banner

Quick Enquiry

Your Name (required)

Your Email (required)

Subject

Contactnumber

Your Message

Java Projects

 

Java Projects — IEEE JAVA 2016-2017

 

Sno Projects List IEEE Abstract Base Paper
CLOUD COMPUTING
1 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 Download Download
2 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2016 Download Download
3 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2016 Download Download
4 An Efficient Privacy-Preserving Ranked Keyword Search Method 2016 Download Download
5 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2016 Download Download
6 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2016 Download Download
7 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2016 Download Download
8 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments 2016 Download Download
9 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2016 Download Download
10 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016 Download Download
11 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2016 Download Download
12 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 2016 Download Download
13 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2016 Download Download
14 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 2016 Download Download
15 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2016 Download Download
16 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud 2016 Download Download
17 SecRBAC: Secure data in the Clouds 2016 Download Download
18 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2016 Download Download
19 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming 2016 Download Download
20 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage 2016 Download Download
DataMining
1 A Novel Recommendation Model Regularized with User Trust and Item Ratings 2016 Download Download
2 Automatically Mining Facets for Queries from Their Search Results 2016 Download Download
3 Booster in High Dimensional Data Classification 2016 Download Download
4 Building an intrusion detection system using a filter-based feature selection algorithm 2016 Download Download
5 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information 2016 Download Download
6 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings 2016 Download Download
7 Efficient Algorithms for Mining Top-K High Utility Itemsets 2016 Download Download
8 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2016 Download Download
9 Nearest Keyword Set Search in Multi-Dimensional Datasets 2016 Download Download
10 Rating Prediction based on Social Sentiment from Textual Reviews 2016 Download Download
Networking
1 A Stable Approach for Routing Queries in Unstructured P2P Networks 2016 Download Download
2 iPath: Path Inference in Wireless Sensor Networks 2016 Download Download
3 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2016 Download Download
4 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2016 Download Download
5 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users 2016 Download Download
MOBILE COMPUTING
1 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2016 Download Download
2 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 2016 Download Download
3 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach 2016 Download Download
4 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2016 Download Download
IMAGE PROCESSING
1 A Locality Sensitive Low-Rank Model for Image Tag Completion 2016 Download Download
2 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks 2016 Download Download
3 Learning of Multimodal Representations with Random Walks on the Click Graph 2016 Download Download
4 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval 2016 Download Download
5 Tag Based Image Search by Social Re-ranking 2016 Download Download
SECURE COMPUTING
1 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2016 Download Download
2 Data Lineage in Malicious Environments 2016 Download Download
3 Detecting Malicious Facebook Applications 2016 Download Download
4 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 2016 Download Download
5 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata 2016 Download Download
6 Resolving Multi-party Privacy Conflicts in Social Media 2016 Download Download
7 Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions 2016 Download Download
8 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data 2016 Dowvnload Download
9 Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms 2016 Download Download
PARALLEL AND DISTRIBUTED SYSTEMS
1 A Hop-by-Hop Routing Mechanism for Green Internet 2016 Download Download
2 Continuous Answering Holistic Queries over Sensor Networks 2016 Download Download
3 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks 2016 Download Download
4 The Server Provisioning Problem for Continuous Distributed Interactive Applications 2016 Download Download
SOFTWARE ENGINEERING
1 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation 2016 Download Download
2 Metamorphic Testing for Software Quality Assessment: A Study of Search Engines 2016 Download Download
3 SITAR: GUI Test Script Repair 2016 Download Download