Monday, 17 August 2015

Latest IEEE 2015-2016 Java Projects at Dharmapuri, Krishnagiri, Hosur, Thiruvannamalai District

Latest IEEE 2015-2016 Java Projects
Service Computing
1. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
2. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
3. Formalization and Verification of Group Behavior Interactions
4. Group Key Agreement with Local Connectivity
5. Data Lineage in Malicious Environments
6. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
7. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
8. Formalization and Verification of Group Behavior Interactions
9. Enabling Cloud Storage Auditing with Key-Exposure Resistance
10. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
11. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
12. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9843360513)
13. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
14. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
15. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
16. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
17. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
18. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
19. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
20. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
21. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
22. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
23. Enabling Cloud Storage Auditing with Key-Exposure Resistance
24. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
25. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
26. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
27. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
28. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
29. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
30. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
31. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
32. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
33. Secure Auditing and Deduplicating Data in Cloud
34. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9843360513)
35. Subgraph Matching with Set Similarity in a Large Graph Database
36. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
37. Making Digital Artifacts on the Web Verifiable and Reliable
38. Anonymizing Collections of Tree-Structured Data
39. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
40. FOCS: Fast Overlapped Community Search
41. Sparsity Learning Formulations for Mining Time-Varying Data
42. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
43. The Impact of View Histories on Edit Recommendations
44. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
45. Discovery of Ranking Fraud for Mobile Apps
46. Towards Effective Bug Triage with Software Data Reduction Techniques
47. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
48. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9843360513)
49. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9843360513)
50. Multiview Alignment Hashing for Efficient Image Search
51. YouTube Video Promotion by Cross-network
52. Semantic-Improved Color Imaging Applications: It Is All About Context
53. Geolocalized Modeling for Dish Recognition
54. Learning to Rank Image Tags with Limited Training Examples
55. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
56. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9843360513)
57. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
58. Tracking Temporal Community Strength in Dynamic Networks
59. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
60. Towards Information Diffusion in Mobile Social Networks
61. User-Deļ¬ned Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9843360513)
62. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
63. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
64. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
65. A Computational Dynamic Trust Model for User Authorization
66. Secure Distributed Deduplication Systems with Improved Reliability
67. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
68. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


EG Technologies
No: 26F, Second Floor, Opp Town EB Office,
Narasimmachari Street, Dharmapuri. 636 701
Contact: +91-9843360513, +91-9894473196

No comments:

Post a Comment