SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
 

 
 
 
 

Academic Projects for
CSE (2013-2014)
 
 
 

We will develop your ideas and your papers also,
For any Further information call-9603150547
e-mail visionsolutions.9@gmail.com
 
 
 
 
 

DOTNET
DATA MINING
1. Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional
Data. [SMS001]
2.Secure Mining of Association Rules in Horizontally Distributed Databases. [SMS002]
3.A Novel Profit Maximizing Metric for Measuring Classification Performance of
Customer Churn Prediction Models. [SMS003]
4.ELCA: Evaluation for Keyword Search on Probabilistic XML a Data. [SMS004]
5.Dynamic Query Forms for Database Queries. [SMS005]
6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors. [SMS006]
7.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled
Data Warehouse. [SMS007]
8. Clustering

Sentence-Level

Text

Using

a

Novel

Fuzzy

Relational

Clustering

Algorithm. [SMS008]
9. Optimal Route Queries with Arbitrary Order Constraints. [SMS009]
10.Failure-Aware Cascaded Suppression in Wireless Sensor Networks. [SMS010]

NETWORKING AND NETWORK SECURITY
11.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System. [SMS011]
12. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless
Mesh Network. [SMS012]
13.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming
Systems. [SMS013]
14.Diffusion Dynamics of Network Technologies With Bounded Rational Users:
Aspiration-Based Learning. [SMS014]
15.Delay-Based Network Utility Maximization. [SMS015]
16.Answering “What-If” Deployment and Configuration Questions With WISE:
Techniques and Deployment Experience. [SMS016]
17.An Empirical Interference Modeling for Link Reliability Assessment in Wireless
Networks. [SMS017]
 

18.A

Rank

Correlation

Based

Detection

against

Distributed

Reflection

DoS

Attacks. [SMS018]

CLOUD COMPUTING
19.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud. [SMS019]
20.Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS020]
21.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption. [SMS021]
22.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems. [SMS022]
23.CloudMoV: Cloud-based Mobile Social TV. [SMS023]
24.Privacy Preserving Delegated Access Control in Public Clouds. [SMS024]
25.Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing
Networks. [SMS025]
MOBILE COMPUTING
26.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead
in Mobile Ad Hoc Networks. [SMS026]
27.EAACK—A Secure Intrusion-Detection System for MANETs D. [SMS027]
28.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users. [SMS028]
29.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating
System. [SMS029]
30.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in
Mobile Ad Hoc Networks. [SMS030]
31.On

Quality

of

Monitoring

for

Multi-channel

Wireless

Infrastructure

Networks. [SMS031]
32.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks. [SMS032]
33.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS033]
34.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users. [SMS034]
 

35.EMAP:

Expedite

Message

Authentication

Protocol

for

Vehicular

Ad

Hoc

Networks. [SMS035]

PARALLEL DISTRIBUTED SYSTEMS
36.A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices. [SMS036]
37.Exploiting Service Similarity for Privacy in Location Based Search Queries. [SMS037]
38.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS038]
39.GKAR:

A

Novel

Geographic

K-Anycast

Routing

for

Wireless

Sensor

Networks. [SMS039]
40.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Environment. [SMS040]
41.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing
Clouds. [SMS041]
42.BAHG:

Back-Bone-Assisted

Hop

Greedy

Routing

for

VANET’s

City

Environments. [SMS042]
43.ASAP:

An

Adaptive

Sampling

Approach

to

Data

Collection

in

Sensor

Networks. [SMS043]
44.A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem
and Its Efficient Parallelization. [SMS044]
45.A General Framework for Efficient Continuous Multidimensional Top-k Query
Processing in Sensor Networks. [SMS045]

SERVICECOMPUTING

46.Privacy-EnhancedWebServiceComposition. [SMS046]
47.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
InformationSharing. [SMS047]
48.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems. [SMS048]
 

49.Document Clustering for Forensic Analysis: An Approach for Improving Computer
Inspection. [SMS049]
50.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing. [SMS050]

IMAGEPROCESSING
51.Face Recognition and Verification Using Photometric Stereo: The Photo face Database
and a Comprehensive Evaluation. [SMS051]
 

JAVA
DATA MINING
1.A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional
Data.[SMS001]
2.A Framework for Mining Signatures from Event Sequences and Its Applications in
Healthcare Data.[SMS002]
3.A Novel Profit Maximizing Metric for Measuring Classification Performance of
Customer Churn Prediction Models.[SMS003]
4.A Survey of XML Tree Patterns.[SMS004]
5.Change Detection in Streaming Multivariate Data Using Likelihood Detectors.[SMS005]
6.Dynamic Personalized Recommendation on Sparse Data.[SMS006]
7.Mining

User

Queries

with

Markov

Chains:

Application

to

Online

Image

Retrieval.[SMS007]
8. Optimal Route Queries with Arbitrary Order Constraints.[SMS008]
9.Failure-Aware Cascaded Suppression in Wireless Sensor Networks.[SMS009]
10.Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and RuleBased Model.[SMS010]
11.A System to Filter Unwanted Messages from OSN User Walls.[SMS011]
12.M-Privacy for Collaborative Data Publishing.[SMS012]
13.Comparable Entity Mining from Comparative Questions.[SMS013]
14.Spatial Approximate String Search.[SMS014]
15.Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled
Data Warehouse.[SMS015]

NETWORKING AND NETWORK SECURITY
16.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System.[SMS016]
17.Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless
Mesh Networks.[SMS017]
18.Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging
Quality.[SMS018]
 

19.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming
Systems.[SMS019]
20.Efficient Algorithms for Neighbor Discovery in Wireless Networks.[SMS020]
21.Diffusion Dynamics of Network Technologies With Bounded Rational Users:
Aspiration-Based Learning.[SMS021]
22.Answering “What-If” Deployment and Configuration Questions With WISE:
Techniques and Deployment Experience.[SMS022]
23.An Empirical Interference Modeling for Link Reliability Assessment in Wireless
Networks.[SMS023]
24.An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc
Networks.[SMS024]
25.A

Rank

Correlation

Based

Detection

Resources

for

against

Distributed

Reflection

DoS

Attacks.[SMS025]
26.Optimizing

Cloud

Delivering

IPTV

Services

through

Virtualization.[SMS026]
27.Participatory Privacy Enabling Privacy in Participatory Sensing.[SMS027]

CLOUD COMPUTING
28.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud.[SMS028]
29.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS029]
30.Winds of Change From Vendor Lock-In to the Meta Cloud.[SMS030]
31.Cloud computing for mobile users can offloading compution save energy.[SMS031]
32.On Data Staging Algorithms for Shared Data Accesses in Clouds.[SMS032]
33.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems.[SMS033]
34.AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social
Video Sharing in the Clouds.[SMS034]
35.CloudMoV: Cloud-based Mobile Social TV.[SMS035]
36.QoS Ranking Prediction for Cloud Services.[SMS036]
37.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS037]
 

38.Collaboration

in

Multicloud

Computing

Environments:

Framework

and

Security Issues.[SMS038]
39.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS039]
40.Towards Differential Query Services in Cost-Efficient Clouds.[SMS040]

MOBILE COMPUTING
41.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead
in Mobile Ad Hoc Networks.[SMS041]
42.EAACK :A Secure Intrusion-Detection System for MANETs.[SMS042]
43.Vampire attacks:Draining life from wireless ad-hoc sensor networks.[SMS043]
44.Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor
Networks.[SMS044]
45.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in
Mobile Ad Hoc Networks.[SMS045]
46.On

Quality

of

Monitoring

for

Multi-channel

Wireless

Infrastructure

Networks.[SMS046]
47.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.[SMS047]
48.A Scalable Server Architecture for Mobile Presence Services in Social Network
Applications.[SMS048]
49.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users.[SMS049]
50.EMAP:

Expedite

Message

Authentication

Protocol

for

Vehicular

Ad

Hoc

Mobile

Ad

Hoc

Networks.[SMS050]
51.Adaptive

Position

Update

for

Geographic

Routing

in

Networks.[SMS051]
52.Community-Aware Opportunistic Routing in Mobile Social Networks.[SMS052]
53.Distributed Cooperative Caching in Social Wireless Networks.[SMS053]
54.Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference
Cancellation.[SMS054]
55.Toward a Statistical Framework for Source Anonymity in Sensor Networks.[SMS055]
 

PARALLEL DISTRIBUTED SYSTEMS
56.Covering Points of Interest with Mobile Sensors.[SMS056]
57.A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.[SMS057]
58.Analysis of Distance-Based Location Management in Wireless Communication
Networks.[SMS058]
59.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor
Networks.[SMS059]
60.Error-Tolerant

Resource

Allocation

and

Payment

Minimization

for

Cloud

System.[SMS060]
61.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems.[SMS061]
62.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Environment.[SMS062]
63.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing
Clouds.[SMS063]
64.BAHG:

Back-Bone-Assisted

Hop

Greedy

Routing

for

VANET’s

City

Environments.[SMS064]
65.Towards Differential Query Services in Cost-Efficient Clouds.[SMS065]
66.A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy
Preserving of Intermediate Datasets in Cloud.[SMS066]
67.Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage
Systems.[SMS067]
68.ASAP:

An

Adaptive

Sampling

Approach

to

Data

Collection

in

Sensor

Networks.[SMS068]
69.Detection

and

Localization

of

Multiple

Spoofing

Attackers

in

Wireless

Networks.[SMS069]

70.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing.[SMS070]
 

SERVICE COMPUTING
71.Privacy-Enhanced Web Service Composition.[SMS071]
72.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems.[SMS072]
73.Document Clustering for Forensic Analysis: An Approach for Improving Computer
Inspection.[SMS073]

SECURE COMPUTING
74.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS074]
75.Secure

Encounter-based

Mobile

Social

Networks

Tradeoffs.[SMS075]
76.Two tales of privacy in online social networks.[SMS076]

Requirements

Designs

and
 

ANDROID
DATA MINING
1.Finding

Rare

Classes

Active

Learning

with

Generative

and

Discriminative

Models. [SMS001]
2.A Generalized Flow-Based Method for Analysis of Implicit Relationships on
Wikipedia . [SMS002]
3.A Survey of XML Tree Patterns. [SMS003]
4.Anonymization of Centralized and Distributed Social Networks by Sequential
Clustering . [SMS004]
5.T-Drive Enhancing Driving Directions with Taxi Driversâc Intelligence. [SMS005]
6.Region-Based Foldings in Process Discovery. [SMS006]
7.Ranking on Data Manifold with Sink Points. [SMS007]
8.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled
Data Warehouse. [SMS008]

CLOUD COMPUTING
9. Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS009]
10. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption. [SMS010]
11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems. [SMS011]
12.

CloudMoV: Cloud-based Mobile Social TV. [SMS012]
 

MOBILE COMPUTING
13.

Discovery

and

Verification

of

Neighbor

Positions

in

Mobile

Ad

Hoc

Networks. [SMS013]
14.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating
System. [SMS014]
15.SSD

A

Robust

RF

Location

Fingerprint

Addressing

Mobile

Devicesa

Heterogeneity. [SMS015]
16.A Scalable Server Architecture for Mobile Presence Services in Social Network
Applications. [SMS016]
17.Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. [SMS017]

PARALLEL DISTRIBUTED SYSTEMS
18.Distributed

Web

Systems

Performance

Forecasting

Using

Turning

Bands

Method. [SMS018]
19.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption. [SMS019]
20.Security Analysis of a Single Sign-On Mechanism for Distributed Computer
Networks. [SMS020]
21.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor
Networks. [SMS021]
22.Analysis of Distance-Based Location Management in Wireless Communication
Networks. [SMS022]
 

SERVICE COMPUTING
23.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing. [SMS023]
24.Document Clustering for Forensic Analysis: An Approach for Improving Computer
Inspection. [SMS024]
25.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing. [SMS025]

Mais conteúdo relacionado

Mais procurados

Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014xtreamtechnologies
 
Java ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatoreJava ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatoreabile technologies
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESMusthafa Tema
 
IEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsIEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsgagnertechnologies
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaAdz91 Digital Ads Pvt Ltd
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
Cloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutionsCloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutionsElakkiya Triplen
 

Mais procurados (10)

2014 dotnet ieee
2014 dotnet ieee2014 dotnet ieee
2014 dotnet ieee
 
Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014Java non ieee project titles 2013-2014
Java non ieee project titles 2013-2014
 
Android titles
Android titlesAndroid titles
Android titles
 
Java ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatoreJava ieee projects archieves for CSE and IT students In coimbatore
Java ieee projects archieves for CSE and IT students In coimbatore
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
 
IEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsIEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science students
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
2014 java ieee
2014 java ieee2014 java ieee
2014 java ieee
 
Cloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutionsCloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutions
 

Semelhante a Cse dot net java & android

Ieee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologiesIeee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologiesRICHBRAINTECHNOLOGIES
 
Ieee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojectsIeee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojectsRICHBRAINPROJECTS
 
Ieee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechIeee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechRICHBRAINTECH
 
dotnet-projects in madurai
dotnet-projects in maduraidotnet-projects in madurai
dotnet-projects in madurais3tech
 
Ieee 2013 dotnet project titles richbraintech
Ieee 2013 dotnet project titles richbraintechIeee 2013 dotnet project titles richbraintech
Ieee 2013 dotnet project titles richbraintechRICHBRAINTECH
 
Ieee 2013 dotnet project titles richbrainprojects
Ieee 2013 dotnet project titles richbrainprojectsIeee 2013 dotnet project titles richbrainprojects
Ieee 2013 dotnet project titles richbrainprojectsRICHBRAINPROJECTS
 
Ieee 2013 dotnet project titles richbraintechnologies
Ieee 2013 dotnet project titles richbraintechnologiesIeee 2013 dotnet project titles richbraintechnologies
Ieee 2013 dotnet project titles richbraintechnologiesRICHBRAINTECHNOLOGIES
 
2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologies2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologiesIEEEFINALYEARPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologiesRICHBRAINTECHNOLOGIES
 
2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologies2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologiesIEEEMCAPROJECTS
 
2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologies2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologiesIEEEFINALYEARPROJECTS
 
2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologiesIEEEBEBTECHPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologiesIEEEBTECHMTECHPROJECTS
 
2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologies2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologiesIEEEBTECHMTECHPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologiesRICHBRAINPROJECTS
 
2013 2014 ieee me mtech java projects richbraintechnologies
2013 2014 ieee me mtech java projects richbraintechnologies2013 2014 ieee me mtech java projects richbraintechnologies
2013 2014 ieee me mtech java projects richbraintechnologiesIEEEMEMTECHPROJECTS
 
2013 2014 ieee finalyear me mtech java projects richbraintechnologies
2013 2014 ieee finalyear me mtech java projects richbraintechnologies2013 2014 ieee finalyear me mtech java projects richbraintechnologies
2013 2014 ieee finalyear me mtech java projects richbraintechnologiesIEEEFINALYEARPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologiesIEEEMCAPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologiesIEEEFINALYEARPROJECTS
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologiesRICHBRAINTECH
 

Semelhante a Cse dot net java & android (20)

Ieee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologiesIeee 2013 java project titles richbraintechnologies
Ieee 2013 java project titles richbraintechnologies
 
Ieee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojectsIeee 2013 java project titles richbrainprojects
Ieee 2013 java project titles richbrainprojects
 
Ieee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintechIeee 2013 java project titles richbraintech
Ieee 2013 java project titles richbraintech
 
dotnet-projects in madurai
dotnet-projects in maduraidotnet-projects in madurai
dotnet-projects in madurai
 
Ieee 2013 dotnet project titles richbraintech
Ieee 2013 dotnet project titles richbraintechIeee 2013 dotnet project titles richbraintech
Ieee 2013 dotnet project titles richbraintech
 
Ieee 2013 dotnet project titles richbrainprojects
Ieee 2013 dotnet project titles richbrainprojectsIeee 2013 dotnet project titles richbrainprojects
Ieee 2013 dotnet project titles richbrainprojects
 
Ieee 2013 dotnet project titles richbraintechnologies
Ieee 2013 dotnet project titles richbraintechnologiesIeee 2013 dotnet project titles richbraintechnologies
Ieee 2013 dotnet project titles richbraintechnologies
 
2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologies2013 2014 ieee finalyear be btech java projects richbraintechnologies
2013 2014 ieee finalyear be btech java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologies2013 2014 ieee finalyear mca students java projects richbraintechnologies
2013 2014 ieee finalyear mca students java projects richbraintechnologies
 
2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologies2013 2014 ieee finalyear beme java projects richbraintechnologies
2013 2014 ieee finalyear beme java projects richbraintechnologies
 
2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies2013 2014 ieee be btech java projects richbraintechnologies
2013 2014 ieee be btech java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologies2013 2014 ieee btech mtech java projects richbraintechnologies
2013 2014 ieee btech mtech java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee me mtech java projects richbraintechnologies
2013 2014 ieee me mtech java projects richbraintechnologies2013 2014 ieee me mtech java projects richbraintechnologies
2013 2014 ieee me mtech java projects richbraintechnologies
 
2013 2014 ieee finalyear me mtech java projects richbraintechnologies
2013 2014 ieee finalyear me mtech java projects richbraintechnologies2013 2014 ieee finalyear me mtech java projects richbraintechnologies
2013 2014 ieee finalyear me mtech java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 

Mais de Vision Solutions

Civil project tittles 2020
Civil project tittles 2020Civil project tittles 2020
Civil project tittles 2020Vision Solutions
 
Civil project tittles 2019
Civil project tittles 2019Civil project tittles 2019
Civil project tittles 2019Vision Solutions
 
Mechnical project list 2020
Mechnical project list 2020Mechnical project list 2020
Mechnical project list 2020Vision Solutions
 
Ieee 2020 matlab project list
Ieee 2020 matlab project listIeee 2020 matlab project list
Ieee 2020 matlab project listVision Solutions
 
Ieee cse software 2018 project list
Ieee cse software 2018 project listIeee cse software 2018 project list
Ieee cse software 2018 project listVision Solutions
 
Ieee m.tech embedded 2018 project list
Ieee m.tech embedded 2018 project listIeee m.tech embedded 2018 project list
Ieee m.tech embedded 2018 project listVision Solutions
 
Ieee eee embedded 2018 project list
Ieee eee embedded 2018 project listIeee eee embedded 2018 project list
Ieee eee embedded 2018 project listVision Solutions
 
Ieee ece embedded 2018 project list
Ieee ece embedded 2018 project listIeee ece embedded 2018 project list
Ieee ece embedded 2018 project listVision Solutions
 
Ieee m.tech 2018 power systems & power electronics & drives list
Ieee m.tech 2018 power systems & power electronics & drives listIeee m.tech 2018 power systems & power electronics & drives list
Ieee m.tech 2018 power systems & power electronics & drives listVision Solutions
 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project listVision Solutions
 
IEEE 2017 EEE matlab projects
IEEE 2017 EEE matlab projectsIEEE 2017 EEE matlab projects
IEEE 2017 EEE matlab projectsVision Solutions
 
IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTIEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTVision Solutions
 
IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTIEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTVision Solutions
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)Vision Solutions
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)Vision Solutions
 
IEEE 2015 MATLAB EEE PROJECT LIST
IEEE 2015 MATLAB EEE PROJECT LISTIEEE 2015 MATLAB EEE PROJECT LIST
IEEE 2015 MATLAB EEE PROJECT LISTVision Solutions
 
IEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LISTIEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LISTVision Solutions
 

Mais de Vision Solutions (20)

Cse python titles 2020
Cse python titles 2020Cse python titles 2020
Cse python titles 2020
 
Civil project tittles 2020
Civil project tittles 2020Civil project tittles 2020
Civil project tittles 2020
 
Civil project tittles 2019
Civil project tittles 2019Civil project tittles 2019
Civil project tittles 2019
 
Mechnical project list 2020
Mechnical project list 2020Mechnical project list 2020
Mechnical project list 2020
 
Cse titles 2020
Cse titles 2020Cse titles 2020
Cse titles 2020
 
Ieee 2020 matlab project list
Ieee 2020 matlab project listIeee 2020 matlab project list
Ieee 2020 matlab project list
 
Eee hardware list
Eee hardware listEee hardware list
Eee hardware list
 
Ieee cse software 2018 project list
Ieee cse software 2018 project listIeee cse software 2018 project list
Ieee cse software 2018 project list
 
Ieee m.tech embedded 2018 project list
Ieee m.tech embedded 2018 project listIeee m.tech embedded 2018 project list
Ieee m.tech embedded 2018 project list
 
Ieee eee embedded 2018 project list
Ieee eee embedded 2018 project listIeee eee embedded 2018 project list
Ieee eee embedded 2018 project list
 
Ieee ece embedded 2018 project list
Ieee ece embedded 2018 project listIeee ece embedded 2018 project list
Ieee ece embedded 2018 project list
 
Ieee m.tech 2018 power systems & power electronics & drives list
Ieee m.tech 2018 power systems & power electronics & drives listIeee m.tech 2018 power systems & power electronics & drives list
Ieee m.tech 2018 power systems & power electronics & drives list
 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project list
 
IEEE 2017 EEE matlab projects
IEEE 2017 EEE matlab projectsIEEE 2017 EEE matlab projects
IEEE 2017 EEE matlab projects
 
IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTIEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LIST
 
IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTIEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LIST
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
 
IEEE 2015 MATLAB EEE PROJECT LIST
IEEE 2015 MATLAB EEE PROJECT LISTIEEE 2015 MATLAB EEE PROJECT LIST
IEEE 2015 MATLAB EEE PROJECT LIST
 
IEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LISTIEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LIST
 

Último

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Cse dot net java & android

  • 1.           Academic Projects for CSE (2013-2014)       We will develop your ideas and your papers also, For any Further information call-9603150547 e-mail visionsolutions.9@gmail.com        
  • 2.   DOTNET DATA MINING 1. Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data. [SMS001] 2.Secure Mining of Association Rules in Horizontally Distributed Databases. [SMS002] 3.A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models. [SMS003] 4.ELCA: Evaluation for Keyword Search on Probabilistic XML a Data. [SMS004] 5.Dynamic Query Forms for Database Queries. [SMS005] 6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors. [SMS006] 7.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse. [SMS007] 8. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm. [SMS008] 9. Optimal Route Queries with Arbitrary Order Constraints. [SMS009] 10.Failure-Aware Cascaded Suppression in Wireless Sensor Networks. [SMS010] NETWORKING AND NETWORK SECURITY 11.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System. [SMS011] 12. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Network. [SMS012] 13.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems. [SMS013] 14.Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning. [SMS014] 15.Delay-Based Network Utility Maximization. [SMS015] 16.Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience. [SMS016] 17.An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks. [SMS017]
  • 3.   18.A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. [SMS018] CLOUD COMPUTING 19.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud. [SMS019] 20.Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS020] 21.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. [SMS021] 22.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems. [SMS022] 23.CloudMoV: Cloud-based Mobile Social TV. [SMS023] 24.Privacy Preserving Delegated Access Control in Public Clouds. [SMS024] 25.Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks. [SMS025] MOBILE COMPUTING 26.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks. [SMS026] 27.EAACK—A Secure Intrusion-Detection System for MANETs D. [SMS027] 28.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users. [SMS028] 29.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. [SMS029] 30.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks. [SMS030] 31.On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks. [SMS031] 32.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks. [SMS032] 33.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS033] 34.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users. [SMS034]
  • 4.   35.EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks. [SMS035] PARALLEL DISTRIBUTED SYSTEMS 36.A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices. [SMS036] 37.Exploiting Service Similarity for Privacy in Location Based Search Queries. [SMS037] 38.IP-Geolocation Mapping for Moderately Connected Internet Regions. [SMS038] 39.GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks. [SMS039] 40.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment. [SMS040] 41.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds. [SMS041] 42.BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments. [SMS042] 43.ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks. [SMS043] 44.A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization. [SMS044] 45.A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks. [SMS045] SERVICECOMPUTING 46.Privacy-EnhancedWebServiceComposition. [SMS046] 47.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed InformationSharing. [SMS047] 48.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. [SMS048]
  • 5.   49.Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection. [SMS049] 50.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. [SMS050] IMAGEPROCESSING 51.Face Recognition and Verification Using Photometric Stereo: The Photo face Database and a Comprehensive Evaluation. [SMS051]
  • 6.   JAVA DATA MINING 1.A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data.[SMS001] 2.A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data.[SMS002] 3.A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models.[SMS003] 4.A Survey of XML Tree Patterns.[SMS004] 5.Change Detection in Streaming Multivariate Data Using Likelihood Detectors.[SMS005] 6.Dynamic Personalized Recommendation on Sparse Data.[SMS006] 7.Mining User Queries with Markov Chains: Application to Online Image Retrieval.[SMS007] 8. Optimal Route Queries with Arbitrary Order Constraints.[SMS008] 9.Failure-Aware Cascaded Suppression in Wireless Sensor Networks.[SMS009] 10.Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and RuleBased Model.[SMS010] 11.A System to Filter Unwanted Messages from OSN User Walls.[SMS011] 12.M-Privacy for Collaborative Data Publishing.[SMS012] 13.Comparable Entity Mining from Comparative Questions.[SMS013] 14.Spatial Approximate String Search.[SMS014] 15.Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse.[SMS015] NETWORKING AND NETWORK SECURITY 16.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System.[SMS016] 17.Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks.[SMS017] 18.Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality.[SMS018]
  • 7.   19.Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems.[SMS019] 20.Efficient Algorithms for Neighbor Discovery in Wireless Networks.[SMS020] 21.Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning.[SMS021] 22.Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience.[SMS022] 23.An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks.[SMS023] 24.An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks.[SMS024] 25.A Rank Correlation Based Detection Resources for against Distributed Reflection DoS Attacks.[SMS025] 26.Optimizing Cloud Delivering IPTV Services through Virtualization.[SMS026] 27.Participatory Privacy Enabling Privacy in Participatory Sensing.[SMS027] CLOUD COMPUTING 28.A Load Balancing Model Based on Cloud Partitioning for the Public Cloud.[SMS028] 29.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS029] 30.Winds of Change From Vendor Lock-In to the Meta Cloud.[SMS030] 31.Cloud computing for mobile users can offloading compution save energy.[SMS031] 32.On Data Staging Algorithms for Shared Data Accesses in Clouds.[SMS032] 33.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.[SMS033] 34.AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.[SMS034] 35.CloudMoV: Cloud-based Mobile Social TV.[SMS035] 36.QoS Ranking Prediction for Cloud Services.[SMS036] 37.Privacy-Preserving Public Auditing for Secure Cloud Storage.[SMS037]
  • 8.   38.Collaboration in Multicloud Computing Environments: Framework and Security Issues.[SMS038] 39.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS039] 40.Towards Differential Query Services in Cost-Efficient Clouds.[SMS040] MOBILE COMPUTING 41.A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks.[SMS041] 42.EAACK :A Secure Intrusion-Detection System for MANETs.[SMS042] 43.Vampire attacks:Draining life from wireless ad-hoc sensor networks.[SMS043] 44.Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks.[SMS044] 45.Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks.[SMS045] 46.On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks.[SMS046] 47.Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.[SMS047] 48.A Scalable Server Architecture for Mobile Presence Services in Social Network Applications.[SMS048] 49.Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users.[SMS049] 50.EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Mobile Ad Hoc Networks.[SMS050] 51.Adaptive Position Update for Geographic Routing in Networks.[SMS051] 52.Community-Aware Opportunistic Routing in Mobile Social Networks.[SMS052] 53.Distributed Cooperative Caching in Social Wireless Networks.[SMS053] 54.Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation.[SMS054] 55.Toward a Statistical Framework for Source Anonymity in Sensor Networks.[SMS055]
  • 9.   PARALLEL DISTRIBUTED SYSTEMS 56.Covering Points of Interest with Mobile Sensors.[SMS056] 57.A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.[SMS057] 58.Analysis of Distance-Based Location Management in Wireless Communication Networks.[SMS058] 59.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks.[SMS059] 60.Error-Tolerant Resource Allocation and Payment Minimization for Cloud System.[SMS060] 61.Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.[SMS061] 62.Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment.[SMS062] 63.Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds.[SMS063] 64.BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments.[SMS064] 65.Towards Differential Query Services in Cost-Efficient Clouds.[SMS065] 66.A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.[SMS066] 67.Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems.[SMS067] 68.ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.[SMS068] 69.Detection and Localization of Multiple Spoofing Attackers in Wireless Networks.[SMS069] 70.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.[SMS070]
  • 10.   SERVICE COMPUTING 71.Privacy-Enhanced Web Service Composition.[SMS071] 72.NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.[SMS072] 73.Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection.[SMS073] SECURE COMPUTING 74.CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.[SMS074] 75.Secure Encounter-based Mobile Social Networks Tradeoffs.[SMS075] 76.Two tales of privacy in online social networks.[SMS076] Requirements Designs and
  • 11.   ANDROID DATA MINING 1.Finding Rare Classes Active Learning with Generative and Discriminative Models. [SMS001] 2.A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia . [SMS002] 3.A Survey of XML Tree Patterns. [SMS003] 4.Anonymization of Centralized and Distributed Social Networks by Sequential Clustering . [SMS004] 5.T-Drive Enhancing Driving Directions with Taxi Driversâc Intelligence. [SMS005] 6.Region-Based Foldings in Process Discovery. [SMS006] 7.Ranking on Data Manifold with Sink Points. [SMS007] 8.Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse. [SMS008] CLOUD COMPUTING 9. Privacy-Preserving Public Auditing for Secure Cloud Storage. [SMS009] 10. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. [SMS010] 11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems. [SMS011] 12. CloudMoV: Cloud-based Mobile Social TV. [SMS012]
  • 12.   MOBILE COMPUTING 13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks. [SMS013] 14.Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. [SMS014] 15.SSD A Robust RF Location Fingerprint Addressing Mobile Devicesa Heterogeneity. [SMS015] 16.A Scalable Server Architecture for Mobile Presence Services in Social Network Applications. [SMS016] 17.Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. [SMS017] PARALLEL DISTRIBUTED SYSTEMS 18.Distributed Web Systems Performance Forecasting Using Turning Bands Method. [SMS018] 19.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. [SMS019] 20.Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks. [SMS020] 21.Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks. [SMS021] 22.Analysis of Distance-Based Location Management in Wireless Communication Networks. [SMS022]
  • 13.   SERVICE COMPUTING 23.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. [SMS023] 24.Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection. [SMS024] 25.Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. [SMS025]