IEEE 2015-16 Dotnet
Dot Net IEEE 2015-16 Computer Science List
Check out the list for technology and domain options.
Cloud Computing IEEE Dot Net - 2015-16
# | Project Title |
---|---|
1 | A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
2 | Cloud-Based Multimedia Content Protection System |
3 | Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
4 | Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds |
5 | Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
6 | Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem |
7 | Identity-Based Distributed Provable Data Possession in Multicloud Storage |
8 | Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud |
9 | PSMPA: Patient Self-Controllable and Multi-Level Privacy- Preserving Cooperative Authentication in Distributed |
10 | SelCSP: A Framework to Facilitate Selection of Cloud Service Providers |
DATA MINING PROJECTS IEEE Dot Net 2015-16
# | Project Title |
---|---|
1 | Discovery of Ranking Fraud for Mobile Apps |
2 | PAGE: A Partition Aware Engine for Parallel Graph Computation |
3 | Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites |
4 | Query Aware Determinization of Uncertain Objects |
IEEE MOBILE COMPUTING PROJECTS Dot Net 2015-16
# | Project Title |
---|---|
1 | A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks |
2 | Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks |
3 | Optimal Configuration of Network Coding in Ad Hoc Networks |
4 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
IEEE NETWORKING PROJECTS Dot Net 2015-16
# | Project Title |
---|---|
1 | Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization |
2 | Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis |
3 | Universal Network Coding-Based Opportunistic Routing for Unicast |
SECURE COMPUTING PROJECT IEEE Dot Net 2015-16
# | Project Title |
---|---|
1 | Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems |
2 | Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search |
3 | Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints |
4 | Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System |
PARALLEL AND DISTRIBUTED SYSTEMS IEEE Dot Net 2015-16
# | Project Title |
---|---|
1 | Authenticated Key Exchange Protocols for Parallel Network File Systems |
SERVICE COMPUTING IEEE Dot Net 2015-16
# | Project Title |
---|---|
1 | Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |
IMAGE PROCESSING IEEE Dot Net 2015-16
# | Project Title |
---|---|
1 | An Attribute-Assisted Reranking Model for Web Image Search |
2 | Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images |
3 | Detection and Rectification of Distorted Fingerprints |
4 | Eye Gaze Tracking With a Web Camera in a Desktop Environment |
5 | Learning Fingerprint Reconstruction: From Minutiae to Image |
6 | Multiview Alignment Hashing for Efficient Image Search |
7 | Single Image Superresolution Based on Gradient Profile Sharpness |
8 | Steganography Using Reversible Texture Synthesis |
9 | Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |