You are on page 1of 10



JV 1 A Hybrid Cloud Approach for Secure CLOUD 2015
Authorized De duplication COMPUTING
JV 2 A Profit Maximization Scheme with CLOUD 2015
Guaranteed Quality of Service in Cloud COMPUTING
JV 3 A Scalable and Reliable Matching Service for CLOUD 2015
Content-Based Publish/Subscribe Systems COMPUTING
JV 4 A Secure and Dynamic Multi-keyword Ranked CLOUD 2015
Search Scheme over Encrypted Cloud Data COMPUTING
JV 5 A Secure Anti-Collusion Data Sharing Scheme CLOUD 2015
for Dynamic Groups in the Cloud COMPUTING
JV 6 An Authenticated Trust and Reputation CLOUD 2015
Calculation and Management System for Cloud COMPUTING
and Sensor Networks Integration
JV 7 Audit-Free Cloud Storage via Deniable CLOUD 2015
Attribute-based Encryption COMPUTING
JV 8 Circuit Ciphertext-policy Attribute-based CLOUD 2015
Hybrid Encryption with Verifiable Delegation COMPUTING
in Cloud Computing
JV 9 CloudArmor: Supporting Reputation-based CLOUD 2015
Trust Management for Cloud Services COMPUTING
JV 10 Control Cloud Data Access Privilege and CLOUD 2015
Anonymity with Fully Anonymous Attribute- COMPUTING
Based Encryption
JV 11 Enabling Cloud Storage Auditing With Key- CLOUD 2015
Exposure Resistance COMPUTING
JV 12 Enabling Fine-grained Multi-keyword Search CLOUD 2015
Supporting Classified Sub-dictionaries over COMPUTING
Encrypted Cloud Data
JV 13 Identity-Based Encryption with Outsourced CLOUD 2015
Revocation in Cloud Computing COMPUTING
JV 14 Key-Aggregate Searchable Encryption CLOUD 2015
(KASE) for Group Data Sharing via Cloud COMPUTING
JV 15 Privacy Preserving Ranked Multi-Keyword CLOUD 2015
Search for Multiple Data Owners in Cloud COMPUTING
JV 16 Privacy-Preserving Public Auditing for CLOUD 2015
Regenerating-Code-Based Cloud Storage COMPUTING

com .no:9985827707 E-mail:vstechnosolutions7@gmail. V S TECHNO SOLUTIONS SMART SOLLUTIONS FOR SMART PEOPLE IEEE CSE JAVA PROJECTS LIST JV 17 Provable Multicopy Dynamic Data CLOUD 2015 Possession in Cloud Computing Systems COMPUTING JV 18 Public Integrity Auditing for Shared Dynamic CLOUD 2015 Cloud Data with Group User Revocation COMPUTING JV 19 Secure Auditing and Deduplicating Data in CLOUD 2015 Cloud COMPUTING JV 20 Stealthy Denial of Service Strategy in Cloud CLOUD 2015 Computing COMPUTING JV 21 Best Keyword Cover Search DATA MINING 2015 JV 22 Co-Extracting Opinion Targets and Opinion DATA MINING 2015 Words from Online Reviews Based on the Word Alignment Model JV 23 Context-Based Diversification for Keyword DATA MINING 2015 Queries over XML Data JV 24 Discovery of Ranking Fraud for Mobile Apps DATA MINING 2015 JV 25 Malware Propagation in Large-Scale DATA MINING 2015 Networks JV 26 On Summarization and Timeline Generation DATA MINING 2015 for Evolutionary Tweet Streams JV 27 Privacy Policy Inference of User-Uploaded DATA MINING 2015 Images on Content Sharing Sites JV 28 Progressive Duplicate Detection DATA MINING 2015 JV 29 Reverse Nearest Neighbors in Unsupervised DATA MINING 2015 Distance-Based Outlier Detection JV 30 Route-Saver: Leveraging Route APIs for DATA MINING 2015 Accurate and Efficient Query Processing at Location-Based Services JV 31 Scalable Constrained Spectral Clustering DATA MINING 2015 JV 32 Towards Effective Bug Triage with Software DATA MINING 2015 Data Reduction Techniques JV 33 Tweet Segmentation and Its Application to DATA MINING 2015 Named Entity Recognition JV 34 A Distortion-Resistant Routing Framework NETWORKING 2015 for Video Traffic in Wireless Multihop Networks JV 35 A Proximity-Aware Interest-Clustered P2P NETWORKING 2015 File Sharing System JV 36 Detecting Malicious Facebook Applications NETWORKING 2015 JV 37 Maximizing P2P File Access Availability in NETWORKING 2015 Mobile Ad Hoc Networks though Replication Ph.

V S TECHNO SOLUTIONS SMART SOLLUTIONS FOR SMART PEOPLE IEEE CSE JAVA PROJECTS LIST for Efficient File Sharing JV 38 Dynamic Routing for Data Integrity and MOBILE 2015 Delay Differentiated Services in Wireless COMPUTING Sensor Networks JV 39 Friendbook: A Semantic-Based Friend MOBILE 2015 Recommendation System for Social COMPUTING Networks JV 40 Privacy-Preserving and Truthful Detection of MOBILE 2015 Packet Dropping Attacks in Wireless Ad Hoc COMPUTING Networks JV 41 User-Defined Privacy Grid System for MOBILE 2015 Continuous Location-Based Services COMPUTING JV 42 A Computational Dynamic Trust Model for SECURE 2015 User Authorization COMPUTING JV 43 A Lightweight Secure Scheme for Detecting SECURE 2015 Provenance Forgery and Packet Drop Attacks COMPUTING in Wireless Sensor Networks JV 44 Continuous and Transparent User Identity SECURE 2015 Verification for Secure Internet Services COMPUTING JV 45 Contributory Broadcast Encryption with SECURE 2015 Efficient Encryption and Short Ciphertexts COMPUTING JV 46 DDSGA: A Data-Driven Semi-Global SECURE 2015 Alignment Approach for Detecting COMPUTING Masquerade Attacks JV 47 Improved Privacy-Preserving P2P SECURE 2015 Multimedia Distribution Based on COMPUTING Recombined Fingerprints JV 48 Secure Data Aggregation Technique for SECURE 2015 Wireless Sensor Networks in the Presence of COMPUTING Collusion Attacks JV 49 Secure Spatial Top-k Query Processing via SECURE 2015 Untrusted E-mail:vstechnosolutions7@gmail.Based Service Providers COMPUTING JV 50 Asymmetric Social Proximity Based Private PARALLEL & 2015 Matching Protocols for Online Social DISTRIBUTED Networks SYSTEMS JV 51 PARALLEL & 2015 Cost-a\Effective Authentic and Anonymous DISTRIBUTED Data Sharing with Forward Security SYSTEMS JV 52 Secure Distributed Deduplication Systems PARALLEL & 2015 with Improved Reliability DISTRIBUTED .

Applied to Recommendations SECURITY JV 54 INFORMATION 2015 FORENSICS Effective Key Management in Dynamic AND Wireless Sensor Networks SECURITY JV 55 INFORMATION 2015 FORENSICS Key Updating for Leakage Resiliency with AND Application to AES Modes of Operation SECURITY JV 56 INFORMATION 2015 Passive IP Traceback: Disclosing the FORENSICS Locations of IP Spoofers from Path AND Backscatter SECURITY JV 57 INFORMATION 2015 FORENSICS Software Puzzle: A Countermeasure to AND Resource-Inflated Denial.of-Service Attacks SECURITY JV 58 An Attribute-Assisted Reranking Model for IMAGE 2015 Web Image Search PROCESSING JV 59 EMR: A Scalable Graph-based Ranking IMAGE 2015 Model for Content-based Image Retrieval PROCESSING JV 60 Learning to Rank Image Tags With Limited IMAGE 2015 Training Examples PROCESSING JV 61 SERVICE 2015 Designing High Performance Web-Based COMPUTING Computing Services to Promote Telemedicine (WEB Database Management System SERVICE) JV 62 SERVICE 2015 Location-Aware and Personalized COMPUTING Collaborative Filtering for Web Service (WEB Recommendation SERVICE) JV 63 A Fuzzy Preference Tree-Based FUZZY 2015 Recommender System for Personalized SYSTEMS Business-to-Business E-Services JV 64 Accuracy Constrained Privacy Preserving Access Control Mechanism for relational data Data Mining . V S TECHNO SOLUTIONS SMART SOLLUTIONS FOR SMART PEOPLE IEEE CSE JAVA PROJECTS LIST SYSTEMS JV 53 INFORMATION 2015 A Framework for Secure Computations with FORENSICS Two Non-Colluding Servers and Multiple AND E-mail:vstechnosolutions7@gmail.

V S TECHNO SOLUTIONS SMART SOLLUTIONS FOR SMART PEOPLE IEEE CSE JAVA PROJECTS LIST JV 65 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Data Mining JV 66 Click Prediction for Web Image Reranking Image Using Multimodal Sparse Coding Processing JV 67 A Cocktail Approach for Travel Package Recommendation Data Mining JV 68 Discovering Emerging Topics in Social Streams via Link-Anomaly Detection Data Mining JV 69 Efficient Prediction of Difficult Keyword Queries Data Mining JV 70 Keyword Query Routing Data Mining JV 71 Privacy-Preserving and Content-Protecting Location Based Queries Data Mining JV 72 Security Evaluation of Pattern Classifiers under Attack Data Mining JV 73 Towards Online Shortest Path Computation Data Mining JV 74 Supporting Privacy Protection in Personalized Data Mining Web Search JV 75 A Hybrid Cloud Approach for Secure Cloud Authorized Deduplication Computing JV 76 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Cloud Computing Systems Computing JV 77 Decentralized Access Control with Anonymous Cloud Authentication Computing JV 78 Distributed. Cloud Efficient Clouds Computing JV 83 Key-Aggregate Cryptosystem for Scalable Cloud Data Sharing in Cloud Storage Computing JV 84 Cooperative Caching for Efficient Data Access Networking in Disruption Tolerant Networks E-mail:vstechnosolutions7@gmail. and Independent Cloud Access to Encrypted Cloud Databases Computing JV 79 Oruta: Privacy-Preserving Public Auditing for Cloud Shared Data in the Cloud Computing JV 80 Privacy-Preserving Multi-Keyword Ranked Cloud Search over Encrypted Cloud Data Computing JV 81 Scalable Distributed Service Integrity Cloud Attestation for Software-as-a-Service Clouds Computing JV 82 Towards Differential Query Services in . Concurrent.

com .no:9985827707 E-mail:vstechnosolutions7@gmail. V S TECHNO SOLUTIONS SMART SOLLUTIONS FOR SMART PEOPLE IEEE CSE JAVA PROJECTS LIST JV 85 Cost Effective Resource Allocation of Overlay Networking Routing Relay Nodes PRJ CODE TITTLE YEAR JV 86 A Fast Clustering-Based Feature Subset Selection Algorithm 2013 for High Dimensional Data JV 87 CloudMoV: Cloud-based Mobile Social TV 2013 JV 88 Crowd sourcing L Pedictors of Behavioral Outcomes 2013 JV 89 Incentive Compatible LPivacy-LPeserving Data Analysis 2013 JV 90 Focus Learning to Crawl Web Forums 2013 JV 91 Robust Module Based Data Management 2013 JV 92 PMSE: A Personalized Mobile Search Engine 2013 JV 93 A System to Filter Unwanted Messages from OSN User 2013 Walls JV 94 Sensitive Label Privacy Protection on Social Network Data 2013 JV 95 Clustering Sentence-Level Text Using a Novel Fuzzy 2013 Relational Clustering Algorithm JV 96 Annonating search result from web data bases 2013 JV 97 PeservingPivacy Public Auditing for Secure Cloud Storage 2013 Ph.

V S TECHNO SOLUTIONS SMART SOLLUTIONS FOR SMART PEOPLE IEEE CSE JAVA PROJECTS LIST JV 98 Winds of Change from Vendor Lock-In to the Meta Cloud 2013 JV 99 AMES-Cloud: A Framework of Adaptive Mobile Video 2013 Streaming and Efficient Social Video Sharing in the Clouds JV 100 CAM: Cloud-Assisted Privacy Preserving Mobile Health 2013 Monitoring JV 101 Two tales of Privacy in online social networks 2013 JV 102 Utility-Privacy Trade off in Databases An Information. 2013 theoretic Approach JV 103 Dynamic Resource Allocation using Virtual Machines for 2013 Cloud Computing Environment JV 104 Mobile Relay Configuration in Data-intensive Wireless 2013 Sensor Networks JV 105 Distributed Cooperative Caching in Social Wireless 2013 Networks JV 106 Optimizing Cloud Resources for Delivering IPTV Services 2013 through Virtualization JV 107 Access Policy Consolidation for Event Processing Systems 2013 JV 108 Mining Contracts for Business Events and Temporal 2013 Constraints in Service Engagements JV 109 Fully Anonymous Profile Matching in Mobile Social 2013 Networks JV 110 Delay based network utility maximization 2013 JV 111 On the Node Clone Detection in Wireless Sensor Networks 2013 JV 112 A Highly Scalable Key Pre-Distribution Scheme for 2013 Wireless Sensor Networks JV 113 Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks 2013 JV 114 Fast transmission to remote cooperative groups: A new key 2013 management paradigm JV 115 Minimum Cost Blocking Problem in Multi-path Wireless 2013 Routing Protocols JV 116 Discovery and Verification of Neighbor Positions in Mobile 2013 Ad Hoc Networks JV 117 Content Sharing over Smartphone-Based Delay-Tolerant 2013 Networks JV 118 Slicing A New Approach to Privacy Preserving data 2012 publishing JV 119 A Network Coding Equivalent Content Distribution Scheme 2012 for Efficient peer to peer interactive vod streaming JV 120 On Optimizing Overlay Topologies for Search in 2012 Unstructured Peer-to-Peer Networks .no:9985827707 E-mail:vstechnosolutions7@gmail.

V S TECHNO SOLUTIONS SMART SOLLUTIONS FOR SMART PEOPLE IEEE CSE JAVA PROJECTS LIST JV 121 Automatic Discovery of Association Orders between Name 2012 and Aliases from the Web using AnchorTexts-based Co- occurrences JV 122 cloud data protection for the masses 2012 JV 123 Clustering with Multi view point-Based Similarity Measure 2012 JV 124 cooperative provable data profession for integrity 2012 verification in multi cloud storage JV 125 Distributed Packet Buffers for High-Bandwidth Switches 2012 and Routers JV 126 Efficient Fuzzy Type-Ahead Search in XML Data 2012 JV 127 Fast Data Collection in tree based wireless sensor networks 2012 JV 128 Footprint Detecting Sybil Attacks in Urban Vehicular 2012 Networks JV 129 Game-Theoretic Pricing for Video Streaming in mobile 2012 networks JV 130 Handwritten Chinese Text Recognition by Integrating 2012 Multiple Contexts JV 131 Trust modelling in social tagging of multimedia content 2012 JV 132 Learn to Personalized Image Search from the photo sharing 2012 websites JV 133 Multiparty access control for online social networks model 2012 and mechanisms JV 134 Online Modelling of Proactive Moderation System for 2012 auction fraud detection JV 135 Organizing User Search Histories 2012 JV 136 Packet Loss Control Using Tokens at the network edge. JV 145 Energy Efficient Cooperative Video distribution with 2012 Ph. 2012 JV 137 Packet-Hiding Methods for Preventing Selective jamming 2012 attacks JV 138 Ranking model adaption for domain specific search 2012 JV 139 Risk-Aware Mitigation for manet routing attacks 2012 JV 140 Self Adaptive Contention Aware Routing protocol for 2012 intermittently connected mobile networks JV 141 Ensuring distributed accountability for data sharing in the 2012 cloud JV 142 Adaptive Opprtunistic routing for wireless adhoc .no:9985827707 E-mail:vstechnosolutions7@gmail. 2012 JV 143 Vehicle Detection in Aerial Surveillance Using Dynamic 2012 Bayesian Networks JV 144 Catching Packet Droppers and Modifiers in wireless sensor 2012 networks.

com . V S TECHNO SOLUTIONS SMART SOLLUTIONS FOR SMART PEOPLE IEEE CSE JAVA PROJECTS LIST statistical QoS provisions over wireless networks JV 146 CCD A Distributed Publish/Subscribe frame work for rich 2012 content formats JV 147 An Efficient Catching scheme and consistency maintenance 2012 in hybrid p2p systems JV 148 Cut Detection in Wireless Sensor Networks 2012 JV 149 Confucius A Tool Supporting Collaborative Scientific 2012 Workflow Composition JV 150 Decision Trees for Uncertain Data 2011 JV 151 Discovering Conditional Functional Dependencies 2011 JV 152 Effective Navigation of Query Results Based on Concept 2011 Hierarchies JV 153 Extended XML Tree Pattern Matching: Theories and 2011 Algorithms JV 154 Ranking Spatial Data by Quality Preferences 2011 JV 155 The CoQUOS Approach to Continuous Queries in 2011 Unstructured Overlays JV 156 Delay Analysis and Optimality of Scheduling Policies for 2011 Multi-Hop Wireless Networks JV 157 Modelling and Detection of Camouflaging Worm 2011 JV 158 Nymble: Blocking Misbehaving Users in Anonym zing 2011 Networks JV 159 SAT: A Security Architecture Achieving Anonymity and 2011 Traceability in Wireless Mesh Networks JV 160 Secure and Practical Outsourcing of Linear Programming in 2011 Cloud Computing JV 161 A Privacy-Preserving Location Monitoring System for 2011 Wireless Sensor Networks JV 162 Authenticated Multi-Step Nearest Neighbour Search 2011 JV 163 Adaptive Cluster Distance Bounding for High Dimensional 2011 Indexing JV 164 Group Enclosing Queries 2011 JV 165 Making Aggregation Work in Uncertain and Probabilistic 2011 Databases JV 166 Data Leakage Detection 2011 JV 167 Improving Utilization of Infrastructure Clouds 2011 JV 168 Wireless Sensor Network Security model using Zero 2011 Knowledge Protocol JV 169 Selfish Overlay Network Creation and Maintenance 2011 JV 170 SPAF: Stateless FSA-based Packet Filters 2011 JV 171 ProgME: Towards Programmable Network Measurement 2011 E-mail:vstechnosolutions7@gmail.

no:9985827707 E-mail:vstechnosolutions7@gmail. V S TECHNO SOLUTIONS SMART SOLLUTIONS FOR SMART PEOPLE IEEE CSE JAVA PROJECTS LIST JV 172 Locating Equivalent Servants over P2P Networks 2011 JV 173 A Competitive Study of Cryptography Techniques over 2011 Block Cipher JV 174 Caching Strategies Based on Information Density Estimation 2011 in Wireless Ad Hoc Networks JV 175 Clustering with Multi-Viewpoint based Similarity Measure 2011 JV 176 Dynamics of Malware Spread in Decentralized Peer-to-Peer 2011 Networks JV 177 Embedded Extended Visual Cryptography Schemes 2011 JV 178 Online Intrusion Alert Aggregation with Generative Data 2011 Stream Modeling .