Dot Net Titles 2013-2014

5
1POINTER TECHNOLOGY DOT NET IEEE TITLES 2013-2014 1) Privacy-Preserving Public Auditing for Secure Cloud Storage 2) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 3) Privacy Preserving Data Sharing With Anonymous ID Assignment 4) Identity-Based Secure Distributed Data Storage Schemes 5) A Cloud-based Approach for Interoperable EHRs 6) Secure Logging As a Service—Delegating Log Management to the Cloud 7) Network Performance Aware MPI Collective Communication Operations in the Cloud 8) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 9) Modeling of Distributed File Systems for Practical Performance Analysis 10) Privacy Preserving Delegated Access Control in Public Clouds 11) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 12) An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing 13) QoS Ranking Prediction for Cloud Services 14) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 15) Protecting Sensitive Labels in Social Network Data Anonymization 16) Achieving Data Privacy through Secrecy Views and Null- Based Virtual Updates No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph – 044 342323407; Mobile –9043350456, 9500139248 Email: [email protected] website: www.1pointer.com

description

Final year dotnet project titles

Transcript of Dot Net Titles 2013-2014

Page 1: Dot Net Titles 2013-2014

1POINTER TECHNOLOGY

DOT NET IEEE TITLES 2013-2014

1) Privacy-Preserving Public Auditing for Secure Cloud Storage2) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using

Attribute-Based Encryption 3) Privacy Preserving Data Sharing With Anonymous ID Assignment4) Identity-Based Secure Distributed Data Storage Schemes5) A Cloud-based Approach for Interoperable EHRs6) Secure Logging As a Service—Delegating Log Management to the Cloud7) Network Performance Aware MPI Collective Communication Operations in the Cloud8) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems9) Modeling of Distributed File Systems for Practical Performance Analysis10) Privacy Preserving Delegated Access Control in Public Clouds11) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage12) An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud

Computing13) QoS Ranking Prediction for Cloud Services14) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud15) Protecting Sensitive Labels in Social Network Data Anonymization16) Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates17) Efficient Evaluation of SUM Queries over Probabilistic Data18) Supporting Search-As-You-Type Using SQL in Databases19) Mining User Queries with Markov Chains: Application to Online Image Retrieval20) A System to Filter Unwanted Messages from OSN User Walls21) Reinforced Similarity Integration in Image-Rich Information Networks22) Co-Occurrence-Based Diffusion for Expert Search on the Web23) A New Algorithm for Inferring User Search Goals with Feedback Sessions24) A Machine Learning Approach to Software Requirements Prioritization25) Semi-Supervised Heterogeneous Fusion for Multimedia Data Co-clustering26) Structural Diversity for Resisting Community Identification in Published Social

Networks27) Reversible Data Hiding With Optimal Value Transfer28) A Formal Usability Constraints Model for Watermarking of Outsourced Datasets29) Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System

Development [With Hardware]30) A Survival Modeling Approach to Biomedical Search Result Diversification Using

Wikipedia31) PMSE: A Personalized Mobile Search Engine [With Hardware]

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.Ph – 044 342323407; Mobile –9043350456, 9500139248

Email: [email protected] website: www.1pointer.com

Page 2: Dot Net Titles 2013-2014

1POINTER TECHNOLOGY

32) A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

33) Multiparty Access Control for Online Social Networks: Model and Mechanisms34) Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information35) Patch-Based Image Warping for Content-Aware Retargeting36) MSIDX: Multi-Sort Indexing for Efficient Content-based Image Search and Retrieval37) SORT: Self-Organizing Trust Modelfor Peer-to-Peer Systems38) A System for Timely and Controlled Information Sharing in Emergency Situations [With

Hardware]39) A MAC Sensing Protocol Design for Data Transmission with More Protection to Primary

Users40) Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data41) Detection and Localization of Multiple Spoofing Attackers in Wireless Networks42) Sybil Defender: A Defense Mechanism for Sybil Attacks in Large Social Networks43) Anonymous and Distributed Community Cyber Incident Detection44) Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior45) Optimal Client-Server Assignment for Internet Distributed Systems46) A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

47) A Secure Payment Scheme with Low Communication and Processing Overhead

for Multichip Wireless Networks48) Scaling up publish/subscribe overlays using interest correlation for link sharing49) A Highly Practical Approach towards Achieving Minimum Datasets Storage Cost in the

Cloud150) Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds51) Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in

Delay-tolerant Networks52) Buffer Management for Aggregated Streaming Data with Packet Dependencies53) Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks54) SOS: A Distributed Mobile Q&A System Based on Social Networks55) Behavioral Malware Detection in Delay Tolerant Networks56) A System for Denial-of-Service Attack Detection Based on Multivariate Correlation

Analysis57) Load Rebalancing for Distributed File Systems in Clouds58) Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption59) ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs60) An Adaptive Cloud Downloading Service61) A Quantitative Model and Analysis of Information Confusion in Social Networks62) Resource Management for Complex, Dynamic Environments

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.Ph – 044 342323407; Mobile –9043350456, 9500139248

Email: [email protected] website: www.1pointer.com

Page 3: Dot Net Titles 2013-2014

1POINTER TECHNOLOGY

63) Ant Colony Optimization for Software Project Scheduling and Staffing with an

Event-Based Scheduler

………YOUR OWN PAPER CONCEPTS CAN BE ACCEPTED

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.Ph – 044 342323407; Mobile –9043350456, 9500139248

Email: [email protected] website: www.1pointer.com