Latest IEEE 2015-2016
Java Projects
|
Service Computing
|
1. SmartCrawler: A Two-stage
Crawler for Efficiently Harvesting Deep-Web Interfaces
|
Secure Computing
|
2. Collusion-Tolerable
Privacy-Preserving Sum and Product Calculation without Secure Channel
|
3. Formalization and Verification
of Group Behavior Interactions
|
4. Group Key Agreement with Local
Connectivity
|
5. Data Lineage in Malicious
Environments
|
6. Privacy-Preserving Public
Auditing for Regenerating-Code-Based Cloud Storage
|
7. Improving Privacy and Security
in Decentralized Ciphertext-Policy Attribute-Based Encryption
|
8. Formalization and Verification
of Group Behavior Interactions
|
9. Enabling Cloud Storage Auditing
with Key-Exposure Resistance
|
10. Control Cloud Data Access
Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
|
11. Anonymity-based
Privacy-preserving Data Reporting for Participatory Sensing
|
12. T-Broker: A Trust-Aware
Service Brokering Scheme for Multiple Cloud Collaborative Services
|
CLOUD COMPUTING (Hint: For
Abstract and Base Paper Contact: 9843360513)
|
13. MobiContext: A Context-aware
Cloud-Based Venue Recommendation Framework
|
14. SAE: Toward Efficient Cloud
Data Analysis Service for Large-Scale Social Networks
|
15. MobiContext: A Context-aware
Cloud-Based Venue Recommendation Framework
|
16. Understanding the Performance
and Potential of Cloud Computing for Scientific Applications
|
17. Towards Optimized Fine-Grained
Pricing of IaaS Cloud Platform
|
18. Service Operator-aware Trust
Scheme for Resource Matchmaking across Multiple Clouds
|
19. Reactive Resource Provisioning
Heuristics for Dynamic Dataflows on Cloud Infrastructure
|
20. A Profit Maximization Scheme
with Guaranteed Quality of Service in Cloud Computing
|
21. Privacy-Preserving Public
Auditing for Regenerating-Code-Based Cloud Storage
|
22. OPoR: Enabling Proof of
Retrievability in Cloud Computing with Resource-Constrained Devices
|
23. Enabling Cloud Storage
Auditing with Key-Exposure Resistance
|
24. CONTROL CLOUD DATA ACCESS
PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
|
25. Circuit Ciphertext-policy
Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud
Computing
|
26. Audit-Free Cloud Storage via
Deniable Attribute-based Encryption
|
27. CHARM: A Cost-efficient Multi-cloud
Data Hosting Scheme with High Availability
|
28. Audit-Free Cloud Storage via
Deniable Attribute-based Encryption
|
29. A Profit Maximization Scheme
with Guaranteed Quality of Service in Cloud Computing
|
30. Provable Multicopy Dynamic
Data Possession in Cloud Computing Systems
|
31. Public Integrity Auditing for
Shared Dynamic Cloud Data with Group User Revocation
|
32. Key-Aggregate Searchable
Encryption (KASE)for Group Data Sharing via Cloud Storage
|
33. Secure Auditing and
Deduplicating Data in Cloud
|
34. Identity-based Encryption with
Outsourced Revocation in Cloud Computing
|
KNOWLEDGE AND DATA ENGINEERING -
(DATA MINING) (Hint: For Abstract and Base Paper Contact: 9843360513)
|
35. Subgraph Matching with Set
Similarity in a Large Graph Database
|
36. Structured Learning from
Heterogeneous Behavior for Social Identity Linkage
|
37. Making Digital Artifacts on
the Web Verifiable and Reliable
|
38. Anonymizing Collections of
Tree-Structured Data
|
39. Privacy Policy Inference of
User-Uploaded Images on Content Sharing Sites
|
40. FOCS: Fast Overlapped
Community Search
|
41. Sparsity Learning Formulations
for Mining Time-Varying Data
|
42. k-Nearest Neighbor
Classification over Semantically Secure Encrypted Relational Data
|
43. The Impact of View Histories
on Edit Recommendations
|
44. Agent-based Interactions and
Economic Encounters in an Intelligent InterCloud
|
45. Discovery of Ranking Fraud for
Mobile Apps
|
46. Towards Effective Bug Triage
with Software Data Reduction Techniques
|
47. Subgraph Matching with Set
Similarity in a Large Graph Database
|
Software Engineering
|
48. The Impact of View Histories
on Edit Recommendations
|
NETWORKING (Hint: For Abstract and
Base Paper Contact: 9843360513)
|
49. FRAppE: Detecting Malicious
Facebook Applications
|
IMAGE PROCESSING - MULTIMEDIA
(Hint: For Abstract and Base Paper Contact: 9843360513)
|
50. Multiview Alignment Hashing
for Efficient Image Search
|
51. YouTube Video Promotion by
Cross-network
|
52. Semantic-Improved Color
Imaging Applications: It Is All About Context
|
53. Geolocalized Modeling for Dish
Recognition
|
54. Learning to Rank Image Tags
with Limited Training Examples
|
55. Automatic Face Naming by
Learning Discriminative Affnity Matrices From Weakly Labeled Image
|
56. Multiview Alignment Hashing
for Efficient Image
|
MOBILE COMPUTING - WIRELESS
COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9843360513)
|
57. Maximizing Energy Efficiency
in Multiple Access Channels by Exploiting Packet Dropping and Transmitter
Buffering
|
58. Tracking Temporal Community Strength
in Dynamic Networks
|
59. Modelling and Analysis of
Communication Traffic Heterogeneity in Opportunistic Networks
|
60. Towards Information Diffusion
in Mobile Social Networks
|
61. User-Deļ¬ned Privacy Grid
System for Continuous Location-Based Services
|
PARALLEL AND DISTRIBUTED SYSTEMS
WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9843360513)
|
62. Service Operator-aware Trust
Scheme for Resource Matchmaking across Multiple Clouds
|
63. A Secure Anti-Collusion Data
Sharing Scheme for Dynamic Groups in the Cloud
|
64. Cost-Effective Authentic and
Anonymous Data Sharing with Forward Security
|
65. A Computational Dynamic Trust
Model for User Authorization
|
66. Secure Distributed
Deduplication Systems with Improved Reliability
|
67. Collusion-Tolerable
Privacy-Preserving Sum and Product Calculation without Secure Channel
|
68. Control Cloud Data Access
Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
|
EG
Technologies
No: 26F,
Second Floor, Opp Town EB Office,
Narasimmachari
Street, Dharmapuri. 636 701
Contact:
+91-9843360513, +91-9894473196
No comments:
Post a Comment