SlideShare a Scribd company logo
1 of 14
Sno JAVA IEEE 2016 IEEE Abstract
Base
Paper
CLOUD COMPUTING
1
A Secure and Dynamic Multi-Keyword Ranked Search
Scheme over Encrypted Cloud Data
2016 Download Download
2
A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
2016 Download Download
3
An Efficient File Hierarchy Attribute-Based Encryption
Scheme in Cloud Computing
2016 Download Download
4
An Efficient Privacy-Preserving Ranked Keyword Search
Method
2016 Download Download
5
A Modified Hierarchical Attribute-Based Encryption Access
Control Method for Mobile Cloud Computing
2016 Download Download
7
Circuit Ciphertext-policy Attribute-based Hybrid Encryption
with Verifiable Delegation in Cloud Computing
2016 Download Download
8
Conditional Identity-Based Broadcast Proxy Re-Encryption
and Its Application to Cloud Email
2016 Download Download
10
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-
User Environments
2016 Download Download
13
Dual-Server Public-Key Encryption With Keyword Search for
Secure Cloud Storage
2016 Download Download
14
Dynamic and Public Auditing with Fair Arbitration for Cloud
Data
2016 Download Download
15
Enabling Cloud Storage Auditing With Verifiable Outsourcing
of Key Updates
2016 Download Download
16
Flexible and Fine-Grained Attribute-Based Data Storage in
Cloud Computing
2016 Download Download
17
Fine-Grained Two-Factor Access Control for Web-Based
Cloud Computing Services
2016 Download Download
19
Identity-Based Encryption with Cloud Revocation Authority
and Its Applications
2016 Download Download
20
Identity-Based Proxy-Oriented Data Uploading and Remote
Data Integrity Checking in Public Cloud
2016 Download Download
21 Protecting Your Right: Verifiable Attribute-Based Keyword 2016 Download Download
Search with Fine-Grained Owner-Enforced Search
Authorization in the Cloud
23 SecRBAC: Secure data in the Clouds 2016 Download Download
24
Secure Data Sharing in Cloud Computing Using Revocable-
Storage Identity-Based Encryption
2016 Download Download
25
Secure Optimization Computation Outsourcing in Cloud
Computing: A Case Study of Linear Programming
2016 Download Download
26
TMACS: A Robust and Verifiable Threshold Multi-Authority
Access Control System in Public Cloud Storage
2016 Download Download
DATA MINING
1
A Novel Recommendation Model Regularized with User Trust
and Item Ratings
2016 Download Download
2
Automatically Mining Facets for Queries from Their Search
Results
2016 Download Download
3 Booster in High Dimensional Data Classification 2016 Download Download
4
Building an intrusion detection system using a filter-based
feature selection algorithm
2016 Download Download
5
Connecting Social Media to E-Commerce: Cold-Start Product
Recommendation Using Microblogging Information
2016 Download Download
6
Cross-Domain Sentiment Classification Using Sentiment
Sensitive Embeddings
2016 Download Download
9 Efficient Algorithms for Mining Top-K High Utility Itemsets 2016 Download Download
11
Mining User-Aware Rare Sequential Topic Patterns in
Document Streams
2016 Download Download
12 Nearest Keyword Set Search in Multi-Dimensional Datasets 2016 Download Download
13
Rating Prediction based on Social Sentiment from Textual
Reviews
2016 Download Download
NETWORKING
1
A Stable Approach for Routing Queries in Unstructured P2P
Networks
2016 Download Download
2 iPath: Path Inference in Wireless Sensor Networks 2016 Download Download
3
Opportunistic Routing With Congestion Diversity in Wireless
Ad Hoc Networks
2016 Download Download
4
Spatial Reusability-Aware Routing in Multi-Hop Wireless
Networks
2016 Download Download
4
STAMP: Enabling Privacy-Preserving Location Proofs for
Mobile Users
2016 Download Download
MOBILE COMPUTING
1
Energy and Memory Efficient Clone Detection in Wireless
Sensor Networks
2016 Download Download
2
EPLQ: Efficient Privacy-Preserving Location-Based Query
Over Outsourced Encrypted Data
2016 Download Download
3
Secure Overlay Routing Using Key Pre-Distribution: A Linear
Distance Optimization Approach
2016 Download Download
4
Detecting Node Failures in Mobile Wireless Networks: A
Probabilistic Approach
2016 Download Download
IMAGE PROCESSING
1
A Locality Sensitive Low-Rank Model for Image Tag
Completion
2016 Download Download
2
A Scalable Approach for Content-Based Image Retrieval in
Peer-to-Peer Networks
2016 Download Download
3
Learning of Multimodal Representations with Random Walks
on the Click Graph
2016 Download Download
4
Online Multi-Modal Distance Metric Learning with
Application to Image Retrieval
2016 Download Download
5 Tag Based Image Search by Social Re-ranking 2016 Download Download
SECURE COMPUTING
1
Contributory Broadcast Encryption with Efficient Encryption
and Short Ciphertexts
2016 Download Download
2 Data Lineage in Malicious Environments 2016 Download Download
3 Detecting Malicious Facebook Applications 2016 Download Download
4 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 2016 Download Download
5
Inference Attack on Browsing History of Twitter Users using
Public Click Analytics and Twitter Metadata
2016 Download Download
6 Resolving Multi-party Privacy Conflicts in Social Media 2016 Download Download
1
Hidden Ciphertext Policy Attribute-Based Encryption Under
Standard Assumptions
2016 Download Download
2
Optimized Search-and-Compute Circuits and Their
Application to Query Evaluation on Encrypted Data
2016 Download Download
3
Privacy-Preserving Utility Verification of the Data Published
by Non-interactive Differentially Private Mechanisms
2016 Download Download
PARALLEL AND DISTRIBUTED SYSTEMS
1 A Hop-by-Hop Routing Mechanism for Green Internet 2016 Download Download
2 Continuous Answering Holistic Queries over Sensor Networks 2016 Download Download
3
Dictionary Based Secure Provenance Compression for
Wireless Sensor Networks
2016 Download Download
4
The Server Provisioning Problem for Continuous Distributed
Interactive Applications
2016 Download Download
SOFTWARE ENGINEERING
1
Mapping Bug Reports to Relevant Files: A Ranking Model, a
Fine-Grained Benchmark, and Feature Evaluation
2016 Download Download
2
Metamorphic Testing for Software Quality Assessment: A
Study of Search Engines
2016 Download Download
3 SITAR: GUI Test Script Repair 2016 Download Download
Sno
NS2 & NS3 PROJECTS IEEE Abstract
Base
Paper
Mobile Ad-hoc Network
1
A Novel Approach for Efficient Usage of Intrusion Detection
System in Mobile Ad Hoc Networks
2016 Download Download
2
Detecting Colluding Blackhole and Greyhole Attacks in Delay
Tolerant Networks
2016 Download Download
3
Mitigating Denial of Service Attacks in OLSR Protocol Using
Fictitious Nodes
2016 Download Download
4
Opportunistic Routing With Congestion Diversity in Wireless
Ad Hoc Networks
2016 Download Download
5
Top-k Query Processing and Malicious Node Identification
Based on Node Grouping in MANETs
2016 Download Download
VANET
1
A Pseudonym Management System to Achieve Anonymity in
Vehicular Ad Hoc Networks
2016 Download Download
2
ART: An Attack-Resistant Trust Management Scheme for
Securing Vehicular Ad Hoc Networks
2016 Download Download
3
Contact-Aware Data Replication in Roadside Unit Aided
Vehicular Delay Tolerant Networks
2016 Download Download
4
DIVERT: A Distributed Vehicular Traffic Re-routing System
for Congestion Avoidance
2016 Download Download
5
Dual Authentication and Key Management Techniques for
Secure Data Transmission in Vehicular Ad Hoc Networks
2016 Download Download
6
Secure and Robust Multi-Constrained QoS Aware Routing
Algorithm for VANETs
2016 Download Download
Wireless Sensor Network
1 A Hop-by-Hop Routing Mechanism for Green Internet 2016 Download Download
2
Achieving Optimal Traffic Engineering Using a Generalized
Routing Framework
2016 Download Download
3
Assessing Performance Gains Through Global Resource
Control of Heterogeneous Wireless Networks
2016 Download Download
4
CANS: Towards Congestion-Adaptive and Small Stretch
Emergency Navigation with Wireless Sensor Networks
2016 Download Download
5
Cluster-Based Routing for the Mobile Sink in Wireless Sensor
Networks With Obstacles
2016 Download Download
6
Code-Based Neighbor Discovery Protocols in Mobile Wireless
Networks
2016 Download Download
7
Duplicate Detectable Opportunistic Forwarding in Duty-Cycled
Wireless Sensor Networks
2016 Download Download
8
Fair Routing for Overlapped Cooperative Heterogeneous
Wireless Sensor Networks
2016 Download Download
9
Geographic and Opportunistic Routing for Underwater Sensor
Networks
2016 Download Download
10 iPath: Path Inference in Wireless Sensor Networks 2016 Download Download
11
Joint Optimization of Lifetime and Transport Delay under
Reliability Constraint Wireless Sensor Networks
2016 Download Download
12
Location aware sensor routing protocol for mobile wireless
sensor networks
2016 Download Download
13
Maximizing Data Collection Throughput on a Path in Energy
Harvesting Sensor Networks Using a Mobile Sink
2016 Download Download
15 Privacy-Preserving Data Aggregation in Mobile Phone Sensing 2016 Download Download
16
RSSI-based Localization through Uncertain Data Mapping for
Wireless Sensor Networks
2016 Download Download
17
Towards Distributed Optimal Movement Strategy for Data
Gathering in Wireless Sensor Networks
2016 Download Download
Network Security
1
A Secure and Efficient ID-Based Aggregate Signature Scheme
for Wireless Sensor Networks
2016 Download Download
2
ActiveTrust: Secure and Trustable Routing in Wireless Sensor
Networks
2016 Download Download
3
Adaptive and Channel-Aware Detection of Selective
Forwarding Attacks in Wireless Sensor Networks
2016 Download Download
4
Dynamic Network Control for Confidential Multi-Hop
Communications
2016 Download Download
5
Embedding IP Unique Shortest Path Topology on a
Wavelength-Routed Network: Normal and Survivable Design
2016 Download Download
6
Energy and Memory Efficient Clone Detection in Wireless
Sensor Networks
2016 Download Download
7
Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based
Wireless Networks
2016 Download Download
8 LAAEM: A Method to Enhance LDoS Attack 2016 Download Download
9
Mimicry Attacks Against Wireless Link Signature and New
Defense Using Time-Synched Link Signature
2016 Download Download
10
PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor
Networks
2016 Download Download
11
PROVEST: Provenance-based Trust Model for Delay Tolerant
Networks
2016 Download Download
12
Reliable and Efficient Data Acquisition in Wireless Sensor
Networks in the Presence of Transfaulty Nodes
2016 Download Download
13
Secure Transmission Against Pilot Spoofing Attack: A Two-
Way Training-Based Scheme
2016 Download Download
14
Security Analysis and Improvements on Two Homomorphic
Authentication Schemes for Network Coding
2016 Download Download
15
Traffic Decorrelation Techniques for Countering a Global
Eavesdropper in WSNs
2016 Download Download
Sno .NET PROJECTS IEEE Abstract
Base
Paper
CLOUD COMPUTING
1
A Secure and Dynamic Multi-Keyword Ranked Search Scheme
over Encrypted Cloud Data
2016 Download Download
2
Catch You if You Misbehave: Ranked Keyword Search Results
Verification in Cloud Computing
2016 Download Download
3
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption
with Verifiable Delegation in Cloud Computing
2016 Download Download
4
Dynamic and Public Auditing with Fair Arbitration for Cloud
Data
2016 Download Download
5
Dynamic-Hash-Table Based Public Auditing for Secure Cloud
Storage
2016 Download Download
6
Enabling Cloud Storage Auditing With Verifiable Outsourcing
of Key Updates
2016 Download Download
7
Fine-Grained Two-Factor Access Control for Web-Based
Cloud Computing Services
2016 Download Download
8
Identity-Based Proxy-Oriented Data Uploading and Remote
Data Integrity Checking in Public Cloud
2016 Download Download
9
MMBcloud-tree: Authenticated Index for Verifiable Cloud
Service Selection
2016 Download Download
10
Trust-but-Verify: Verifying Result Correctness of Outsourced
Frequent Itemset Mining in Data-Mining-As-a-Service
Paradigm
2016 Download Download
DATA MINING
1
Personalized Travel Sequence Recommendation on Multi-
Source Big Social Media
2016 Download Download
2
Practical Approximate k Nearest Neighbor Queries with
Location and Query Privacy
2016 Download Download
3 Text Mining the Contributors to Rail Accidents 2016 Download Download
4
User-Service Rating Prediction by Exploring Social Users’
Rating Behaviors
2016 Download Download
SECURE COMPUTING
1
Detecting and Removing Web Application Vulnerabilities with
Static Analysis and Data Mining
2016 Download Download
2 ID2S Password-Authenticated Key Exchange Protocols 2016 Download Download
3
Privacy-Preserving Outsourced Association Rule Mining on
Vertically Partitioned Databases
2016 Download Download
MOBILE COMPUTING
1
A Joint Time Synchronization and Localization Design for
Mobile Underwater Sensor Networks
2016 Download Download
2
DaGCM: A Concurrent Data Uploading Framework for
Mobile Data Gathering in Wireless Sensor Networks
2016 Download Download
3
Service Usage Classification with Encrypted Internet Traffic in
Mobile Messaging Apps
2016 Download Download
4
Traffic Decorrelation Techniques for Countering a Global
2016 Download Download
Eavesdropper in WSNs
5
WORAL: A Witness Oriented Secure Location Provenance
Framework for Mobile Devices
2016 Download Download
NETWORKING
1
Efficient Certificateless Access Control for Wireless Body Area
Networks
2016 Download Download
2
Finding Nonequivalent Classifiers in Boolean Space to Reduce
TCAM Usage
2016 Download Download
3
Geographic and Opportunistic Routing for Underwater Sensor
Networks
2016 Download Download
4
Optimizing Cost for Online Social Networks on Geo-
Distributed Clouds
2016 Download Download
5
Secure and Efficient data communication protocol for Wireless
Body Area Networks
2016 Download Download
PARALLEL AND DISTRIBUTED SYSTEMS
1
Authenticated Key Exchange Protocols for Parallel Network
File Systems
2016 Download Download
2
Real-Time Semantic Search Using Approximate Methodology
for Large-Scale Storage Systems
2016 Download Download
Sno HADOOP BIGDATA IEEE Abstract
Base
Paper
Big Data Projects
1
A Big Data Clustering Algorithm for Mitigating the Risk of
Customer Churn
2016 Download Download
2
A Parallel Patient Treatment Time Prediction Algorithm and
Its Applications in Hospital Queuing-Recommendation in a Big
Data Environment
2016 Download Download
3
Adaptive Replication Management in HDFS based on
Supervised Learning
2016 Download Download
4
Clustering of Electricity Consumption Behavior Dynamics
toward Big Data Applications
2016 Download Download
5
Distributed In-Memory Processing of All k Nearest Neighbor
Queries
2016 Download Download
6
Dynamic Job Ordering and Slot Configurations for MapReduce
Workloads
2016 Download Download
7
Dynamic Resource Allocation for MapReduce with Partitioning
Skew
2016 Download Download
8
FiDoop-DP: Data Partitioning in Frequent Itemset Mining on
Hadoop Clusters
2016 Download Download
9
Novel Scheduling Algorithms for Efficient Deployment of
MapReduce Applications in Heterogeneous Computing
Environments
2016 Download Download
10
On Traffic-Aware Partition and Aggregation in MapReduce for
Big Data Applications
2016 Download Download
11
Optimization for Speculative Execution in Big Data Processing
Clusters
2016 Download Download
12
Service Rating Prediction by Exploring Social Mobile Users’
Geographical Locations
2016 Download Download
13
Wide Area Analytics for Geographically Distributed
Datacenters
2016 Download Download
Sno ANDROID PROJECTS IEEE Abstract
Base
Paper
Android Projects
1
A Shoulder Surfing Resistant Graphical Authentication
System
2016 Download Download
2
Authentication of Smartphone Users Using Behavioral
Biometrics
2016 Download Download
9
Context Awareness Location-based Android Application for
Tracking Purposes in Assisted Living
2016 Download Download
3
Context Awareness Location-based Android Application for
Tracking Purposes in Assisted Living
2016 Download Download
4
Design of Secure Location and Message Sharing System for
Android Platform
2016 Download Download
5
Designing a Secure Exam Management System (SEMS) for
M-Learning Environments
2016 Download Download
6
Developing Apps for Visually Impaired People: Lessons
Learned from Practice
2016 Download Download
7
Design and Analysis of an Efficient Friend-to-Friend
Content Dissemination System
2016 Download Download
8
FoodForCare: An Android Application for Self-Care with
Healthy Food
2016 Download Download
9
Intelligent Hands Free Speech based SMS System on
Android
2016 Download Download
10
Mobile Cloud Support for Semantic-enriched Speech
Recognition in Social Care
2016 Download Download
11
One-Round Privacy-Preserving Meeting Location
Determination for Smartphone Applications
2016 Download Download
12
Optimizing User Experience in Choosing Android
Applications
2016 Download Download
13
PassBYOP: Bring Your Own Picture for Securing
Graphical Passwords
2016 Download Download
14
Performance Analysis of Touch-Interaction Behavior for
Active Smartphone Authentication
2016 Download Download
15
Privacy-Preserving Location Sharing Services for Social
Networks
2016 Download Download
16
Personalized Travel Sequence Recommendation on Multi-
Source Big Social Media
2016 Download Download
17
Safeguard: User Reauthentication on Smartphones via
Behavioral Biometrics
2016 Download Download
IEEE 2016 Projects

More Related Content

Recently uploaded

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 

Recently uploaded (20)

Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

IEEE 2016 Projects

  • 1. Sno JAVA IEEE 2016 IEEE Abstract Base Paper CLOUD COMPUTING 1 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 Download Download 2 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2016 Download Download 3 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2016 Download Download 4 An Efficient Privacy-Preserving Ranked Keyword Search Method 2016 Download Download 5 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2016 Download Download 7 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2016 Download Download 8 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2016 Download Download 10 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi- User Environments 2016 Download Download 13 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2016 Download Download 14 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016 Download Download 15 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2016 Download Download 16 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 2016 Download Download 17 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2016 Download Download 19 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 2016 Download Download 20 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2016 Download Download 21 Protecting Your Right: Verifiable Attribute-Based Keyword 2016 Download Download
  • 2. Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud 23 SecRBAC: Secure data in the Clouds 2016 Download Download 24 Secure Data Sharing in Cloud Computing Using Revocable- Storage Identity-Based Encryption 2016 Download Download 25 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming 2016 Download Download 26 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage 2016 Download Download DATA MINING 1 A Novel Recommendation Model Regularized with User Trust and Item Ratings 2016 Download Download 2 Automatically Mining Facets for Queries from Their Search Results 2016 Download Download 3 Booster in High Dimensional Data Classification 2016 Download Download 4 Building an intrusion detection system using a filter-based feature selection algorithm 2016 Download Download 5 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information 2016 Download Download 6 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings 2016 Download Download 9 Efficient Algorithms for Mining Top-K High Utility Itemsets 2016 Download Download 11 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2016 Download Download 12 Nearest Keyword Set Search in Multi-Dimensional Datasets 2016 Download Download 13 Rating Prediction based on Social Sentiment from Textual Reviews 2016 Download Download NETWORKING 1 A Stable Approach for Routing Queries in Unstructured P2P Networks 2016 Download Download
  • 3. 2 iPath: Path Inference in Wireless Sensor Networks 2016 Download Download 3 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2016 Download Download 4 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2016 Download Download 4 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users 2016 Download Download MOBILE COMPUTING 1 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2016 Download Download 2 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 2016 Download Download 3 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach 2016 Download Download 4 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2016 Download Download IMAGE PROCESSING 1 A Locality Sensitive Low-Rank Model for Image Tag Completion 2016 Download Download 2 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks 2016 Download Download 3 Learning of Multimodal Representations with Random Walks on the Click Graph 2016 Download Download 4 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval 2016 Download Download 5 Tag Based Image Search by Social Re-ranking 2016 Download Download SECURE COMPUTING 1 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2016 Download Download 2 Data Lineage in Malicious Environments 2016 Download Download 3 Detecting Malicious Facebook Applications 2016 Download Download
  • 4. 4 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 2016 Download Download 5 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata 2016 Download Download 6 Resolving Multi-party Privacy Conflicts in Social Media 2016 Download Download 1 Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions 2016 Download Download 2 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data 2016 Download Download 3 Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms 2016 Download Download PARALLEL AND DISTRIBUTED SYSTEMS 1 A Hop-by-Hop Routing Mechanism for Green Internet 2016 Download Download 2 Continuous Answering Holistic Queries over Sensor Networks 2016 Download Download 3 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks 2016 Download Download 4 The Server Provisioning Problem for Continuous Distributed Interactive Applications 2016 Download Download SOFTWARE ENGINEERING 1 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation 2016 Download Download 2 Metamorphic Testing for Software Quality Assessment: A Study of Search Engines 2016 Download Download 3 SITAR: GUI Test Script Repair 2016 Download Download
  • 5. Sno NS2 & NS3 PROJECTS IEEE Abstract Base Paper Mobile Ad-hoc Network 1 A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks 2016 Download Download 2 Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks 2016 Download Download 3 Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes 2016 Download Download 4 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2016 Download Download 5 Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs 2016 Download Download VANET 1 A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks 2016 Download Download 2 ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks 2016 Download Download 3 Contact-Aware Data Replication in Roadside Unit Aided Vehicular Delay Tolerant Networks 2016 Download Download 4 DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance 2016 Download Download 5 Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks 2016 Download Download 6 Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs 2016 Download Download Wireless Sensor Network 1 A Hop-by-Hop Routing Mechanism for Green Internet 2016 Download Download 2 Achieving Optimal Traffic Engineering Using a Generalized Routing Framework 2016 Download Download 3 Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks 2016 Download Download
  • 6. 4 CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks 2016 Download Download 5 Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles 2016 Download Download 6 Code-Based Neighbor Discovery Protocols in Mobile Wireless Networks 2016 Download Download 7 Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks 2016 Download Download 8 Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks 2016 Download Download 9 Geographic and Opportunistic Routing for Underwater Sensor Networks 2016 Download Download 10 iPath: Path Inference in Wireless Sensor Networks 2016 Download Download 11 Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks 2016 Download Download 12 Location aware sensor routing protocol for mobile wireless sensor networks 2016 Download Download 13 Maximizing Data Collection Throughput on a Path in Energy Harvesting Sensor Networks Using a Mobile Sink 2016 Download Download 15 Privacy-Preserving Data Aggregation in Mobile Phone Sensing 2016 Download Download 16 RSSI-based Localization through Uncertain Data Mapping for Wireless Sensor Networks 2016 Download Download 17 Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks 2016 Download Download Network Security 1 A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks 2016 Download Download 2 ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks 2016 Download Download 3 Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks 2016 Download Download 4 Dynamic Network Control for Confidential Multi-Hop Communications 2016 Download Download
  • 7. 5 Embedding IP Unique Shortest Path Topology on a Wavelength-Routed Network: Normal and Survivable Design 2016 Download Download 6 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2016 Download Download 7 Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based Wireless Networks 2016 Download Download 8 LAAEM: A Method to Enhance LDoS Attack 2016 Download Download 9 Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature 2016 Download Download 10 PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks 2016 Download Download 11 PROVEST: Provenance-based Trust Model for Delay Tolerant Networks 2016 Download Download 12 Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes 2016 Download Download 13 Secure Transmission Against Pilot Spoofing Attack: A Two- Way Training-Based Scheme 2016 Download Download 14 Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding 2016 Download Download 15 Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs 2016 Download Download
  • 8. Sno .NET PROJECTS IEEE Abstract Base Paper CLOUD COMPUTING 1 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 Download Download 2 Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing 2016 Download Download 3 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2016 Download Download 4 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016 Download Download 5 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage 2016 Download Download 6 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2016 Download Download 7 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2016 Download Download 8 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2016 Download Download 9 MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection 2016 Download Download 10 Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm 2016 Download Download
  • 9. DATA MINING 1 Personalized Travel Sequence Recommendation on Multi- Source Big Social Media 2016 Download Download 2 Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy 2016 Download Download 3 Text Mining the Contributors to Rail Accidents 2016 Download Download 4 User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors 2016 Download Download SECURE COMPUTING 1 Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining 2016 Download Download 2 ID2S Password-Authenticated Key Exchange Protocols 2016 Download Download 3 Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases 2016 Download Download MOBILE COMPUTING 1 A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks 2016 Download Download 2 DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks 2016 Download Download 3 Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps 2016 Download Download 4 Traffic Decorrelation Techniques for Countering a Global 2016 Download Download
  • 10. Eavesdropper in WSNs 5 WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices 2016 Download Download NETWORKING 1 Efficient Certificateless Access Control for Wireless Body Area Networks 2016 Download Download 2 Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage 2016 Download Download 3 Geographic and Opportunistic Routing for Underwater Sensor Networks 2016 Download Download 4 Optimizing Cost for Online Social Networks on Geo- Distributed Clouds 2016 Download Download 5 Secure and Efficient data communication protocol for Wireless Body Area Networks 2016 Download Download PARALLEL AND DISTRIBUTED SYSTEMS 1 Authenticated Key Exchange Protocols for Parallel Network File Systems 2016 Download Download 2 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems 2016 Download Download
  • 11. Sno HADOOP BIGDATA IEEE Abstract Base Paper Big Data Projects 1 A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn 2016 Download Download 2 A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data Environment 2016 Download Download 3 Adaptive Replication Management in HDFS based on Supervised Learning 2016 Download Download 4 Clustering of Electricity Consumption Behavior Dynamics toward Big Data Applications 2016 Download Download 5 Distributed In-Memory Processing of All k Nearest Neighbor Queries 2016 Download Download 6 Dynamic Job Ordering and Slot Configurations for MapReduce Workloads 2016 Download Download 7 Dynamic Resource Allocation for MapReduce with Partitioning Skew 2016 Download Download 8 FiDoop-DP: Data Partitioning in Frequent Itemset Mining on Hadoop Clusters 2016 Download Download 9 Novel Scheduling Algorithms for Efficient Deployment of MapReduce Applications in Heterogeneous Computing Environments 2016 Download Download 10 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications 2016 Download Download
  • 12. 11 Optimization for Speculative Execution in Big Data Processing Clusters 2016 Download Download 12 Service Rating Prediction by Exploring Social Mobile Users’ Geographical Locations 2016 Download Download 13 Wide Area Analytics for Geographically Distributed Datacenters 2016 Download Download Sno ANDROID PROJECTS IEEE Abstract Base Paper Android Projects 1 A Shoulder Surfing Resistant Graphical Authentication System 2016 Download Download 2 Authentication of Smartphone Users Using Behavioral Biometrics 2016 Download Download 9 Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living 2016 Download Download 3 Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living 2016 Download Download 4 Design of Secure Location and Message Sharing System for Android Platform 2016 Download Download 5 Designing a Secure Exam Management System (SEMS) for M-Learning Environments 2016 Download Download 6 Developing Apps for Visually Impaired People: Lessons Learned from Practice 2016 Download Download
  • 13. 7 Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System 2016 Download Download 8 FoodForCare: An Android Application for Self-Care with Healthy Food 2016 Download Download 9 Intelligent Hands Free Speech based SMS System on Android 2016 Download Download 10 Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care 2016 Download Download 11 One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications 2016 Download Download 12 Optimizing User Experience in Choosing Android Applications 2016 Download Download 13 PassBYOP: Bring Your Own Picture for Securing Graphical Passwords 2016 Download Download 14 Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication 2016 Download Download 15 Privacy-Preserving Location Sharing Services for Social Networks 2016 Download Download 16 Personalized Travel Sequence Recommendation on Multi- Source Big Social Media 2016 Download Download 17 Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics 2016 Download Download