IEEE PROJECTS JAVA 2014

1 CPJ1401 A Hybrid Cloud Approach for Secure Authorized Deduplication
CLOUD COMPUTING
2 CPJ1402 Behavioral Malware Detection in Delay Tolerant Networks
CLOUD COMPUTING
3 CPJ1403 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing System
CLOUD COMPUTING
4 CPJ1404 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
CLOUD COMPUTING
5 CPJ1405 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
CLOUD COMPUTING
6 CPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
CLOUD COMPUTING
7 CPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
CLOUD COMPUTING
8 CPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
CLOUD COMPUTING
9 CPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
CLOUD COMPUTING
10 CPJ1410 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System
CLOUD COMPUTING
11 CPJ1411 Privacy Policy Inference of User Uploaded Images on Content Sharing Sites
CLOUD COMPUTING
12 CPJ1412 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
CLOUD COMPUTING
13 CPJ1413 Towards Differential Query Services in Cost-Efficient Clouds
CLOUD COMPUTING
14 CPJ1414 A Cocktail Approach for Travel Package Recommendation
DATA MINING
15 CPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
DATA MINING
16 CPJ1416 BestPeer++ A Peer-to-Peer Based Large-Scale Data Processing Platform
DATA MINING
17 CPJ1417 Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
DATA MINING
18 CPJ1418 Dealing With Concept Drifts in Process Mining
DATA MINING
19 CPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
DATA MINING
20 CPJ1420 Efficient Prediction of Difficult Keyword Queries over Databases
DATA MINING
21 CPJ1421 Facilitating Document Annotation Using Content and Querying Value
DATA MINING
22 CPJ1422 Fast Nearest Neighbor Search with Keywords
DATA MINING
23 CPJ1423 Keyword Query Routing
DATA MINING
24 CPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
DATA MINING
25 CPJ1425 Security Evaluation of Pattern Classifiers under Attack
DATA MINING
26 CPJ1426 Supporting Privacy Protection in Personalized Web Search
DATA MINING
27 CPJ1427 Towards Online Shortest Path Computation
DATA MINING
28 CPJ1428 Captcha as Graphical Passwords´┐ŻA New Security Primitive Based on Hard AI Problems
SECURE COMPUTING
29 CPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
SECURE COMPUTING
30 CPJ1430 PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks
SECURE COMPUTING
31 CPJ1431 Top-k Query Result Completeness Verification in Tiered Sensor Networks
SECURE COMPUTING
32 CPJ1432 Automatic Test Packet Generation
NETWORKING
33 CPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
NETWORKING
34 CPJ1434 Boundary Cutting for Packet Classification
NETWORKING
35 CPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks
NETWORKING
36 CPJ1436 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
PARALLEL
& DISTRIBUTED SYSTEMS
37 CPJ1437 Consistency as a Service: Auditing Cloud Consistency
NETWORKING
38 CPJ1438 Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
IMAGE PROCESSING
39 CPJ1439 Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks
PARALLEL
& DISTRIBUTED SYSTEMS
40 CPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
PARALLEL
& DISTRIBUTED SYSTEMS
41 CPJ1441 Securing Broker-Less PublishSubscribe Systems Using Identity-Based Encryption
PARALLEL
& DISTRIBUTED SYSTEMS
42 CPJ1442 SOS A Distributed Mobile Q&A System Based on Social Network
PARALLEL
& DISTRIBUTED SYSTEMS
43 CPJ1443 The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Eva
PARALLEL
& DISTRIBUTED SYSTEMS
44 CPJ1444 The Design and Evaluation of An Information Sharing System for Human Networks
PARALLEL
& DISTRIBUTED SYSTEMS
45 CPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
PARALLEL
& DISTRIBUTED SYSTEMS
46 CPJ1446 Secure Outsourced Attribute-based Signatures
PARALLEL
& DISTRIBUTED SYSTEMS
47 CPJ1447 An Incentive Framework for Cellular Traffic Offloading
MOBILE COMPUTING
48 CPJ1448 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
MOBILE COMPUTING
49 CPJ1449 Efficient Authentication for Mobile and Pervasive Computing
MOBILE COMPUTING
50 CPJ1450 Friendbook A Semantic-based Friend Recommendation System for Social Networks
MOBILE COMPUTING
51 CPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
MOBILE COMPUTING
52 CPJ1452 Privacy-Enhanced Web Service Composition
SERVICE COMPUTING (Web Service)
53 CPJ1453 Web Service Recommendation via Exploiting Location and QoS Information
SERVICE COMPUTING (Web Service)
54 CPJ1454 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
PARALLEL & DISTRIBUTED SYSTEMS
55 CPJ1455 Secure Mining of Association Rules in Horizontally Distributed Databases
Data MINING
56 CPJ1456 Privacy Preserving Delegated Access Control in Public Clouds
CLOUD COMPUTING
57 CPJ1457 m-Privacy for Collaborative Data Publishing
DATA MINING
58 CPJ1458 Personalized Web Search Using Browsing History and Domain Knowledge
INTELLIGENT COMPUTING
59 CPJ1459 SocialTube: P2P-Assisted Video Sharing in Online Social Networks
PARALLEL
& DISTRIBUTED SYSTEMS
60 CPJ1460 On the Use of Side Information for Mining Text Data
DATA MINING
61 CPJ1461 Secure kNN Query Processing in Untrusted Cloud Environments
DATA MINING
62 CPJ1462 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
DATA MINING
63 CPJ1463 XSPath: Navigation on XML Schemas Made Easy
DATA MINING
64 CPJ1464 Dynamic Query Forms for Database Queries
DATA MINING
65 CPJ1465 Video Dissemination over Hybrid Cellular and Ad Hoc Networks
MOBILE COMPUTING
66 CPJ1466 Mapping XML to a Wide Sparse Table
DATA MINING
67 CPJ1467 A Cloud Enviroment for Backup and Data Storage
CLOUD COMPUTING
68 CPJ1468 Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks
SECURE COMPUTING
69 CPJ1469 Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
DATA MINING
70 CPJ1470 A Scientometric Analysis of Cloud Computing Literature
CLOUD COMPUTING
71 CPJ1471 Best Keyword Cover Search
DATA MINING
72 CPJ1472 A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks
PARALLEL & DISTRIBUTED SYSTEMS
73 CPJ1473 Incremental Affinity Propagation Clustering Based on Message Passing
DATA MINING
74 CPJ1474 A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network
NETWORKING
75 CPJ1475 Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
MULTIMEDIA
76 CPJ1476 A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
SERVICE COMPUTING
77 CPJ1477 Image Search Reranking With Query-Dependent Click-Based Relevance Feedback
IMAGE PROCESSING
78 CPJ1478 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding
IMAGE PROCESSING
79 CPJ1479 LARS: An Efficient and Scalable Location-Aware Recommender System
DATA MINING
80 CPJ1480 A Two-stage Deonoymization Attack Against Anonymized Social Networks
PARALLEL &
DISTRIBUTED SYSTEMS
81 CPJ1481 Privacy Preserving Enhance Collaborative Tagging
DATA MINING
82 CPJ1482 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
PARALLEL
& DISTRIBUTED SYSTEMS
83 CPJ1483 E-MACs: Towards More Secure and More Efficient Constructions of Secure Channels
SECURE COMPUTING
84 CPJ1484 A Tag Encoding Scheme against Pollution Attack to Linear Network Coding
PARALLEL & DISTRIBUTED SYSTEMS
85 CPJ1485 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
MOBILE COMPUTING
86 CPJ1486 Preserving location privacy in geo social application
MOBILE COMPUTING
87 CPJ1487 dentity Based Distributed Provable Data Possession in Multi Cloud Storage
CLOUD COMPUTING