Non IEEE / Application Projects - Computing |
Java - Parallel & Distributed Computing |
1 |
PSMPA: Patient Self-Controllable
and Multi-Level Privacy-Preserving
Cooperative Authentication in Distributed
m-Healthcare Cloud Computing System |
2 |
Secure and Distributed Data Discovery and
Dissemination in Wireless Sensor Networks |
3 |
A Hybrid Cloud Approach for Secure Authorized Deduplication |
4 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
5 |
Cost-Aware SEcure Routing (CASER) Protocol
Design for Wireless Sensor Networks |
6 |
Distributed Database Management Techniques
for Wireless Sensor Networks |
7 |
Dynamic Bin Packing for On-Demand Cloud Resource Allocation |
8 |
On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications |
9 |
Response Time Based Optimal Web Service Selection |
10 |
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing |
11 |
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage |
12 |
DCloud: Deadline-aware Resource Allocation for Cloud Computing Jobs |
13 |
Performance-Aware Cloud Resource Allocation via Fitness-enabled Auction |
14 |
POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks |
15 |
Robinhood: Towards Efficient Work-stealing in Virtualized Environments |
|
|
Java - Dependable & Secure Computing |
1 |
Group Key Agreement with Local Connectivity |
2 |
High Performance and High Scalable Packet Classification Algorithm for Network Security Systems |
3 |
Low-Rate DoS Attacks Detection Based on Network Multifractal |
4 |
Malware Detection in Cloud Computing Infrastructures |
5 |
PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications |
6 |
Risk Aware Query Replacement Approach for Secure Databases Performance Management |
7 |
Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service |
8 |
Towards Detecting Compromised Accounts on Social Networks |
9 |
Privacy Protection for Wireless Medical Sensor Data |
10 |
A Computational Dynamic Trust Model
for User Authorization |
11 |
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption |
12 |
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
13 |
An Access Control Model for Online Social
Networks Using User-to-User Relationships |
14 |
Deleting Secret Data with Public Verifiability |
15 |
My Privacy My Decision: Control of Photo
Sharing on Online Social Networks |
16 |
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks |
|
|
Java - Dependable & Secure Computing |
1 |
Predicting User-Topic Opinions in Twitter with Social and Topical Context |
2 |
Contact-Aware Data Replication in Roadside Unit
Aided Vehicular Delay Tolerant Networks |
3 |
Discover the Expert: Context-Adaptive Expert Selection for Medical Diagnosis |
4 |
Towards Information Diffusion in Mobile Social Networks |
5 |
Providing Privacy-Aware Incentives in Mobile
Sensing Systems |
6 |
User-Defined Privacy Grid System for Continuous Location-Based Services |
7 |
DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks |
8 |
Delay Models for Static and Adaptive Persistent Resource Allocations in Wireless Systems |
9 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
|
|
Java - Service Computing |
1 |
On the Security of Data Access Control for Multiauthority Cloud Storage Systems |
2 |
QoS Evaluation for Web Service Recommendation |
3 |
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System |
4 |
Disease Inference from Health-Related Questions via Sparse Deep Learning |
5 |
Dynamic Proofs of Retrievability for Coded Cloud Storage Systems |
6 |
Efficient Keyword Searching in Large-scale Social Network Service |
7 |
Joint Optimization of Resource Provisioning in Cloud Computing |
8 |
Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |
9 |
Multi-Objective Service Composition in
Uncertain Environments |
10 |
Using ant colony system to consolidate VMS for green cloud computing |
11 |
An Integrated Semantic Web Service Discovery and Composition Framework |
12 |
Dynamic Job Ordering and Slot Configurations for MapReduce Workloads |
13 |
Processes Meet Big Data: Connecting Data Science with Process Science |
14 |
SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces |
15 |
Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services |
16 |
Diversifying Web Service Recommendation Results via Exploring Service Usage History |
|
|
Dot Net - Mobile Computing |
1 |
Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols |
2 |
Virtual Servers Co-Migration for Mobile Accesses Online vs. Offline |
3 |
CoCoWa: A Collaborative Contact-Based
Watchdog for Detecting Selfish Nodes |
4 |
Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage |
5 |
Joint Spectrum and Power Allocation for Multi-node Cooperative Wireless System |
|
|
Dot Net - Parallel & Distributed Computing |
1 |
LEISURE: A Framework for Load-Balanced Network - Wide Traffic Measuremen |
2 |
Authenticated Key Exchange Protocols for Parallel Network File Systems |
3 |
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing |
4 |
Hybrid cloud approach for secure authorized seduplication |
5 |
Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Network |
6 |
Universal Network Coding-Based Opportunistic Routing for Unicast |
7 |
SPA: A Secure and Private Auction Framewor k for Decentralized Online Social Networ ks |
8 |
Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds |
|
|
Dot Net - Dependable & Secure Computing |
1 |
An Access Control Model for Online Social Networks Using User-to-User Relationships |
2 |
A Computational Dynamic Trust Model for User Authorization |
3 |
My Privacy My Decision: Control of Photo Sharing on Online Social Networks |
4 |
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption |
5 |
Group Key Agreement with Local Connectivity |
6 |
Privacy protection for wirelsess sensor medical data |
7 |
REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks |
|
|
NS2 - Mobile Computing |
1 |
A Distributed Multi-Channel MAC Protocol for Ad Hoc Wireless Networks |
2 |
A Distributed Three-Hop Routing Protoco to Increase the Capacity of Hybrid Wireless Networks |
3 |
A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks |
4 |
A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks |
5 |
An OpenFlow Architecture for Energy-Aware Traffic Engineering in Mobile Networks |
6 |
CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes |
7 |
Cognitive Radio-Aware Transport Protocol for Mobile Ad Hoc Networks |
8 |
Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks |
9 |
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes |
10 |
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach |
|
|