IEEE Projects – What are they?
The first and foremost question that comes to a student’s mind when they come across the term IEEE Project is…what is are IEEE projects ? This page will answer this question and also try and address other concerns that students generally have with regard to the whole IEEE project process.
Actually the term IEEE projects in itself is just a easier way to say – IEEE paper based projects! So IEEE projects are actually projects which are based on IEEE papers. Naturally when people say IEEE 2014 project , what is meant is that the project is based on an IEEE paper published in the year 2014…as simple as that. Though this looks fairly simple and straight forward, lots of students that come to us are not very clear about this. Some students further more believe that IEEE projects are projects that are provided by IEEE or funded by IEEE etc…this however is wrong in the general context that that term is used these days.
Selecting IEEE Projects
So once that we are clear on what ieee projects are, the next question is how does one go about selecting one such project. But before a student can go about selecting an ieee project, the student needs to identify the project domain(s) that the student is interested in for the final year project. Once the student has decided on a project domain or some technology then the students can visit IEEE Xplore, which is the online digital library run by IEEE, which contains all the IEEE papers that are published. The students can perform search based on the area of interest, the technologies they are interested in and use different combination of keywords to look for papers they are interested in.
IEEE Base Papers
Once the student has selected a paper that they find interesting then they can use that as the base paper for their project. This is another very popularly used term “IEEE base paper” – again this only means that the project is based on a certain IEEE paper. Hence when one says IEEE 2014 project or IEEE 2014 base paper than means that the respective IEEE paper was or should have been published in the year 2014. The same rule applies for IEEE reference papers as well.
So these are some of the most common doubts that students who are starting out on new project have, and we hope that this page answers the same. Still have questions related to IEEE projects and any thing related to them? Leave your question in the comments section below and we will answer your question as soon as we can.
The first and foremost question that comes to a student’s mind when they come across the term IEEE Project is…what is are IEEE projects ? This page will answer this question and also try and address other concerns that students generally have with regard to the whole IEEE project process.
Actually the term IEEE projects in itself is just a easier way to say – IEEE paper based projects! So IEEE projects are actually projects which are based on IEEE papers. Naturally when people say IEEE 2014 project , what is meant is that the project is based on an IEEE paper published in the year 2014…as simple as that. Though this looks fairly simple and straight forward, lots of students that come to us are not very clear about this. Some students further more believe that IEEE projects are projects that are provided by IEEE or funded by IEEE etc…this however is wrong in the general context that that term is used these days.
Selecting IEEE Projects
So once that we are clear on what ieee projects are, the next question is how does one go about selecting one such project. But before a student can go about selecting an ieee project, the student needs to identify the project domain(s) that the student is interested in for the final year project. Once the student has decided on a project domain or some technology then the students can visit IEEE Xplore, which is the online digital library run by IEEE, which contains all the IEEE papers that are published. The students can perform search based on the area of interest, the technologies they are interested in and use different combination of keywords to look for papers they are interested in.
IEEE Base Papers
Once the student has selected a paper that they find interesting then they can use that as the base paper for their project. This is another very popularly used term “IEEE base paper” – again this only means that the project is based on a certain IEEE paper. Hence when one says IEEE 2014 project or IEEE 2014 base paper than means that the respective IEEE paper was or should have been published in the year 2014. The same rule applies for IEEE reference papers as well.
So these are some of the most common doubts that students who are starting out on new project have, and we hope that this page answers the same. Still have questions related to IEEE projects and any thing related to them? Leave your question in the comments section below and we will answer your question as soon as we can.
IEEE JAVA PROJECTS TITLES YEAR--2014
1. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability Secure Computing
2. Fast Nearest Neighbor Search with Keywords Data Mining
3. Personalized web search using Browsing history and domain Knowledge Data Mining
4. Secure Outsourced Attribute-Based Signatures Parallel and Distributed Systems
5. Secure-Mining-of-Association-Rules-in-Horizontally-Distributed-Databases Data Mining
6. Supporting Privacy Protection in Personalized Web Search Data Mining
7. XSPath Navigation on XML Schemas Made Easy Data Mining
8. A Hybrid Cloud Approach for Secure Authorized Deduplication Parallel and Distributed Systems
9. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks Parallel and Distributed Systems
10. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks MOBILE COMPUTING
11. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud Parallel and Distributed Systems
12. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Parallel and Distributed Systems
13. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding Parallel and Distributed Systems
14. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Data Mining
15. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Parallel and Distributed Systems
16. Bandwidth Distributed Denial of Service: Attacks and Defenses Flooding Attacks
17. Behavioral Malware Detection in Delay Tolerant Networks Parallel and Distributed Systems
18. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing
19. Cooperative Spectrum Sharing: A Contract-Based Approach Mobile Computing
20. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Parallel and Distributed Systems
21. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Parallel and Distributed Systems
22. Facilitating Document Annotation Using Content and Querying Value Data Mining
23. Interpreting the Public Sentiment Variations on Twitter Data Mining
24. Keyword Query Routing Data Mining
25. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities Secure Computing
26. Modeling of Distributed File Systems for Practical Performance Analysis Parallel and Distributed Systems
27. Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks Parallel and Distributed Systems
28. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Networking
29. Preserving Location Privacy in Geo-Social Applications Mobile Computing
30. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing
31. Product Aspect Ranking and Its Applications Data Mining
32. Two Provably Secure Password Hashing Algorithms Networking
33. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking
34. Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups Data Mining
35. Hiding in the Mobile Crowd Location Privacy through Collaboration Networking
36. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Parallel and Distributed Systems
37. Automatic Test Packet Generation Networking
38. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Parallel and Distributed Systems
39. A Cocktail Approach for Travel Package Recommendation Data Mining
40. Efficient Prediction of Difficult Keyword Queries over Databases Data Mining
41. Multicast Capacity in MANET with Infrastructure Support Parallel and Distributed Systems
42. PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks
43. Efficient Authentication for Mobile and Pervasive Computing Mobile Computing
44. Friendbook: A Semantic-based Friend Recommendation System for Social Networks Mobile Computing
45. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Android
46. Towards Differential Query Services in Cost-Efficient Clouds Parallel and Distributed Systems
47. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Parallel and Distributed Systems
48. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Networking
49. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing Cloud Computing
50. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Parallel and Distributed Systems
51. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attacker’s Impact Information Forensics and Security
52. The Design and Evaluation of An Information Sharing System for Human Networks Parallel and Distributed Systems
53. Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks Parallel and Distributed Systems
54. Distributed, concurrent, and independent access to encrypted cloud databases Parallel and Distributed Systems
55. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Security
56. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Data Mining
57. Boundary Cutting for Packet Classification Networking
58. Leveraging Social Networks for P2P Content based File Sharing in Disconnected MANETs Networking
59. Data Mining with Big Data Data Mining
60. secure information sharing using ABE
1. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability Secure Computing
2. Fast Nearest Neighbor Search with Keywords Data Mining
3. Personalized web search using Browsing history and domain Knowledge Data Mining
4. Secure Outsourced Attribute-Based Signatures Parallel and Distributed Systems
5. Secure-Mining-of-Association-Rules-in-Horizontally-Distributed-Databases Data Mining
6. Supporting Privacy Protection in Personalized Web Search Data Mining
7. XSPath Navigation on XML Schemas Made Easy Data Mining
8. A Hybrid Cloud Approach for Secure Authorized Deduplication Parallel and Distributed Systems
9. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks Parallel and Distributed Systems
10. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks MOBILE COMPUTING
11. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud Parallel and Distributed Systems
12. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Parallel and Distributed Systems
13. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding Parallel and Distributed Systems
14. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Data Mining
15. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Parallel and Distributed Systems
16. Bandwidth Distributed Denial of Service: Attacks and Defenses Flooding Attacks
17. Behavioral Malware Detection in Delay Tolerant Networks Parallel and Distributed Systems
18. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing
19. Cooperative Spectrum Sharing: A Contract-Based Approach Mobile Computing
20. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Parallel and Distributed Systems
21. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Parallel and Distributed Systems
22. Facilitating Document Annotation Using Content and Querying Value Data Mining
23. Interpreting the Public Sentiment Variations on Twitter Data Mining
24. Keyword Query Routing Data Mining
25. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities Secure Computing
26. Modeling of Distributed File Systems for Practical Performance Analysis Parallel and Distributed Systems
27. Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks Parallel and Distributed Systems
28. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Networking
29. Preserving Location Privacy in Geo-Social Applications Mobile Computing
30. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing
31. Product Aspect Ranking and Its Applications Data Mining
32. Two Provably Secure Password Hashing Algorithms Networking
33. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking
34. Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups Data Mining
35. Hiding in the Mobile Crowd Location Privacy through Collaboration Networking
36. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Parallel and Distributed Systems
37. Automatic Test Packet Generation Networking
38. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Parallel and Distributed Systems
39. A Cocktail Approach for Travel Package Recommendation Data Mining
40. Efficient Prediction of Difficult Keyword Queries over Databases Data Mining
41. Multicast Capacity in MANET with Infrastructure Support Parallel and Distributed Systems
42. PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks
43. Efficient Authentication for Mobile and Pervasive Computing Mobile Computing
44. Friendbook: A Semantic-based Friend Recommendation System for Social Networks Mobile Computing
45. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Android
46. Towards Differential Query Services in Cost-Efficient Clouds Parallel and Distributed Systems
47. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Parallel and Distributed Systems
48. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Networking
49. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing Cloud Computing
50. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Parallel and Distributed Systems
51. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attacker’s Impact Information Forensics and Security
52. The Design and Evaluation of An Information Sharing System for Human Networks Parallel and Distributed Systems
53. Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks Parallel and Distributed Systems
54. Distributed, concurrent, and independent access to encrypted cloud databases Parallel and Distributed Systems
55. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Security
56. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Data Mining
57. Boundary Cutting for Packet Classification Networking
58. Leveraging Social Networks for P2P Content based File Sharing in Disconnected MANETs Networking
59. Data Mining with Big Data Data Mining
60. secure information sharing using ABE
- Distributed Explicit Rate Schemes in Multi-Input–Multi Output Network Systems(2010) /Java
- A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems(2011) /Java
- Cut Detection in Wireless Sensor Networks(2012) /Java
- Efficient Similarity Search over Encrypted Data(2012) /Java
- Efficient Public Key Certificate Management for Mobile Ad Hoc Networks(2011) /Java
- MeasuRouting: A Framework for Routing Assisted Traffic Monitoring(2012) /Java
- BGP Churn Evolution: A Perspective from the Core(2012) /Java
- A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree(2011) /Java
- Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters(2012) /Java
- A Study on Certificate Revocation in Mobile Ad Hoc Networks(2011) /Java
- Continuous Neighbor Discovery in Asynchronous Sensor Networks(2011) /Java
- Advanced Routing Technology for Fast Internet Protocol Network Recovery(2011) /Java
- Effective Pattern Discovery for Text Mining(2012) /Java
- Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage(2012) /Java
- Data Leakage Detection(2011) /Java
- A Level Set Method for Image Segmentation in the Presence of Intensity in homogeneities with Application to MRI(2011) /Java
- A Dual Framework and Algorithms for Targeted Online Data Delivery(2011) /Java
- Embedded Extended Visual Cryptography Schemes(2011) /Java
- Multicast Multi-path Power Efficient Routing in Mobile AdHoc networks(2010) /Java
- Outsourced Similarity Search on Metric Data Assets(2012) /Java
- GLIP: A Concurrency Control Protocol for Clipping Indexing(2009) /Java
- Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks(2012) /Java
- Packet-Hiding Methods for Preventing Selective Jamming Attacks(2012) /Java
- Monitoring Online Tests through Data Visualization(2009) /Java
- Particle Swarm Optimization: Technique, System and Challenges(2011) /Java
- Insights on Media Streaming Progress Using BitTorrent-Like Protocols for On-Demand Streaming(2012) /Java
- BinRank: Scaling Dynamic Authority-Based Search Using Materialized Subgraphs(2010) /Java
- Optimized Resource Allocation for Software Release Planning(2009) /Java
- Message Authentication in Computationally Constrained Environments(2009) /Java
- Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries(2008) /Java
- Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis(2009) /Java
- Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks(2010) /Java
- Load-Balancing Multipath Switching System With Flow Slice(2012) /Java
- Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs(2012) /Java
- Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use Recommendations(2009) /Java
- Conditional Shortest Path Routing in Delay Tolerant Networks(2010) /Java
- Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks(2011) /Java
- Distributed Packet Buffers for High-Bandwidth Switches and Routers(2012) /Java
- Providing Rate Guarantees for Internet Application Traffic across ATM Networks(2009) /Java
- Decision Trees for Uncertain Data(2011) /Java
- KTR: an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services(2010) /Java
- A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks(2011) /Java
- A Cross Layer Architecture for Multicast and Unicast Video Transmission in Mobile Broadband Networks(2011) /Java
- Ensuring Distributed Accountability For Data Sharing In The Cloud(2012) /Java
- Detecting Spam Zombies by Monitoring Outgoing Messages(2012) /Java
- A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts(2011) /Java
- Achieving Network Level Privacy in Wireless Sensor Networks(2010) /Java
- ProgME: Towards Programmable Network MEasurement(2011) /Java
- Mobility Management Approaches for Mobile IP Networks(2009) /Java
- Game-Theoretic Pricing for Video Streaming in Mobile Networks(2012) /Java
- The CoQUOS Approach to Continuous Queries in Unstructured Overlays(2011) /Java
- Trust Modeling in Social Tagging of Multimedia(2012) /Java
- Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing(2011) /Java
- Carving and Replaying Differential Unit Test Cases from System Test Cases(2009) /Java
- Adding Temporal Constraints to XML Schema(2012) /Java
- Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks(2012) /Java
- Learn to Personalized Image Search from the Photo Sharing Websites(2012) /Java
- DoubleGuard: Detecting Intrusions in Multitier Web Applications(2012) /Java
- SAT-Solving Approaches to Context-Aware Enterprise Network Security Management(2009) /Java
- Detecting Malicious Packet Losses(2009) /Java
- A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks(2010) /Java
- Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network(2012) /Java
- Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation(2011) /Java
- Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service(2011) /Java
- Portable Cloud Services Using TOSCA(2012) /Java
- Efficient Fuzzy Type-Ahead Search in XML Data(2012) /Java
- Bandwidth Estimation for IEEE 802-11-Based Ad Hoc Networks(2008) /Java
- A Novel Parallel Scan for Multicore Processors and Its Application in Sparse Matrix-Vector Multiplication(2012) /Java
- Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing(2009) /Java
- Distributed Explicit Rate Schemes in Multi-Input– Multi-Output Network Systems(2010) /Java
- A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns(2008) /Java
- Optimal Source-Based Filtering of Malicious Traffic(2012) /Java
- Probabilistic Exposure Fusion(2012) /Java
- Knowledge-Based Interactive Postmining of Association Rules Using Ontologies(2010) /Java
- Packet Loss Control Using Tokens at the Network Edge(2012) /Java
- Nymble: Blocking Misbehaving Users in Anonymizing Networks(2011) /Java
- An Efficient Self-Organized Authentication and Key Management Scheme for Distributed Multihop Relay- Based IEEE 802.16 Networks(2011) /Java
- Temporal Data Clustering Via Weighted Clustering Ensemble with Different Representations(2011) /Java
- Bandwidth Recycling in IEEE 802.16 Networks(2010) /Java
- Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks(2011) /Java
- Energy-Efficient Cooperative Videodistribution With Statistical Qosprovisions Over Wireless Networks(2012) /Java
- Monitoring the Application-Layer DDoS Attacks for Popular Websites(2009) /Java
- Buffer Sizing for 802.11 Based Networks(2011) /Java
- On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks(2012) /Java
- Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems(2010) /Java
- Optimizing Cloud Resources for Delivering IPTV Services through Virtualization(2012) /Java
- An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System(2012) /Java
- Cloud Data Protection for the Masses(2012) /Java
- Always Acyclic Distributed Path Computation(2010) /Java
- Effective Navigation of Query Results Based on Concept Hierarchies(2011) /Java
- Handwritten Chinese Text Recognition by Integrating Multiple Contexts(2012) /Java
- Confucius: A Tool Supporting Collaborative Scientific Workflow Composition(2012) /Java
- Secure and Practical Outsourcing of Linear Programming in Cloud Computing(2011) /Java
- Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports(2011) /Java
- Slicing: A New Approach to Privacy Preserving Data Publishing(2012) /Java
- Slicing: A New Approach to Privacy Preserving Data Publishing /Java
- Online Modeling of Proactive Moderation System for Auction Fraud Detection(2012) /Java
- Toward Secure and Dependable Storage Services in Cloud Computing(2012) /Java
- SaaAS - The Mobile Agent based Service for Cloud Computing in Internet Environment(2010) /Java
- Autonomy-Oriented Self-Equilibrium Routing Model in Traffic Networks(2010) /Java
- Layered Approach Using Conditional Random Fields for Intrusion Detection(2010) /Java
- Clustering with Multiviewpoint-Based Similarity Measure(2012) /Java
- Bootstrapping Ontologies for Web Services(2012) /Java
- SigFree: A Signature-free Buffer Overflow Attack Blocker(2010) /Java
- A Permutation Based Algorithm to Optimally Reschedule Trains in a Railway Traffic Network(2011) /Java
- An Efficient Paging Scheme for Terminal Mobility Using Personal Mobility Management Information in Interworked Fixed and Mobile Networks(2011) /Java
- Wardrop Routing in Wireless Networks(2009) /Java
- Random Access Transport Capacity(2010) /Java
- Privacy- and Integrity-Preserving Range Queries in Sensor Networks(2012) /Java
- Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences(2012) /Java
- Host-to-Host Congestion Control for TCP(2010) /Java
- On Modeling, Analysis, and Optimization of Packet Aggregation Systems(2010) /Java
- Modeling and Detection of Camouflaging Worm(2011) /Java
- Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks5(2011) /Java
- Extended XML Tree Pattern Matching Theories and Algorithms(2011) /Java
- A Trigger Identification Service for Defending Reactive Jammers in Wireless Sensor Network(2012) /Java
- Ensuring Data Storage Security in Cloud Computing(2010) /Java
- Cloud Computing Security From Single to Multi-Clouds(2012) /Java
- Organizing User Search Histories(2012) /Java
- Clustering with Multi-Viewpoint based Similarity Measure(2011) /Java
- Risk-Aware Mitigation for MANET Routing Attacks(2012) /Java
- Fast Data Collection in Tree-Based Wireless Sensor Networks(2012) /Java
- Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments(2009) /Java
- Implementation of LSB Steganography and its Evaluation for Various File Formats(2010) /Java
- Firecol: A Collaborative Protection Network For The Detection Of Flooding Ddos Attacks(2012) /Java
- Fast Rendering Algorithm of Underwater Optical Effect(2009) /Java
- Mining Association Rules with Item Constraints(2010) /Java
- SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks(2011) /Java
- Security Analysis of the SASI Protocol(2009) /Java
- Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks(2010) /Java
- XLP: A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks(2010) /Java
- Optimal Bandwidth Assignment for Multiple-Description-Coded Video(2011) /Java
- Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes(2010) /Java
- Discovering Conditional Functional Dependencies(2011) /Java
- Footprint: Detecting Sybil Attacks in Urban Vehicular Networks(2012) /Java
- Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding(2011) /Java
- Independent Directed Acyclic Graphs for Resilient Multipath Routing(2012) /Java
- POPI: A User-level Tool for Inferring Router Packet Forwarding(2010) /Java
- Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation(2010) /Java
- Cloud Computing for Agent-Based Urban Transportation Systems(2011) /Java
- Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword Searching(2012) /Java
- Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks(2010) /Java
- Collaborative Sensing to Improve Information Quality for Target Tracking in Wireless Sensor Networks(2010) /Java
- A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding(2012) /Java
- A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network(2012) /Java
- IRM: Integrated File Replication and Consistency Maintenance in p2p Systems(2010) /Java
- Measuring the Sky: On Computing Data Cubes via Skylining the Measures(2012) /Java
- Detecting and Resolving Firewall Policy Anomalies(2012) /Java
- Multiple Routing Configurations for Fast IP Network Recovery(2009) /Java
- A New Method for Generating All Positive and Negative Association Rules(2011) /Java
- Ranking Model Adaptation For Domain-Specific Search(2012) /Java
- A Competitive Study of Cryptography Techniques over Block Cipher(2011) /Java
- Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks(2012) /Java
- Analysis on Credit Card Fraud Detection Methods(2011) /Java
- Efficient and Dynamic Routing Topology Inference From End-to-End Measurements(2009) /Java
- Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast(2010) /Java
- Latency Equalization as a New Network Service Primitive(2012) /Java
- Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption(2012) /Java
- Multiparty Access Control for Online Social Networks: Model and Mechanisms(2012) /Java
- CCD: A Distributed Publish/Subscribe Framework for Rich Content Formats(2012) /Java
- Grid Scheduling based on Collaborative Random Early Detection Strategies(2010) /Java
- An Efficient Density Based Improved K- Medoids Clustering Algorithm(2011) /Java
- Dynamic Routing with Security Considerations(2009) /Java
- Multipath Dissemination in Regular Mesh Topologies(2009) /Java
- Efficient Error Estimating Coding:Feasibility and Applications(2012) /Java
- BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks(2012) /Java
- Closeness: A New Privacy Measure for Data Publishing(2010) /Java
- Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach(2010) /Java
- Intrusion detection: An Energy efficient approach in Heterogeneous WSN(2011) /Java
- Adaptive Opportunistic Routing for Wireless Ad Hoc Networks(2012) /Java
- Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks(2012) /Java
- Protecting Location Privacy in Sensor Networks against a Global Eavesdropper(2012) /Java
- HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing(2012) /Java
- P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains(2010) /Java
- Catching Packet Droppers and Modifiers in Wireless Sensor Networks(2012) /Java
- Live Streaming with Receiver-based Peer-division Multiplexing(2011) /Java
- A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming(2012) /Java
- Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ(2010) /Java
- Efficient Broadcasting in Mobile Ad Hoc Networks(2009) /Java
- Ranking Spatial Data by Quality Preferences(2011) /Java
- Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud(2012) /Java
- RIHT: A Novel Hybrid IP Traceback Scheme(2012) /Java
- Efficient Privacy-Preserving Range Queries Over Encrypted Data In Cloud Computing Java / Cloud Computing
- Privacy-Preserving Updates To Anonymous And Confidential Databases. Java / Cloud Computing
- A Price- And-Time-Slot-Negotiation Mechanism For Cloud Service Reservations Java / Cloud Computing
- DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Java / Cloud Computing
- Fog Computing: Mitigating Insider Data Theft Attacks In The Cloud Java / Cloud Computing
- Reliable Re-Encryption In Unreliable Clouds Java / Cloud Computing
- Reversible Data Hiding With Optimal Value Transfer Java / Cloud Computing
- Dynamic Bandwidth Allocation In Cloud Computing Java / Cloud Computing
- THEMIS: A Mutually Verifiable Billing System For The Cloud Computing Environment Java / Cloud Computing
- Winds Of Change: From Vendor Lock-In To The Meta Cloud Java / Cloud Computing
- A New Technique Of Data Integrity For Analysis Of The Cloud Computing Security Java / Cloud Computing
- Outsourcing Privacy-Preserving Social Networks To A Cloud Java / Cloud Computing
- A Log-Based Approach To Make Digital Forensics Easier On Cloud Computing Java / Cloud Computing
- A Load Balancing Model Based On Cloud Partitioning For The Public Cloud Java / Cloud Computing
- A Novel Method To Secure Cloud Computing Through Multicast Key Management Java / Cloud Computing
- Collaboration In Multicloud Computing Environments: Framework And Security Issues Java / Cloud Computing
- Cooperative Cloud Computing In Research And Academic Environment Using Virtual Cloud Java / Cloud Computing
- An IBE-Based Security Scheme On Internet Of Things Java / Cloud Computing
- Privacy Preserving Cloud Data Access With Multi-Authorities Java / Cloud Computing
- Oruta: Privacy-Preserving Public Auditing For Shared Data In The Cloud Java / Cloud Computing
- MORPHOSYS: Efficient Colocation Of QoS-Constrained Workloads In The Cloud Java / Cloud Computing
- IDSaaS: Intrusion Detection System As A Service In Public Clouds Java / Cloud Computing
- Distributed Accountability For Data Sharing In Cloud Java / Cloud Computing
- Cooperative Provable Data Possession For Integrity Verification In Multi-Cloud Storage Java / Cloud Computing
- Cloud Data Protection For The Masses Java / Cloud Computing
- Time Based Re-Encryption In Unreliable Clouds Java / Cloud Computing
- Fair-Share For Fair Bandwidth Location In Cloud Computing Java / Cloud Computing
- Cloud Computing Security From Single To Multi Clouds Java / Cloud Computing
- Investigation And Analysis Of New Approach Of Intelligent Semantic Web Search Engines Java / Cloud Computing
- Ranking Model Adaptation For Domain Specific Search Java / Cloud Computing
- Gossip-Based Resource Management For Cloud Environments Java / Cloud Computing
- Cooperative Provable Data Possession For Integrity Verification In Multi-Cloud Storage Java / Cloud Computing
- Ensuring Distributed Accountability For Data Sharing In The Cloud Java / Cloud Computing
- Costing Of Cloud Computing Services A Total Cost Of Ownership Approach Java / Cloud Computing
- Cloud Data Production For Masses Java / Cloud Computing
- Cloud Computing Security: From Single To Multi Clouds Java / Cloud Computing
- DAC MACS: Effective Data Access Control For Multi Authority Cloud Storage Systems Java / Cloud Computing
- Client-Side Load Balancer Using Cloud Java / Cloud Computing
- Efficient Compression Of Encrypted Grayscale Images Java / Cloud Computing
- Comparable Entity Mining From Comparative Questions Java / Data Mining
- Resilient Identity Crime Detection Java / Data Mining
- A Bayesian Approach To Filtering Junk E-Mail Java / Data Mining
- Statistical Entity Extraction From Web Java / Data Mining
- Efficient Similarity Search Over Encrypted Data Java / Data Mining
- Multiparty Access Control For Online Social Networks Model And Mechanisms Java / Data Mining
- Organizing User Search Histories Java / Data Mining
- An Exploration Of Improving Collaborative Recommender Systems Via User-Item Subgroups Java / Data Mining
- Implementation Of Web Usage Mining Using APRIORI And FP Growth Algorithms Java / Data Mining
- Adapting A Ranking Model For Domain-Specific Search Java / Data Mining
- M-Privacy For Collaborative Data Publishing Java / Data Mining
- Facilitating Effective User Navigation Through Website Structure Improvement Java / Data Mining
- Preventing Private Information Inference Attacks On Social Networks Java / Data Mining
- Privacy Against Aggregate Knowledge Attacks Java / Data Mining
- Privacy-Preserving Mining Of Association Rules From Outsourced Transaction Databases Java / Data Mining
- FoCUS: Learning To Crawl Web Forums Java / Data Mining
- Sensitive Label Privacy Protection On Social Network Data Java / Data Mining
- User Action Interpretation For Online Content Optimization Java / Data Mining
- Efficient Algorithms For Mining High Utility Itemsets From Transactional Databases Java / Data Mining
- Dynamic Personalized Recommendation On Sparse Data Java / Data Mining
- SybilDefender: Defend Against Sybil Attacks In Large Social Networks Java / Data Mining
- Anomaly Detection Via Online Oversampling Principal Component Analysis Java / Data Mining
- A Probabilistic Approach To String Transformation Java / Data Mining
- A Fast Clustering-Based Feature Subset Selection Algorithm For High Dimensional Data Java / Data Mining
- Efficient Map/Reduce-Based DBSCAN Algorithm With Optimized Data Partition Java / Data Mining
- Creating Evolving User Behavior Profiles Automatically Java / Data Mining
- Efficient Extended Boolean Retrieval Java / Data Mining
- A Novel Algorithm For Automatic Document Clustering Java / Data Mining
- Clustering Methods In Data Mining With Its Applications In High Education Java / Data Mining
- Combining Tag And Value Similarity For Data Extraction And Alignment Java / Data Mining
- How Do Facebookers Use Friendlists Java / Data Mining
- Sequential Anomaly Detection In The Presence Of Noise And Limited Feedback Java / Data Mining
- Investigation And Analysis Of New Approach Of Intelligent Semantic Web Search Engines Java / Data Mining
- Fast And Accurate Annotation Of Short Texts With Wikipedia Pages Java / Data Mining
- Efficient Anonymous Message Submission Java / Data Mining
- On The Spectral Characterization And Scalable Mining Of Network Communities Java / Data Mining
- A Framework For Personal Mobile Commerce Pattern Mining And Prediction Java / Data Mining
- Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries Java / Data Mining
- Automatic Discovery Of Association Orders Between Name And Aliases From The Web Using Anchor Texts-Based Co-Occurrences Java / Data Mining
- Advance Mining Of Temporal High Utility Itemset Java / Data Mining
- Efficient Extended Boolean Retrieval Java / Data Mining
- Slicing A New Approach To Privacy Preserving Data Publishing. Java / Data Mining
- Enabling Multilevel Trust In Privacy Preserving Data Mining Java / Data Mining
- Web Mining Framework For Security In E-Commerce Java / Data Mining
- Efficient Multi-Dimensional Fuzzy Search For Personal Information Management Systems Java / Data Mining
- An Improved Frequent Pattern Tree Based Association Rule Mining Technique. Java / Data Mining
- A Threshold-Based Similarity Measure For Duplicate Detection Java / Data Mining
- Data Leakage Detection Java / Data Mining
- Automatic Text Summarization Java / Data Mining
- AMPLE An Adaptive Traffic Engineering System Based On Virtual Routing Topologies. Java / Wireless Communication
- PerLa: A Language And Middleware Architecture For Data Management And Integration In Pervasive Infor Java / Wireless Communication
- Cut Detection In Wireless Sensor Networks. Java / Wireless Communication
- An Adaptive Opportunistic Routing Scheme For Wireless Ad-Hoc Networks. Java / Wireless Communication
- A Scalable Server Architecture For Mobile Presence Services In Social Network Applications Java / Mobile Computing
- A Framework For Partitioning And Execution Of Data Stream Applications In Mobile Cloud Computing Java / Mobile Computing
- Efficient And Secure Data Storage Operations For Mobile Cloud Computing Java / Mobile Computing
- Text Editor Java / Mobile Computing
- Credit Card Fraud Detection Using Hidden Markov Model Java / Mobile Computing
- Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper. Java / Mobile Computing
- Network Assisted Mobile Computing With Optimal Uplink Query Processing. Java / Mobile Computing
- Cooperative Download In Vehicular Environments. Java / Mobile Computing
- Local Broadcast Algorithms In Wireless Ad Hoc Networks: Reducing The Number Of Transmissions. Java / Mobile Computing
- Hop-By-Hop Routing In Wireless Mesh Networks With Bandwidth Guarantees. Java / Mobile Computing
- Movie Rating And Review Summarization In Mobile Environment Java / Mobile Computing
- Fast Data Collection In Tree-Based Wireless Sensor Networks. Java / Mobile Computing
- Detecting Spam Zombies By Monitoring Outgoing Messages Java / Secure Computing
- Detecting Imprudence Of ‘Reliable’ Sellers In Online Auction Sites Java / Secure Computing
- Automated Detection System For SQL Injection Attack Java / Secure Computing
- An Iterative Hierarchical Key Exchange Scheme For Secure Scheduling Of Big Data Applications In Cloud Computing Java / Secure Computing
- Security Tactics For Secured Cloud Computing Resources Java / Secure Computing
- Secure Web Referral Services For Mobile Cloud Computing Java / Secure Computing
- SORT: A Self-ORganizing Trust Model For Peer-To-Peer Systems Java / Secure Computing
- Securing Online Reputation Systems Through Dempster-Shafer Theory Based Trust Model Java / Secure Computing
- Extracting Spread-Spectrum Hidden Data From Digital Media Java / Secure Computing
- Seed Block Algorithm: A Remote Smart Data Back-Up Technique For Cloud Computing Java / Secure Computing
- Auditing For Network Coding Storage Java / Secure Computing
- Detecting Anomalous Insiders In Collaborative Information Systems Java / Secure Computing
- Enhanced Privacy Preserving Updates For Anonymous And Confidential Databases Java / Secure Computing
- Runtime Defense Against Code Injection Attacks Using Replicated Execution Java / Secure Computing
- Anomaly Detection For Discrete Sequences: Java / Secure Computing
- FADE: Secure Overlay Cloud Storage With File Assured Deletion. Java / Secure Computing
- DoubleGuard: Detecting Intrusions In Multi-Tier Web Applications Java / Secure Computing
- Online Modeling Of Proactive Moderation System For Auction Fraud Detection. Java / Secure Computing
- Packet-Hiding Methods For Preventing Selective Jamming Attacks. Java / Secure Computing
- Risk-Aware Mitigation For MANET Routing Attacks. Java / Secure Computing
- Enhancing Security And Confidentiality In Locationbased Data Encryption Algorithms Java / Secure Computing
- NCCloud: A Network-Coding-Based Storage System In A Cloud-Of-Clouds Java / Secure Computing
- Enabling Data Hiding For Resource Sharing In Cloud Computing Environments Based On DNA Sequences Java / Secure Computing
- SDSM: A Secure Data Service Mechanism In Mobile Cloud Computing Java / Secure Computing
- Secure Information Management Protocol Based On Linguistic Sharing Techniques Java / Secure Computing
- Study Of Multistage Anomaly Detection For Secured Cloud Computing Resources In Future Internet Java / Secure Computing
- An Approach To Detect And Prevent SQL Injection Attacks In Database Using Web Service Java / Secure Computing
- An Approach To Detect And Prevent SQL Injection Attacks In Database Using Web Service Java / Secure Computing
- Authentication Scheme For Session Password Using Color Matrix Java / Secure Computing
- Color Steganography Using Armstrong Number Java / Secure Computing
- Coding For Cryptographic Security Enhancement Using Stopping Sets Java / Secure Computing
- Data Integrity Proofs In Cloud Storage Java / Secure Computing
- A Privacy-Preserving Location Monitoring System For Wireless Sensor Networks Java / Secure Computing
- Multi-Level Weighted Sequential Pattern Mining Based On Prime Encoding Java / Secure Computing
- Layered Approach Using Conditional Random Fields For Intrusion Detection Java / Secure Computing
- A Proxy-Based Real-Time Protection Mechanism For Social Networking Sites Java / Secure Computing
- Multilevel Weighted Sequential Pattern Mining Using Prime Encoding Java / Secure Computing
- Persuasive Cued Click-Points: Design, Implementation, And Evaluation Of A Knowledge-Based Authentica Java / Multimedia
- Trust Modeling In Social Tagging Of Multimedia Content. Java / Multimedia
- Learn To Personalized Image Search From The Photo Sharing Websites. Java / Multimedia
- Denial-Of-Service Defense Through Web Referral Java / Networking
- Detecting And Resolving Firewall Policy Anomalies Java / Networking
- An Efficient Caching Scheme And Consistency Maintenance In Hybrid P2P System. Java / Networking
- Optimum Relay Selection For Energy-Efficient Cooperative Ad Hoc Networks Java / Networking
- A Fast Re-Route Method Java / Networking
- Participatory Privacy: Enabling Privacy In Participatory Sensing Java / Networking
- Participatory Privacy: Enabling Privacy In Participatory Sensing Java / Networking
- FireCol: A Collaborative Protection Network For The Detection Of Flooding DDoS Attacks Java / Networking
- Handling Multiple Failures In IP Networks Through Localized On-Demand Link State Routing Java / Networking
- Independent Directed Acyclic Graphs For Resilient Multipath Routing Java / Networking
- Trustworthy Coordination Of Web Services Atomic Transactions Java / Networking
- DoubleGuard: Detecting Intrusions In Multi-Tier Web Applications Java / Networking
- Policy-By-Example For Online Social Networks. Java / Networking
- Security Architecture For Cloud Networking. Java / Networking
- Packet Loss Control Using Tokens At The Network Edge. Java / Networking
- Game-Theoretic Pricing For Video Streaming In Mobile Networks. Java / Networking
- Optimizing Cloud Resources For Delivering IPTV Services Through Virtualization. Java / Networking
- Privacy- And Integrity-Preserving Range Queries In Sensor Networks Java / Networking
- Time Delay On-Demand Multipath Routing Protocol In Mobile Ad-Hoc Networks Java / Networking
- Security Schemes For Wireless Sensor Networks With Mobile Sink Java / Networking
- A Novel Cross Layer Intrusion Detection System In MANET Java / Networking
- An Enhanced Security Scheme For Wireless Sensor Network Using Mobile Sink Server Java / Networking
- Cooperative Provable Data Possession For Integrity Verification In Multi-Cloud Storage. Java / Parallel And Distributed System
- Color-Tone Similarity Of Digital Images Java / Image Processing
- A Novel Pair-Wise Image Matching Strategy With Compact Descriptors Java / Image Processing
- Depth-Aided Exemplar-Based Hole Filling For DIBR View Synthesis Java / Image Processing
- Circular Re-Ranking Of Visual Search. Java / Image Processing
- Image Authentication Using Stochastic Diffusion Java / Image Processing
- Scalable Face Image Retrieval Using Attribute-Enhanced Sparse Codewords Java / Image Processing
- Super-Resolution-Based Inpainting Java / Image Processing
- Persuasive Cued Click-Points: Design, Implementation, And Evaluation Of A Knowledge-Based Authentication Mechanism Java / Image Processing
- A Bayesian Approach To Digital Matting Java / Image Processing
- Defenses Against Large Scale Online Password Guessing Attacks By Using Persuasive Click Java / Image Processing
- An Effective Image Steganalysis Method Based On Neighborhood Information Of Pixels Java / Image Processing
- Automatic Plant Leaf Classification For A Mobile Field Guide Java / Image Processing
- Secure And Authenticated Reversible Data Hiding In Encrypted Images Java / Image Processing
- Face Hallucination Based On PCA Dictionary Pairs Java / Image Processing
- Fast Moving-Object Detection In H.264/AVC Compressed Domain For Video Surveillance Java / Image Processing
- Bayesian Stereoscopic Image Resolution Enhancement Java / Image Processing
- Beyond Text QA: Multimedia Answer Generation By Harvesting Web Information Java / Image Processing
- An Extended Visual Cryptography Scheme Without Pixel Expansion For Halftone Images Java / Image Processing
- A Secret-Sharing-Based Method For Authentication Of Grayscale Document Images Via The Use Of The PNG Java / Image Processing
- Robust Face-Name Graph Matching For Movie Character Identification Java / Image Processing
- A Novel Approach To A Dynamic Template Generation Algorithm For Multiple-Choice Forms Java / Image Processing
- A DYMANIC METHOD TO SECURE CONFIDENTIAL DATA USING SIGNCRYPTION WITH STEGANOGRAPHY Java / Image Processing
- From Blind To Quantitative Steganalysis Java / Image Processing
- Mitigating Of Fire Based Disaster Using IP Java / Image Processing
- Intent Search - Capturing User Intention For One Click Internet Image Search Java / Image Processing
- A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Java / Image Processing
- Security Enhancement Using Steganography Java / Image Processing
- A Keyless Approach To Image Encryption Java / Image Processing
- N-Square Approach For Lossless Image Compression And Decompression Java / Image Processing
- "An Efficient Real Time Moving Object Detection Method For Video Surveillance System" Java / Image Processing
- Image Authentication And Restoration Using BlockWise Fragile Watermarking Based On K-Medoids Clustering Approach Java / Image Processing
- A Novel Exemplar Based Image Inpainting Algorithm For Natural Scene Image Completion With Improved Patch Prioritizing Java / Image Processing
- Separable Bilateral Nonlocal Means Java / Image Processing
- A Robust Skew Detection Method Based On Maximum Gradient Difference And R-Signature Java / Image Processing
- Image-Based Object Detection Under Varying Illumination In Environments With Specular Surfaces Java / Image Processing
- A New Block Compressive Sensing To Control The Number Of Measurements Java / Image Processing
- Lossless Image Compression Based On Data Folding Java / Image Processing
- A Chaotic System Based Fragile Watermarking Scheme For Image Tamper Detection Java / Image Processing
- Post Processing For Blocking Artifact Reduction. Java / Image Processing
- Linear Distance Coding For Image Classification Java / Image Processing
- Security Enhancement Scheme For Image Steganography Using S-DES Technique Java / Image Processing
- OCR In Desktop Java / Image Processing