IEEE 2014-15 DOTNET PROJECT LIST
IEEE
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1.
Accuracy-Constrained
Privacy-Preserving Access Control Mechanism for Relational Data
2.
Fast Nearest Neighbor Search with Keywords
3.
Quasi-SLCA Based Keyword Query Processing over
Probabilistic XML Data
4.
Secure
Mining of Association Rules in Horizontally Distributed Databases
5.
Supporting
Privacy Protection in Personalized Web Search
6. The
Role of Hubness in Clustering High-Dimensional Data
7.
Authentication of k nearest Neighbor Query on Road Networks
8.
Privacy-Preserving and Content-Protecting
Location Based Queries
9.
Mining
Probabilistically Frequent Sequential Patterns in Large Uncertain Databases
10.
Context-based
Diversification for Keyword Queries over XML Data
11. Efficient Prediction of Difficult Keyword Queries
over Databases
12. Using Personalization to Improve XML Retrieval
13. Range Aggregation with Set Selection
14. Secure and Privacy Messaging in Online Social
Networks
15. A Methodology for
Direct and Indirect Discrimination Prevention in Data Mining
IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS
16.
Trajectory Improves Data Delivery in Urban
Vehicular Networks
17.
Shared Authority Based Privacy-preserving
Authentication Protocol in Cloud Computing
18.
PSMPA:
Patient Self-controllable and Multi-level Privacy-preserving Cooperative
Authentication in Distributed m-Healthcare Cloud Computing System
19.
Privacy-Preserving Multi-Keyword Ranked Search over
Encrypted Cloud Data
20.
Key-Aggregate Cryptosystem for Scalable Data
Sharing in Cloud Storage
21.
Peer-Assisted VoD Systems: An Efficient Modeling
Framework
22.
Enabling Data Integrity Protection in
Regenerating-Coding-Based Cloud Storage: Theory and Implementation
23.
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
24.
ALBA-R: Load-Balancing Geographic Routing Around
Connectivity Holes in Wireless Sensor Networks
25.
A Hybrid Cloud Approach for Secure Authorized De
duplication
26.
Mona:
Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
IEEE TRANSACTIONS ON
CLOUD COMPUTING
27.
Cloud-Assisted Mobile-Access of Health Data With
Privacy and Auditability
28.
Consistency as a Service: Auditing Cloud Consistency
29.
Cost-Effective
Authentic and Anonymous Data Sharing with Forward Security
30.
Distributed,
Concurrent, and Independent Access to Encrypted Cloud
Databases
31.
Identity-Based
Secure Distributed Data Storage Schemes
32.
Oruta:
Privacy-Preserving Public Auditing for Shared Data in the Cloud
IEEE TRANSACTIONS
ON IMAGE PROCESSING
33.
A Dynamic Appearance Descriptor Approach to Facial Actions Temporal
Modeling
34.
Localization
of License Plate Number Using Dynamic Image Processing
Techniques
35.
A New
Iterative Triclass Thresholding Technique in Image Segmentation
36.
Click
Prediction for Web Image Reranking Using Multimodal Sparse Coding
37.
Robust
Face Recognition with Structurally Incoherent Low-Rank Matrix Decomposition
IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
38.
Secure Data
Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact
39.
Uniform
Embedding for Efficient JPEG Steganography
40.
Data Hiding in
Encrypted H.264/AVC Video Streams by Codeword Substitution
41.
On the
Relation of Random Grid and Deterministic Visual Cryptography
42.
Robust
Lossless Watermarking of Relational Databases Based on Circular Histogram
Modulation
43.
Scalable
Similarity Search with Topology Preserving Hashing
IEEE
TRANSACTIONS ON MOBILE COMPUTING
44.
Autonomous Mobile Mesh Networks
45. Opportunistic Channel Sharing
in Cognitive Radio Networks
46. Optimal Multicast Capacity and Delay Tradeoffs in
MANETs
47.
Efficient Location Privacy-Aware Forwarding in
Opportunistic Mobile Networks
48.
Friendbook: A Semantic-based Friend
Recommendation System for Social Networks
49.
Class-Based Shared Resource Allocation for
Cell-Edge Users in OFDMA Networks
50.
A Secure and Privacy-Preserving Opportunistic
Computing Framework for Mobile-Healthcare Emergency
51.
Secure Mobile Payment System using GSM
IEEE TRANSACTIONS ON
MULTIMEDIA
52.
An adaptive mechanism for optimal content
download in wireless networks
53.
Reversible Data Hiding in Encrypted JPEG Bit
stream
54.
Inferring User Image-Search Goals under the
Implicit Guidance of Users
55.
Exploiting Click Constraints and Multi-view
Features for Image Re-ranking
56.
Prototype-Based Modeling for Facial Expression
Analysis
IEEE TRANSACTIONS ON SERVICE
COMPUTING
57.
Panda:
Public Auditing for Shared Data with Efficient User Revocation in the Cloud
58.
Self-Adaptive Semantic Focused Crawler for
Mining Services Information Discovery
59.
Full Security of Quantum Key Distribution From
No-Signaling Constraints
IEEE TRANSACTIONS ON
NETWORKING
60.
An Adaptive Video Streaming Control System:
Modeling, Validation, and Performance Evaluation
61.
Incentive
Based Data Sharing in Delay Tolerant Mobile Networks
62.
Iterative Localization of Wireless Sensor Networks:
An Accurate and Robust Approach
63.
Secure
and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
64.
Secure Continuous Aggregation in Wireless Sensor
Networks
65.
A Trust-Aware System for Personalized User Recommendations
in Social Networks
66.
Resource Allocation in MIMO-OFDM Based
Cooperative Cognitive Radio Networks
67.
An Efficient and Robust Addressing Protocol for
Node Auto configuration in Ad Hoc Networks
68.
Filtering Of Malicious Traffic Based On Markov’s
Chain Method
69.
Cooperative Communication Protocol Designs Based
on Optimum Power and Time Allocation
IEEE TRANSACTIONS ON WEB
MINING
70.
An Ontology-Based Text Mining Method to Develop
D-Matrix from Unstructured Text
No comments:
Post a Comment