| S.No | Titles | Domain | Year |
| IEEE 2015-2016 JAVA TITLES | |||
| 1 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage | CloudComputing | 2015 |
| 2 | Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing | CloudComputing | 2015 |
| 3 | Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud | CloudComputing | 2015 |
| 4 | CloudArmor: Supporting Reputation-based Trust Management for Cloud Services | CloudComputing | 2015 |
| 5 | CloudGenius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds | CloudComputing | 2015 |
| 6 | Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption | CloudComputing | 2015 |
| 7 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | CloudComputing | 2015 |
| 8 | Provable multi copy dynamic data possession in cloud computing system | CloudComputing | 2015 |
| 7 | Privacy-Preserving Indoor Localization on Smartphones | Android | 2015 |
| 8 | COVERT: Compositional Analysis of Android Inter-App Permission Leakage | Android | 2015 |
| 9 | SBVLC: Secure Barcode-based Visible Light Communication for Smartphones | Android | 2015 |
| 10 | Context-Based Access Control Systems for Mobile Devices | Android | 2015 |
| 11 | Continuous and Transparent User Identity Verification for Secure Internet Services | Android | 2015 |
| 12 | A Distortion-Resistant Routing Framework for Video Traffic in | Networking | 2015 |
| 13 | Wireless Multihop Networks NETWORKING | Networking | 2015 |
| 14 | A Proximity-Aware Interest-Clustered P2P File Sharing System NETWORKING | Networking | 2015 |
| 15 | Detecting Malicious Facebook Applications NETWORKING | Networking | 2015 |
| 16 | Maximizing P2P File Access Availability in Mobile Ad Hoc | Networking | 2015 |
| 17 | Networks though Replication for Efficient File Sharing NETWORKING | Networking | 2015 |
| 18 | A secure anti-collision data sharing scheme for dynamic groups in the cloud | Distributed Computing | 2015 |
| 19 | Cost-Effective Authentic and Anonymous Data Sharing with Forward Security | Distributed Computing | 2015 |
| 20 | Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks | Distributed Computing | 2015 |
| 21 | Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints | Secure Computing | 2015 |
| 22 | A Computational Dynamic Trust Model for User Authorization | Secure Computing | 2015 |
| 23 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks | Secure Computing | 2015 |
| 24 | Continuous and Transparent User Identity Verification for Secure Internet Services | Secure Computing | 2015 |
| 25 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks | Secure Computing | 2015 |
| 26 | DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks | Secure Computing | 2015 |
| 27 | Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System | Service Computing | 2015 |
| 28 | Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation | Service Computing | 2015 |
| 29 | A Feature-Based Framework for Developing and Provisioning Customizable Web Services | Service Computing | 2015 |
| 30 | Automatic Web Service Composition Based on Uncertainty Execution Effects | Service Computing | 2015 |
| 31 | Constructing a Global Social Service Network for Better Quality of Web Service Discovery | Service Computing | 2015 |
| 32 | Unified Collaborative and Content-Based Web Service Recommendation | Service Computing | 2015 |
| 33 | An Incremental and Distributed Inference Method for Large-Scale Ontologies Based on MapReduce Paradigm | Hadoop | 2015 |
| 34 | Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters | Hadoop | 2015 |
| 35 | Hadoop Recognition of Biomedical Named Entity Using Conditional Random Fields | Hadoop | 2015 |
| 36 | Real-Time Big Data Analytical Architecture for Remote Sensing Application | Hadoop | 2015 |
| 37 | DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors | Hadoop | 2015 |
| 38 | Context-Based Diversification for Keyword Queries over XML Data | Data Mining | 2015 |
| 39 | Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites | Data Mining | 2015 |
| 40 | Scalable Constrained Spectral Clustering | Data Mining | 2015 |
| 41 | Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services | Data Mining | 2015 |
| 42 | Tweet Segmentation and Its Application to Named Entity Recognition | Data Mining | 2015 |
Saturday, July 18, 2015
IEEE 2015-2016 JAVA, Android, Bigdata TITLES
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment