IEEE .NET
PROJECT TITLES 2015-2016
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
|
CLOUD COMPUTING
|
.NET/2015
|
Cloud-Based Multimedia Content Protection System
|
CLOUD COMPUTING
|
.NET/2015
|
Control Cloud Data Access Privilege and Anonymity with Fully
Anonymous Attribute-Based Encryption
|
CLOUD COMPUTING
|
.NET/2015
|
Cost-Minimizing Dynamic Migration of Content Distribution
Services into Hybrid Clouds
|
CLOUD COMPUTING
|
.NET/2015
|
Energy-aware Load Balancing and Application Scaling for the
Cloud Ecosystem
|
CLOUD COMPUTING
|
.NET/2015
|
Identity-Based Distributed Provable Data Possession in
Multi cloud Storage
|
CLOUD COMPUTING
|
.NET/2015
|
Combining Efficiency, Fidelity, and
Flexibility in
Resource
Information Services
|
CLOUD COMPUTING
|
.NET/2015
|
Panda: Public Auditing for Shared Data with Efficient User
Revocation in the Cloud
|
CLOUD COMPUTING
|
.NET/2015
|
PSMPA: Patient Self-Controllable and Multi-Level Privacy- Preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System
|
CLOUD COMPUTING
|
.NET/2015
|
SelCSP: A Framework to Facilitate Selection of Cloud Service
Providers
|
CLOUD COMPUTING
|
.NET/2015
|
Discovery of Ranking Fraud for Mobile Apps
|
DATA MINING
|
.NET/2015
|
PAGE: A Partition Aware Engine for Parallel Graph Computation
|
DATA MINING
|
.NET/2015
|
Privacy Policy Inference of User-Uploaded Images on Content
Sharing Sites
|
DATA MINING
|
.NET/2015
|
Query Aware Determinization of Uncertain Objects
|
DATA MINING
|
.NET/2015
|
Active Learning for Ranking
through Expected Loss Optimization
|
DATA MINING
|
.NET/2015
|
Efficient Algorithms for Mining
the Concise and Lossless Representation of HighUtility Itemsets
|
DATA MINING
|
.NET/2015
|
Efficient
Motif Discovery for Large-scale Time Series in Healthcare
|
DATA MINING
|
.NET/2015
|
k-Nearest Neighbor
Classification over Semantically Secure Encrypted Relational Data
|
DATA MINING
|
.NET/2015
|
Relational Collaborative Topic
Regression for Recommender Systems
|
DATA MINING
|
.NET/2015
|
Optimal Configuration of Network Coding in Ad Hoc Networks
|
MOBILE COMPUTING
|
.NET/2015
|
Optimum Power Allocation in
Sensor Networks for Active Radar Applications
|
MOBILE COMPUTING
|
|
Privacy-Preserving and Truthful Detection of Packet Dropping
Attacks in Wireless Ad Hoc Networks
|
MOBILE COMPUTING
|
.NET/2015
|
Authenticated Key Exchange Protocols for Parallel Network File
Systems
|
PARALLEL AND DISTRIBUTED
|
.NET/2015
|
Behavior Rule Specification-Based Intrusion Detection for Safety
Critical Medical Cyber Physical Systems
|
SECURE COMPUTING
|
.NET/2015
|
Generating Searchable Public-Key Ciphertexts with Hidden
Structures for Fast Keyword Search
|
SECURE COMPUTING
|
.NET/2015
|
Enabling Fine-grained Multi-keyword Search Supporting
Classified Sub-dictionaries over Encrypted Cloud Data
|
SECURE COMPUTING
|
|
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
|
SECURE COMPUTING
|
.NET/2015
|
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection
System
|
SECURE COMPUTING
|
.NET/2015
|
An Attribute-Assisted Reranking Model for Web Image Search
|
IMAGE PROCESSING
|
.NET/2015
|
Automatic Face Naming by Learning Discriminative Affinity
Matrices From Weakly Labeled Images
|
IMAGE PROCESSING
|
.NET/2015
|
Detection and Rectification of Distorted Fingerprints
|
IMAGE PROCESSING
|
.NET/2015
|
Eye Gaze Tracking With a Web Camera in a Desktop Environment
|
IMAGE PROCESSING
|
.NET/2015
|
Learning Fingerprint Reconstruction: From Minutiae to Image
|
IMAGE PROCESSING
|
.NET/2015
|
Multiview Alignment Hashing for Efficient Image Search
|
IMAGE PROCESSING
|
.NET/2015
|
Single Image Superresolution Based on Gradient Profile
Sharpness
|
IMAGE PROCESSING
|
.NET/2015
|
Steganography Using Reversible Texture Synthesis
|
IMAGE PROCESSING
|
.NET/2015
|
Location-Aware and Personalized Collaborative Filtering for Web
Service Recommendation
|
SERVICECOMPUTING
|
.NET/2015
|
Collision Tolerant and Collision Free Packet Scheduling for
Underwater Acoustic Localization
|
NETWORKING
|
.NET/2015
|
Defeating Jamming With the Power of Silence: A Game-Theoretic
Analysis
|
NETWORKING
|
.NET/2015
|
Universal Network Coding-Based Opportunistic Routing for
Unicast
|
NETWORKING
|
.NET/2015
|
A Distributed Three-hop Routing Protocol to Increase the
Capacity of Hybrid Wireless Networks
|
MOBILE COMPUTING
|
.NET/2015
|
Mobile Data Gathering with Load Balanced Clustering and Dual
Data Uploading in Wireless Sensor Networks
|
MOBILE COMPUTING
|
.NET/2015
|
No comments:
Post a Comment