9 January 2015

JAVA IEEE 2014





1. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

2. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

3. Dealing With Concept Drifts in Process Mining

4. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

5. Supporting Privacy Protection in Personalized Web Search

6. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

7. A Hybrid Cloud Approach for Secure Authorized Deduplication

8. Secure Outsourced Attribute-Based Signatures

9. MPrivacy for collaborative data publishing

10. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation

11. A Rough Hypercuboid Approach for Feature Selection in Approximation Spaces

12. Event Characterization and Prediction Based on Temporal Patterns in Dynamic Data System

13. Consensus-Based Ranking of Multivalued Objects: A Generalized Borda Count Approach

14. Active Learning of Constraints for Semi-Supervised Clustering

15. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme

16. A Cocktail Approach for Travel Package Recommendation


17. A social compute cloud: Allocating and sharing Infrastructure Resources via social networks

18. Discovering via Link-Anomaly Detection Emerging Topics in Social Streams

19. Supporting Privacy Protection in Personalized Web Search

20. Facilitating Document Annotation Using Content and Querying Value

21. Event Characterization and Prediction Based on Temporal Patterns in Dynamic Data System

22. Uncertain One-Class Learning and Concept Summarization Learning on Uncertain Data Streams

23. Learning Conditional Preference Networks from Inconsistent Examples

24. Rough Sets, Kernel Set, and Spatiotemporal Outlier Detection

25. Data Mining with Big Data

26. A Comparative Study of Implementation Techniques for Query Processing in Multicore Systems

27. Learning Conditional Preference Networks from Inconsistent Examples

28. Automatic Caption Generation For News In Images

29. A Tag encoding scheme against pollution attack in linear coding

30. Preserving Location Privacy In Geosocial Applications

31.Behavioural malware detection in delay tolerant networks

32. Network selection and resource allocation for WAN

33. RRE: A Game theoretic intrusion response and recovery engine

0 comments :

Post a Comment

Home About-us Privacy Policy Contact-us Java
Copyright © www.mainproject.org 2018 | All Rights Reserved. Design By Templateclue