[ult_tab_element tab_style=”Style_3″ auto_rotate=”Disables” tab_bottom_border=”Disable” disp_icon=”Enable” font_icons_position=”Right” resp_type=”Tabs” resp_style=”Icon”][single_tab icon=”Defaults-hand-o-left” title=”Java IEEE Projects Titles 2014″ tab_id=”ccc8df48-d946-8″]

Get 2014 Quality Java IEEE Projects @ Low Cost Call Us 9566355386 / 9962588976

JAVA IEEE Projects

S.NoCodeTitlesDomainYear
1LM_J014_01Supporting Privacy Protection in Personalized Web SearchData MiningFeb 2014
2LM_J014_02Fast Nearest Neighbor Search with KeywordsData MiningApril 2014
3LM_J014_03Approximate Shortest Distance Computing: A Query-Dependent Local Landmark SchemeData MiningJan 2014
4LM_J014_04LARS: An Efficient and Scalable Location-Aware Recommender SystemData MiningJune 2014
5LM_J014_05Dynamic Query Forms for Database QueriesData MiningPreprint
6LM_J014_06Privacy Preserving Delegated Access Control in Public CloudsData MiningPreprint
7LM_J014_07m-Privacy for Collaborative Data PublishingData MiningPreprint
8LM_J014_08Scalable Keyword Search on Large RDF DataData MiningPreprint
9LM_J014_09Secure Mining of Association Rules in Horizontally Distributed DatabasesData MiningApril 2014
10LM_J014_10Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation - Information Forensics and SecurityImage ProcessingJan 2014
11LM_J014_11Fingerprint Compression Based on Sparse RepresentationImage ProcessingFeb 2014
12LM_J014_12Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image CompressionImage ProcessingJan 2014
13LM_J014_13Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudCloud ComputingMarch 2014
14LM_J014_14Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud ComputingCloud ComputingJan 2014
15LM_J015_15Secure Data Retrieval for Decentralized Disruption-Tolerant Military NetworksNetworkingFeb 2014
16LM_J014_16Incentive Based Data Sharing in Delay Tolerant Mobile NetworksWireless CommunicationJan 2014
17LM_J015_17Hiding in the Mobile Crowd: Location Privacy through Collaboration Network SecurityAug 2015
18LM_J014_18Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc NetworksMobile ComputingFeb 2014
19LM_J014_19SocialTube: P2P-Assisted Video Sharing in Online Social NetworksMobile ComputingSep 2014
20LM_J014_20Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless NetworksMobile ComputingPreprint
21LM_J014_21Cooperative Caching for Efficient Data Access in Disruption Tolerant NetworksMobile ComputingMarch 2014
22LM_J014_22Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc NetworksMobile ComputingPreprint
23LM_J014_23Distributed Resource Allocation for Multi-Cell Relay-Aided OFDMA SystemsMobile ComputingSep 2014
24LM_J014_24Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionParallel Distributed SystemsFeb 2014
25LM_J014_25Traffic pattern-based content leakage detection for trusted content delivery networksParallel Distributed SystemsFeb 2014
26LM_J014_26A System for Denial-of-Service Attack Detection Based on Multivariate Correlation AnalysisParallel Distributed SystemsFeb 2014
27LM_J014_27Cross-Layer Approach for Minimizing Routing Disruption in IP NetworksParallel Distributed SystemsJuly 2014
28LM_J014_28Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageParallel Distributed SystemsFeb 2014
29LM_J014_29Bandwidth Distributed Denial of Service: Attacks and DefensesSecurity and PrivacyFeb 2014
[/single_tab][/ult_tab_element]