IEEE 2016 - 2017 IT TITLES

IT PROJECT TITLES 2016- 2017

 

S.NO

TITLES

DOMAIN

1.     

To Cloudify or Not to Cloudify The Question for a Scientific Data Center           

Cloud Computing

2.     

Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

Cloud Computing

3.     

Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys

Cloud Computing

4.     

Providing User Security Guarantees in Public Infrastructure Clouds

Cloud Computing

5.     

EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud

Cloud Computing

6.     

Ensemble: A Tool for Performance Modeling of Applications in Cloud Data Centers

Cloud Computing

7.     

An Efficient Privacy-Preserving Ranked Keyword Search Method

Cloud Computing

8.     

Dynamic and Fault-Tolerant Clustering for Scientific Workflows

Cloud Computing

9.     

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public   Cloud Storage

Cloud Computing

10. 

Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes

Network Security & Secure Computing

11. 

Clustering Data Streams Based on Shared Density Between Micro-Clusters

Data Mining

12. 

Cold-Start Recommendation with Provable Guarantees: A Decoupled Approach

Data Mining

13. 

Efficient R-Tree Based Indexing Scheme for Server-Centric Cloud Storage System

Data Mining

14. 

Nearest Keyword Set Search in Multi-dimensional Datasets

Data Mining

15. 

RSkNN: kNN Search on Road Networks by Incorporating Social Influence

Data Mining

16. 

A Bayesian Classification Approach Using Class-Specific Features for Text Categorization

Data Mining

17. 

Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors        

Mobile Computing

18. 

Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps    

Mobile Computing

19. 

Distributed and Fair Beaconing Congestion Control Schemes for Vehicular Networks      

Mobile Computing

20. 

CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless    Sensor Networks        

Wireless Sensor Networks

21. 

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks     

Wireless Sensor Networks

22. 

A Decentralized Damage Detection System for Wireless Sensor and Actuator Networks

Networking and Service Computing, Secure Computing

23. 

Achieving Flatness: Selecting the Honey words from Existing User Passwords

Networking and Service Computing, Secure Computing

24. 

Optimization of the processing of data streams on roughly characterized distributed resources

Parallel and Distributed System

 



Place your Enquiry...

Captcha  Can't read click to refresh

OFFER


SPECIAL LINKS


LATEST NEWS