globally Distributed Product Development KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Base paper & Abstract Contact 9843360513) 1. Efficient Community Formation for Web Services 2. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform 3. Secure Mining of Association Rules in Hor izontally Distributed Databases 4. Dynamic Query Forms for Database Queries 5. Secure kNN Query Processing in Untrusted Cloud Environments 6. An Empirical Performance Evaluation of Relational Keyword Search Systems 7. Keyword Query Routing 8. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures 9. Demand Bidding Program and Its Application in Hotel Energy Management 10. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds 11. Incremental Detection of Inconsistencies in Distributed Data 12. A Cocktail Approach for Travel Package Recommendation 13. The Role of Hubness in Clustering High-Dimensional Data
  • 8. PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Base paper & Abstract Contact 9843360513) 1. A Random Decision Tree Framework for Privacy-Preserving Data Mining 2. Analysis of Field Data on Web Security Vulnerabilities 3. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation 4. A Reliability Improvement Method for SOA-Based Applications 5. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates 6. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 7. Web Service Recommendation via Exploiting Location and QoS Information 8. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks 9. Exploiting Rateless Codes in Cloud Storage Systems 10. COMIC:Cost Optimization for Internet Content Multihoming 11. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems 12. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data 13. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes 14. Uniform Embedding for Efficient JPEG Steganography 15. Secure Deduplication with Efficient and Reliable Convergent Key Management 16. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks 17. Link Quality Aware Code Dissemination in Wireless Sensor Networks 18. Exploiting Service Similarity for Privacy in Location Based Search Queries CLOUD COMPUTING (Base paper & Abstract Contact 9843360513) 1. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2. A secure data self-destructing scheme in cloud computing 3. A Dynamic Secure Group Sharing Framework in Public Cloud Computing 4. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data 5. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds 6. Secure kNN Query Processing in Untrusted Cloud Environments
  • 9. 7. Exploiting Rateless Codes in Cloud Storage Systems 8. Fuzzy Authorization for Cloud Storage 9. Planning vs. dynamic control Resource allocation in corporate clouds 10. Automatic Scaling of Internet Applications for Cloud Computing Services 11. Strategy-proof Pricing for Cloud Service Composition 12. Privacy Preserving Delegated Access Control in Public Clouds 13. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks 14. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor 15. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users 16. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query 17. A Mechanism Design Approach to Resource Procurement in Cloud Computing 18. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud 19. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage 20. A Scientometric Analysis of Cloud Computing Literature 21. Consistency as a Service Auditing Cloud Consistency IMAGE PROCESSING – MULTIMEDIA (Base paper & Abstract Contact 9843360513) 1. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting 2. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions 3. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback 4. FeatureMatch: A General ANNF Estimation Technique and its Applications 5. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion 6. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics 7. As-Projective-As-Possible Image Stitching with Moving DLT
  • 10. 8. Sharing Visual Secrets in Single Image Random Dot Stereograms 9. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces 10. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering 11. A New Iterative Triclass Thresholding Technique in Image Segmentation 12. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version? 13. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms 14. An Iranian License Plate Recognition System Based on Color Features 15. Learning Layouts for Single-Page Graphic Designs 16. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image 17. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion 18. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks 19. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform 20. Fingerprint Compression Based on Sparse Representation 21. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application 22. LBP-Based Edge-Texture Features for Object Recoginition 23. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework 24. Toward Experiential Mobile Media Processing 25. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors 26. . Corruptive Artifacts Suppression for Example-Based Color Transfer NETWORKING (Base paper & Abstract Contact 9843360513) 1. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
  • 11. 2. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness 3. Designing Truthful Spectrum Double Auctions with Local Markets 4. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 5. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail 6. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks 7. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey 8. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management 9. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks INTERNATIONAL CONFERENCE (Base paper & Abstract Contact 9843360513) 1. A Study on Clinical Prediction Using Data Mining Techniques 2. Online Payment System using Steganography and Visual Cryptography 3. Efficient Instant-Fuzzy Search with Proximity Ranking 4. Attribute Based Encryption with Privacy Preserving In Clouds 5. A Secure Client Side Deduplication Scheme in Cloud Storage Environments Latest IEEE 2014-2015 Java Project List for ME/ MCA/MSc/BE/BSc Students MOBILE COMPUTING - WIRELESS COMMUNICATION (Base paper & Abstract Contact 9843360513) 1. Leveraging the Tail Time for Saving Energy in Cellular Networks 2. Keylogging-resistant Visual Authentication Protocols 3. Video Dissemination over Hybrid Cellular and Ad Hoc Networks 4. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 5. Preserving Location Privacy in Geo-Social Applications 6. Efficient Authentication for Mobile and Pervasive Computing 7. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability 8. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
  • 12. KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Base paper & Abstract Contact 9843360513) 1. Typicality-Based Collaborative Filtering Recommendation 2. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems 3. CoRE: A Context-Aware Relation Extraction Method for Relation Completion 4. Keyword Search Over Probabilistic RDF Graphs 5. Efficient Prediction of Difficult Keyword Queries over Databases 6. Interpreting the Public Sentiment Variations on Twitter 7. An Efficient Recommendation Method for Improving Business Process Modeling 8. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events 9. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments 10. On the use of Side Information for Mining Text Data 11. Privacy Preserving and Content Protecting Location based Queries 12. Fast Nearest Neighbor Search with Keywords 13. Towards Differential Query Services in Cost-Efficient Clouds 14. Facilitating Document Annotation using Content and Querying Value 15. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept 16. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation 17. Secure Outsourced Attribute-Based Signatures 18. Supporting Privacy Protection in Personalized Web Search 19. Dealing With Concept Drifts in Process Mining 20. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 21. A Meta-Top-Down Method for Large-Scale Hierarchical Classification 22. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme 23. Active Learning of Constraints for Semi-Supervised Clustering 24. Best Keyword Cover Search
  • 13. 25. Personalized Recommendation Combining User Interest and Social Circle 26. Online Feature Selection and Its Applications 27. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization 28. Incremental Affinity Propagation Clustering Based on Message Passing 29. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data 30. Secure kNN Query Processing in Untrusted Cloud Environments 31. Malware Propagation in Large-Scale Networks 32. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth 33. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance 34. Discovering Emerging Topics in Social Streams via Link Anomaly Detection 35. Efficient Ranking on Entity Graphs with Personalized Relationships 36. Task Trail: An Effective Segmentation of User Search Behavior 37. Privacy-Preserving Enhanced Collaborative Tagging 38. XSPath Navigation on XML Schemas Made Easy 39. Security Evaluation of Pattern Classifiers under Attack 40. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery 41. On Skyline Groups PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Base paper & Abstract Contact 9843360513) 1. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks 2. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 3. Nothing is for Free: Security in Searching Shared and Encrypted Data 4. SocialTube: P2P-assisted Video Sharing in Online Social Networks 5. Behavioral Malware Detection in Delay Tolerant Networks 6. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 7. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
  • 14. 8. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage 9. On the Security of Trustee-Based Social Authentications 10. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 11. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks 12. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 13. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 14. A Two-stage Deanonymization Attack Against Anonymized Social Networks 15. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis CLOUD COMPUTING (Base paper & Abstract Contact 9843360513) 1. Scalable architecture for multi-user encrypted SQL operations on cloud database services 2. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 3. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 4. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage 5. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service 6. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 7. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 8. Secure kNN Query Processing in Untrusted Cloud Environments 9. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems 10. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 11. A Hybrid Cloud Approach for Secure Authorized Deduplication 12. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 13. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
  • 15. 14. A Novel Model for Competition and Cooperation Among Cloud Providers 15. CLOUDQUAL: A Quality Model for Cloud Services 16. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud IMAGE PROCESSING – MULTIMEDIA (Base paper & Abstract Contact 9843360513) 1. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images 2. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites 3. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems NETWORKING (Base paper & Abstract Contact 9843360513) 1. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks 2. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey 3. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact 4. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs 5. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing INTERNATIONAL CONFERENCE (Base paper & Abstract Contact 9843360513) 1. Enhanced Security for Association Rule Mining to secure Transactional Databases 2. Operational Pattern Revealing Technique in Text Mining 3. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data 4. Personalized web search using Browsing history and domain Knowledge 5. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption 6. Data Security the Challenge of Cloud Computing 7. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance 8. A Cloud Enviroment for Backup and Data Storage