IEEE Transactions on Computers |
1. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal |
|
|
|
|
2. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing |
|
|
|
|
3. TagBook: A Semantic Video Representation without Supervision for Event Detection |
|
|
|
|
4. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates |
|
|
|
|
5. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation |
|
|
|
|
More Projects>> |
IEEE Transactions on Cloud Computing |
1. The Impact of Review Environment on Review Credibility |
|
|
|
|
2. Private Over-threshold Aggregation Protocols over Distributed Datasets |
|
|
|
|
3. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis |
|
|
|
|
4. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing |
|
|
|
|
5. Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
|
|
|
|
More Projects>> |
IEEE TRANSACTIONS ON MOBILE COMPUTING |
1. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach |
|
|
|
|
2. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction |
|
|
|
|
3. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation |
|
|
|
|
4. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor |
|
|
|
|
5. What Is Happening in The Video Annotate Video by Sentence |
|
|
|
|
More Projects>> |
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS |
1. Mining Health Examination Records A Graph-based Approach |
|
|
|
|
2. A Credibility Analysis System for Assessing Information on Twitter |
|
|
|
|
3. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
|
|
|
|
4. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys |
|
|
|
|
5. Text Mining the Contributors to Rail Accidents |
|
|
|
|
IEEE Transactions on Security Computing |
1. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data |
|
|
|
|
2. Interactive Streaming of Sequences of High Resolution JPEG2000 Images |
|
|
|
|
3. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems |
|
|
|
|
4. Predicting Personalized Image Emotion Perceptions in Social Networks |
|
|
|
|
5. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data |
|
|
|
|
More Projects>> |
Services Computing |
1. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing |
|
|
|
|
2. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm |
|
|
|
|
3. Cloud workflow scheduling with deadlines and time slot availability |
|
|
|
|
4. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys |
|
|
|
|
IEEE/ACM TRANSACTIONS ON NETWORKING |
1. Path-Based Epidemic Spreading in Networks |
 |
|
|
|
2. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality |
 |
|
|
|
3. On the Resiliency of Static Forwarding Tables |
 |
|
|
|
4. Network Capability in Localizing Node Failures via End-to-End Path Measurements |
 |
|
|
|
5. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement |
 |
|
|
|
More Projects>> |
|
|
Android Application Demo |
|
|
|
Professional Referrance |
|
- Enterprise IT Training
- Interview Questions
- Technical Reference
- Placement Papers
- Inplant Training
|
 |
|
IEEE 2014 Latest Projects |
|
- IEEE 2013 Projects
- IEEE 2012 Projects
- Software Application Projects
|
|
Online Projects Support |
|
 |
 |
|
|