Final
Year Projects in Chennai
JAVA – IEEE TITLES 2014
SAKTHI SOFTWARE SOLUTIONS
RVR Towers, 1st Street, 3rd Main Road, Annanagar,
Behind Nalli Silks, Chennai 600 040.
Tel: 044-43016888 / 9710780469
Email: fresherfocus@gmail.com, sssprojects2013@gmail.com
URL: www.sssedu.in
S.no
|
JAVA – IEEE TITLES
|
DOMAIN
|
1
|
RRE: A Game-Theoretic Intrusion Response and Recovery
Engine
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
2
|
SOS: A Distributed Mobile Q&A System Based on Social
Networks
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
3
|
The Client Assignment Problem for Continuous
Distributed Interactive Applications: Analysis,Algorithms, and
Evaluation
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
4
|
The Design and Evaluation of An Information Sharing
System for Human Networks
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
5
|
Towards Differential Query Services in Cost-Efficient
Clouds
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
6
|
Traffic Pattern-Based Content Leakage Detection for
Trusted Content Delivery Networks
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
7
|
Web Service Recommendation via Exploiting Location and
QoS Information
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
8
|
A Scalable Two-Phase Top-Down Specialization Approach
for Data Anonymization Using MapReduce on Cloud
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
9
|
A Stochastic Model to Investigate Data Center
Performance and QoS in IaaS Cloud Computing Systems
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
10
|
Distributed, Concurrent, and Independent Access to
Encrypted Cloud Databases
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
11
|
Enabling Trustworthy Service Evaluation in
Service-Oriented Mobile Social Networks
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
12
|
Expressive, Efficient, and Revocable Data Access
Control for Multi-Authority Cloud Storage
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
13
|
A Hybrid Cloud Approach for Secure Authorized
Deduplication
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
14
|
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
15
|
Key-Aggregate Cryptosystem for Scalable Data Sharing in
Cloud Storage
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
16
|
Privacy-Preserving Multi-Keyword Ranked Search over
Encrypted Cloud Data
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
17
|
Scalable Distributed Service Integrity Attestation for
Software-as-a-Service Clouds
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
18
|
Exploiting Service Similarity for Privacy in
Location-Based Search Queries
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
19
|
LocaWard: A Security and Privacy Aware Location-Based
Rewarding System
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
20
|
On False Data-Injection Attacks against Power System
State Estimation: Modeling and Countermeasures
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
21
|
Securing Broker-Less Publish/Subscribe Systems Using
Identity-Based Encryption
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
22
|
Secure Outsourced Attribute-based Signatures
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
23
|
Fast Nearest Neighbor Search with Keywords
|
KNOWLEDGE AND DATA ENGINEERING
|
24
|
Privacy-Preserving and Content-Protecting Location
Based Queries
|
KNOWLEDGE AND DATA ENGINEERING
|
25
|
Security Evaluation of Pattern Classifiers under Attack
|
KNOWLEDGE AND DATA ENGINEERING
|
26
|
Towards Online Shortest Path Computation
|
KNOWLEDGE AND DATA ENGINEERING
|
27
|
A Cocktail Approach for Travel Package Recommendation
|
KNOWLEDGE AND DATA ENGINEERING
|
28
|
Accuracy-Constrained Privacy-Preserving Access Control
Mechanism for Relational Data
|
KNOWLEDGE AND DATA ENGINEERING
|
29
|
BestPeer++: A Peer-to-Peer Based Large-Scale Data
Processing Platform
|
KNOWLEDGE AND DATA ENGINEERING
|
30
|
Data Mining with Big Data
|
KNOWLEDGE AND DATA ENGINEERING
|
31
|
Discovering Emerging Topics in Social Streams via
Link-Anomaly Detection
|
KNOWLEDGE AND DATA ENGINEERING
|
32
|
Efficient Prediction of Difficult Keyword Queries over
Databases
|
KNOWLEDGE AND DATA ENGINEERING
|
33
|
Building Confidential and Efficient Query Services in
the Cloud with RASP Data Perturbation
|
KNOWLEDGE AND DATA ENGINEERING
|
34
|
Facilitating Document Annotation Using Content and
Querying Value
|
KNOWLEDGE AND DATA ENGINEERING
|
35
|
Keyword Query Routing
|
KNOWLEDGE AND DATA ENGINEERING
|
36
|
Supporting Privacy Protection in Personalized Web
Search
|
KNOWLEDGE AND DATA ENGINEERING
|
37
|
An Incentive Framework for Cellular Traffic Offloading
|
MOBILITY AND SECURITY
|
38
|
Cooperative Caching for Efficient Data Access in
Disruption Tolerant Networks
|
MOBILITY AND SECURITY
|
39
|
Efficient Authentication for Mobile and Pervasive
Computing
|
MOBILITY AND SECURITY
|
40
|
Efficient and Privacy-Aware Data Aggregation in Mobile
Sensing
|
DEPENDABLE AND SECURE COMPUTING
|
41
|
Optimal Distributed Malware Defense in Mobile Networks
with Heterogeneous Devices
|
TRANSACTIONS ON MOBILE COMPUTING
|
42
|
PACK: Prediction-Based Cloud Bandwidth and Cost
Reduction System
|
NETWORKING
|
43
|
Automatic Test Packet Generation
|
NETWORKING
|
44
|
Boundary Cutting for Packet Classification
|
NETWORKING
|
45
|
Cost-Effective Resource Allocation of Overlay Routing
Relay Nodes
|
NETWORKING
|
46
|
Secure Data Retrieval for Decentralized
Disruption-Tolerant Military Networks
|
NETWORKING
|
47
|
Bandwidth Distributed Denial of Service: Attacks and
Defenses
|
NETWORKING
|
48
|
Dealing With Concept Drifts in Process Mining
|
DATA MINING
|
49
|
Privacy-Enhanced Web Service Composition
|
SERVICE COMPUTING
|
50
|
PROFILR: Toward Preserving Privacy and Functionality in
Geosocial Networks
|
INFORMATION FORENSICS AND SECURITY
|
51
|
Top-k Query Result Completeness Verification in Tiered
Sensor Networks
|
INFORMATION FORENSICS AND SECURITY
|
52
|
Captcha as Graphical Passwords—A New Security Primitive
Based on Hard AI Problems
|
INFORMATION FORENSICS AND SECURITY
|
53
|
Oruta: Privacy-Preserving Public Auditing for Shared
Data in the Cloud
|
CLOUD COMPUTING
|
54
|
Friendbook: A Semantic-based Friend Recommendation
System for Social Networks
|
MOBILE COMPUTING
|
No comments:
Post a Comment