banner

Quick Enquiry

Your Name (required)

Your Email (required)

Subject

Contactnumber

Your Message

Java Projects

 

Java Projects — IEEE JAVA 2015-2016

 

Sno Projects List IEEE Abstract Base Paper
CLOUD COMPUTING
1 A Hybrid Cloud Approach for Secure Authorized Deduplication 2015 Download Download
2 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 2015 Download Download
3 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems 2015 Download Download
4 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015 Download Download
5 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2015 Download Download
6 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration 2015 Download Download
7 Audit-Free Cloud Storage via Deniable Attribute-based Encryption 2015 Download Download
8 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2015 Download Download
9 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services 2015 Download Download
10 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption 2015 Download Download
11 Enabling Cloud Storage Auditing With Key-Exposure Resistance 2015 Download Download
12 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data 2015 Download Download
13 Identity-Based Encryption with Outsourced Revocation in Cloud Computing 2015 Download Download
14 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage 2015 Download Download
15 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing 2015 Download Download
16 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage 2015 Download Download
17 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems 2015 Download Download
18 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 2015 Download Download
19 Secure Auditing and Deduplicating Data in Cloud 2015 Download Download
20 Stealthy Denial of Service Strategy in Cloud Computing 2015 Download Download
DataMining
1 Best Keyword Cover Search 2015 Download Download
2 Context-Based Diversification for Keyword Queries over XML Data 2015 Download Download
3 Discovery of Ranking Fraud for Mobile Apps 2015 Download Download
4 Malware Propagation in Large-Scale Networks 2015 Download Download
5 On Summarization and Timeline Generation for Evolutionary Tweet Streams 2015 Download Download
6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 2015 Download Download
7 Progressive Duplicate Detection 2015 Download Download
8 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection 2015 Download Download
9 Scalable Constrained Spectral Clustering 2015 Download Download
10 Towards Effective Bug Triage with Software Data Reduction Techniques 2015 Download Download
11 Tweet Segmentation and Its Application to Named Entity Recognition 2015 Download Download
Networking
1 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks 2015 Download Download
2 A Proximity-Aware Interest-Clustered P2P File Sharing System 2015 Download Download
3 Detecting Malicious Facebook Applications 2015 Download Download
4 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 2015 Download Download
MOBILE COMPUTING
1 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks 2015 Download Download
2 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks 2015 Download Download
3 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 2015 Download Download
4 User-Defined Privacy Grid System for Continuous Location-Based Services 2015 Download Download
IMAGE PROCESSING
1 An Attribute-Assisted Reranking Model for Web Image Search 2015 Download Download
2 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval 2015 Download Download
3 Learning to Rank Image Tags With Limited Training Examples 2015 Download Download
INFORMATION AND SECURITY
1 A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendation 2015 Download Download
2 Effective Key Management in Dynamic Wireless Sensor Networks 2015 Download Download
3 Key Updating for Leakage Resiliency with Application to AES Modes of Operation 2015 Download Download
4 Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter 2015 Download Download
5 Software Puzzle: A Countermeasure to Resource-Inflated Denialof- Service Attacks 2015 Download Download