TECHNOLOGY: Dot Net DOMAIN: Networking S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 Accurate Per-Packet Delay Tomography in Wireless Ad Hoc Networks In this paper, we study the problem of decomposing the end-to-end delay into the per-hop delay for each packet, in multi-hop wireless ad hoc networks. Knowledge on the per-hop per-packet […]
IEEE Projects 2017 Java Networking Abstract Title Topics List
TECHNOLOGY: JAVA DOMAIN: Networking S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 Accurate Per-Packet Delay Tomography in Wireless Ad Hoc Networks In this paper, we study the problem of decomposing the end-to-end delay into the per-hop delay for each packet, in multi-hop wireless ad hoc networks. Knowledge on the per-hop per-packet delay […]
IEEE 2017 Projects Dotnet Cloud Computing Abstract Topics List Title
TECHNOLOGY: Dot Net DOMAIN: Cloud Computing S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the […]
IEEE 2017 Java Cloud Computing Projects Abstract Title Topics List
TECHNOLOGY: JAVA DOMAIN: Cloud Computing S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud […]
IEEE 2017 Dotnet .net Data Mining Projects Topics Abstract Title List
TECHNOLOGY: Dot net DOMAIN: Data Mining S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 Enabling Kernel-Based Attribute-Aware Matrix Factorization for Rating Prediction In recommender systems, one key task is to predict the personalized rating of a user to a new item and then return the new items having the top predicted […]
IEEE 2017 Java Data Mining Projects Title Abstract List Topics
TECHNOLOGY: JAVA DOMAIN: Data Mining S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 Enabling Kernel-Based Attribute-Aware Matrix Factorization for Rating Prediction In recommender systems, one key task is to predict the personalized rating of a user to a new item and then return the new items having the top predicted ratings […]
Google Play Malware and Rank Fraud Detection
Fraudulent developers frequently exploit google play to hire teams of willing workers to commit fraud collectively, emulating realistic, spontaneous activities from unrelated people. This behavior is called “search rank fraud”. We present Fair-Play, a novel system that uncovers both malware and search rank fraud apps, by picking out trails those fraudsters leave behind. To identify […]
Traffic And Evergy Saving Encrypted Search Scheme Over Encrypted Mobile Cloud Data
With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data have to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, […]
Computing Semantic Similarity of Concepts in Knowledge Graphs
This paper presents a method for measuring the semantic similarity between concepts in Knowledge Graphs (KGs) such as WordNet and DBpedia. Previous work on semantic similarity methods have focused on either the structure of the semantic network between concepts (e.g., path length and depth), or only on the Information Content (IC) of concepts. We propose […]
User-Centric Similarity Search
User preferences play a significant role in market analysis. In the database literature, there has been extensive work on query primitives, such as the well known top-k query that can be used for the ranking of products based on the preferences customers have expressed. Still, the fundamental operation that evaluates the similarity between products is […]
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- 8
- …
- 108
- Next Page »