IEEE 2014-2015 .NET PROJECT TITLES
CLOUD COMPUTING
- Balancing
Performance, Accuracy, and Precision for Secure Cloud Transactions
- Building
Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
- Consistency
as a Service: Auditing Cloud Consistency
- Decentralized
Access Control with Anonymous Authentication of Data Stored in Clouds
- Distributed,
Concurrent, and Independent Access to Encrypted Cloud Databases
- Enabling
Data Integrity Protection in Regenerating-Coding-Based
- Cloud
Storage: Theory and Implementation
- Identity-Based
Distributed Provable Data Possession in Multi- Cloud Storage
- Key-Aggregate
Cryptosystem for Scalable Data Sharing in Cloud Storage
- Panda:
Public Auditing for Shared Data with Efficient User Revocation in the
Cloud
- Privacy-Preserving
Multi-Keyword Ranked Search over Encrypted Cloud Data
- Scalable
Distributed Service Integrity Attestation for Software-as- a-Service
Clouds
DATA MINING
- A
Cocktail Approach for Travel Package Recommendation
- An
Empirical Performance Evaluation of Relational Keyword Search Techniques
- LARS*: An
Efficient and Scalable Location-Aware Recommender System
- Product
Aspect Ranking and Its Applications
- Secure
Mining of Association Rules in Horizontally Distributed Databases
- Supporting
Privacy Protection in Personalized Web Search
- Trusted
DB: A Trusted Hardware-Based Database with Privacy and Data
Confidentiality
- Typicality-Based
Collaborative Filtering Recommendation
- Privacy-Preserving
Enhanced Collaborative Tagging
- Building
Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
- Discovering
Emerging Topics in Social Streams via Link-Anomaly Detection
- Mining
Probabilistically Frequent Sequential Patterns in Large Uncertain
Databases
- Building
Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
- A
K-Main Routes Approach to Spatial Network Activity Summarization
- A
Probabilistic Approach to String Transformation
- A
System for Automatic Notification and Severity Estimation of Automotive
Accidents
- Commuter
Route Optimized Energy Management of Hybrid Electric Vehicles
- Effective
and Efficient Clustering Methods for Correlated Probabilistic Graphs
- Mining
Probabilistically Frequent Sequential Patterns in Large Uncertain
Databases
- Mining
Statistically Significant Co-location and Segregation Patterns
- Random
Projection Random Discretization Ensembles—Ensembles of Linear
Multivariate Decision Trees
- Secure
Mining of Association Rules in Horizontally Distributed Databases
- Using
Incomplete Information for Complete Weight Annotation of Road Networks
- Web-Based
Traffic Sentiment Analysis Methods and Applications
SECURE COMPUTING
- Captcha as Graphical Passwords—A New Security
Primitive Based on Hard AI Problems
NETWORKING
1.Content Caching and Scheduling in Wireless Networks With Elastic
and Inelastic Traffic
- Secure
Data Retrieval for Decentralized Disruption-Tolerant Military Networks
- Minimum-Delay Multicast Algorithms for Mesh Overlays
- Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for
OFDMA Relay Networks
- D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs
Management
- Designing Truthful Spectrum Double Auctions with Local Markets
- Congestion Aware Routing
in Nonlinear Elastic Optical Networks
- A Geometric Deployment and
Routing Scheme for Directional Wireless Mesh Networks
- An Economic Framework for
Routing and Channel Allocation in Cognitive Wireless Mesh Networks
- Degraded Service
Provisioning in Mixed-Line-Rate WDM Backbone Networks Using Multipath
Routing
- On the Network Sharing of
Mixed Network Coding and Routing Data Flows in Congestion Networks
- QoS Aware Geographic Opportunistic
Routing in Wireless Sensor Networks
- Sleep Scheduling for
Geographic Routing in Duty-Cycled Mobile Sensor Networks
- Scalable Dynamic Routing
Protocol for Cognitive Radio Sensor Networks
NETWORK
SECURITY
- A
Denial of Service Attack to UMTS Networks Using SIM-Less Devices
- Generating
Summary Risk Scores for Mobile Applications
- Modeling
the Propagation of Worms in Networks A Survey
- Toward
Unified Security and Privacy Protection for Smart Meter Networks
- Security
Analysis of Handover Key Management in 4G LTESAE Networks
- A
Denial of Service Attack to UMTS Networks Using SIM-Less Devices
- Generating
Summary Risk Scores for Mobile Applications
- Modeling
the Propagation of Worms in Networks A Survey
- Toward
Unified Security and Privacy Protection for Smart Meter Networks
- Security
Analysis of Handover Key Management in 4G LTESAE Networks
PARALLEL &
DISTRIBUTED SYSTEMS
- A
Probabilistic Misbehavior Detection Scheme toward Efficient Trust
Establishment in Delay-Tolerant Networks
- A System
for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis
- An
Error-Minimizing Framework for Localizing Jammers in Wireless Networks
- Certificate
less Remote Anonymous Authentication Schemes for Wireless Body Area
Networks
- Efficient
Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
- Multicast
Capacity in MANET with Infrastructure Support
- Secure
and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
- Transmission-Efficient
Clustering Method for Wireless Sensor Networks Using Compressive Sensing
- A Model
Approach to the Estimation of Peer-to-Peer Traffic Matrices
- A
Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile
Wireless Networks
- A
Scalable and Modular Architecture for High-Performance Packet
Classification
- CPU
Scheduling for Power Energy Management on Multicore Processors Using Cache
Miss and Context Switch Data
- Dynamic
Trust Management for Delay Tolerant Networks and Its Application to Secure
Routing
- Hop-by-Hop
Message Authenticationand Source Privacy in WirelessSensor Networks
- Improvement
of Real-Time Multi-CoreSchedulability with Forced Non-Preemption
- Improving
the Performance of IndependentTask Assignment Heuristics MinMin,MaxMin and
Sufferage
- Localized
Movement-Assisted SensorDeployment Algorithm for HoleDetection and Healing
- Reservation-Based
Packet Bufferswith Deterministic Packet Departures
- Signature
Searching in a Networked Collection of Files
- An Online
Integrated Resource Allocator for Guaranteed Performance in Data Centers
- Efficient
Data Collection for Large-Scale Mobile Monitoring Applications
- Efficient
Response Time Approximations for Multiclass Fork and Join Queues in Open
and Closed Queuing Networks
- Harmonic-Aware
Multi-Core Scheduling for Fixed-Priority Real-Time Systems
- Hyperbolic
Utilization Bounds for Rate Monotonic Scheduling on Homogeneous
Multiprocessors
- Max-Min
Lifetime Optimization for Cooperative Communications in Multi-Channel
Wireless Networks
- Multi-Core
Embedded Wireless Sensor Networks Architecture and Applications
- On Social
Delay-Tolerant Networking Aggregation, Tie Detection, and Routing
- Secure
Deduplication with Efficient and Reliable Convergent Key Management
- Towards
Differential Query Services in Cost-Efficient Clouds
- Cross-Layer
Approach for Minimizing Routing Disruption in IP Networks
- Multicast
Capacity in MANET with Infrastructure Support
- Order-Optimal
Information Dissemination in MANETs via Network Coding
MOBILE COMPUTING
- A
QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks Autonomous
Mobile Mesh Networks
- DA-Sync:
A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks
- Leveraging
Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
- Preserving
Location Privacy in Geo social Applications
- Pattern Analysis
& Machine Intelligence
- Web Image
Re-Ranking Using Query-Specific Semantic Signatures
- Cloud-Assisted
Mobile-Access of Health Data With
Privacy and Audit ability
IMAGE PROCESSING
- Click
Prediction for Web Image Re ranking Using Multimodal Sparse Coding
- Designing
an Efficient Image Encryption-Then-Compression
- System
via Prediction Error Clustering and Random Permutation
No comments:
Post a Comment