Code No. |
Project Title |
Base Paper |
Abstract |
Video |
JV123 |
A Topology Potential-Based Method for Identifying Essential Proteins from PPI
Networks(IEEE 2015)
|
Download |
Download
|
|
JV124 |
Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks(IEEE 2015)
|
Download |
Download
|
|
JV125 |
Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation(IEEE 2015)
|
Download |
Download
|
|
JV126 |
Energy Efficient Virtual Network Embedding for Cloud Networks(IEEE 2015)
|
Download |
Download
|
|
JV127 |
Statistical Dissemination Control in Large Machine-to-Machine Communication Networks(IEEE 2015)
|
Download |
Download
|
|
JV128 |
Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing(IEEE 2015)
|
Download |
Download
|
|
JV129 |
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce(IEEE 2015)
|
Download |
Download
|
|
JV130 |
Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter(IEEE 2015)
|
Download |
Download
|
|
JV131 |
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming(IEEE 2015)
|
Download |
Download
|
|
JV132 |
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes(IEEE 2015)
|
Download |
Download
|
|
JV133 |
Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks(IEEE 2015)
|
Download |
Download
|
|
JV134 |
Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks(IEEE 2015)
|
Download |
Download
|
|
JV135 |
Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics (IEEE 2015)
|
Download |
Download
|
|
JV136 |
Friendbook A Semantic-Based Friend Recommendation System for Social Networks(IEEE 2015)
|
Download |
Download
|
|
JV137 |
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems(IEEE 2015)
|
Download |
Download
|
|
JV138 |
Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks(IEEE 2015)
|
Download |
Download
|
|
JV139 |
Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things (IEEE 2015)
|
Download |
Download
|
|
JV140 |
Authenticated Key Exchange Protocols for Parallel Network File Systems (IEEE 2015)
|
Download |
Download
|
|
JV141 |
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks(IEEE 2015)
|
Download |
Download
|
|
JV142 |
Decentralized Computation Offloading Game for Mobile Cloud Computing(IEEE 2015)
|
Download |
Download
|
|
JV143 |
A Cocktail Approach for Travel Package Recommendation(IEEE 2016)
|
Download |
Download
|
|
JV144 |
A Hybrid Cloud Approach for Secure Authorized Deduplication(IEEE 2015)
|
Download |
Download
|
|
JV145 |
A Scalable Two-Phase Top-Down
Specialization Approach for Data
Anonymization Using MapReduce on Cloud(IEEE 2016) |
Download |
Download
|
|
JV146 |
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems(IEEE 2016) |
Download |
Download |
|
JV147 |
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data(IEEE 2016) |
Download |
Download |
|
JV148 |
An Incentive Framework for Cellular Traffic Offloading(IEEE 2016) |
Download |
Download |
|
JV149 |
Automatic Test Packet Generation(IEEE 2016) |
Download |
Download |
|
JV150 |
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions(IEEE 2016) |
Download |
Download |
|
JV151 |
BestPeer A Peer-to-Peer Based Large-Scale Data Processing(IEEE 2016) |
Download |
Download |
|
JV152 |
Boundary Cutting for Packet Classification(IEEE 2016) |
Download |
Download |
|
JV153 |
Captcha as Graphical Passwords—A New Security
Primitive Based on Hard AI Problems(IEEE 2016) |
Download |
Download |
|
JV154 |
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks(IEEE 2016) |
Download |
Download |
|
JV155 |
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes(IEEE 2016) |
Download |
Download |
|
JV156 |
Data Mining with Big Data(IEEE 2016) |
Download |
Download |
|
JV157 |
Dealing With Concept Drifts in Process Mining(IEEE 2016) |
Download |
Download |
|
JV158 |
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds(IEEE 2016) |
Download |
Download |
|
JV159 |
Distributed, Concurrent, and Independent
Access to Encrypted Cloud Databases(IEEE 2016) |
Download |
Download |
|
JV160 |
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing(IEEE 2016) |
Download |
Download |
|
JV161 |
Efficient Authentication for Mobile and Pervasive Computing(IEEE 2016) |
Download |
Download |
|
JV162 |
Efficient Prediction of Difficult Keyword Queries over Databases(IEEE 2016) |
Download |
Download |
|
JV163 |
Enabling Trustworthy Service Evaluation in
Service-Oriented Mobile Social Networks(IEEE 2016) |
Download |
Download |
|
JV164 |
Expressive, Efficient, and Revocable Data
Access Control for Multi-Authority
Cloud Storage(IEEE 2016) |
Download |
Download |
|
JV165 |
Facilitating Document Annotation Using
Content and Querying Value(IEEE 2016) |
Download |
Download |
|
JV166 |
Fast Nearest Neighbor Search with Keywords(IEEE 2016) |
Download |
Download |
|
JV167 |
Friendbook A Semantic-based Friend Recommendation System for Social Networks(IEEE 2015)
|
Download |
Download
|
|
1 | 2 | 3 | 4 | 5 | 6 |
|