Home || About us || Contact us || Sales || Course || Multimedia || Project || Netwoking || Back
2015
TO 2008 Project Titles in JAVA
S.NO |
2015 JAVA |
DOMAIN |
YEAR |
1 |
A Hybrid Cloud Approach
for Secure Authorized Deduplication |
CLOUD COMPUTING |
JAVA/2015 |
2 |
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
CLOUD COMPUTING |
JAVA/2015 |
3 |
A Scalable and Reliable Matching
Service for Content-Based Publish/Subscribe Systems |
CLOUD COMPUTING |
JAVA/2015 |
4 |
A Secure
and Dynamic Multi-keyword Ranked Search Scheme
over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA/2015 |
5 |
A Secure
Anti-Collusion Data Sharing
Scheme for Dynamic
Groups in the Cloud |
CLOUD COMPUTING |
JAVA/2015 |
6 |
An
Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration |
CLOUD COMPUTING |
JAVA/2015 |
7 |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
CLOUD COMPUTING |
JAVA/2015 |
8 |
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable
Delegation in Cloud Computing |
CLOUD COMPUTING |
2015 |
9 |
CloudArmor:
Supporting Reputation-based Trust Management
for Cloud Services |
CLOUD COMPUTING |
2015 |
10 |
Control Cloud Data Access
Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
CLOUD COMPUTING |
2015 |
11 |
Enabling Cloud
Storage Auditing With Key-Exposure Resistance |
CLOUD COMPUTING |
2015 |
12 |
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
CLOUD COMPUTING |
2015 |
13 |
Identity-Based Encryption with Outsourced Revocation in Cloud Computing |
CLOUD COMPUTING |
2015 |
14 |
Key-Aggregate Searchable Encryption (KASE) for Group Data
Sharing via Cloud Storage |
CLOUD COMPUTING |
2015 |
15 |
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing |
CLOUD COMPUTING |
2015 |
16 |
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud
Storage |
CLOUD COMPUTING |
2015 |
17 |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
CLOUD COMPUTING |
2015 |
18 |
Public Integrity Auditing for Shared
Dynamic Cloud Data with Group User Revocation |
CLOUD COMPUTING |
2015 |
19 |
Secure Auditing and
Deduplicating Data in Cloud |
CLOUD COMPUTING |
2015 |
20 |
Stealthy
Denial of Service Strategy in Cloud Computing |
CLOUD COMPUTING |
2015 |
21 |
Best
Keyword Cover Search |
DATA MINING |
2015 |
22 |
Co-Extracting Opinion Targets and Opinion Words from Online
Reviews Based on the Word Alignment Model |
DATA MINING |
2015 |
23 |
Context-Based Diversification for Keyword
Queries over XML Data |
DATA MINING |
2015 |
24 |
Discovery
of Ranking Fraud for |
DATA MINING |
2015 |
25 |
Malware
Propagation in Large-Scale Networks |
DATA MINING |
2015 |
26 |
On Summarization and Timeline Generation for Evolutionary Tweet
Streams |
DATA MINING |
2015 |
27 |
Privacy Policy Inference of User-Uploaded Images
on Content Sharing Sites |
DATA MINING |
2015 |
28 |
Progressive Duplicate
Detection |
DATA MINING |
2015 |
29 |
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection |
DATA MINING |
2015 |
30 |
Route-Saver: Leveraging Route APIs for Accurate
and Efficient Query Processing at Location-Based Services |
DATA MINING |
2015 |
31 |
Scalable
Constrained Spectral Clustering |
DATA MINING |
2015 |
32 |
Towards Effective Bug Triage with Software Data
Reduction Techniques |
DATA MINING |
2015 |
33 |
Tweet
Segmentation and Its Application to Named Entity Recognition |
DATA MINING |
2015 |
34 |
A
Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop
Networks |
NETWORKING |
2015 |
35 |
A Proximity-Aware Interest-Clustered P2P File
Sharing System |
NETWORKING |
2015 |
36 |
Detecting
Malicious Facebook Applications |
NETWORKING |
2015 |
37 |
Maximizing
P2P File Access Availability in Networks though Replication for Efficient File
Sharing |
NETWORKING |
2015 |
38 |
Dynamic
Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
MOBILE COMPUTING |
2015 |
39 |
Friendbook:
A Semantic-Based Friend Recommendation System for Social Networks |
MOBILE COMPUTING |
2015 |
40 |
Privacy-Preserving
and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
MOBILE COMPUTING |
2015 |
41 |
User-Defined
Privacy Grid System for Continuous Location-Based Services |
MOBILE COMPUTING |
2015 |
42 |
A
Computational Dynamic Trust Model for User Authorization |
SECURE COMPUTING |
2015 |
43 |
A
Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor
Networks |
SECURE COMPUTING |
2015 |
44 |
Continuous
and Transparent User Identity Verification for Secure Internet Services |
SECURE COMPUTING |
2015 |
45 |
Contributory
Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
SECURE COMPUTING |
2015 |
46 |
DDSGA:
A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks |
SECURE COMPUTING |
2015 |
47 |
Improved
Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints |
SECURE COMPUTING |
2015 |
48 |
Secure Data Aggregation Technique for Wireless
Sensor Networks in the Presence of Collusion Attacks |
SECURE COMPUTING |
2015 |
49 |
Secure
Spatial Top-k Query Processing via Untrusted Location- Based Service Providers |
SECURE COMPUTING |
2015 |
50 |
Asymmetric
Social Proximity Based Private Matching Protocols for Online Social Networks |
PARALLEL
& DISTRIBUTED SYSTEMS |
2015 |
51 |
Cost-Effective
Authentic and Anonymous Data Sharing with Forward Security |
PARALLEL
& DISTRIBUTED SYSTEMS |
2015 |
52 |
Secure
Distributed Deduplication Systems with Improved Reliability |
PARALLEL
& DISTRIBUTED SYSTEMS |
2015 |
53 |
A
Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to
Recommendations |
INFORMATION FORENSICS AND SECURITY |
2015 |
54 |
Effective
Key Management in Dynamic Wireless Sensor Networks |
INFORMATION FORENSICS AND SECURITY |
2015 |
55 |
Key
Updating for Leakage Resiliency with Application to AES Modes of Operation |
INFORMATION FORENSICS AND SECURITY |
2015 |
56 |
Passive
IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter |
INFORMATION FORENSICS AND SECURITY |
2015 |
57 |
Software
Puzzle: A Countermeasure to Resource-Inflated Denial- of-Service Attacks |
INFORMATION FORENSICS AND SECURITY |
2015 |
58 |
An
Attribute-Assisted Reranking Model for Web Image Search |
IMAGE PROCESSING |
2015 |
59 |
EMR:
A Scalable Graph-based Ranking Model for Content-based Image Retrieval |
IMAGE PROCESSING |
2015 |
60 |
Learning
to Rank Image Tags With Limited Training Examples |
IMAGE PROCESSING |
2015 |
61 |
Designing
High Performance Web-Based Computing Services to Promote Telemedicine Database Management System |
SERVICE
COMPUTING (WEB SERVICE) |
2015 |
62 |
Location-Aware and Personalized
Collaborative Filtering for Web Service
Recommendation |
SERVICE
COMPUTING (WEB
SERVICE) |
2015 |
63 |
A Fuzzy Preference Tree-Based Recommender System
for Personalized Business-to-Business E-Services |
FUZZY SYSTEMS |
2015 |
64 |
Prediction of Atomic Web Services Reliability for
QoS-Aware Recommendation |
SERVICE
COMPUTING (WEB
SERVICE) |
2015 |
65 |
Real-Time Detection of Traffic From Twitter Stream
Analysis |
DATA MINING |
2015 |
66 |
t-Closeness through Microaggregation: Strict
Privacy with Enhanced Utility
Preservation |
DATA MINING |
2015 |