SlideShare a Scribd company logo
JAVA IEEE TITLES 2015
S.NO Project Title Domain
1 A Hybrid Cloud Approach for Secure Authorized
Deduplication
Cloud Computing
2 A Profit Maximization Scheme with Guaranteed Quality of
Service in Cloud Computing
Cloud Computing
3 A Scalable and Reliable Matching Service for Content-Based
Publish/Subscribe Systems
Cloud Computing
4 A Secure and Dynamic Multi-keyword Ranked Search
Scheme over Encrypted Cloud Data
Cloud Computing
5 A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
Cloud Computing
6 An Authenticated Trust and Reputation Calculation and
Management System for Cloud and Sensor Networks
Integration
Cloud Computing
7 Audit-Free Cloud Storage via Deniable Attribute-based
Encryption
Cloud Computing
8 Circuit Ciphertext-policy Attribute-based Hybrid Encryption
with Verifiable Delegation in Cloud Computing
Cloud Computing
9 Cloud Armor: Supporting Reputation-based Trust
Management for Cloud Services
Cloud Computing
10 Control Cloud Data Access Privilege and Anonymity with
Fully Anonymous Attribute-Based Encryption
Cloud Computing
11 Enabling Cloud Storage Auditing With Key-Exposure
Resistance
Cloud Computing
12 Enabling Fine-grained Multi-keyword Search Supporting
Classified Sub-dictionaries over Encrypted Cloud Data
Cloud Computing
13 Identity-Based Encryption with Outsourced Revocation in
Cloud Computing
Cloud Computing
14 Key-Aggregate Searchable Encryption (KASE) for Group
Data Sharing via Cloud Storage
Cloud Computing
15 Privacy Preserving Ranked Multi-Keyword Search for
Multiple Data Owners in Cloud Computing
Cloud Computing
16 Privacy-Preserving Public Auditing for Regenerating-Code-
Based Cloud Storage
Cloud Computing
17 Provable Multi copy Dynamic Data Possession in Cloud
Computing Systems
Cloud Computing
18 Public Integrity Auditing for Shared Dynamic Cloud Data
with Group User Revocation
Cloud Computing
19 Secure Auditing and Deduplicating Data in Cloud Cloud Computing
20 Stealthy Denial of Service Strategy in Cloud Computing Cloud Computing
21 Mobi Context: A Context-aware Cloud-Based Venue Cloud Computing
Recommendation Framework
22 SAE: Toward Efficient Cloud Data Analysis Service for
Large-Scale Social Networks
Cloud Computing
23 Understanding the Performance and Potential of Cloud
Computing for Scientific Applications
Cloud Computing
24 Towards Optimized Fine-Grained Pricing of IaaS Cloud
Platform
Cloud Computing
25 Service Operator-aware Trust Scheme for Resource
Matchmaking across Multiple Clouds
Cloud Computing
26 Reactive Resource Provisioning Heuristics for Dynamic
Dataflows on Cloud Infrastructure
Cloud Computing
27 A Profit Maximization Scheme with Guaranteed Quality of
Service in Cloud Computing
Cloud Computing
28 OPoR: Enabling Proof of Retrievability in Cloud Computing
with Resource-Constrained Devices
Cloud Computing
29 Best Keyword Cover Search Data Mining
30 Co-Extracting Opinion Targets and Opinion Words from
Online Reviews Based on the Word Alignment Model
Data Mining
31 Context-Based Diversification for Keyword Queries over
XML Data
Data Mining
32 Discovery of Ranking Fraud for Mobile Apps Data Mining
33 Malware Propagation in Large-Scale Networks Data Mining
34 On Summarization and Timeline Generation for Evolutionary
Tweet Streams
Data Mining
35 Privacy Policy Inference of User-Uploaded Images on Content
Sharing Sites
Data Mining
36 Progressive Duplicate Detection Data Mining
37 Reverse Nearest Neighbors in Unsupervised Distance-Based
Outlier Detection
Data Mining
38 Route-Saver: Leveraging Route APIs for Accurate and
Efficient Query Processing at Location-Based Services
Data Mining
39 Scalable Constrained Spectral Clustering Data Mining
40 Towards Effective Bug Triage with Software Data Reduction
Techniques
Data Mining
41 Tweet Segmentation and Its Application to Named Entity
Recognition
Data Mining
42 Subgraph Matching with Set Similarity in a Large Graph
Database
Data Mining
43 Structured Learning from Heterogeneous Behavior for Social
Identity Linkage
Data Mining
44 Making Digital Artifacts on the Web Verifiable and Reliable Data Mining
45 Anonymizing Collections of Tree-Structured Data Data Mining
46 FOCS: Fast Overlapped Community Search Data Mining
47 Sparsity Learning Formulations for Mining Time-Varying
Data
Data Mining
48 K-Nearest Neighbor Classification over Semantically Secure
Encrypted Relational
Data Mining
49 The Impact of View Histories on Edit Recommendations Data Mining
50 Agent-based Interactions and Economic Encounters in an
Intelligent Inter Cloud
Data Mining
51 A Distortion-Resistant Routing Framework for Video Traffic
in Wireless Multihop Networks
Data Mining
52 Detecting Malicious Facebook Applications Data Mining
53 Maximizing P2P File Access Availability in Mobile Ad Hoc
Networks though Replication for Efficient File Sharing
Data Mining
54 A Proximity-Aware Interest-Clustered P2P File Sharing
System
Data Mining
55 Dynamic Routing for Data Integrity and Delay Differentiated
Services in Wireless Sensor Networks
Mobile Computing
56 Friend book: A Semantic-Based Friend Recommendation
System for Social Networks
Mobile Computing
57 Privacy-Preserving and Truthful Detection of Packet Dropping
Attacks in Wireless Ad Hoc Networks
Mobile Computing
58 User-Defined Privacy Grid System for Continuous Location-
Based Services
Mobile Computing
59 Maximizing Energy Efficiency in Multiple Access Channels
by Exploiting Packet Dropping and Transmitter Buffering
Mobile Computing
60 Tracking Temporal Community Strength in Dynamic
Networks
Mobile Computing
61 Modeling and Analysis of Communication Traffic
Heterogeneity in Opportunistic Networks
Mobile Computing
62 Towards Information Diffusion in Mobile Social Networks Mobile Computing
63 User-Defined Privacy Grid System for Continuous Location-
Based Services
Mobile Computing
64 A Computational Dynamic Trust Model for User
Authorization
Secure Computing
65 A Lightweight Secure Scheme for Detecting Provenance
Forgery and Packet Drop Attacks in Wireless Sensor
Networks
Secure Computing
66 Continuous and Transparent User Identity Verification for
Secure Internet Services
Secure Computing
67 Contributory Broadcast Encryption with Efficient Encryption
and Short Cipher texts
Secure Computing
68 DDSGA: A Data-Driven Semi-Global Alignment Approach
for Detecting Masquerade Attacks
Secure Computing
69 Improved Privacy-Preserving P2P Multimedia Distribution Secure Computing
Based on Recombined Fingerprints
70 Secure Data Aggregation Technique for Wireless Sensor
Networks in the Presence of Collusion Attacks
Secure Computing
71 Secure Spatial Top-k Query Processing via Untrusted
Location- Based Service Providers
Secure Computing
72 Smart Crawler: A Two-stage Crawler for Efficiently
Harvesting Deep-Web Interfaces
Secure Computing
73 Collusion-Tolerable Privacy-Preserving Sum and Product
Calculation without Secure Channel
Secure Computing
74 Formalization and Verification of Group Behavior Interactions Secure Computing
75 Group Key Agreement with Local Connectivity Secure Computing
76 Data Lineage in Malicious Environments Secure Computing
77 Privacy-Preserving Public Auditing for Regenerating-Code-
Based Cloud Storage
Secure Computing
78 Improving Privacy and Security in Decentralized Ciphertext-
Policy Attribute-Based Encryption
Secure Computing
79 Formalization and Verification of Group Behavior Interactions Secure Computing
80 Enabling Cloud Storage Auditing with Key-Exposure
Resistance
Secure Computing
81 Control Cloud Data Access Privilege and Anonymity With
Fully Anonymous Attribute-Based Encryption
Secure Computing
82 nonymity-based Privacy-preserving Data Reporting for
Participatory Sensing
Secure Computing
83 Asymmetric Social Proximity Based Private Matching
Protocols for Online Social Networks
Parallel & Distributed
Systems
84 Cost-Effective Authentic and Anonymous Data Sharing with
Forward Security
Parallel & Distributed
Systems
85 Secure Distributed Deduplication Systems with Improved
Reliability
Parallel & Distributed
Systems
86 Service Operator-aware Trust Scheme for Resource
Matchmaking across Multiple Clouds
Parallel & Distributed
Systems
87 A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
Parallel & Distributed
Systems
88 A Computational Dynamic Trust Model for User
Authorization
Parallel & Distributed
Systems
89 Secure Distributed Deduplication Systems with Improved
Reliability
Parallel & Distributed
Systems
90 Collusion-Tolerable Privacy-Preserving Sum and Product
Calculation without Secure Channel
Parallel & Distributed
Systems
91 Control Cloud Data Access Privilege and Anonymity With
Fully Anonymous Attribute-Based Encryption
Parallel & Distributed
Systems
92 A Framework for Secure Computations with Two Non-
Colluding Servers and Multiple Clients, Applied to
Information Forensics
And Security
Recommendations
93 Effective Key Management in Dynamic Wireless Sensor
Networks
Information Forensics
And Security
94
Key Updating for Leakage Resiliency with Application to
AES Modes of Operation
Information
Forensics And
Security
95
Passive IP Trace back: Disclosing the Locations of IP
Spoofers from Path Backscatter
Information
Forensics And
Security
96
Software Puzzle: A Countermeasure to Resource-Inflated
Denial of- Service Attacks
Information
Forensics And
Security
97 An Attribute-Assisted Reranking Model for Web Image
Search
Image Processing
98 EMR: A Scalable Graph-based Ranking Model for Content-
based Image Retrieval
Image Processing
99 Learning to Rank Image Tags With Limited Training
Examples
Image Processing
100 Multiview Alignment Hashing for Efficient Image Search Image Processing
101 YouTube Video Promotion by Cross-network Image Processing
102 Semantic-Improved Color Imaging Applications: It Is All
About Context
Image Processing
103 Geolocalized Modeling for Dish Recognition Image Processing
104 Automatic Face Naming by Learning Discriminative Affnity
Matrices From Weakly Labeled Image
Image Processing
105 Multiview Alignment Hashing for Efficient Image Image Processing
106 The Impact of View Histories on Edit Recommendations Software Engineering
107 Designing High Performance Web-Based Computing Services
to Promote Telemedicine Database Management System
Service Computing
(Web Service)
108 Location-Aware and Personalized Collaborative Filtering for
Web Service Recommendation
Service Computing
(Web Service)
109 A Fuzzy Preference Tree-Based Recommender System for
Personalized Business-to-Business E-Services
Fuzzy Systems

More Related Content

DOCX
Java ieee 2020 21 projects list
Venkat Projects
 
PDF
Java titles 2017 2018
GREEN CORNER TECH
 
DOCX
2014 and 2015 ieee final list
Manju Nath
 
PDF
Final year IEEE projects for 2013-14
projectsepark
 
DOC
Dotnet application-non-ieee
xtreamtechnologies
 
PDF
Cse titles 2020
Vision Solutions
 
DOCX
2014 java ieee
Anand Buddarapu
 
DOC
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
Ganesh Ganesan
 
Java ieee 2020 21 projects list
Venkat Projects
 
Java titles 2017 2018
GREEN CORNER TECH
 
2014 and 2015 ieee final list
Manju Nath
 
Final year IEEE projects for 2013-14
projectsepark
 
Dotnet application-non-ieee
xtreamtechnologies
 
Cse titles 2020
Vision Solutions
 
2014 java ieee
Anand Buddarapu
 
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
Ganesh Ganesan
 

What's hot (12)

DOCX
2015 and 2016 ieee projects list
Tmks Infotech
 
PDF
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
krish madhi
 
PDF
2015 and 2016 IEEE Projects for Cloud Computing
Manju Nath
 
PDF
2014 list
sai samba
 
PDF
Ieee 2015 2016
Focuslogic Walaja
 
DOC
Ieee 2014 java projects list
Mumbai Academisc
 
DOC
Novel secure communication protocol basepaper
Mumbai Academisc
 
DOCX
2014 and 2015 IEEE Projects
Tmks Infotech
 
DOC
2021- 22 IEEE JAVA Projects
MSR PROJECTS
 
PDF
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
Adz91 Digital Ads Pvt Ltd
 
DOC
Ieee 2013 dot net projects list
Mumbai Academisc
 
DOCX
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Manju Nath
 
2015 and 2016 ieee projects list
Tmks Infotech
 
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
krish madhi
 
2015 and 2016 IEEE Projects for Cloud Computing
Manju Nath
 
2014 list
sai samba
 
Ieee 2015 2016
Focuslogic Walaja
 
Ieee 2014 java projects list
Mumbai Academisc
 
Novel secure communication protocol basepaper
Mumbai Academisc
 
2014 and 2015 IEEE Projects
Tmks Infotech
 
2021- 22 IEEE JAVA Projects
MSR PROJECTS
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
Adz91 Digital Ads Pvt Ltd
 
Ieee 2013 dot net projects list
Mumbai Academisc
 
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Manju Nath
 
Ad

Similar to CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra Pradesh (20)

DOCX
Java ieee 2020 21 projects list
Venkat Projects
 
DOC
Ieee java projects list
Mumbai Academisc
 
DOC
Ieee 2013 java projects list
Mumbai Academisc
 
DOC
Java IEEE Projects 2012-2011-2010
java projects IEEE
 
PDF
CSE Dot net ieee projects 2015.Nellore
Green Corner Tech,Nellore
 
PDF
Hb services java ieee 2015 - 16
HB Educational Services
 
PDF
cse projects,Dot net ieee projects 2015,green corner tech,nellore
Green Corner Tech,Nellore
 
DOC
Global tech project list
Jayesh Buwa
 
DOC
Java IEEE 2013 Projects list
java projects IEEE
 
DOCX
java project centre in chennai
Aishwarya Rajesh
 
DOCX
ece project centre in chennai titles 2014
Aishwarya Rajesh
 
DOCX
final year ieee project centre in chennai
Aishwarya Rajesh
 
DOCX
best project centre in chennai titles 2014
Aishwarya Rajesh
 
DOCX
ieee project centre in chennai
Aishwarya Rajesh
 
DOCX
dotnet project centre in chennai
Aishwarya Rajesh
 
DOCX
best ieee project centre in chennai
Aishwarya Rajesh
 
DOCX
be project centre in chennai
Aishwarya Rajesh
 
DOCX
cse project centre in chennai
Aishwarya Rajesh
 
DOC
Java projects 2013 14
MSR PROJECTS
 
PDF
Java 2015 project list
MSR PROJECTS
 
Java ieee 2020 21 projects list
Venkat Projects
 
Ieee java projects list
Mumbai Academisc
 
Ieee 2013 java projects list
Mumbai Academisc
 
Java IEEE Projects 2012-2011-2010
java projects IEEE
 
CSE Dot net ieee projects 2015.Nellore
Green Corner Tech,Nellore
 
Hb services java ieee 2015 - 16
HB Educational Services
 
cse projects,Dot net ieee projects 2015,green corner tech,nellore
Green Corner Tech,Nellore
 
Global tech project list
Jayesh Buwa
 
Java IEEE 2013 Projects list
java projects IEEE
 
java project centre in chennai
Aishwarya Rajesh
 
ece project centre in chennai titles 2014
Aishwarya Rajesh
 
final year ieee project centre in chennai
Aishwarya Rajesh
 
best project centre in chennai titles 2014
Aishwarya Rajesh
 
ieee project centre in chennai
Aishwarya Rajesh
 
dotnet project centre in chennai
Aishwarya Rajesh
 
best ieee project centre in chennai
Aishwarya Rajesh
 
be project centre in chennai
Aishwarya Rajesh
 
cse project centre in chennai
Aishwarya Rajesh
 
Java projects 2013 14
MSR PROJECTS
 
Java 2015 project list
MSR PROJECTS
 
Ad

More from Green Corner Tech,Nellore (8)

PDF
Vlsi Projects titles 2018 19
Green Corner Tech,Nellore
 
PDF
Matlab ECE ieee titles 2018 2019
Green Corner Tech,Nellore
 
PDF
Diploma projects Mini projects list
Green Corner Tech,Nellore
 
PDF
Embedded Projects b.tech 2018-19
Green Corner Tech,Nellore
 
PDF
Eee titles2018 2019
Green Corner Tech,Nellore
 
PDF
Java ieee titles2016 student
Green Corner Tech,Nellore
 
PDF
Embedded b tech projects nellore
Green Corner Tech,Nellore
 
PDF
Btech eee projects Nellore,Greencornertech
Green Corner Tech,Nellore
 
Vlsi Projects titles 2018 19
Green Corner Tech,Nellore
 
Matlab ECE ieee titles 2018 2019
Green Corner Tech,Nellore
 
Diploma projects Mini projects list
Green Corner Tech,Nellore
 
Embedded Projects b.tech 2018-19
Green Corner Tech,Nellore
 
Eee titles2018 2019
Green Corner Tech,Nellore
 
Java ieee titles2016 student
Green Corner Tech,Nellore
 
Embedded b tech projects nellore
Green Corner Tech,Nellore
 
Btech eee projects Nellore,Greencornertech
Green Corner Tech,Nellore
 

Recently uploaded (20)

PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PDF
Introduction to Data Science: data science process
ShivarkarSandip
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PDF
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
PPTX
Color Model in Textile ( RGB, CMYK).pptx
auladhossain191
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPT
Ppt for engineering students application on field effect
lakshmi.ec
 
PPTX
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
PDF
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Introduction of deep learning in cse.pptx
fizarcse
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PPTX
22PCOAM21 Data Quality Session 3 Data Quality.pptx
Guru Nanak Technical Institutions
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
Introduction to Data Science: data science process
ShivarkarSandip
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
Color Model in Textile ( RGB, CMYK).pptx
auladhossain191
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
Ppt for engineering students application on field effect
lakshmi.ec
 
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Inventory management chapter in automation and robotics.
atisht0104
 
Software Testing Tools - names and explanation
shruti533256
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Introduction of deep learning in cse.pptx
fizarcse
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
22PCOAM21 Data Quality Session 3 Data Quality.pptx
Guru Nanak Technical Institutions
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 

CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra Pradesh

  • 1. JAVA IEEE TITLES 2015 S.NO Project Title Domain 1 A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing 2 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing Cloud Computing 3 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems Cloud Computing 4 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Cloud Computing 5 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Cloud Computing 6 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration Cloud Computing 7 Audit-Free Cloud Storage via Deniable Attribute-based Encryption Cloud Computing 8 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing Cloud Computing 9 Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services Cloud Computing 10 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption Cloud Computing 11 Enabling Cloud Storage Auditing With Key-Exposure Resistance Cloud Computing 12 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data Cloud Computing 13 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Cloud Computing 14 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage Cloud Computing 15 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Cloud Computing 16 Privacy-Preserving Public Auditing for Regenerating-Code- Based Cloud Storage Cloud Computing 17 Provable Multi copy Dynamic Data Possession in Cloud Computing Systems Cloud Computing 18 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Cloud Computing 19 Secure Auditing and Deduplicating Data in Cloud Cloud Computing 20 Stealthy Denial of Service Strategy in Cloud Computing Cloud Computing 21 Mobi Context: A Context-aware Cloud-Based Venue Cloud Computing
  • 2. Recommendation Framework 22 SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks Cloud Computing 23 Understanding the Performance and Potential of Cloud Computing for Scientific Applications Cloud Computing 24 Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform Cloud Computing 25 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds Cloud Computing 26 Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure Cloud Computing 27 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing Cloud Computing 28 OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices Cloud Computing 29 Best Keyword Cover Search Data Mining 30 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model Data Mining 31 Context-Based Diversification for Keyword Queries over XML Data Data Mining 32 Discovery of Ranking Fraud for Mobile Apps Data Mining 33 Malware Propagation in Large-Scale Networks Data Mining 34 On Summarization and Timeline Generation for Evolutionary Tweet Streams Data Mining 35 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining 36 Progressive Duplicate Detection Data Mining 37 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection Data Mining 38 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services Data Mining 39 Scalable Constrained Spectral Clustering Data Mining 40 Towards Effective Bug Triage with Software Data Reduction Techniques Data Mining 41 Tweet Segmentation and Its Application to Named Entity Recognition Data Mining 42 Subgraph Matching with Set Similarity in a Large Graph Database Data Mining 43 Structured Learning from Heterogeneous Behavior for Social Identity Linkage Data Mining 44 Making Digital Artifacts on the Web Verifiable and Reliable Data Mining 45 Anonymizing Collections of Tree-Structured Data Data Mining 46 FOCS: Fast Overlapped Community Search Data Mining
  • 3. 47 Sparsity Learning Formulations for Mining Time-Varying Data Data Mining 48 K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data Mining 49 The Impact of View Histories on Edit Recommendations Data Mining 50 Agent-based Interactions and Economic Encounters in an Intelligent Inter Cloud Data Mining 51 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks Data Mining 52 Detecting Malicious Facebook Applications Data Mining 53 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Data Mining 54 A Proximity-Aware Interest-Clustered P2P File Sharing System Data Mining 55 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks Mobile Computing 56 Friend book: A Semantic-Based Friend Recommendation System for Social Networks Mobile Computing 57 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Mobile Computing 58 User-Defined Privacy Grid System for Continuous Location- Based Services Mobile Computing 59 Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering Mobile Computing 60 Tracking Temporal Community Strength in Dynamic Networks Mobile Computing 61 Modeling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks Mobile Computing 62 Towards Information Diffusion in Mobile Social Networks Mobile Computing 63 User-Defined Privacy Grid System for Continuous Location- Based Services Mobile Computing 64 A Computational Dynamic Trust Model for User Authorization Secure Computing 65 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks Secure Computing 66 Continuous and Transparent User Identity Verification for Secure Internet Services Secure Computing 67 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts Secure Computing 68 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks Secure Computing 69 Improved Privacy-Preserving P2P Multimedia Distribution Secure Computing
  • 4. Based on Recombined Fingerprints 70 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Secure Computing 71 Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers Secure Computing 72 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces Secure Computing 73 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel Secure Computing 74 Formalization and Verification of Group Behavior Interactions Secure Computing 75 Group Key Agreement with Local Connectivity Secure Computing 76 Data Lineage in Malicious Environments Secure Computing 77 Privacy-Preserving Public Auditing for Regenerating-Code- Based Cloud Storage Secure Computing 78 Improving Privacy and Security in Decentralized Ciphertext- Policy Attribute-Based Encryption Secure Computing 79 Formalization and Verification of Group Behavior Interactions Secure Computing 80 Enabling Cloud Storage Auditing with Key-Exposure Resistance Secure Computing 81 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Secure Computing 82 nonymity-based Privacy-preserving Data Reporting for Participatory Sensing Secure Computing 83 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks Parallel & Distributed Systems 84 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Parallel & Distributed Systems 85 Secure Distributed Deduplication Systems with Improved Reliability Parallel & Distributed Systems 86 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds Parallel & Distributed Systems 87 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Parallel & Distributed Systems 88 A Computational Dynamic Trust Model for User Authorization Parallel & Distributed Systems 89 Secure Distributed Deduplication Systems with Improved Reliability Parallel & Distributed Systems 90 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel Parallel & Distributed Systems 91 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Parallel & Distributed Systems 92 A Framework for Secure Computations with Two Non- Colluding Servers and Multiple Clients, Applied to Information Forensics And Security
  • 5. Recommendations 93 Effective Key Management in Dynamic Wireless Sensor Networks Information Forensics And Security 94 Key Updating for Leakage Resiliency with Application to AES Modes of Operation Information Forensics And Security 95 Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path Backscatter Information Forensics And Security 96 Software Puzzle: A Countermeasure to Resource-Inflated Denial of- Service Attacks Information Forensics And Security 97 An Attribute-Assisted Reranking Model for Web Image Search Image Processing 98 EMR: A Scalable Graph-based Ranking Model for Content- based Image Retrieval Image Processing 99 Learning to Rank Image Tags With Limited Training Examples Image Processing 100 Multiview Alignment Hashing for Efficient Image Search Image Processing 101 YouTube Video Promotion by Cross-network Image Processing 102 Semantic-Improved Color Imaging Applications: It Is All About Context Image Processing 103 Geolocalized Modeling for Dish Recognition Image Processing 104 Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image Image Processing 105 Multiview Alignment Hashing for Efficient Image Image Processing 106 The Impact of View Histories on Edit Recommendations Software Engineering 107 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Service Computing (Web Service) 108 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation Service Computing (Web Service) 109 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services Fuzzy Systems