IEEE DOTNET PROJECTS 2012

1 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding.
CLOUD COMPUTING 2012/.NET

2 Cloud Computing Security From Single to Multi-Clouds.CLOUD COMPUTING (IEEE CONFERENCE) 2012/.NET

3 Enhanced Data Security Model for Cloud Computing CLOUD COMPUTING (IEEE CONFERENCE) 2012/.NET

4 Ensuring Distributed Accountability for Data Sharing in the Cloud. CLOUD COMPUTING 2012/.NET

5 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. CLOUD COMPUTING 2012/.NET

6 Outsourced Similarity Search on Metric Data Assets.CLOUD COMPUTING 2012/.NET

7 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING 2012/.NET

8 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. CLOUD COMPUTING 2012/.NET

9 Toward Secure and Dependable Storage Services in Cloud Computing. CLOUD COMPUTING 2012/.NET

10 A Query Formulation Language for the data web KNOWLEDGE AND DATA ENGINEERING 2012/.NET

11 Creating Evolving User Behavior Profiles Automatically KNOWLEDGE AND DATA ENGINEERING 2012/.NET

12 D-Cache: Universal Distance Cache for Metric Access Methods KNOWLEDGE AND DATA ENGINEERING 2012/.NET

13 DDD: A New Ensemble Approach for Dealing with Concept Drift KNOWLEDGE AND DATA ENGINEERING 2012/.NET

14 Efficient Computation of Range Aggregates against Uncertain Location-Based Queries KNOWLEDGE AND DATA ENGINEERING
2012/.NET

15 Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/.NET

16 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis KNOWLEDGE AND DATA ENGINEERING 2012/.NET

17 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques KNOWLEDGE AND DATA ENGINEERING 2012/.NET

18 Measuring the Sky: On Computing Data Cubes via Skylining the Measures KNOWLEDGE AND DATA ENGINEERING 2012/.NET

19 Mining Web Graphs for Recommendations KNOWLEDGE AND DATA ENGINEERING 2012/.NET

20 Organizing User Search Histories KNOWLEDGE AND DATA ENGINEERING 2012/.NET

21 Publishing Search Logs—A Comparative Study of Privacy Guarantees KNOWLEDGE AND DATA ENGINEERING 2012/.NET

22 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators KNOWLEDGE AND DATA ENGINEERING 2012/.NET

23 ROAD: A New Spatial Object Search Framework for Road Networks KNOWLEDGE AND DATA ENGINEERING 2012/.NET

24 Scalable Learning of Collective Behavior KNOWLEDGE AND DATA ENGINEERING 2012/.NET

25 Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/.NET

26 Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings KNOWLEDGE AND DATA ENGINEERING 2012/.NET

27 Bounding the Impact of Unbounded Attacks in Stabilization PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

28 Catching Packet Droppers and Modifiers in Wireless Sensor Networks PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

29 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

30 A New Cell-Counting-Based Attack Against Tor NETWORKING 2012/.NET

31 Optimal Source-Based Filtering of Malicious Traffic NETWORKING 2012/.NET

32 Topology Control in Mobile AD-HOC Networks with Cooperative Communications NETWORKING (IEEE JOURNAL) 2012/.NET

33 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network SECURE COMPUTING (IJCA) 2012/.NET

34 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING 2012/.NET

35 ES-MPICH2: A Message Passing Interface with Enhanced Security SECURE COMPUTING 2012/.NET

36 On the Security and Efficiency of Content Distribution via Network Coding SECURE COMPUTING 2012/.NET

37 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework forMobile-Healthcare Emergency SECURE COMPUTING 2012/.NET

38 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/.NET

39 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/.NET

40 Active Visual Segmentation IMAGE PROCESSING 2012/.NET

41 Image Segmentation Based on the Poincaré Map Method IMAGE PROCESSING 2012/.NET

42 K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER IMAGE PROCESSING (IJEST) 2012/.NET

43 Multiple Exposure Fusion for High Dynamic Range Image Acquisition IMAGE PROCESSING 2012/.NET

44 Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval IMAGE PROCESSING 2012/.NET

45 Smile Detection by Boosting Pixel Differences IMAGE PROCESSING 2012/.NET

46 View-invariant action recognition based on Artificial Neural Networks IMAGE PROCESSING 2012/.NET

47 Cooperative Download in Vehicular Environments MOBILE COMPUTING 2012/.NET

48 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation MOBILE COMPUTING 2012/.NET

49 Network Assisted Mobile Computing with Optimal Uplink Query Processing MOBILE COMPUTING 2012/.NET

50 Protecting Location Privacy in Sensor Networks against a Global Eavesdropper MOBILE COMPUTING 2012/.NET

51 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks MOBILE COMPUTING 2012/.NET

52 Revisiting Defenses against Large-Scale Online Password Guessing Attacks SECURE COMPUTING 2012/.NET

53 A Novel Anti phishing framework based on visual cryptography IMAGE PROCESSING 2012/.NET

54 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies NETWORKING (JOURNAL) 2012/.NET

55 Robust Face-Name Graph Matching for Movie Character Identification MULTIMEDIA 2012/.NET

56 Low-Complexity Compression Method for Hyperspectral Images Based on Distributed Source Coding IMAGE PROCESSING 2012/.NET

57 Balancing the Trade-Offs between Query Delay and Data Availability in MANETs PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

58 Efficient Multidimensional Fuzzy Search for Personal Information Management Systems KNOWLEDGE AND DATA ENGINEERING 2012/.NET

59 Robustness of Offline Signature Verification Based on Gray Level Features IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY
2012/.NET

60 Controllable SecureWatermarking Technique for Tradeoff Between Robustness and Security IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY 2012/.NET

61 A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition IMAGE PROCESSING 2012/.NET

61 A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition IMAGE PROCESSING 2012/.NET

62 Towards Accurate Mobile Sensor Network Localization in Noisy Environments MOBILE COMPUTING 2012/.NET

63 Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism SECURE COMPUTING 2012/.NET

64 Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning LEARNING TECHNOLOGIES 2012/.NET

65 Multi-biometric Cryptosystems Based on Feature-Level Fusion IMAGE PROCESSING 2012/.NET

DOWNLOAD BASE PAPERS:

https://rapidshare.com/files/2544105175/Dot NET.rar

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s