SOFTWARE PROJECT TITLE 2014-15
CLOUD COMPUTING
1. Object-Oriented
Shadow Detection and Removal From Urban High-Resolution Remote Sensing Images(2014)
2.
Consistency
as a Service: Auditing Cloud Consistency(2014)
3.
Balancing
Performance, Accuracy, and Precision for Secure Cloud Transactions(2014)
4.
A
Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization
Using Map Reduce on Cloud(2014)
5.
Proactive
Workload Management in Hybrid Cloud Computing(2014)
. Decreasing
Impact of SLA Violations: A Proactive Resource Allocation Approach for Cloud
Computing Environments(2014)
7. KASR:
A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data
Applications(2014)
8.
Distributed,
Concurrent, and Independent Access to Encrypted Cloud Databases(2014)
9.
A
Hybrid Cloud Approach for Secure Authorized Deduplication(2014)
10.
Shared
Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
11. Privacy-Preserving Multi-Keyword Ranked
Search over Encrypted Cloud Data
12. Resource Availability Characteristics and
Node Selection in Cooperatively Shared Computing Platforms
13. Decentralized Access Control with
Anonymous Authentication of Data Stored in Clouds
14. Scalable Distributed Service Integrity
Attestation for Software-as-a-Service Clouds
15. Privacy
Preserving Back-Propagation Neural Network Learning Made Practical with Cloud
Computing
IMAGE PROCESSING
1. Fuzzy Clustering with a modified MRF Energy function
for change detection in synthetic aperture radar images(2014)
2. Measures of Effective Video Tracking(2014)
3. Image Quality Assessment for Fake Biometric Detection: Application
to IRIS, Fingerprint, and Face Recognition(2014)
4. Object-Oriented Shadow Detection and Removal From Urban
High-Resolution Remote Sensing Images(2014)
DATA MINING
1. A Fuzzy Preference Tree-Based Recommender System for
Personalized Business-to-Business E-Services
2. Building Confidential and Efficient Query Services in the
Cloud with RASP Data Perturbation
3. Scalable Keyword Search on Large RDF Data
4. Adaptive Replica Synchronization for Distributed File Systems
5. OCCT: A One-Class Clustering Tree for Implementing
One-to-Many Data Linkage
6. Probabilistic Aspect Mining Model for Drug Reviews
7. Efficient Range-Based Storage Management for Scalable Data
stores
8. PSMPA: Patient Self-controllable and Multi-level Privacy-preserving
Cooperative Authentication in Distributed m- Healthcare Cloud Computing System
9. Automatic Generation of the Domain Module from Electronic
Textbooks: Method and Validation
10. Task Trail: An Effective Segmentation of User Search
Behavior
11. Supporting Privacy Protection in Personalized Web Search
12. An Empirical Performance Evaluation of Relational Keyword
Search Techniques
13. Discovering the Top-k Unexplained Sequences in Time-Stamped
Observation Data
NETWORK SECURITY
1.
Secure Two-Party
Differentially Private Data Release for Vertically Partitioned Data
2.
Private Searching on
Streaming Data Based on Keyword Frequency
3.
Building a Scalable
System for Stealthy P2P-Botnet Detection
4. The Client Assignment
Problem for Continuous Distributed Interactive Applications: Analysis,
Algorithms, and Evaluations
5.
An Empirical Study of
Ontology-Based Multi-Document Summarization in Disaster Management
6.
PPTP:
Privacy-Preserving Traffic Padding in Web-Based Applications
7.
Securing Broker-Less
Publish/Subscribe Systems Using Identity-Based Encryption
NETWORKING
1.
Evolving Fuzzy Rules for Anomaly Detection in Data Streams
2.
Secure Data Retrieval for Decentralized Disruption-Tolerant
Military Networks
3.
List Scheduling Algorithm for Heterogeneous Systems by an
Optimistic Cost Table
4.
Cloning, Resource Exchange, and Relation Adaptation: An
Integrative Self-Organization Mechanism in a Distributed Agent Network
5.
Breaking the Barrier to Transferring Link Information across
Networks
6.
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
7.
Network Aware Scheduling for Virtual Machine Workloads with
Interference Models
8.
A Model Approach to the Estimation of Peer-to-Peer Traffic
Matrices
Comments
Post a Comment