Tuesday, March 11, 2014


Posted by ADMIN at 8:25 AM 0 Comments

 1.     A Decentralized Service Discovery Approach on Peer-to-Peer Networks.

2.     A Distributed Control Law for Load Balancing in Content Delivery Networks
3.     A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data.
4.     A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia.
5.     A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks.
6.     A Load Balancing Model Based on Cloud Partitioningfor the Public Cloud.
7.     A New Algorithm for Inferring User Search Goals with Feedback Sessions
8.     A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
9.     A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
10.                        A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
11.                        A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
12.                        A System to Filter Unwanted Messages from OSN User Walls
13.                        Access Policy Consolidation for Event Processing Systems
14.                        AMES A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
15.                        Annotating Search Results from Web Databases
16.                        Attribute-Based Encryption With Verifiable Outsourced Decryption
17.                        Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
18.                        Beyond Text QA Multimedia
19.                        CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
20.                        CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
21.                        CloudMoV Cloud-based Mobile Social TV
22.                        Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
23.                        Collaboration in Multicloud Computing Environments Framework and Security Issues
24.                        Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
25.                        Comparable Entity Mining from Comparative Questions
26.                        Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
27.                        Crowd sourcing Predictors of Behavioral Outcomes
28.                        Delay-Based Network Utility Maximization
29.                        Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
30.                        Distributed Cooperative Caching in Social Wireless Networks
31.                        Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
32.                        Document Clustering for Forensic Analysis An Approach for Improving Computer Inspection
33.                        Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
34.                        EAACK—A Secure Intrusion-Detection System for MANETs
35.                        Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
36.                        Extracting Spread-Spectrum Hidden Data from Digital Media
37.                        Facilitating Document Annotation using Content and Querying Value
38.                        Facilitating Effective User Navigation through Website Structure Improvement
39.                        Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm
40.                        Fault Node Recovery Algorithm for a Wireless Sensor Network
41.                        FoCUS Learning to Crawl Web Forums
42.                        Fully Anonymous Profile Matching in Mobile Social Networks
43.                        Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
44.                        Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
45.                        Identity-Based Secure Distributed Data Storage
46.                        Incentive Compatible Privacy-Preserving Data Analysis
47.                        IP-Geolocation Mapping for Moderately Connected Internet Regions
48.                        Load Rebalancing for Distributed File Systems in Clouds
49.                        Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
50.                        Mining contract s for business event and temporal constraints in service engagement
51.                        Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
52.                        Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
53.                        Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
54.                        m-Privacy for Collaborative Data Publishing
55.                        NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
56.                        On the Node Clone Detection in Wireless Sensor Networks
57.                        Opportunistic MANETs Mobility Can Make Up for Low Transmission Power
58.                        Optimal Client-Server Assignment for Internet Distributed Systems
59.                        Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
60.                        PACK Prediction-Based Cloud Bandwidth and Cost Reduction System
61.                        PMSE A Personalized Mobile Search Engine
62.                        Preventing Private Information Inference Attacks on Social Networks
63.                        Price Differentiation for Communication Networks
64.                        Privacy Preserving Data Sharing With Anonymous ID Assignment
65.                        Privacy Preserving Delegated Access Control
66.                        Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
67.                        Privacy-Preserving Public Auditing for Secure Cloud Storage
68.                        Protecting Sensitive Labels in Social Network Data Anonymization

69.                        obust Module Based Data Management
70.                        Scalable and Secure Sharing of Personal Health Records
71.                        Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
72.                        Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
73.                        Sensitive Label Privacy Protection on Social Network Data
74.                        SocialTube P2P-assisted Video Sharing in Online Social Networks
75.                        SORT A Self-ORganizing Trust Model for Peer-to-Peer Systems
76.                        Spatial Approximate String Search
77.                        Super-Resolution-based Inpainting
78.                        Towards a Statistical Framework for Source Anonymity in Sensor Networks
79.                        Towards Differential Query Services in Cost-Efficient Clouds
80.                        Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
81.                        Twitsper Tweeting Privately
82.                        Two tales of privacy in online social networks
83.                        Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
84.                        Utility-Privacy Tradeoff in Databases An Information-theoretic Approach
85.                        Vampire attacks Draining life from wireless ad-hoc sensor networks
86.                        WARNINGBIRD A Near Real-time Detection System for Suspicious URLs in Twitter Stream
87.                        Whole Test Suite Generation
88.                        Winds of Change from Vendor Lock-In to the Meta Cloud
89.                        Eefficient Rekeying Framework for Secure
90.                        Fast Nearest Neighbor Search
91.                        Mobi-Sync Efficient Time Synchronization
92.                        Super-Resolution-based Inpainting
93.                        Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
94.                        Collaboration in Multicloud Computing Environments Framework and Security Issues
95.                        Price Differentiation for Communication Networks
96.                        Anomaly Detection via Online Over-Sampling
97.                        Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

Share This Post

Get Updates

Subscribe to our Mailing List. We'll never share your Email address.





AERONAUTICAL AEROSPACE AGRICULTURE ANDROID Android project titles Animation projects Artificial Intelligence AUTOMOBILE BANK JOBS BANK RECRUITMENTS BIG DATA PROJECT TITLES Bio instrumentation Project titles BIO signal Project titles BIO-TECHNOLOGY BIOINFORMATICS BIOMEDICAL Biometrics projects CAREER CAT 2014 Questions CHEMICAL CIVIL Civil projects cloud computing COMP- PROJ-DOWN COMPUTER SCIENCE PROJECT DOWNLOADS COMPUTER(CSE) CONFERENCE Data mining Projects Data protection. Design projects DIGITAL SIGNAL PROCESSING IEEE Project titles Dot net projects EBOOKS ELECTRICAL MINI PROJECTS ELECTRICAL PROJECTS DOWNLOADS ELECTRONICS MINI PROJECTS ELECTRONICS PROJECT DOWNLOADS EMG PROJECTS employment Engineering projects Exams Facts final year projects FOOD TECHNOLOGY FREE IEEE 2014 project Free IEEE Paper FREE IEEE PROJECTS GATE GAte scorecard GOVT JOBS Green projects GSM BASED Guest authors HIGHWAY IEEE 2014 projects ieee 2015 projects IEEE computer science projects IEEE Paper IEEE PAPER 2015 ieee project titles IEEE projects IEEE Transactions INDUSTRIAL INNOVATIVE PROJECTS INTERFACING IT IT LIST Java projects labview projects LATEST TECHNOLOGY list of project centers Low cost projects MARINE Matlab codes MATLAB PROJECT TITLES MATLAB PROJECTS MBA MBA 2015 projects MCA MECHANICAL MECHANICAL PROJECTS DOWNLOAD MINI PROJECTS modelling projects MP3 MP3 cutter Mp4 Networking topics ns2 projects online jobs PETROCHEMICAL PHYSIOLOGICAL MODELLING projects physiotheraphy Projects Power electronics power system projects PRODUCTION project centers project downloads Prosthesis projects RAILWAY RECRUITMENT 2012 Recent RECENT TECHNOLOGY RECENT TECHNOLOGY LIST RECRUITMENT Rehabilitation projects renewable power respiration projects RESUME FORMAT. Ring Tone Cutter Robotics projects. Robots in medical social network jobs Solar projects Songs Cutter Speech-music separation-Abstract structural engineering TECHNOLOGY technology management TELE COMMUNICATION Telegram project TEXTILE TOP ENGINEERING COLLEGES Training VLSI


This blogs is an effort to club the scattered information about engineering and project titles and ideas available in the web. While every effort is made to ensure the accuracy of the information on this site, no liability is accepted for any consequences of using it. Most of the material and information are taken from other blogs and site with the help of search engines. If any posts here are hitting the copyrights of any publishers, kindly mail the details to It will be removed immediately.

Alexa Rank

back to top