Anda di halaman 1dari 7

JAVA IEEE PROJECTS LIST:

S No

Title Of The Project


1 Privacy Preserving Public Auditing for Secure Cloud Storage 2 Winds of Change from Vendor Lock-In to the Meta Cloud

Domain Cloud Computing Cloud Computing Cloud Computing

Year 2013 2013 2013

AMES-Cloud: A Framework of Adaptive Mobile Video 3 Streaming and Efficient Social Video Sharing in the Clouds A Load Balancing Model Based on Cloud Partitioning for 4 the Public Cloud Development Privacy Preserving Delegated Access Control in Public 5 Clouds CAM: Cloud-Assisted Privacy Preserving Mobile Health 6 Monitoring. Extracting Spread-Spectrum Hidden Data from Digital 7 Media
8 Two tales of privacy in online social networks

Cloud Computing

2013

Cloud Computing

2013

Secure Computing

2013

Secure Computing Secure Computing Secure Computing

2013 2013 2013

Utility-Privacy Tradeoff in Databases An Information9 theoretic Approach. A Fast Clustering-Based Feature Subset Selection algorithm 10 for High Dimensional Data A System to Filter Unwanted Messages from OSN User 11 Walls CloudMoV: Cloud-based Mobile Social TV
12

Data Mining

2013

Data Mining Data Mining Data Mining Data Mining Data Mining Data Mining Data Mining Data Mining

2013 2013 2013 2013 2013 2013 2013 2013

Comparable Entity Mining from Comparative Questions


13 14 Crowd sourcing Predictors of Behavioral Outcomes

Facilitating Effective User Navigation through Website 15 Structure Improvement


16 Focus Learning to Crawl Web Forums 17

Incentive Compatible Privacy-Preserving Data Analysis

18 PMSE: A Personalized Mobile Search Engine

Sensitive Label Privacy Protection on Social Network Data Data Mining


19 20 Robust Module Based Data Management 21 Spatial Approximate String Search

2013 2013 2013 2013

Data Mining Data Mining Mobile Computing

Mobile Relay Configuration in Data-intensive Wireless 22 Sensor Networks. Vampire attacks: Draining life from wireless ad-hoc sensor 23 networks. Towards a Statistical Framework for Source Anonymity in 24 Sensor Networks A Scalable Server Architecture for Mobile Presence Services 25 in Social Network Applications Privacy-Preserving Distributed Profile Matching in 26 Proximity-based Mobile Social Networks Distributed Cooperative Caching in Social Wireless 27 Networks Optimizing Cloud Resources for Delivering IPTV Services 28 through Virtualization
29 Access Policy Consolidation for Event Processing Systems

Mobile Computing

2013

Mobile Computing

2013

Mobile Computing

2013

Mobile Computing

2013

Mobile Computing

2013

Networking Networking Networking

2013 2013 2013

Mining Contracts for Business Events and Temporal 30 Constraints in Service Engagements Fully Anonymous Profile Matching in Mobile Social 31 Networks
32 Price Differentiation for Communication Networks

Networking Networking Parallel and Distributed Systems Parallel and Distributed Systems Cloud Computing Cloud & Parallel And Distributed Knowledge & Data Engineering

2013 2013 2013

Dynamic Resource Allocation using Virtual Machines for 33 Cloud Computing Environment Scalable and Secure Sharing of Personal Health Records in 34 Cloud Computing Using Attribute-Based Encryption
35 Cloud Data Protection for the Masses 36

2013 2012 2012 2012

Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage

37 Efficient Fuzzy Type-Ahead Search in XML Data

Ensuring distributed accountability for data sharing in the 38 cloud Fast Data Collection in Tree-Based Wireless Sensor
39 Networks

Secure Computing

2012

Mobile Computing

2012

Footprint Detecting Sybil Attacks in Urban Vehicular 40 Networks Handwritten Chinese Text Recognition by Integrating 41 Multiple Contexts Learn to Personalized Image Search from the Photo Sharing 42 Websites Multiparty access control for online social networks: model 43 and mechanisms On Optimizing Overlay Topologies for Search in
44 Unstructured Peer-to-Peer Networks

Parallel And Distributed Pattern Analysis & Machine Intelligence Multimedia & Image Processing Knowledge & Data Engineering Parallel And Distributed Network security

2012

2012

2012

2012

2012 2012

Online Modeling of Proactive Moderation System for


45 Auction Fraud Detection

Packet-Hiding Methods for Preventing Selective


46 Jamming Attacks 47
RANKING MODEL ADAPTATION FOR DOMAIN-SPECIFIC SEARCH

Secure Computing Knowledge & Data Engineering Secure Computing Knowledge & Data Engineering Image Processing Networking Mobile Computing Networking Image Processing

2012

2012 2012 2012 2012 2012 2012 2012 2012

48 Risk-Aware Mitigation For MANET routing attacks

Slicing: A New Approach to Privacy Preserving Data


49 Publishing 50 Ttrust modeling in social tagging of multimedia content 51 Adaptive Opportunistic Routing for Wireless Ad Hoc N/ws

Handling Selfishness in Replica Allocation over a Mobile Ad


52 Hoc Network 53 Latency Equalization as a New Network Service Primitive

Vehicle Detection in Aerial Surveillance Using Dynamic


54 Bayesian Networks

Toward Reliable Data Delivery for Highly Dynamic Mobile


55 Ad Hoc Networks

Mobile Computing

2012

56

Organizing User Search Histories A Network Coding Equivalent Content Distribution Scheme

Knowledge & Data Engineering Parallel And Distributed

2012 2012

57 for Efficient Peer-to-Peer Interactive VoD Streaming

Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co58 occurrences 59 Packet Loss Control Using Tokens at the Network Edge

Computer Application

2012

Networking Networking Data Mining Data Mining Data Mining

2012 2012 2012 2012 2012

Distributed Packet Buffers for High-BandwidthSwitches and


60 Routers 61 Efficient Extended Boolean Retrieval 62 BibPro: A Citation Parser Based on Sequence Alignment

Extending Attribute Information for Small Data Set


63 Classification 64 Enabling Multilevel Trust in Privacy Preserving Data Mining

2012 Data Mining 2012 Cloud computing 2012 Cloud computing 2012 Cloud computing 2012 Mobile Computing 2012 Image processing Cloud Computing Networks 2012 2012

A Gossip Protocol for Dynamic Resource Management in


65 Large Cloud Environments

A Secure Erasure Code-Based Cloud Storage System with


66 Secure Data Forwarding

HASBE: A Hierarchical Attribute-Based Solution for


67 Flexible and Scalable Access Control in Cloud Computing

Acknowledgment-Based Broadcast Protocol for Reliable and


68 Efficient Data Dissemination in Vehicular Ad Hoc Networks

Game-Theoretic Pricing for Video Streaming in Mobile


69 Networks 70 Cloud Computing Security from single to multi clouds

Privacy and Integrity preserving range queries in sensor


71 networks

Self Adaptive Contention Aware Routing Protocol for


72 Intermittently Connected Mobile Networks 73 Outsourced Similarity Search on Metric Data Assets 74 Semantics-Based Automated Service Discovery

2012 Parallel And Distributed Data Mining Service Computing 2012 2012

Energy-Efficient Cooperative Video Distribution with


75 Statistical QoS Provisions over Wireless Networks

Mobile Computing

2012

FADE: Secure Overlay Cloud Storage with File


76 Assured Deletion 77 Security Architecture for Cloud Networking 78 Separable Reversible Data Hiding in Encrypted Image 79 Clustering with Multiviewpoint-Based Similarity Measure 80 Effective Pattern Discovery for Text Mining 81 Advance Mining of Temporal High Utility Itemset

2012 Cloud Computing Cloud Computing network computing Data Mining Data Mining Data Mining Secure Computing Networking Cloud computing Networking 2012 2012 2012 2012 2012 2011 2011 2011 2011 2011 2011 2011 2011 2011 2012 2012 2012 2012 2012 2012

Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication 82 Mechanism An Efficient Caching Scheme and Consistency Maintenance 83 in Hybrid P2P System
84 Efficient audit service outsourcing for data integrity in clouds 85 Detecting Targeted Malicious Email 86

Monitoring and Detecting Abnormal Behavior in Mobile Cloud computing Cloud Infrastructure Protecting Location Privacy in Sensor Networks against a 87 Mobile Computing Global Eavesdropper Secure And Practical Outsourcing Of Linear Programming In 88 Cloud Computing Cloud Computing multi-clouds
89 Improving Utilization of Infrastructure Clouds

Cloud Computing Cloud Computing Image Processing & Secure Computing Image Processing & Secure Computing Image Processing & Secure Computing Knowledge & Data Engineering Image Processing & Knowledge & Data Engineering IEEE Journal

Cloud Computing for Agent-Based Urban Transportation Systems Nymble-Blocking Misbehaving Users In Anonym Zing 91 Networks Robust Video Data Hiding Using Forbidden Data Hiding 92 And Selective Embedding
90 93 Embedded Extended Visual Crypto Graph Schemes 94 Extended xml tree pattern matching: theories and algorithms

Sketch4match-Content-Based Image Retrieval System Using


95 Sketches 96 Making Aggregation Work in Uncertain and Probabilistic

Databases Advanced Routing Technology For Fast Internet Protocol Network Recovery Denial Of Service Attacks In Wireless Networks : The Case 98 Of Jammers
97 99 Data Leakage Detection

IEEE Journal IEEE Journal Knowledge & Data Engineering Knowledge & Data Engineering

2011 2011 2011

Adaptive Cluster Distance Bounding for High Dimensional 100 Indexing

2011

Decision Trees for Uncertain Data


101 102

Knowledge & Data Engineering Data Mining Data Mining Data Mining Data Mining Networking Networking + Knowledge & Data Engineering Networking Networking Networking Networking Networking Networking Networking Networking

2011

Effective Navigation Of Query Results Based On Concept Hierarchies

2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011

103 Clustering With Multi View Point Based Similarity Measure 104

A Dual Framework And Algorithm For Targeted Online Data Delivery

105 Ranking Spatial Data By Quality Preferences 106

Resource Management Using Dynamical Load Prediction & Multi Processor Cooperation Load Shedding In Mobile Systems In Mobiqual A Study on Certificate Revocation in Mobile Ad Hoc Networks A permutation-based algorithm to optimally reschedule trains in a railway traffic network Design Of P-Cycles For Full Node Protection In WDM Mesh Networks Dynamic Channel Allocation For Wireless Zone-Based Multicast & Broadcast Service A Foundation For Stochastic Bandwidth Estimation Of Networks With Random Service A New Approach For FEC Decoding Based On The Bp Algorithm In LTE And Wi-Max Systems Voronai-Based Continuous Query Processing For Mobile Users Geographical Routing With Location Service In Intermittently Connected MANETS

107 108

109 110 111 112 113 114 115

An Efficient Paging Scheme For Terminal Mobility Using Personal Mobility Management Information In Inter Worked 116 Fixed And Mobile Networks
117 Selective Data Stream Blocking Mechanism For Networks

Networking Networking Networking Wireless Communication Networking Networking Networking Wireless Communication Wireless Communication Wireless Communication Wireless Communication Mobile Computing Mobile Computing Secure Computing Secure Computing Secure Computing Secure Computing Secure Computing Secure Computing Software Engineering

2011 2011 2011

Design And Performance Analysis Of Mobility Management Schemes Based On Pointer Forwarding For Wireless Mesh 118 Networks Secure Communications Over Wireless Broadcast Networks: 119 Stability And Utility Maximization
120 Selfish Overlay Network Creation and Maintenance 121 Buffer Sizing for 802.11 Based Networks 122 Locating Equivalent Servants over P2P Networks

2011 2011 2011 2011 2011

The CoQUOS Approach to Continuous Queries in 123 Unstructured Overlays SAT: A Security Architecture Achieving Anonymity and 124 Traceability in Wireless Mesh Networks Wireless Sensor Network Security model using Zero 125 Knowledge Protocol Caching Strategies Based on Information Density Estimation 126 in Wireless Ad Hoc Networks A Privacy Preserving Location Monitoring System For Wireless Sensor Networks Supporting Efficient And Scalable Multicasting Over Mobile 128 Ad-Hoc Networks
127 129 Analysis Of Credit Card Fraud Detection Methods 130

2011

2011

2011 2011 2011 2011 2011 2011 2011 2011 2011 2011

A Competitive Study Of Cryptography Techniques Over Block Cipher

131 Modeling And Detection Of Camouflaging Worm

Dynamics Of Malware Spread In Decentralized Peer-To-Peer Networks On The Effectiveness Of Monitoring For Intrusion Detection 133 In Mobile Ad Hoc Networks Online Intrusion Alert Aggregation with Generative Data 134 Stream Modeling Analysis Of Quality Of Object Oriented Systems Using 135 Object Oriented Metrics
132

Anda mungkin juga menyukai