ieee it titles 2016 2017
TRANSCRIPT
www.pgembeddedsystems.com
IT PROJECT TITLES 2016 - 2017
S.NO TITLES DOMAIN
1. To Cloudify or Not to Cloudify The Question for a
Scientific Data CenterCloud Computing
2. Towards Building Forensics Enabled Cloud Through
Secure Logging-as-a-ServiceCloud Computing
3. Publicly Verifiable Inner Product Evaluation over
Outsourced Data Streams under Multiple KeysCloud Computing
4. Providing User Security Guarantees in Public
Infrastructure CloudsCloud Computing
5. EPAS: A Sampling Based Similarity Identification
Algorithm for the CloudCloud Computing
6. Ensemble: A Tool for Performance Modeling of
Applications in Cloud Data CentersCloud Computing
7. An Efficient Privacy-Preserving Ranked Keyword
Search MethodCloud Computing
8. Dynamic and Fault-Tolerant Clustering for Scientific
WorkflowsCloud Computing
9. TMACS: A Robust and Verifiable Threshold Multi-
Authority Access Control System in Public Cloud
Storage
Cloud Computing
10. Mitigating Denial of Service Attacks in OLSR
Protocol Using Fictitious Nodes
Network Security &
Secure Computing
11. Clustering Data Streams Based on Shared Density
Between Micro-Clusters
Data Mining
12. Cold-Start Recommendation with Provable
Guarantees: A Decoupled Approach
Data Mining
www.pgembeddedsystems.com
13. Efficient R-Tree Based Indexing Scheme for Server-
Centric Cloud Storage System
Data Mining
14. Nearest Keyword Set Search in Multi-dimensional
Datasets
Data Mining
15. RSkNN: kNN Search on Road Networks by
Incorporating Social Influence
Data Mining
16. A Bayesian Classification Approach Using Class-
Specific Features for Text Categorization
Data Mining
17. Movee: Video Liveness Verification for Mobile
Devices Using Built-In Motion Sensors
Mobile Computing
18. Service Usage Classification with Encrypted Internet
Traffic in Mobile Messaging Apps
Mobile Computing
19. Distributed and Fair Beaconing Congestion Control
Schemes for Vehicular Networks
Mobile Computing
20. CANS: Towards Congestion-Adaptive and Small
Stretch Emergency Navigation with Wireless
Sensor Networks
Wireless Sensor Networks
21. Energy and Memory Efficient Clone Detection in
Wireless Sensor Networks
Wireless Sensor Networks
22. A Decentralized Damage Detection System for
Wireless Sensor and Actuator Networks
Networking and Service
Computing, Secure
Computing
23. Achieving Flatness: Selecting the Honey words from
Existing User Passwords
Networking and Service
Computing, Secure
Computing
24. Optimization of the processing of data streams on
roughly characterized distributed resources
Parallel and Distributed
System