S.No | Titles | Domain | Year |
IEEE 2015-2016 JAVA TITLES | |||
1 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage | CloudComputing | 2015 |
2 | Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing | CloudComputing | 2015 |
3 | Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud | CloudComputing | 2015 |
4 | CloudArmor: Supporting Reputation-based Trust Management for Cloud Services | CloudComputing | 2015 |
5 | CloudGenius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds | CloudComputing | 2015 |
6 | Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption | CloudComputing | 2015 |
7 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | CloudComputing | 2015 |
8 | Provable multi copy dynamic data possession in cloud computing system | CloudComputing | 2015 |
7 | Privacy-Preserving Indoor Localization on Smartphones | Android | 2015 |
8 | COVERT: Compositional Analysis of Android Inter-App Permission Leakage | Android | 2015 |
9 | SBVLC: Secure Barcode-based Visible Light Communication for Smartphones | Android | 2015 |
10 | Context-Based Access Control Systems for Mobile Devices | Android | 2015 |
11 | Continuous and Transparent User Identity Verification for Secure Internet Services | Android | 2015 |
12 | A Distortion-Resistant Routing Framework for Video Traffic in | Networking | 2015 |
13 | Wireless Multihop Networks NETWORKING | Networking | 2015 |
14 | A Proximity-Aware Interest-Clustered P2P File Sharing System NETWORKING | Networking | 2015 |
15 | Detecting Malicious Facebook Applications NETWORKING | Networking | 2015 |
16 | Maximizing P2P File Access Availability in Mobile Ad Hoc | Networking | 2015 |
17 | Networks though Replication for Efficient File Sharing NETWORKING | Networking | 2015 |
18 | A secure anti-collision data sharing scheme for dynamic groups in the cloud | Distributed Computing | 2015 |
19 | Cost-Effective Authentic and Anonymous Data Sharing with Forward Security | Distributed Computing | 2015 |
20 | Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks | Distributed Computing | 2015 |
21 | Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints | Secure Computing | 2015 |
22 | A Computational Dynamic Trust Model for User Authorization | Secure Computing | 2015 |
23 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks | Secure Computing | 2015 |
24 | Continuous and Transparent User Identity Verification for Secure Internet Services | Secure Computing | 2015 |
25 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks | Secure Computing | 2015 |
26 | DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks | Secure Computing | 2015 |
27 | Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System | Service Computing | 2015 |
28 | Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation | Service Computing | 2015 |
29 | A Feature-Based Framework for Developing and Provisioning Customizable Web Services | Service Computing | 2015 |
30 | Automatic Web Service Composition Based on Uncertainty Execution Effects | Service Computing | 2015 |
31 | Constructing a Global Social Service Network for Better Quality of Web Service Discovery | Service Computing | 2015 |
32 | Unified Collaborative and Content-Based Web Service Recommendation | Service Computing | 2015 |
33 | An Incremental and Distributed Inference Method for Large-Scale Ontologies Based on MapReduce Paradigm | Hadoop | 2015 |
34 | Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters | Hadoop | 2015 |
35 | Hadoop Recognition of Biomedical Named Entity Using Conditional Random Fields | Hadoop | 2015 |
36 | Real-Time Big Data Analytical Architecture for Remote Sensing Application | Hadoop | 2015 |
37 | DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors | Hadoop | 2015 |
38 | Context-Based Diversification for Keyword Queries over XML Data | Data Mining | 2015 |
39 | Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites | Data Mining | 2015 |
40 | Scalable Constrained Spectral Clustering | Data Mining | 2015 |
41 | Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services | Data Mining | 2015 |
42 | Tweet Segmentation and Its Application to Named Entity Recognition | Data Mining | 2015 |
Saturday, July 18, 2015
IEEE 2015-2016 JAVA, Android, Bigdata TITLES
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment