2. Combining Tag and Value Similarity for Data Extraction and Alignment
3. Coupled Behavior Analysis with Applications
4. Data Mining for XML Query-Answering Support
5. Document Clustering in Correlation Similarity Measure Space
6. Efficient and Effective Duplicate Detection in Hierarchical Data
7. Efficient Extended Boolean Retrieval
8. Organizing User Search Histories
9. Publishing Search Logs—A Comparative Study of Privacy Guarantees
10. Clustering with Multiviewpoint-Based Similarity Measure
11. Slicing: A new Approach for Privacy Preserving Data Publishing
12. Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword Searching
13. Efficient Fuzzy Type-Ahead Search in XML Data
14. Outsourced Similarity Search on Metric Data Assets
Projects on Networking:
15. Finding Cheap Routes in Profit-Driven Opportunistic Spectrum Access
Networks: A Truthful Mechanism Design Approach 16. Online Adaptive Compression in Delay Sensitive Wireless Sensor Networks 17. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies 18. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs 19. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency Web site: www.liotech.in www.liotechprojects.com Email id: liotechprojects@gmail.com Contact no: 8519950799 .NET IEEE Project List
20. Topology control in mobile ad hoc Networks with cooperative
communications Projects on Network Security: 21. A Hybrid Approach to Private Record Matching 22. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
23. On Privacy of Encrypted Speech Communications
24. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
25. Privacy-Preserving Enforcement of Spatially Aware RBAC
26. Revisiting Defenses against Large-Scale Online Password Guessing Attacks
27. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
28. Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key
Management Scheme for Secure Broadcasting
29. Enhancing Data Trustworthiness via Assured Digital Signing
30. Exploring Context and Content Links in Social Media: A Latent Space Method
Projects on Mobile Computing:
31. An Iterative Algorithm for Trust Management and Adversary Detection for Delay- Tolerant Networks 32. Message Drop and Scheduling in DTNs: Theory and Practice 33. Thwarting Control-Channel Jamming Attacks from Inside Jammers 34. Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation 35. Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and Cross-Layer Optimization for Scalable Video Streaming
Web site: www.liotech.in
www.liotechprojects.com Email id: liotechprojects@gmail.com Contact no: 8519950799 36. A Trigger Identification Service for Defending Reactive Jammers in WSN 37. Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks 38. Low Power Consumption Solutions for Mobile Instant Messaging 39. Converge Cast: On the Capacity and Delay Tradeoffs 40. Catching Packet Droppers and Modifiers in Wireless Sensor Networks 41. Network Assisted Mobile Computing with Optimal Uplink Query Processing
42. ES-MPICH2: A Message Passing Interface with Enhanced Security
43. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
44. Cooperative Download in Vehicular Environments
45. Uncoordinated Cooperative Communications in Highly Dynamic Wireless Networks
46. The Three-Tier Security Scheme in Wireless Sensor Networks with
Mobile Sinks
Projects on Image Processing:
47. Automatic Image Equalization and Contrast Enhancement Using
Gaussian Mixture Modeling 48. Image Authentication Using Distributed Source Coding 49. Analyzing Image Deblurring Through Three Paradigms 50. Smile Detection by Boosting Pixel Differences 51. Fast Vanishing-point Detection in Unstructured Environments 52. An Online Learning Approach to Occlusion Boundary Detection 53. Robust Face-Name Graph Matching for Movie Character Identification 54. Shadow Removal Using Bilateral Filtering 55. Combining Head Pose and Eye Location Information for Gaze Estimation
56. A Secret-Sharing-Based Method for Authentication of Grayscale
Document Images via the Use of the PNG Image With a Data Repair Capability
57. Distributed Throughput Maximization in Wireless Networks via Random
Power Allocation
Projects on Cloud Computing:
58. Cashing in on the Cache in the Cloud
59. Cooperative Provable Data Possession for Integrity Verification in Multi- Cloud Storage
60. pCloud: A Distributed System for Practical PIR
61. Cloud Computing Security: From Single to Multi-Clouds 62. Privacy-Preserving Public Auditing for Secure Cloud Storage 63. Monitoring Service Systems from a Language-Action Perspective 64. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
65. Ensuring Distributed Accountability for Data Sharing in the Cloud
66. Enhanced Data Security Model for Cloud Computing
New projects:
1. Ensuring Distributed Accountability for Data Sharing in the Cloud
2. Enhanced Data Security Model for Cloud Computing
3. Catching Packet Droppers and Modifiers in Wireless Sensor Networks
4. Cloud Computing Security: From Single to Multi-Clouds
5. Privacy-Preserving Public Auditing for Secure Cloud Storage
6. Monitoring Service Systems from a Language-Action Perspective
7. HASBE: A Hierarchical Attribute-Based Solution for Flexible and
Scalable Access Control in Cloud Computing
8. Network Assisted Mobile Computing with Optimal Uplink Query
Processing
Web site: www.liotech.in
www.liotechprojects.com Email id: liotechprojects@gmail.com Contact no: 8519950799 9. A Message Passing Interface with Enhanced Security
10. Detection and Localization of Multiple Spoofing Attackers in Wireless
Networks(video available)
11. Exploring Context and Content Links in Social Media: A Latent Space Method
12. Cooperative Download in Vehicular Environments
13. Uncoordinated Cooperative Communications in Highly Dynamic
Wireless Networks
14 The Three-Tier Security Scheme in Wireless Sensor Networks with
Mobile Sinks
15. Distributed Throughput Maximization in Wireless Networks via
Random Power Allocation(video available)
16. Efficient Fuzzy Type-Ahead Search in XML Data
17. Creating Evolving User Behavior Profiles Automatically 18. Outsourced Similarity Search on Metric Data Assets 19. A Genetic Programming Approach to Record Deduplication