IEEE 2013-14 JAVA PROJECTS AT ECRUITMENTS SOLUTIONS
CLOUD COMPUTING
1. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
2. Privacy-Preserving Public Auditing for Secure Cloud Storage
3. Winds of Change From Vendor Lock-In to the Meta Cloud.
4. Cloud computing for mobile users can offloading compution save energy.
5. On Data Staging Algorithms for Shared Data Accesses in Clouds
6. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
7. CloudMoV: Cloud-based Mobile Social TV
8. QoS Ranking Prediction for Cloud Services
9. Privacy-Preserving Public Auditing for Secure Cloud Storage
2. Privacy-Preserving Public Auditing for Secure Cloud Storage
3. Winds of Change From Vendor Lock-In to the Meta Cloud.
4. Cloud computing for mobile users can offloading compution save energy.
5. On Data Staging Algorithms for Shared Data Accesses in Clouds
6. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
7. CloudMoV: Cloud-based Mobile Social TV
8. QoS Ranking Prediction for Cloud Services
9. Privacy-Preserving Public Auditing for Secure Cloud Storage
10. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
11. Ensuring Distributed Accountability for Data Sharing in the Cloud
11. Ensuring Distributed Accountability for Data Sharing in the Cloud
DATA MINING:
1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
2. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4. A Survey of XML Tree Patterns
5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6. Dynamic Personalized Recommendation on Sparse Data
7. Mining User Queries with Markov Chains: Application to Online Image Retrieval
8. Optimal Route Queries with Arbitrary Order Constraints
9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
10. M-Privacy for Collaborative Data Publishing
11. Crowd sourcing Predictors of Behavioral Outcomes.
12. Spatial Approximate String Search
13. Facilitating Document Annotation Using Content and Querying Value
14. Privacy Preserving Delegated Access Control in Public Clouds
PARLLEL DISTRIBUTION
2. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4. A Survey of XML Tree Patterns
5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6. Dynamic Personalized Recommendation on Sparse Data
7. Mining User Queries with Markov Chains: Application to Online Image Retrieval
8. Optimal Route Queries with Arbitrary Order Constraints
9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
10. M-Privacy for Collaborative Data Publishing
11. Crowd sourcing Predictors of Behavioral Outcomes.
12. Spatial Approximate String Search
13. Facilitating Document Annotation Using Content and Querying Value
14. Privacy Preserving Delegated Access Control in Public Clouds
PARLLEL DISTRIBUTION
- IP-Geolocation Mapping for Moderately Connected Internet Regions
- A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
- Analysis of Distance-Based Location Management in Wireless Communication Networks.
- Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
- Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
- BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
- Towards Differential Query Services in Cost-Efficient Clouds.
- A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.
- Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems.
- ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.
MOBILE COMPUTING
1. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks.
1. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks.
- EAACK—A Secure Intrusion-Detection System for MANETs
- Vampire attacks:Draining life from wireless ad-hoc sensor networks.
- Towards a Statistical Framework for Source Anonymity in Sensor Networks
- Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
- Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
- On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
- Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
- IP-Geolocation Mapping for Moderately Connected Internet Regions
- Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
- EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
- Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
- Optimal Multicast Capacity and Delay Tradeoffs in MANETs
- Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
NETWORKING
1. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
2. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
3. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
4. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
5. Efficient Algorithms for Neighbor Discovery in Wireless Networks
2. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
3. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
4. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
5. Efficient Algorithms for Neighbor Discovery in Wireless Networks
SERVICE COMPUTING
1. Privacy-Enhanced Web Service Composition
2. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
2. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
3. . NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
4. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
5. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
6. Distributed Web Systems Performance Forecasting Using Turning Bands Method
SECURE COMPUTING
1. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
2. Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.
3. Two tales of privacy in online social networks.
4. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
5. Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
6. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
7. An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
8. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
9. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.
10. Participatory Privacy Enabling Privacy in Participatory Sensing.
11. Modeling the Pair wise Key Predistribution Scheme in the Presence of Unreliable Links
12. Multiparty Access Control for Online Social Networks Model and Mechanisms
13. Privacy and Integrity Preserving Range Queriesin Sensor Networks
No comments:
Post a Comment