IEEE 2014 – 2015 JAVA TITLES
|
||
PROJECT CODE
|
TITLE
|
DOMAIN
|
LANJ1501
|
TEES: An Efficient Search
Scheme over Encrypted Data on Mobile Cloud
|
CLOUD COMPUTING
|
LANJ1502
|
DROPS: Division and Replication
of Data in Cloud for Optimal Performance and Security
|
CLOUD COMPUTING
|
LANJ1503
|
CloudArmor: Supporting Reputation-based Trust
Management for Cloud Services
|
CLOUD COMPUTING
|
LANJ1504
|
A Profit Maximization Scheme with
Guaranteed Quality of
Service in Cloud
Computing
|
CLOUD COMPUTING
|
LANJ1505
|
An Authenticated Trust and Reputation
Calculation and
Management System for Cloud and Sensor
Networks Integration
|
CLOUD COMPUTING
|
LANJ1506
|
Control Cloud Data Access Privilege and Anonymity With Fully
Anonymous Attribute-Based Encryption
|
CLOUD COMPUTING
|
LANJ1507
|
Key-Aggregate Searchable Encryption (KASE)
for Group Data Sharing via Cloud Storage
|
CLOUD COMPUTING
|
LANJ1508
|
Audit-Free Cloud Storage via Deniable
Attribute-based
Encryption
|
CLOUD COMPUTING
|
LANJ1509
|
A
Hybrid Cloud Approach for Secure Authorized Deduplication
|
CLOUD COMPUTING
|
LANJ1510
|
A Scalable and Reliable Matching Service
for Content-Based Publish/Subscribe Systems
|
CLOUD COMPUTING
|
LANJ1511
|
Enabling Cloud Storage Auditing with
Key-Exposure Resistance
|
CLOUD COMPUTING
|
LANJ1512
|
Stealthy Denial of Service Strategy in Cloud
Computing
|
CLOUD COMPUTING
|
LANJ1513
|
Privacy-Preserving Public Auditing for
Regenerating-Code-Based Cloud Storage
|
CLOUD COMPUTING
|
LANJ1514
|
Enabling Fine-grained
Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted
Cloud Data
|
CLOUD COMPUTING
|
LANJ1515
|
Cloud-Trust - a Security
Assessment Model for Infrastructure as a Service (IaaS) Clouds
|
CLOUD COMPUTING
|
LANJ1516
|
Circuit Cipher text-policy
Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud
Computing
|
CLOUD COMPUTING
|
LANJ1517
|
A Dynamic Secure Group Sharing
Framework In Public Cloud Computing
|
CLOUD COMPUTING
|
LANJ1518
|
Provable Multicopy Dynamic Data Possession in
Cloud Computing Systems
|
CLOUD COMPUTING
|
LANJ1519
|
Detecting
Malicious Facebook Applications
|
NETWORKING
|
LANJ1520 |
A Distortion-Resistant Routing Framework
for Video Traffic in Wireless Multihop Networks
|
NETWORKING |
LANJ1521
|
Maximizing P2P File Access Availability in
Mobile Ad Hoc Networks though Replication for Efficient File Sharing
|
NETWORKING
|
LANJ1522
|
Scaling Social Media Applications Into
Geo-Distributed Clouds
|
NETWORKING
|
LANJ1523
|
Privacy-Preserving Quantification of
Cross-Domain Network Reachability
|
NETWORKING
|
LANJ1524
|
Privacy Policy Inference of User-Uploaded
Images on Content Sharing Sites
|
KNOWLEDGE &
DATA ENGINEERING
|
LANJ1525
|
Tweet Segmentation and Its Application to
Named Entity Recognition
|
KNOWLEDGE &
DATA ENGINEERING
|
LANJ1526
|
Best
Keyword Cover Search
|
KNOWLEDGE &
DATA ENGINEERING
|
LANJ1527
|
On Summarization and Timeline Generation
for Evolutionary Tweet Streams
|
KNOWLEDGE &
DATA ENGINEERING
|
LANJ1528
|
FOCS: Fast Overlapped Community Search
|
KNOWLEDGE &
DATA ENGINEERING
|
LANJ1529
|
Reverse Nearest Neighbors in Unsupervised
Distance-Based Outlier Detection
|
KNOWLEDGE &
DATA ENGINEERING
|
LANJ1530
|
Route-Saver: Leveraging Route APIs for Accurate
and Efficient Query Processing at Location-Based Services
|
KNOWLEDGE &
DATA ENGINEERING
|
LANJ1531
|
Translating Relational Queries into
Spreadsheets
|
KNOWLEDGE &
DATA ENGINEERING
|
LANJ1532
|
PAGE: A Partition Aware Engine for Parallel Graph Computation |
KNOWLEDGE &
DATA ENGINEERING
|
LANJ1533
|
Efficient Enforcement of Action-aware
Purpose-based Access Control within Relational Database Management Systems
|
KNOWLEDGE &
DATA ENGINEERING
|
LANJ1534
|
Friendbook: A Semantic-Based Friend
Recommendation System for Social Networks
|
MOBILE COMPUTING
|
LANJ1535
|
User-Defined Privacy Grid System for
Continuous Location-Based Services
|
MOBILE COMPUTING
|
LANJ1536
|
DaGCM: A Concurrent Data Uploading Framework
for Mobile Data Gathering in Wireless Sensor Networks
|
MOBILE COMPUTING
|
LANJ1537
|
A
New Multiple Service Key Management Scheme for Secure Wireless Mobile
Multicast
|
MOBILE COMPUTING
|
LANJ1538
|
A privacy-preserving framework for managing mobile ad requests and billing information |
MOBILE COMPUTING
|
LANJ1539
|
Practical Secret Key Agreement
for Full-Duplex Near Field
Communications |
MOBILE COMPUTING
|
LANJ1540
|
A Computational
Dynamic Trust Model for User Authorization
|
SECURE COMPUTING
|
LANJ1541
|
Deleting
Secret Data with Public Verifiability
|
SECURE COMPUTING
|
LANJ1542
|
Key-recovery Attacks on KIDS, a Keyed Anomaly
Detection System
|
SECURE COMPUTING
|
LANJ1543
|
My Privacy My Decision: Control of Photo
Sharing on Online Social Networks
|
SECURE COMPUTING
|
LANJ1544
|
A Trust-based Privacy-Preserving Friend
Recommendation Scheme for Online Social Networks
|
SECURE COMPUTING
|
LANJ1545
|
Between Worlds: Securing Mixed
JavaScript/ActionScript Multi-party Web Content
|
SECURE COMPUTING
|
LANJ1546
|
Improved Privacy-Preserving P2P Multimedia
Distribution Based on Recombined Fingerprints
|
SECURE COMPUTING
|
LANJ1547
|
Contributory Broadcast Encryption with
Efficient Encryption and Short Ciphertexts
|
SECURE COMPUTING
|
LANJ1548
|
Continuous and Transparent User Identity
Verification for Secure Internet Services
|
SECURE COMPUTING
|
LANJ1549
|
A Proximity-aware Interest-clustered P2P File
Sharing System
|
PARALLEL & DISTRIBUTED SYSTEMS
|
LANJ1550
|
CAMF: Context-aware Message Forwarding in
Selfish Mobile Social Networks
|
PARALLEL & DISTRIBUTED SYSTEMS
|
LANJ1546
|
Secure Distributed Deduplication Systems
with Improved
Reliability
|
PARALLEL & DISTRIBUTED SYSTEMS
|
LANJ1547
|
A General Scalable and
Elastic Content-Based Publish/Subscribe Service
|
PARALLEL & DISTRIBUTED SYSTEMS
|
LANJ1548
|
Goodput-Aware Load
Distribution for Real-Time Traffic over Multipath Networks
|
PARALLEL & DISTRIBUTED SYSTEMS
|
LANJ1549
|
Software Puzzle: A Countermeasure to
Resource-Inflated Denial of-Service Attacks
|
INFORMATION
FORENSICS AND
SECURITY
|
LANJ1550
|
Key Updating for Leakage Resiliency with
Application to AES Modes of Operation
|
INFORMATION
FORENSICS AND
SECURITY
|
LANJ1551
|
Generating
Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword
Search
|
INFORMATION
FORENSICS AND
SECURITY
|
LANJ1552
|
Learning to Rank Image Tags With Limited Training
Examples
|
IMAGE PROCESSING
|
LANJ1553
|
EMR: A Scalable Graph-based Ranking Model
for Content-based Image Retrieval
|
IMAGE PROCESSING
|
2015-2016 IEEE PROJECT TITLES for M.E.,M.Tech.,B.E.,B.Tech.,M.Phil.,MCA, 2015 IEEE Projects base papers, project center in coimbatore, Bulk IEEE Projects,2015 IEEE projects, MCA projects in coimbatore, IEEE 2015 projects, 2015 IEEE Projects base papers, Application projects, Real time projects, Software Development,2015 IEEE Java projects, 2015 IEEE dotnet projects, 2015 Android IEEE Projects,Android projects,best project center in Coimbatore
Friday, 7 August 2015
2015 - 2016 Java IEEE Project Titles and abstracts in coimbatore
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment