IEEE 2017-2018 JAVA/DOTNET/NS2
PROJECTS
CLOUD COMPUTING
MICI17-001.Achieving Secure, Universal, and
Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted
Cloud Data. (May 2017).
MICI17-002.Fast Phrase Search for Encrypted Cloud
Storage. (May 2017).
MICI17-003.Partial Utility-Driven Scheduling for
Flexible SLA and Pricing Arbitration in Clouds
MICI17-004.Securing Cloud Data under Key Exposure
MICI17-005.Privacy Protection based Access Control Scheme in
Cloud-based Services
MICI17-006. Practical Privacy-Preserving Content-Based Retrieval
in Cloud Image Repositories
MICI17-007.A New Cloud Service Mechanism for
Profit Optimizations of a Cloud Provider and Its Users(June 2017)
MICI17-008.Two-Aggregator Topology Optimization
using Multiple Paths in Data Center Networks(June 2017)
MICI17-009.Application-Aware Big Data
Deduplication in Cloud Environment
MICI17-010.Virtual Machine Migration Planning in
Software-Defined Networks
MICI17-011.Fault Tolerant Stencil Computation on
Cloud-based GPU Spot Instances
MICI17-012.A New Service Mechanism for Profit
Optimizations of a Cloud Provider and Its Users
MICI17-013.Dynamic Resource Provisioning for
Energy Efficient Cloud Radio Access Networks
MICI17-014.Customer-Satisfaction-Aware Optimal Multiserver
Configuration for Profit Maximization in Cloud Computing
MICI17-015.Privacy-Preserving Location-Proximity for Mobile
Apps
MICI17-016.Cooperative Query Answer Authentication
Scheme Over Anonymous Sensing Data
MICI17-017.Resource provisioning for task-batch
based workflows with deadlines in public clouds
MICI17-018.Secure Data Sharing and Searching at
the Edge of Cloud-Assisted Internet of Things
DATA MINING
MICI17-001.Probabilistic Models For Ad View
ability Prediction On The Web. (May 2017).
MICI17-002.Mining Competitors from Large
Unstructured Datasets.(May 2017).
MICI17-003.GALLOP: GlobAL feature fused LOcation
Prediction for Different Check-in Scenarios.(May 2017)
MICI17-004. Efficient Clue-based Route Search on
Road Networks(May 2017)
MICI17-005.Microscopic and Macroscopic
spatio-temporal Topic Models for Check-in Data.(May 2017)
MICI17-006.Large-scale Location Prediction
for Web Pages(May 2016).
MICI17-007.Modeling Information Diffusion
over Social Networks for Temporal Dynamic Prediction(May 2017).
MICI17-008.Discrete Nonnegative Spectral
Clustering(May 2017)
MICI17-009.Managing Temporal Constraints with
Preferences: Representation, Reasoning, and Querying(May 2017)
MICI17-010.Facilitating Time Critical Information
Seeking in Social Media(May 2017)
MICI17-011.Stochastic Blockmodeling and
Variational Bayes Learning for Signed Network Analysis
MICI17-012.Finding Related Forum Posts through
Content Similarity over Intention-based Segmentation
MICI17-013.Big Search in Cyberspace
MICI17-014.Supervised Taxonomies—Algorithms and
Applications
MICI17-015.l-Injection: Toward Effective
Collaborative Filtering Using Uninteresting Items
MICI17-016.Towards Real-Time, Country-Level Location
Classification of Worldwide Tweets
MICI17-017.Differentially Private Data Publishing
and Analysis: a Survey
MICI17-018.Scalable Algorithms for CQA Post Voting
Prediction
MICI17-019.Adaptive ensembling of semi-supervised
clustering solutions
MICI17-020.A Multi-objective Optimization Approach
for Question Routing in Community Question Answering Sevices
MICI17-021.User Vitality Ranking and Prediction in
Social Networking Services: A Dynamic Network Perspective(Feb -2017)
MICI17-022.Search Rank Fraud and Malware Detection
in Google Play(Feb -2017)
MICI17-023.SAP: Improving Continuous Top-K Queries
Over Streaming Data(Feb 2017)
MICI17-024.Data-Driven Answer Selection in
Community QA Systems(Feb 2017)
MICI17-025.Analyzing Sentiments in One Go: A
Supervised Joint Topic Modeling Approach(Feb 2017)
MICI17-026.Analyzing Sentiments in One Go: A
Supervised Joint Topic Modeling Approach(Feb 2017).
MICI17-027.Energy-efficient Query Processing in
Web Search Engines
MICI17-028.Online Multi-task Learning Framework for
Ensemble Forecasting
MICI17-029.Privacy-Preserving Selective
Aggregation of Online User Behavior Data
MICI17-030.Privacy protection based access control
scheme in cloud-based services
MICI17-031.Continuous Top-k Monitoring on Document
Streams
MICI17-032.Dynamic Facet Ordering for Faceted
Product Search Engines
NETWORKING
MICI17-001.An Overlay Architecture for Throughput
Optimal Multipath Routing(May 2017)
MICI17-002.Routing
in Accumulative Multi-Hop Networks(May 2017)
MICI17-003.Coding
for Improved Throughput Performance in Network Switches(May 2017)
MICI17-004.Power
Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet
Protocol(May 2017)
MICI17-005.A
Scalable Framework for Wireless Distributed Computing(May 2017)
MICI17-006.Efficient
Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels
MICI17-007.Data
Center Server Provision: Distributed Asynchronous Control for Coupled Renewal
Systems
MICI17-008.Privacy
and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks
MICI17-009.A
Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G
Networks Over High Speed Rails
MICI17-010.On
Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional
Antennas: Theoretical Foundation and Algorithm Design
MICI17-011.When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting
Prediction in Online Social Networks
MICI17-012.Socially-Driven Learning-Based Prefetching in
Mobile Online Social Networks
NETWORK
SECURITY & SECURE COMPUTING
MICI17-001 .Security
Implications of Permission Models in Smart-Home Application Frameworks.
MOBILE
COMPUTING
MICI17-001.Searching Trajectories by Regions of Interest
MICI17-002.Knowledge-Enhanced Mobile Video Broadcasting
(KMV-Cast) Framework with Cloud Support
MICI17-003. A Classroom Scheduling Service for Smart Classes
MICI17-004.Efficient and Privacy-preserving Min and k-th Min
Computations in Mobile Sensing Systems
MICI17-005. ShakeIn: Secure User Authentication of Smartphones with
Habitual Single-handed Shakes
MICI17-006.Performance Analysis of Mobile Data Offloading in
Heterogeneous Networks
MICI17-007.Distributed Clustering-Task Scheduling
for Wireless Sensor Networks Using Dynamic Hyper Round Policy
WIRELESS
SENSOR NETWORKS
MICI17-001.Data-Driven Faulty Node
Detection Scheme for Wireless Sensor Networks
SERVICE
COMPUTING
MICI17-001.Resource renting for periodical cloud workflow
applications
MICI17-002.Time
Dependent Pricing for Large-scale Mobile Networks of Urban Environment:
Feasibility and Adaptability
MICI17-003.TAFC: Time and Attribute Factors Combined Access
Control on Time-Sensitive Data in Public Cloud
MICI17-004. Resource renting for periodical cloud workflow
applications
KNOWLEDGE AND
DATA ENGINEERING
MICI17-001.Temporal task
scheduling with constrained service delay for profit maximization in hybrid
clouds
MICI17-002.Explaining Missing
Answers to Top-k SQL Queries
MICI17-003.Designing High
Performance Web-Based Computing Services to Promote Telemedicine Database
Management System
MICI17-004. Continuous Top-k
Monitoring on Document Streams
MICI17-005.Generating Query
Facets using Knowledge Bases
MICI17-006.PPRank:
Economically Selecting Initial Users for Influence Maximization in Social
Networks
MICI17-007. Influence
Maximization in Trajectory Databases
MICI17-008.An Iterative
Classification Scheme for Sanitizing Large-Scale Datasets
MICI17-009.Personal Web
Revisitation by Context and Content Keywords with Relevance Feedback
MICI17-010.Query Expansion with
Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
DEPENDABLE AND
SECURE COMPUTING
MICI17-001.A
Scalable Approach to Joint Cyber Insurance and Security-as-a-Service
Provisioning in Cloud Computing
MICI17-002.Cryptographic
Solutions for Credibility and Liability Issues of Genomic Data
MICI17-003.Efficient
Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
MICI17-004.Fault-Tolerant
Adaptive Routing in Dragonfly Networks
MICI17-005.On
the Security of a Variant of ElGamal Encryption Scheme
MICI17-006.Optimal
Spot-Checking for Collusion Tolerance in
Computer Grids
-Preserving Multi-keyword Top-k Similarity Search
Over Encrypted Data
MICI17-007.Privacy-Preserving
Aggregate Queries for Optimal Location Selection
MICI17-008.Design
and Implementation of the Ascend Secure Processor
MICI17-009.Efficient
Delegated Private Set Intersection on Outsourced Private Datasets
MICI17-001.Optimized
Identity-Based Encryption from Bilinear Pairing for Lightweight Devices
MICI17-010.Privacy-Aware
Caching in Information-Centric Networking
MICI17-011.Fuzzy Identity-Based Data Integrity
Auditing for Reliable Cloud Storage Systems
IMAGE
PROCESSING
MICI17-001.Temporal Dependent Rate-Distortion
Optimization for Low-Delay Hierarchical Video Coding.
MICI17-002.Scalable
Image Coding Based on Epitomes
MICI17-003.Image Re-ranking based on Topic
Diversity
MICI17-004.Coherent Semantic-visual Indexing for
Large-scale Image Retrieval in the Cloud
MICI17-005.Learning the image processing pipeline
MULTIMEDIA
MICI17-001.Optimal Representations for Adaptive
Streaming in Interactive Multi-View Video Systems
MICI17-002.Structure-Preserving Image
Super-resolution via Contextualized Multi-task Learning
MICI17-003.Visual Tracking via Nonnegative
Multiple Coding
MICI17-004.Image Based Appraisal of Real Estate
Properties
MICI17-005.Cost-Effective Low-Delay Design for
Multi-Party Cloud Video Conferencing
PARALLEL AND
DISTRIBUTED SYSTEM
MICI17-001.The Importance of Worker Reputation Information in Microtask-Based Crowd
Work Systems
SERVICE
COMPUTING, COMPUTERS, IOT
MICI17-001.TAFC: Time and
Attribute Factors Combined Access Control on Time-Sensitive Data in Public
Cloud
MICI17-002.Transactional
Behavior Verification in Business Process as a Service Configuration
MICI17-003.FogRoute: DTN-based
Data Dissemination Model in Fog Computing
MICI17-004.Pattern−Based
Design and Verification of Secure Service Compositions
MICI17-005.LoDPD:
A Location Difference-based Proximity Detection Protocol for Fog Computing
MICI17-006.Resource
Allocation in Vehicular Cloud Computing Systems with MICI17-007.Heterogeneous Vehicles and
Roadside Units
MICI17-008.Security-Aware
Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical
Systems via Multipath Receptions
SOFTWARE
ENGINEERING
MICI17-001.A Formal Specification and Verification
Framework for Timed Security Protocols
MICI17-002.A Survey of Recent Trends in Testing
Concurrent Software Systems
INFORMATION
FORENSICS AND SECURITY
MICI17-001.Two-Cloud Secure Database for Numeric-Related SQL
Range Queries with Privacy Preserving
MICI17-002.Twitter Trends Manipulation: A First Look Inside the
Security of Twitter Trending
MICI17-003.A Novel Efficient Remote Data Possession Checking
Protocol in Cloud Storage
MICI17-004. A Cross Tenant
Access Control (CTAC) Model for Cloud Computing: Formal Specification and
Verification
MICI17-005.RAAC: Robust and Auditable Access Control with
Multiple Attribute Authorities for Public Cloud Storage
MICI17-006.Identity-Based Data Outsourcing with Comprehensive
Auditing in Clouds
MICI17-007.Strong Key-Exposure Resilient Auditing for Secure
Cloud Storage
MICI17-008.Image origin classification
based on social network provenance
MICI17-009.Person Identification by Keystroke
Dynamics using Pairwise User Coupling
MICI17-010.Efficiently Promoting Product
Online Outcome: An Iterative Rating Attack Utilizing Product and Market
Property
INTELLIGENT TRANSPORTATION SYSTEMS
MICI17-001.EAAP: Efficient Anonymous
Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc
Networks
SECURITY COMPUTING
MICI17-001.FastGeo: Efficient Geometric Range Queries on
Encrypted Spatial Data
MICI17-002.Fuzzy Identity-Based Data Integrity Auditing for
Reliable Cloud Storage Systems
MICI17-003.Cloud Data Auditing
Techniques with a Focus on Privacy and Security
BIG DATA
MICI17-001.Attribute Based Storage Supporting Secure
Deduplication of Encrypted Data in Cloud
MICI17-002.Detecting and Analyzing Urban Regions
with High Impact of Weather Change on Transport
MICI17-003.Visual Analysis of Multiple Route
Choices based on General GPS Trajectories
MICI17-004.Survey on Improving Data Utility in
Differentially Private Sequential Data Publishing
MICI17-005.Big Data Based Security Analytics for
Protecting Virtualized Infrastructures in Cloud Computing
MICI17-006.Secure k-NN Query on Encrypted Cloud
Data with Multiple Keys
MICI17-007.A Pre-Authentication Approach to Proxy
Re-encryption in Big Data Context
MICI17-008.Secure Authentication in Cloud Big Data
with Hierarchical Attribute Authorization Structure
MICI17-009.Privacy-Preserving Data Encryption
Strategy for Big Data in Mobile Cloud Computing
MICI17-010.Optimizing Share Size in Efficient and
Robust Secret Sharing Scheme for Big Data
MICI17-011.Revocable Identity-Based Access Control
for Big Data with Verifiable Outsourced Computing
MICI17-012.Efficient Recommendation of
De-identification Policies using Map Reduce
MICI17-013.NPP: A New Privacy-Aware Public
Auditing Scheme for Cloud Data Sharing with Group Users
MICI17-014.A
Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
MICI17-015.Heterogeneous Data Storage Management with
Deduplication in Cloud Computing
Comments
Post a Comment