amazon

Saturday, July 18, 2015

IEEE 2015-2016 JAVA, Android, Bigdata TITLES

S.No Titles Domain Year
IEEE 2015-2016 JAVA TITLES
1 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage CloudComputing 2015
2 Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing CloudComputing 2015
3 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud CloudComputing 2015
4 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services CloudComputing 2015
5 CloudGenius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds CloudComputing 2015
6 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption CloudComputing 2015
7 Audit-Free Cloud Storage via Deniable Attribute-based Encryption CloudComputing 2015
8 Provable multi copy dynamic data possession in cloud computing system CloudComputing 2015
7 Privacy-Preserving Indoor Localization on Smartphones Android 2015
8 COVERT: Compositional Analysis of Android Inter-App Permission Leakage Android 2015
9 SBVLC: Secure Barcode-based Visible Light Communication for Smartphones Android 2015
10 Context-Based Access Control Systems for Mobile Devices Android 2015
11 Continuous and Transparent User Identity Verification for Secure Internet Services Android 2015
12 A Distortion-Resistant Routing Framework for Video Traffic in Networking 2015
13 Wireless Multihop Networks NETWORKING Networking 2015
14 A Proximity-Aware Interest-Clustered P2P File Sharing System NETWORKING Networking 2015
15 Detecting Malicious Facebook Applications NETWORKING Networking 2015
16 Maximizing P2P File Access Availability in Mobile Ad Hoc Networking 2015
17 Networks though Replication for Efficient File Sharing NETWORKING Networking 2015
18 A secure anti-collision data sharing scheme for dynamic groups in the cloud Distributed Computing 2015
19 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Distributed Computing 2015
20 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks Distributed Computing 2015
21 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints Secure Computing 2015
22 A Computational Dynamic Trust Model for User Authorization Secure Computing 2015
23 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks Secure Computing 2015
24 Continuous and Transparent User Identity Verification for Secure Internet Services Secure Computing 2015
25 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Secure Computing 2015
26 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks Secure Computing 2015
27 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Service Computing 2015
28 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation Service Computing 2015
29 A Feature-Based Framework for Developing and Provisioning Customizable Web Services Service Computing 2015
30 Automatic Web Service Composition Based on Uncertainty Execution Effects Service Computing 2015
31 Constructing a Global Social Service Network for Better Quality of Web Service Discovery Service Computing 2015
32 Unified Collaborative and Content-Based Web Service Recommendation Service Computing 2015
33 An Incremental and Distributed Inference Method for Large-Scale Ontologies Based on MapReduce Paradigm Hadoop 2015
34 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters Hadoop 2015
35 Hadoop Recognition of Biomedical Named Entity Using Conditional Random Fields Hadoop 2015
36 Real-Time Big Data Analytical Architecture for Remote Sensing Application Hadoop 2015
37 DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors Hadoop 2015
38 Context-Based Diversification for Keyword Queries over XML Data Data Mining 2015
39 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining 2015
40 Scalable Constrained Spectral Clustering Data Mining 2015
41 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services Data Mining 2015
42 Tweet Segmentation and Its Application to Named Entity Recognition Data Mining 2015

No comments:

Post a Comment