Project 2013 Titles
SN.NO | PROJECT TITLES | DOMAIN |
---|---|---|
1 | A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional DataA Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data | Data Mining |
2 | A Probabilistic Approach to String Transformation | Data Mining |
3 | Comparable Entity Mining from Comparative Questions | Data Mining |
4 | Crowdsourcing Predictors of Behavioral Outcomes | Data Mining |
5 | Facilitating Document Annotation using Content and Querying Value | Data Mining |
6 | Incentive Compatible Privacy-Preserving Data Analysis | Data Mining |
7 | m-Privacy for Collaborative Data Publishing | Data Mining |
8 | Spatial Approximate String Search | Data Mining |
9 | Mining Contracts for Business Events and Temporal Constraints in Service Engagements | Data Mining |
10 | Ranking on Data Manifold with Sink Points | Data Mining |
11 | The Generalization Ability of Online Algorithms for Dependent Data | Data Mining |
12 | A Load Balancing Model Based on Cloud Partitioning for the Public Cloud | Cloud Computing |
13 | AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds | Cloud Computing |
14 | Cloud computing for mobile users: can offloading computation save energy? | Cloud Computing |
15 | Collaboration in Multicloud Computing Environments: Framework and Security Issues | Cloud Computing |
16 | Mining Contracts for Business Events and Temporal Constraints in Service Engagements | Cloud Computing |
17 | Privacy-Preserving Public Auditing for Secure Cloud Storage | Cloud Computing |
18 | Winds of Change: From Vendor Lock-In to the Meta Cloud | Cloud Computing |
19 | A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud | Cloud Computing |
20 | Cloud Implementation of a Full Hyperspectral Unmixing Chain Within the NASA Web Coverage Processing Service for EO-1 | Cloud Computing |
21 | CloudMoV: Cloud-based Mobile Social TV | Cloud Computing |
22 | Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment | Cloud Computing |
23 | Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems | Cloud Computing |
24 | Optimizing Cloud Resources for Delivering IPTV Services through Virtualization | Cloud Computing |
25 | Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption | Cloud Computing |
26 | A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing | Cloud Computing |
27 | The Power of Prediction: Cloud Bandwidth and Cost Reduction | Cloud Computing |
28 | Super-Resolution-based Inpainting | Image Processing |
29 | Casual Stereoscopic Photo Authoring | Image Processing |
30 | Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes | Image Processing |
31 | Extracting Spread-Spectrum Hidden Data from Digital Media | Image Processing |
32 | Interactive Segmentation for Change Detection in Multispectral Remote-Sensing Images | Image Processing |
33 | Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords | Image Processing |
34 | A Scalable Server Architecture for Mobile Presence Services in Social Network Applications | Web Service |
35 | Mobile Relay Configuration in Data-intensive Wireless Sensor Networks | Networking |
36 | Towards a Statistical Framework for Source Anonymity in Sensor Networks | Networking |
37 | Vampire attacks: Draining life from wireless ad-hoc sensor networks | Networking |
38 | Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks | Networking |
39 | Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks with Joint Voltage and Modulation Scaling | Networking |
40 | Participatory Privacy: Enabling Privacy in Participatory Sensing | Networking |
41 | Price Differentiation for Communication Networks | Networking |
42 | Detection and Localization of Multiple Spoofing Attackers in Wireless Networks | Networking |
43 | Secure Encounter-based Mobile SocialNetworks: Requirements, Designs, and Tradeoffs | Web Service |
44 | Two tales of privacy in online social networks | Web Service |
45 | Fully Anonymous Profile Matching in Mobile Social Networks | Web Service |
No comments:
Post a Comment