[ult_tab_element tab_style=”Style_3″ auto_rotate=”Disables” tab_bottom_border=”Disable” disp_icon=”Enable” font_icons_position=”Right” resp_type=”Tabs” resp_style=”Icon”][single_tab icon=”Defaults-hand-o-left” title=”Java IEEE Projects Titles 2014″ tab_id=”ccc8df48-d946-8″]
[/single_tab][/ult_tab_element]
Get 2014 Quality Java IEEE Projects @ Low Cost Call Us 9566355386 / 9962588976
JAVA IEEE Projects
S.No | Code | Titles | Domain | Year |
---|---|---|---|---|
1 | LM_J014_01 | Supporting Privacy Protection in Personalized Web Search | Data Mining | Feb 2014 |
2 | LM_J014_02 | Fast Nearest Neighbor Search with Keywords | Data Mining | April 2014 |
3 | LM_J014_03 | Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme | Data Mining | Jan 2014 |
4 | LM_J014_04 | LARS: An Efficient and Scalable Location-Aware Recommender System | Data Mining | June 2014 |
5 | LM_J014_05 | Dynamic Query Forms for Database Queries | Data Mining | Preprint |
6 | LM_J014_06 | Privacy Preserving Delegated Access Control in Public Clouds | Data Mining | Preprint |
7 | LM_J014_07 | m-Privacy for Collaborative Data Publishing | Data Mining | Preprint |
8 | LM_J014_08 | Scalable Keyword Search on Large RDF Data | Data Mining | Preprint |
9 | LM_J014_09 | Secure Mining of Association Rules in Horizontally Distributed Databases | Data Mining | April 2014 |
10 | LM_J014_10 | Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation - Information Forensics and Security | Image Processing | Jan 2014 |
11 | LM_J014_11 | Fingerprint Compression Based on Sparse Representation | Image Processing | Feb 2014 |
12 | LM_J014_12 | Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image Compression | Image Processing | Jan 2014 |
13 | LM_J014_13 | Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud | Cloud Computing | March 2014 |
14 | LM_J014_14 | Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing | Cloud Computing | Jan 2014 |
15 | LM_J015_15 | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks | Networking | Feb 2014 |
16 | LM_J014_16 | Incentive Based Data Sharing in Delay Tolerant Mobile Networks | Wireless Communication | Jan 2014 |
17 | LM_J015_17 | Hiding in the Mobile Crowd: Location Privacy through Collaboration | Network Security | Aug 2015 |
18 | LM_J014_18 | Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks | Mobile Computing | Feb 2014 |
19 | LM_J014_19 | SocialTube: P2P-Assisted Video Sharing in Online Social Networks | Mobile Computing | Sep 2014 |
20 | LM_J014_20 | Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless Networks | Mobile Computing | Preprint |
21 | LM_J014_21 | Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks | Mobile Computing | March 2014 |
22 | LM_J014_22 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | Mobile Computing | Preprint |
23 | LM_J014_23 | Distributed Resource Allocation for Multi-Cell Relay-Aided OFDMA Systems | Mobile Computing | Sep 2014 |
24 | LM_J014_24 | Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption | Parallel Distributed Systems | Feb 2014 |
25 | LM_J014_25 | Traffic pattern-based content leakage detection for trusted content delivery networks | Parallel Distributed Systems | Feb 2014 |
26 | LM_J014_26 | A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis | Parallel Distributed Systems | Feb 2014 |
27 | LM_J014_27 | Cross-Layer Approach for Minimizing Routing Disruption in IP Networks | Parallel Distributed Systems | July 2014 |
28 | LM_J014_28 | Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage | Parallel Distributed Systems | Feb 2014 |
29 | LM_J014_29 | Bandwidth Distributed Denial of Service: Attacks and Defenses | Security and Privacy | Feb 2014 |