ieee best titles 2013 2014
DESCRIPTION
Typical Soft Technologies is one of the leading Software Company located in Chennai that offers best Quality projects and training to all customers. We also deliver all the finest Projects at many Students, Companies. Our Computer Courses Provides best future for the Students. If you want any of our projects & Courses, then contact us. [email protected] 044-43555140, 093443 99926.TRANSCRIPT
TYPICAL SOFT TECHNOLOGIES
CLOUD COMPUTING
1. Load Rebalancing for Distributed File Systems in Clouds
2. Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment
3. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
4. Error-Tolerant Resource Allocation and Payment Minimization for
Cloud System
5. Privacy Preserving Delegated Access Control in Public Clouds
PARALLEL AND DISTRIBUTED
1. SPOC: A Secure and Privacy-Preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
2. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the
Cloud
3. Attribute-Based Encryption with Verifiable Outsourced Decryption
4. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater
Sensor Networks
5. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-
Effective Privacy Preserving of Intermediate Data Sets in Cloud
TYPICAL SOFT TECHNOLOGIES
KNOWLEDGE AND DATA ENGINEERING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
2. Distributed Processing of Probabilistic Top-k Queries in Wireless
Sensor Networks
3. Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering.
4. PMSE: A Personalized Mobile Search Engine
5. A Proxy-Based Approach to Continuous Location-Based Spatial
Queries in Mobile Environments
SECURE COMPUTING
1. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems
2. WARNINGBIRD: A Near Real-time Detection System for Suspicious
URLs in Twitter Stream
3. Cross-Domain Privacy-Preserving Cooperative Firewall
Optimization
4. NICE: Network Intrusion Detection and Countermeasure Selection
in Virtual Network Systems
TYPICAL SOFT TECHNOLOGIES
NETWORKING
1. Back-Pressure-Based Packet-by-Packet Adaptive Routing in
Communication Networks
2. A Distributed Control Law for Load Balancing in Content Delivery
Networks
3. Fast Transmission to Remote Cooperative Groups: A New Key
Management Paradigm
4. ABC: Adaptive Binary Cuttings for Multidimensional Packet
Classification
5. Topology Control for Effective Interference Cancellation in Multiuser
MIMO Networks
IMAGE PROCESSING
1. Reversible Data Hiding in Encrypted Images by Reserving Room
Before Encryption
2. Reversible Data Hiding With Optimal Value Transfer
3. Reversible Watermarking Based on Invariant Image Classification and
Dynamic Histogram Shifting
4. Noise Reduction Based on Partial-Reference, Dual-Tree Complex
Wavelet Transform Shrinkage
5. Blur and Illumination Robust Face Recognition via Set-Theoretic Characterization
TYPICAL SOFT TECHNOLOGIES
MOBILE COMPUTING
1. DCIM: Distributed Cache Invalidation Method for Maintaining Cache
Consistency in Wireless Mobile Networks
2. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
3. Toward a Statistical Framework for Source Anonymity in Sensor
Networks
4. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
5. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc
Networks
6. EMAP : Expedite Message Authentication Protocol for Vehicular Ad
Hoc Networks.
7. ALERT: An Anonymous Location-Based Efficient Routing Protocol in
MANETs
TYPICAL SOFT TECHNOLOGIES
WEB SERVICES
1. Personalized QoS-Aware Web Service Recommendation and
Visualization
2. A Bayesian Network-Based Knowledge Engineering Framework for IT
Service Management
3. A Decentralized Service Discovery Approach on Peer-to-Peer Networks
4. Evolution of Social Networks Based on Tagging Practices