Latest IEEE Papers!

Latest IEEE based JAVA Project List

Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers.

CloudMoV: Cloud-based Mobile Social TV

Winds of Change From Vendor Lock-In to the Meta Cloud.

Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud.

Dynamic Resource allocation using virtual machines for cloud computing environment

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

Error-Tolerant Resource Allocation and Payment Minimization for Cloud System

Harnessing the Cloud for Securely Outsourcing Large

Prediction-Based Cloud Bandwidth and Cost Reduction System

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cloud computing for mobile users can offloading compution save energy

A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

Anomaly Detection via Online Over-Sampling Principal Component Analysis

A New Algorithm for Inferring User Search Goals with Feedback Sessions

m-Privacy for Collaborative Data Publishing

Protecting Sensitive Labels in Social Network Data Anonymization

Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

Participatory Privacy Enabling Privacy in Participatory Sensing

Dynamic Control of Coding for Progressive Packet Arrivals in DTNs

Delay-Based Network Utility Maximization

A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

EAACK—A Secure Intrusion-Detection System for MANETs

CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

Vampire attacks:Draining life from wireless ad-hoc sensor networks.

Content Sharing over Smartphone-Based Delay-Tolerant Networks

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

IP-Geolocation Mapping for Moderately Connected Internet Regions

A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

Optimal Client-Server Assignment for Internet Distributed Systems

Latest IEEE based JAVA Project List

Cloud Computing Security From Single to Multi-Clouds

Reliable Re-encryption in Unreliable Clouds

Cloud Data Production for Masses

Costing of Cloud Computing Services A Total Cost of Ownership Approach

Ensuring Distributed Accountability for Data Sharing in the Cloud

Fog Computing Mitigating Insider Data Theft Attacks in the Cloud

Gossip-based Resource Management for Cloud Environments

Towards Secure and Dependable Storage Services in Cloud Computing

Efficient audit service outsourcing for data integrity in clouds

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption

Secure Overlay Cloud Storage with Access Control and Assured Deletion

Automatic Protocol Blocker for Privacy Preserving

Slicing A New Approach to Privacy Preserving Data Publishing

Ranking Model Adaptation for Domain-Specific Search

Advance mining of temporal hign utility Itemset

Organizing User Search Histories

Multiparty Access Control for Online Social Networks Model and Mechanisms

Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences

Statistical Entity Extraction from Web

Efficient Computation of Range Aggregates against Uncertain Location Based Queries

On the Spectral Characterization and Scalable Mining of Network Communities

Confucius A Tool Supporting Collaborative Scientific Workflow Composition

Fast and accurate annotation of short texts

Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

Scalable Learning of Collective Behavior

Outsourced Similarity Search on Metric Data Assets

Bridging Social and Data Networks

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

Cut Detection in Wireless Sensor Networks

PerLa a Language and Middleware Architecture

Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

Cooperative Data Dissemination via Roadside WLANs

Risk-Aware Mitigation for MANET Routing Attacks

Packet-Hiding Methods for Preventing Selective Jamming Attacks

Online Modeling of Proactive Moderation System for Auction Fraud Detection

DoubleGuard Detecting Intrusions In Multi-tier Web Applications

Ensuring Distributed Accountability for Data Sharing in the Cloud

Learn to Personalized Image Search from the Photo Sharing Websites

Privacy- and Integrity-Preserving Range Queries in Sensor Networks

Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

Game-Theoretic Pricing for Video Streaming in Mobile Networks

Packet Loss Control Using Tokens at the Network Edge

Security Architecture for Cloud Networking

Exploiting Jamming-Caused Neighbor Changes for Jammer Localization

Learn to Personalized Image Search from the Photo Sharing Websites

Robust Face-Name Graph Matching for Movie Character Identification

Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs

Energy Efficient Routing in Wireless Sensor Network

BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks

SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

Balancing the Tradeoffs between Query Delay and Data Availability in MANETs

TAM A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks

Throughput and Energy Efficiency in wireless ad hoc nw with caussian channels

A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication

Answering General Time-Sensitive Queries

Decentralized Probabilistic Text Clustering

Discovering Informative Knowledge in Complex Datas

Intent Search Capturing User Intention for One-Click Internet Image Search

Separable Reversible Data Hiding in Encrypted Image_moorthy

Download

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Synopsis  |  IEEE Paper

Latest IEEE based DotNET Project List

Ensuring Distributed Accountability for Data Sharing in the Cloud

Outsourced Similarity Search on Metric Data Assets

Privacy-Preserving Public Auditing for Secure Cloud Storage

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption

Towards Secure and Dependable Storage Services in Cloud Computing

A Query Formulation Language for the data web

Creating Evolving User Behaviour Profiles Automatically

Efficient Computation of Range Aggregates against Uncertain Location Based Queries

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques

Mining Web Graphs for Recommendations

Organizing User Search Histories

Publishing Search Logs – A Comparative Study Of Privacy Guarantees

Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

Scalable Learning of Collective Behavior

Slicing A New Approach to Privacy Preserving Data Publishing

Catching Packet Droppers and Modifiers in Wireless Sensor Networks

The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

A New Cell Counting based Attack Against TOR

Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Adhoc Network

Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs

ES MPICH2 A Message Passing Interface with Enhanced Security

On the Security an d Efficiency of Content Distribution via Network Coding

SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group

Active Visual Segmentation

Multiple Exposure Fusion for High Dynamic Range Image Acquisition

SemiSupervised Biased Maximum Margin Analysis for Interactive Image Retrieval

View-invariant action recognition based on Artificial Neural Networks

Distributed Throughput Maximization in Wireless Networks via Random Power Allocation

Network Assisted Mobile Computing with Optimal Uplink Query Processing

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

Revisiting Defences against Large-Scale Online Password Guessing Attacks

AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

Robust Face-Name Graph Matching for Movie Character Identification

Balancing the Tradeoffs between Query Delay and Data Availability in MANETs

Efficient Multidimensional Fuzzy Search for Personal Information Management Systems

Towards Accurate Mobile Sensor Network Localization in Noisy Environments

Persuasive Cued Click-Points Design, Implementation and Evaluation of a Knowledge-Based Authentication Mechanism

Ranking Model Adaptation for Domain-Specific Search

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Leveraging Smartphone Cameras for Collaborative Road Advisories

Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks

Uncoordinated Cooperative Communications in highly dynamic wireless networks

Load-Balancing Multipath Switching System with Flow Slice

Automatic Reconfiguration for Large-Scale Reliable Storage systems