amazon

Friday, November 7, 2014

IEEE 2014-2015 .NET PROJECT TITLES

IEEE 2014-2015 .NET  PROJECT TITLES
      CLOUD COMPUTING
  1. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
  2. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
  3. Consistency as a Service: Auditing Cloud Consistency
  4. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
  5. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
  6. Enabling Data Integrity Protection in Regenerating-Coding-Based
  7. Cloud Storage: Theory and Implementation
  8. Identity-Based Distributed Provable Data Possession in Multi- Cloud Storage
  9. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  10. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
  11. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
  12. Scalable Distributed Service Integrity Attestation for Software-as- a-Service Clouds
DATA MINING
  1. A Cocktail Approach for Travel Package Recommendation
  2. An Empirical Performance Evaluation of Relational Keyword Search Techniques
  3. LARS*: An Efficient and Scalable Location-Aware Recommender System
  4. Product Aspect Ranking and Its Applications


  1. Secure Mining of Association Rules in Horizontally Distributed Databases
  2. Supporting Privacy Protection in Personalized Web Search
  3. Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
  4. Typicality-Based Collaborative Filtering Recommendation
  5. Privacy-Preserving Enhanced Collaborative Tagging
  6. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
  7. Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
  8. Mining Probabilistically Frequent Sequential Patterns in Large Uncertain Databases
  9. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
  10. A K-Main Routes Approach to Spatial Network Activity Summarization
  11. A Probabilistic Approach to String Transformation
  12. A System for Automatic Notification and Severity Estimation of Automotive Accidents
  13. Commuter Route Optimized Energy Management of Hybrid Electric Vehicles
  14. Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs
  15. Mining Probabilistically Frequent Sequential Patterns in Large Uncertain Databases
  16. Mining Statistically Significant Co-location and Segregation Patterns
  17. Random Projection Random Discretization Ensembles—Ensembles of Linear Multivariate Decision Trees
  18. Secure Mining of Association Rules in Horizontally Distributed Databases
  19. Using Incomplete Information for Complete Weight Annotation of Road Networks
  20. Web-Based Traffic Sentiment Analysis Methods and Applications
SECURE COMPUTING
  1. Captcha  as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
NETWORKING
1.Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic
  1. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
  2. Minimum-Delay Multicast Algorithms for Mesh Overlays
  3. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
  4.  D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
  5. Designing Truthful Spectrum Double Auctions with Local Markets
  6. Congestion Aware Routing in Nonlinear Elastic Optical Networks
  7. A Geometric Deployment and Routing Scheme for Directional Wireless Mesh Networks
  8. An Economic Framework for Routing and Channel Allocation in Cognitive Wireless Mesh Networks
  9. Degraded Service Provisioning in Mixed-Line-Rate WDM Backbone Networks Using Multipath Routing
  10. On the Network Sharing of Mixed Network Coding and Routing Data Flows in Congestion Networks
  11. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
  12. Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Networks
  13. Scalable Dynamic Routing Protocol for Cognitive Radio Sensor Networks


NETWORK SECURITY
  1. A Denial of Service Attack to UMTS Networks Using SIM-Less Devices
  2. Generating Summary Risk Scores for Mobile Applications
  3. Modeling the Propagation of Worms in Networks A Survey
  4. Toward Unified Security and Privacy Protection for Smart Meter Networks
  5. Security Analysis of Handover Key Management in 4G LTESAE Networks
  6. A Denial of Service Attack to UMTS Networks Using SIM-Less Devices
  7. Generating Summary Risk Scores for Mobile Applications
  8. Modeling the Propagation of Worms in Networks A Survey
  9. Toward Unified Security and Privacy Protection for Smart Meter Networks
  10. Security Analysis of Handover Key Management in 4G LTESAE Networks
PARALLEL & DISTRIBUTED SYSTEMS
  1. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
  2. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
  3. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks
  4. Certificate less Remote Anonymous Authentication Schemes for Wireless Body Area Networks
  5. Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
  6. Multicast Capacity in MANET with Infrastructure Support
  7. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
  8. Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing
  9. A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices
  10. A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks
  11. A Scalable and Modular Architecture for High-Performance Packet Classification
  12. CPU Scheduling for Power Energy Management on Multicore Processors Using Cache Miss and Context Switch Data
  13. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
  14. Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks
  15. Improvement of Real-Time Multi-CoreSchedulability with Forced Non-Preemption
  16. Improving the Performance of IndependentTask Assignment Heuristics MinMin,MaxMin and Sufferage
  17. Localized Movement-Assisted SensorDeployment Algorithm for HoleDetection and Healing
  18. Reservation-Based Packet Bufferswith Deterministic Packet Departures
  19. Signature Searching in a Networked Collection of Files
  20. An Online Integrated Resource Allocator for Guaranteed Performance in Data Centers
  21. Efficient Data Collection for Large-Scale Mobile Monitoring Applications
  22. Efficient Response Time Approximations for Multiclass Fork and Join Queues in Open and Closed Queuing Networks
  23. Harmonic-Aware Multi-Core Scheduling for Fixed-Priority Real-Time Systems
  24. Hyperbolic Utilization Bounds for Rate Monotonic Scheduling on Homogeneous Multiprocessors
  25. Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel Wireless Networks
  26. Multi-Core Embedded Wireless Sensor Networks Architecture and Applications
  27. On Social Delay-Tolerant Networking Aggregation, Tie Detection, and Routing
  28. Secure Deduplication with Efficient and Reliable Convergent Key Management
  29. Towards Differential Query Services in Cost-Efficient Clouds
  30. Cross-Layer Approach for Minimizing Routing Disruption in IP Networks
  31. Multicast Capacity in MANET with Infrastructure Support
  32. Order-Optimal Information Dissemination in MANETs via Network Coding
MOBILE COMPUTING
  1. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks Autonomous Mobile Mesh Networks
  2. DA-Sync: A Doppler-Assisted Time-Synchronization Scheme  for Mobile Underwater Sensor Networks
  3. Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
  4. Preserving Location Privacy in Geo social Applications
  5. Pattern Analysis & Machine Intelligence
  6. Web Image Re-Ranking Using Query-Specific Semantic Signatures
  7. Cloud-Assisted Mobile-Access of Health  Data With Privacy and Audit ability
IMAGE PROCESSING
  1. Click Prediction for Web Image Re ranking Using Multimodal Sparse Coding
  2. Designing an Efficient Image Encryption-Then-Compression
  3. System via Prediction Error Clustering and Random Permutation


No comments:

Post a Comment