Sei sulla pagina 1di 10

V S TECHNO SOLUTIONS

SMART SOLLUTIONS FOR SMART PEOPLE

IEEE CSE JAVA PROJECTS LIST


PRJ CODE TITTLE DOMAIN YEAR
JV 1 A Hybrid Cloud Approach for Secure CLOUD 2015
Authorized De duplication COMPUTING
JV 2 A Profit Maximization Scheme with CLOUD 2015
Guaranteed Quality of Service in Cloud COMPUTING
Computing
JV 3 A Scalable and Reliable Matching Service for CLOUD 2015
Content-Based Publish/Subscribe Systems COMPUTING
JV 4 A Secure and Dynamic Multi-keyword Ranked CLOUD 2015
Search Scheme over Encrypted Cloud Data COMPUTING
JV 5 A Secure Anti-Collusion Data Sharing Scheme CLOUD 2015
for Dynamic Groups in the Cloud COMPUTING
JV 6 An Authenticated Trust and Reputation CLOUD 2015
Calculation and Management System for Cloud COMPUTING
and Sensor Networks Integration
JV 7 Audit-Free Cloud Storage via Deniable CLOUD 2015
Attribute-based Encryption COMPUTING
JV 8 Circuit Ciphertext-policy Attribute-based CLOUD 2015
Hybrid Encryption with Verifiable Delegation COMPUTING
in Cloud Computing
JV 9 CloudArmor: Supporting Reputation-based CLOUD 2015
Trust Management for Cloud Services COMPUTING
JV 10 Control Cloud Data Access Privilege and CLOUD 2015
Anonymity with Fully Anonymous Attribute- COMPUTING
Based Encryption
JV 11 Enabling Cloud Storage Auditing With Key- CLOUD 2015
Exposure Resistance COMPUTING
JV 12 Enabling Fine-grained Multi-keyword Search CLOUD 2015
Supporting Classified Sub-dictionaries over COMPUTING
Encrypted Cloud Data
JV 13 Identity-Based Encryption with Outsourced CLOUD 2015
Revocation in Cloud Computing COMPUTING
JV 14 Key-Aggregate Searchable Encryption CLOUD 2015
(KASE) for Group Data Sharing via Cloud COMPUTING
Storage
JV 15 Privacy Preserving Ranked Multi-Keyword CLOUD 2015
Search for Multiple Data Owners in Cloud COMPUTING
Computing
JV 16 Privacy-Preserving Public Auditing for CLOUD 2015
Regenerating-Code-Based Cloud Storage COMPUTING

Ph.no:9985827707 E-mail:vstechnosolutions7@gmail.com
V S TECHNO SOLUTIONS
SMART SOLLUTIONS FOR SMART PEOPLE

IEEE CSE JAVA PROJECTS LIST


JV 17 Provable Multicopy Dynamic Data CLOUD 2015
Possession in Cloud Computing Systems COMPUTING
JV 18 Public Integrity Auditing for Shared Dynamic CLOUD 2015
Cloud Data with Group User Revocation COMPUTING
JV 19 Secure Auditing and Deduplicating Data in CLOUD 2015
Cloud COMPUTING
JV 20 Stealthy Denial of Service Strategy in Cloud CLOUD 2015
Computing COMPUTING
JV 21 Best Keyword Cover Search DATA MINING 2015
JV 22 Co-Extracting Opinion Targets and Opinion DATA MINING 2015
Words from Online Reviews Based on the
Word Alignment Model
JV 23 Context-Based Diversification for Keyword DATA MINING 2015
Queries over XML Data
JV 24 Discovery of Ranking Fraud for Mobile Apps DATA MINING 2015
JV 25 Malware Propagation in Large-Scale DATA MINING 2015
Networks
JV 26 On Summarization and Timeline Generation DATA MINING 2015
for Evolutionary Tweet Streams
JV 27 Privacy Policy Inference of User-Uploaded DATA MINING 2015
Images on Content Sharing Sites
JV 28 Progressive Duplicate Detection DATA MINING 2015
JV 29 Reverse Nearest Neighbors in Unsupervised DATA MINING 2015
Distance-Based Outlier Detection
JV 30 Route-Saver: Leveraging Route APIs for DATA MINING 2015
Accurate and Efficient Query Processing at
Location-Based Services
JV 31 Scalable Constrained Spectral Clustering DATA MINING 2015
JV 32 Towards Effective Bug Triage with Software DATA MINING 2015
Data Reduction Techniques
JV 33 Tweet Segmentation and Its Application to DATA MINING 2015
Named Entity Recognition
JV 34 A Distortion-Resistant Routing Framework NETWORKING 2015
for Video Traffic in Wireless Multihop
Networks
JV 35 A Proximity-Aware Interest-Clustered P2P NETWORKING 2015
File Sharing System
JV 36 Detecting Malicious Facebook Applications NETWORKING 2015
JV 37 Maximizing P2P File Access Availability in NETWORKING 2015
Mobile Ad Hoc Networks though Replication

Ph.no:9985827707 E-mail:vstechnosolutions7@gmail.com
V S TECHNO SOLUTIONS
SMART SOLLUTIONS FOR SMART PEOPLE

IEEE CSE JAVA PROJECTS LIST


for Efficient File Sharing
JV 38 Dynamic Routing for Data Integrity and MOBILE 2015
Delay Differentiated Services in Wireless COMPUTING
Sensor Networks
JV 39 Friendbook: A Semantic-Based Friend MOBILE 2015
Recommendation System for Social COMPUTING
Networks
JV 40 Privacy-Preserving and Truthful Detection of MOBILE 2015
Packet Dropping Attacks in Wireless Ad Hoc COMPUTING
Networks
JV 41 User-Defined Privacy Grid System for MOBILE 2015
Continuous Location-Based Services COMPUTING
JV 42 A Computational Dynamic Trust Model for SECURE 2015
User Authorization COMPUTING
JV 43 A Lightweight Secure Scheme for Detecting SECURE 2015
Provenance Forgery and Packet Drop Attacks COMPUTING
in Wireless Sensor Networks
JV 44 Continuous and Transparent User Identity SECURE 2015
Verification for Secure Internet Services COMPUTING
JV 45 Contributory Broadcast Encryption with SECURE 2015
Efficient Encryption and Short Ciphertexts COMPUTING
JV 46 DDSGA: A Data-Driven Semi-Global SECURE 2015
Alignment Approach for Detecting COMPUTING
Masquerade Attacks
JV 47 Improved Privacy-Preserving P2P SECURE 2015
Multimedia Distribution Based on COMPUTING
Recombined Fingerprints
JV 48 Secure Data Aggregation Technique for SECURE 2015
Wireless Sensor Networks in the Presence of COMPUTING
Collusion Attacks
JV 49 Secure Spatial Top-k Query Processing via SECURE 2015
Untrusted Location- Based Service Providers COMPUTING
JV 50 Asymmetric Social Proximity Based Private PARALLEL & 2015
Matching Protocols for Online Social DISTRIBUTED
Networks SYSTEMS
JV 51 PARALLEL & 2015
Cost-a\Effective Authentic and Anonymous DISTRIBUTED
Data Sharing with Forward Security SYSTEMS
JV 52 Secure Distributed Deduplication Systems PARALLEL & 2015
with Improved Reliability DISTRIBUTED

Ph.no:9985827707 E-mail:vstechnosolutions7@gmail.com
V S TECHNO SOLUTIONS
SMART SOLLUTIONS FOR SMART PEOPLE

IEEE CSE JAVA PROJECTS LIST


SYSTEMS
JV 53 INFORMATION 2015
A Framework for Secure Computations with FORENSICS
Two Non-Colluding Servers and Multiple AND
Clients, Applied to Recommendations SECURITY
JV 54 INFORMATION 2015
FORENSICS
Effective Key Management in Dynamic AND
Wireless Sensor Networks SECURITY
JV 55 INFORMATION 2015
FORENSICS
Key Updating for Leakage Resiliency with AND
Application to AES Modes of Operation SECURITY
JV 56 INFORMATION 2015
Passive IP Traceback: Disclosing the FORENSICS
Locations of IP Spoofers from Path AND
Backscatter SECURITY
JV 57 INFORMATION 2015
FORENSICS
Software Puzzle: A Countermeasure to AND
Resource-Inflated Denial- of-Service Attacks SECURITY
JV 58 An Attribute-Assisted Reranking Model for IMAGE 2015
Web Image Search PROCESSING
JV 59 EMR: A Scalable Graph-based Ranking IMAGE 2015
Model for Content-based Image Retrieval PROCESSING
JV 60 Learning to Rank Image Tags With Limited IMAGE 2015
Training Examples PROCESSING
JV 61 SERVICE 2015
Designing High Performance Web-Based COMPUTING
Computing Services to Promote Telemedicine (WEB
Database Management System SERVICE)
JV 62 SERVICE 2015
Location-Aware and Personalized COMPUTING
Collaborative Filtering for Web Service (WEB
Recommendation SERVICE)
JV 63 A Fuzzy Preference Tree-Based FUZZY 2015
Recommender System for Personalized SYSTEMS
Business-to-Business E-Services
JV 64 Accuracy Constrained Privacy Preserving
Access Control Mechanism for relational data Data Mining

Ph.no:9985827707 E-mail:vstechnosolutions7@gmail.com
V S TECHNO SOLUTIONS
SMART SOLLUTIONS FOR SMART PEOPLE

IEEE CSE JAVA PROJECTS LIST


JV 65 Captcha as Graphical PasswordsA New
Security Primitive Based on Hard AI Problems Data Mining
JV 66 Click Prediction for Web Image Reranking Image
Using Multimodal Sparse Coding Processing
JV 67 A Cocktail Approach for Travel Package
Recommendation Data Mining
JV 68 Discovering Emerging Topics in Social
Streams via Link-Anomaly Detection Data Mining
JV 69 Efficient Prediction of Difficult Keyword
Queries
Data Mining
JV 70 Keyword Query Routing Data Mining
JV 71 Privacy-Preserving and Content-Protecting
Location Based Queries Data Mining
JV 72 Security Evaluation of Pattern Classifiers under
Attack Data Mining
JV 73 Towards Online Shortest Path Computation Data Mining
JV 74 Supporting Privacy Protection in Personalized Data Mining
Web Search
JV 75 A Hybrid Cloud Approach for Secure Cloud
Authorized Deduplication Computing
JV 76 A Stochastic Model to Investigate Data Center
Performance and QoS in IaaS Cloud Cloud
Computing Systems Computing
JV 77 Decentralized Access Control with Anonymous Cloud
Authentication Computing
JV 78 Distributed, Concurrent, and Independent Cloud
Access to Encrypted Cloud Databases Computing
JV 79 Oruta: Privacy-Preserving Public Auditing for Cloud
Shared Data in the Cloud Computing
JV 80 Privacy-Preserving Multi-Keyword Ranked Cloud
Search over Encrypted Cloud Data Computing
JV 81 Scalable Distributed Service Integrity Cloud
Attestation for Software-as-a-Service Clouds Computing
JV 82 Towards Differential Query Services in Cost- Cloud
Efficient Clouds Computing
JV 83 Key-Aggregate Cryptosystem for Scalable Cloud
Data Sharing in Cloud Storage Computing
JV 84 Cooperative Caching for Efficient Data Access Networking
in Disruption Tolerant Networks

Ph.no:9985827707 E-mail:vstechnosolutions7@gmail.com
V S TECHNO SOLUTIONS
SMART SOLLUTIONS FOR SMART PEOPLE

IEEE CSE JAVA PROJECTS LIST


JV 85 Cost Effective Resource Allocation of Overlay Networking
Routing Relay Nodes

PRJ CODE TITTLE


YEAR
JV 86 A Fast Clustering-Based Feature Subset Selection Algorithm 2013
for High Dimensional Data
JV 87 CloudMoV: Cloud-based Mobile Social TV 2013
JV 88 Crowd sourcing L Pedictors of Behavioral Outcomes 2013
JV 89 Incentive Compatible LPivacy-LPeserving Data Analysis 2013
JV 90 Focus Learning to Crawl Web Forums 2013
JV 91 Robust Module Based Data Management 2013
JV 92 PMSE: A Personalized Mobile Search Engine 2013
JV 93 A System to Filter Unwanted Messages from OSN User 2013
Walls
JV 94 Sensitive Label Privacy Protection on Social Network Data 2013
JV 95 Clustering Sentence-Level Text Using a Novel Fuzzy 2013
Relational Clustering Algorithm
JV 96 Annonating search result from web data bases 2013
JV 97 PeservingPivacy Public Auditing for Secure Cloud Storage 2013

Ph.no:9985827707 E-mail:vstechnosolutions7@gmail.com
V S TECHNO SOLUTIONS
SMART SOLLUTIONS FOR SMART PEOPLE

IEEE CSE JAVA PROJECTS LIST


JV 98 Winds of Change from Vendor Lock-In to the Meta Cloud 2013
JV 99 AMES-Cloud: A Framework of Adaptive Mobile Video 2013
Streaming and Efficient Social Video Sharing in the Clouds
JV 100 CAM: Cloud-Assisted Privacy Preserving Mobile Health 2013
Monitoring
JV 101 Two tales of Privacy in online social networks 2013
JV 102 Utility-Privacy Trade off in Databases An Information- 2013
theoretic Approach
JV 103 Dynamic Resource Allocation using Virtual Machines for 2013
Cloud Computing Environment
JV 104 Mobile Relay Configuration in Data-intensive Wireless 2013
Sensor Networks
JV 105 Distributed Cooperative Caching in Social Wireless 2013
Networks
JV 106 Optimizing Cloud Resources for Delivering IPTV Services 2013
through Virtualization
JV 107 Access Policy Consolidation for Event Processing Systems 2013
JV 108 Mining Contracts for Business Events and Temporal 2013
Constraints in Service Engagements
JV 109 Fully Anonymous Profile Matching in Mobile Social 2013
Networks
JV 110 Delay based network utility maximization 2013
JV 111 On the Node Clone Detection in Wireless Sensor Networks 2013
JV 112 A Highly Scalable Key Pre-Distribution Scheme for 2013
Wireless Sensor Networks
JV 113 Back-Pressure-Based Packet-by-Packet Adaptive Routing in
Communication Networks 2013
JV 114 Fast transmission to remote cooperative groups: A new key 2013
management paradigm
JV 115 Minimum Cost Blocking Problem in Multi-path Wireless 2013
Routing Protocols
JV 116 Discovery and Verification of Neighbor Positions in Mobile 2013
Ad Hoc Networks
JV 117 Content Sharing over Smartphone-Based Delay-Tolerant 2013
Networks
JV 118 Slicing A New Approach to Privacy Preserving data 2012
publishing
JV 119 A Network Coding Equivalent Content Distribution Scheme 2012
for Efficient peer to peer interactive vod streaming
JV 120 On Optimizing Overlay Topologies for Search in 2012
Unstructured Peer-to-Peer Networks

Ph.no:9985827707 E-mail:vstechnosolutions7@gmail.com
V S TECHNO SOLUTIONS
SMART SOLLUTIONS FOR SMART PEOPLE

IEEE CSE JAVA PROJECTS LIST


JV 121 Automatic Discovery of Association Orders between Name 2012
and Aliases from the Web using AnchorTexts-based Co-
occurrences
JV 122 cloud data protection for the masses 2012
JV 123 Clustering with Multi view point-Based Similarity Measure 2012
JV 124 cooperative provable data profession for integrity 2012
verification in multi cloud storage
JV 125 Distributed Packet Buffers for High-Bandwidth Switches 2012
and Routers
JV 126 Efficient Fuzzy Type-Ahead Search in XML Data 2012
JV 127 Fast Data Collection in tree based wireless sensor networks 2012
JV 128 Footprint Detecting Sybil Attacks in Urban Vehicular 2012
Networks
JV 129 Game-Theoretic Pricing for Video Streaming in mobile 2012
networks
JV 130 Handwritten Chinese Text Recognition by Integrating 2012
Multiple Contexts
JV 131 Trust modelling in social tagging of multimedia content 2012
JV 132 Learn to Personalized Image Search from the photo sharing 2012
websites
JV 133 Multiparty access control for online social networks model 2012
and mechanisms
JV 134 Online Modelling of Proactive Moderation System for 2012
auction fraud detection
JV 135 Organizing User Search Histories 2012
JV 136 Packet Loss Control Using Tokens at the network edge. 2012
JV 137 Packet-Hiding Methods for Preventing Selective jamming 2012
attacks

JV 138 Ranking model adaption for domain specific search 2012


JV 139 Risk-Aware Mitigation for manet routing attacks 2012
JV 140 Self Adaptive Contention Aware Routing protocol for 2012
intermittently connected mobile networks
JV 141 Ensuring distributed accountability for data sharing in the 2012
cloud
JV 142 Adaptive Opprtunistic routing for wireless adhoc networks. 2012
JV 143 Vehicle Detection in Aerial Surveillance Using Dynamic 2012
Bayesian Networks
JV 144 Catching Packet Droppers and Modifiers in wireless sensor 2012
networks.
JV 145 Energy Efficient Cooperative Video distribution with 2012

Ph.no:9985827707 E-mail:vstechnosolutions7@gmail.com
V S TECHNO SOLUTIONS
SMART SOLLUTIONS FOR SMART PEOPLE

IEEE CSE JAVA PROJECTS LIST


statistical QoS provisions over wireless networks
JV 146 CCD A Distributed Publish/Subscribe frame work for rich 2012
content formats
JV 147 An Efficient Catching scheme and consistency maintenance 2012
in hybrid p2p systems
JV 148 Cut Detection in Wireless Sensor Networks 2012
JV 149 Confucius A Tool Supporting Collaborative Scientific 2012
Workflow Composition
JV 150 Decision Trees for Uncertain Data 2011
JV 151 Discovering Conditional Functional Dependencies 2011
JV 152 Effective Navigation of Query Results Based on Concept 2011
Hierarchies
JV 153 Extended XML Tree Pattern Matching: Theories and 2011
Algorithms
JV 154 Ranking Spatial Data by Quality Preferences 2011
JV 155 The CoQUOS Approach to Continuous Queries in 2011
Unstructured Overlays
JV 156 Delay Analysis and Optimality of Scheduling Policies for 2011
Multi-Hop Wireless Networks
JV 157 Modelling and Detection of Camouflaging Worm 2011
JV 158 Nymble: Blocking Misbehaving Users in Anonym zing 2011
Networks
JV 159 SAT: A Security Architecture Achieving Anonymity and 2011
Traceability in Wireless Mesh Networks
JV 160 Secure and Practical Outsourcing of Linear Programming in 2011
Cloud Computing
JV 161 A Privacy-Preserving Location Monitoring System for 2011
Wireless Sensor Networks
JV 162 Authenticated Multi-Step Nearest Neighbour Search 2011
JV 163 Adaptive Cluster Distance Bounding for High Dimensional 2011
Indexing
JV 164 Group Enclosing Queries 2011
JV 165 Making Aggregation Work in Uncertain and Probabilistic 2011
Databases
JV 166 Data Leakage Detection 2011
JV 167 Improving Utilization of Infrastructure Clouds 2011
JV 168 Wireless Sensor Network Security model using Zero 2011
Knowledge Protocol
JV 169 Selfish Overlay Network Creation and Maintenance 2011
JV 170 SPAF: Stateless FSA-based Packet Filters 2011
JV 171 ProgME: Towards Programmable Network Measurement 2011

Ph.no:9985827707 E-mail:vstechnosolutions7@gmail.com
V S TECHNO SOLUTIONS
SMART SOLLUTIONS FOR SMART PEOPLE

IEEE CSE JAVA PROJECTS LIST


JV 172 Locating Equivalent Servants over P2P Networks 2011
JV 173 A Competitive Study of Cryptography Techniques over 2011
Block Cipher
JV 174 Caching Strategies Based on Information Density Estimation 2011
in Wireless Ad Hoc Networks
JV 175 Clustering with Multi-Viewpoint based Similarity Measure 2011
JV 176 Dynamics of Malware Spread in Decentralized Peer-to-Peer 2011
Networks
JV 177 Embedded Extended Visual Cryptography Schemes 2011
JV 178 Online Intrusion Alert Aggregation with Generative Data 2011
Stream Modeling

Ph.no:9985827707 E-mail:vstechnosolutions7@gmail.com

Potrebbero piacerti anche