PROJECT CODE
|
JAVA
|
|
CLOUD COMPUTING
|
JAVA001
|
SeDaSC: Secure Data Sharing in
Clouds
|
JAVA002
|
Energy-Aware Load
Balancing and Application Scaling for the Cloud Ecosystem
|
JAVA003
|
Attribute Based
Storage Supporting Secure Deduplication of Encrypted Data in Cloud
|
JAVA004
|
kBF: Towards
Approximate and Bloom Filter based Key-Value Storage for Cloud Computing
System
|
JAVA005
|
Strong
Key-Exposure Resilient Auditing for Secure Cloud Storage
|
JAVA006
|
Energy-Aware Data
Allocation With Hybrid Memory for Mobile Cloud Systems
|
JAVA007
|
TEES: An
Efficient Search Scheme over Encrypted Data on Mobile Cloud
|
JAVA008
|
Customer-Satisfaction-Aware
Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
|
JAVA009
|
Resource
provisioning for task-batch based workflows with deadlines in public clouds
|
JAVA010
|
Energy-Aware
Resource and Revenue Management in Federated Cloud: A Game-Theoretic Approach
|
JAVA011
|
Privacy-Preserving
Multikeyword Similarity Search Over Outsourced Cloud Data
|
JAVA012
|
Resource renting
for periodical cloud workflow applications
|
JAVA013
|
Securing Cloud
Data under Key Exposure
|
JAVA014
|
Cost Optimization
for Dynamic Replication and Migration of Data in Cloud Data Centers
|
JAVA015
|
A Novel Efficient
Remote Data Possession Checking Protocol in Cloud Storage
|
JAVA016
|
A Lightweight
Secure Data Sharing Scheme for Mobile Cloud Computing
|
JAVA017
|
MMBcloud -Tree:
Authenticated Index for Verifiable Cloud Service Selection
|
JAVA018
|
A Cross Tenant
Access Control (CTAC) Model for Cloud Computing: Formal Specification and
Verification
|
JAVA019
|
TAFC: Time and
Attribute Factors Combined Access Control on Time-Sensitive Data in Public
Cloud
|
JAVA020
|
RAAC: Robust and
Auditable Access Control with Multiple Attribute Authorities for Public Cloud
Storage
|
JAVA021
|
Fuzzy
Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
|
JAVA022
|
Identity-Based
Data Outsourcing with Comprehensive Auditing in Clouds
|
|
DATAMINING
|
JAVA023
|
A Neural Word
Embeddings Approach For Multi-Domain Sentiment Analysis
|
JAVA024
|
When to Make a
Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in
Online Social Networks
|
JAVA025
|
Predicting Social
Anxiety Treatment Outcome based on Therapeutic Email Conversations
|
JAVA026
|
User Vitality Ranking and Prediction in
Social Networking Service: a Dynamic Network Perspective
|
JAVA027
|
Collaboratively Training
Sentiment Classifiers for Multiple Domains
|
JAVA028
|
Search Rank Fraud
and Malware Detection in Google Play
|
JAVA029
|
Understand Short
Texts by Harvesting and Analyzing Semantic Knowledge
|
JAVA030
|
PPRank:
Economically Selecting Initial Users for Influence Maximization in Social
Networks
|
JAVA031
|
Modeling User
Activity Patterns for Next-Place Prediction
|
JAVA032
|
Query Expansion
with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
|
JAVA033
|
Influence Maximization
in Trajectory Databases
|
JAVA034
|
Personal Web
Revisitation by Context and Content Keywords with Relevance Feedback
|
JAVA035
|
An Iterative
Classification Scheme for Sanitizing Large-Scale Datasets
|
JAVA036
|
Designing
High-Performance Web-Based Computing Services to Promote Telemedicine
Database Management System
|
JAVA037
|
Personal Web
Revisitation by Context and Content Keywords with Relevance Feedback
|
JAVA038
|
Explaining
Missing Answers to Top-k SQL Queries
|
|
Networking / Network Security /
Dependable and Secure Computing
|
JAVA039
|
Publicly
Verifiable Computation of Polynomials over Outsourced Data with Multiple
Sources
|
JAVA040
|
An Efficient
Cloud Market Mechanism for Computing Jobs With Soft Deadlines Security &
Privacy
|
JAVA041
|
Twitter Trends
Manipulation: A First Look Inside the Security of Twitter Trending
|
JAVA042
|
My Privacy My
Decision: Control of Photo Sharing on Online Social Networks
|
JAVA043
|
Person
Identification by Keystroke Dynamics Using Pairwise User Coupling
|
JAVA044
|
FastGeo:
Efficient Geometric Range Queries on Encrypted Spatial Data
|
JAVA045
|
Efficiently
Promoting Product Online Outcome: An Iterative Rating Attack Utilizing
Product and Market Property
|
JAVA046
|
Privacy-Preserving
Aggregate Queries for Optimal Location Selection
|
|
SERVICES COMPUTING
|
JAVA047
|
Pattern Based
Design and Verification of Secure Service Compositions
|
JAVA048
|
DLTSR: A Deep
Learning Framework for Recommendation of Long-tail Web Services
|
JAVA049
|
The Importance of
Worker Reputation Information in Microtask-Based Crowd Work Systems
|
JAVA050
|
Optimal Task
Dispatching on Multiple Heterogeneous Multiserver Systems with Dynamic Speed
and Power Management
|
JAVA051
|
Energy Theft
Detection in Multi-Tenant Data Centers with Digital Protective Relay
Deployment
|
JAVA052
|
Graph Encryption
for Top-K Nearest Keyword Search Queries on Cloud
|
Monday, 28 May 2018
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment