IEEE 2013 - 2014 PROJECT Titles
PROJECT ID |
Title |
Domain |
Area |
|---|---|---|---|
|
Privacy-Preserving Public Auditing for Secure Cloud Storage |
JAVA |
Cloud Computing |
13SMT02 |
Winds of Change from Vendor Lock-In to the Meta Cloud |
JAVA |
Cloud Computing |
13SMT03 |
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds |
JAVA |
Cloud Computing |
13SMT04 |
Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks |
DOTNET |
Cloud Computing |
13SMT05 |
Privacy-Preserving Public Auditing for Secure Cloud Storage |
DOTNET |
Cloud Computing |
13SMT06 |
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption |
DOTNET |
Cloud Computing |
13SMT07 |
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud |
JAVA |
Cloud Computing |
13SMT08 |
Cloud computing for mobile users can offloading compution save energy |
JAVA |
Cloud Computing |
13SMT09 |
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems |
DOTNET |
Cloud Computing |
13SMT10 |
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud |
DOTNET |
Cloud Computing |
13SMT11 |
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud |
DOTNET |
Cloud Computing |
13SMT12 |
Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems |
DOTNET |
Cloud Computing |
13SMT13 |
Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data |
DOTNET |
Cloud Computing |
13SMT14 |
An Adaptive Cloud Downloading Service |
DOTNET |
Cloud Computing |
13SMT15 |
Load Rebalancing for Distributed File Systems in Clouds |
JAVA |
Cloud Computing |
13SMT16 |
Dynamic Audit Services for Outsourced Storages in Clouds |
DOTNET |
Cloud Computing |
13SMT17 |
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption |
JAVA |
Cloud Computing |
13SMT18 |
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud |
JAVA |
Cloud Computing |
13SMT19 |
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System |
JAVA |
Cloud Computing |
13SMT20 |
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords |
JAVA |
IMAGE PROCESSING |
13SMT21 |
Local Directional Number Pattern for Face Analysis Face and Expression Recognition |
DOTNET |
IMAGE PROCESSING |
13SMT22 |
Reversible Data Hiding With Optimal Value Transfer |
DOTNET |
IMAGE PROCESSING |
13SMT23 |
Super-Resolution-based Inpainting |
JAVA |
IMAGE PROCESSING |
13SMT24 |
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting |
DOTNET |
IMAGE PROCESSING |
13SMT25 |
A Fast Re-Route Method |
JAVA |
Journal |
13SMT26 |
A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data |
JAVA |
DATA MINING |
13SMT27 |
CloudMoV: Cloud-based Mobile Social TV |
JAVA |
DATA MINING |
13SMT28 |
Crowd sourcing Predictors of Behavioral Outcomes. |
JAVA |
DATA MINING |
13SMT29 |
Spatial Approximate String Search |
JAVA |
DATA MINING |
13SMT30 |
Incentive Compatible Privacy-Preserving Data Analysis |
JAVA |
DATA MINING |
13SMT31 |
Focus Learning to Crawl Web Forums |
JAVA |
DATA MINING |
13SMT32 |
Robust Module Based Data Management |
JAVA |
DATA MINING |
13SMT33 |
Comparable Entity Mining from Comparative Questions |
JAVA |
DATA MINING |
13SMT34 |
Facilitating Effective User Navigation through Website Structure Improvement |
JAVA |
DATA MINING |
13SMT35 |
PMSE: A Personalized Mobile Search Engine |
JAVA |
DATA MINING |
13SMT36 |
A System to Filter Unwanted Messages from OSN User Walls |
JAVA |
DATA MINING |
13SMT37 |
Protecting Sensitive Labels in Social Network Data Anonymization |
JAVA |
DATA MINING |
13SMT38 |
Mining Order-Preserving Sub matrices from Data with Repeated Measurements |
DOTNET |
DATA MINING |
13SMT39 |
Secure Mining of Association Rules in Horizontally Distributed Databases |
DOTNET |
DATA MINING |
13SMT40 |
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia |
JAVA |
DATA MINING |
13SMT41 |
A Survey of XML Tree Patterns |
DOTNET |
DATA MINING |
13SMT42 |
Dynamic Personalized Recommendation on Sparse Data |
DOTNET |
DATA MINING |
13SMT43 |
A Probabilistic Approach to String Transformation |
JAVA |
DATA MINING |
13SMT44 |
Mining User Queries with Markov Chains: Application to Online Image Retrieval |
DOTNET |
DATA MINING |
13SMT45 |
Annotating Search Results from Web Databases |
JAVA |
DATA MINING |
13SMT46 |
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development |
JAVA |
DATA MINING |
13SMT47 |
A New Algorithm for Inferring User Search Goals with Feedback Sessions |
JAVA |
DATA MINING |
13SMT48 |
m-Privacy for Collaborative Data Publishing |
JAVA |
DATA MINING |
13SMT49 |
Facilitating Document Annotation Using Content And Querying Value |
JAVA |
DATA MINING |
13SMT50 |
Mobile Relay Configuration in Data-intensive Wireless Sensor Networks |
JAVA |
Mobile Computing |
13SMT51 |
Vampire attacks: Draining life from wireless ad-hoc sensor networks |
JAVA |
Mobile Computing |
13SMT52 |
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications |
JAVA |
Mobile Computing |
13SMT53 |
Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks |
JAVA |
Mobile Computing |
13SMT54 |
Distributed Cooperative Caching in Social Wireless Networks |
JAVA |
Mobile Computing |
13SMT55 |
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks |
DOTNET |
Mobile Computing |
13SMT56 |
On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks |
DOTNET |
Mobile Computing |
13SMT57 |
Optimal Multicast Capacity and Delay Tradeoffs in MANETs |
DOTNET |
Mobile Computing |
13SMT58 |
Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks |
DOTNET |
Mobile Computing |
13SMT59 |
Optimal Content Downloading in Vehicular Networks |
DOTNET |
Mobile Computing |
13SMT60 |
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks |
JAVA |
Mobile Computing |
13SMT61 |
Optimizing Cloud Resources for Delivering IPTV Services through Virtualization |
JAVA |
Networking |
13SMT62 |
Access Policy Consolidation for Event Processing Systems |
JAVA |
Networking |
13SMT63 |
Fully Anonymous Profile Matching in Mobile Social Networks |
JAVA |
Networking |
13SMT64 |
The Target Tracking in Mobile Sensor Networks. |
DOTNET |
Networking |
13SMT65 |
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks |
DOTNET |
Networking |
13SMT66 |
Resource Allocation for QoS Support in Wireless Mesh Networks |
DOTNET |
Networking |
13SMT67 |
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks |
JAVA |
Networking |
13SMT68 |
SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks |
JAVA |
Networking |
13SMT69 |
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality |
DOTNET |
Networking |
13SMT70 |
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs |
JAVA |
Networking |
13SMT71 |
Transfer Reliability and Congestion Control Strategies in Opportunistic Networks A Survey |
DOTNET |
Networking |
13SMT72 |
Participatory Privacy Enabling Privacy in Participatory Sensing |
JAVA |
Networking |
13SMT73 |
Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment |
JAVA |
Parallel and Distributed Systems |
13SMT74 |
Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks. |
DOTNET |
Parallel and Distributed Systems |
13SMT75 |
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. |
DOTNET |
Parallel and Distributed Systems |
13SMT76 |
A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks |
DOTNET |
Parallel and Distributed Systems |
13SMT77 |
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation |
JAVA |
Parallel and Distributed Systems |
13SMT78 |
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. |
JAVA |
Secured Computing |
13SMT79 |
Two tales of privacy in online social networks |
JAVA |
Secured Computing |
13SMT80 |
Extracting Spread-Spectrum Hidden Data from Digital Media |
JAVA |
Secured Computing |
13SMT81 |
Utility-Privacy Tradeoff in Databases An Information-theoretic Approach |
JAVA |
Secured Computing |
13SMT82 |
Privacy Preserving Data Sharing With Anonymous ID Assignment. |
DOTNET |
Secured Computing |
13SMT83 |
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing |
DOTNET |
Secured Computing |
13SMT84 |
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption |
DOTNET |
Secured Computing |
13SMT85 |
EAACK—A Secure Intrusion-Detection System for MANETs |
DOTNET |
Secured Computing |
13SMT86 |
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems |
DOTNET |
Secured Computing |
13SMT87 |
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems |
JAVA |
Secured Computing |
13SMT88 |
A Decentralized Service Discovery Approach on Peer-to-Peer Networks |
JAVA |
Secured Computing |
13SMT89 |
Identity-Based Secure Distributed Data Storage Schemes |
JAVA |
Secured Computing |
13SMT90 |
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream |
JAVA |
Secured Computing |
