Tags
fiducial facial point extraction using a novel pro
follow me cloud-when cloud services follow mobile
an optimization framework for mobile data collecti
architectural protection of application privacy ag
assurance of security and privacy requirements for
chaotic searchable encryption for mobile cloud sto
cloud workflow scheduling with deadlines and time
crowdsourcing based description of urban emergency
cypher db a novel architecture for outsourcing sec
distributed and fair beaconing rate adaptation for
enabling cloud storage auditing with verifiable ou
epas a sampling based similarity identification al
fine grained two-factor access control for web-bas
identity based private matching over outsourced en
identity based proxy-oriented data uploading and r
minimizing radio resource usage for machine to-mac
mm bcloud tree authenticated index for verifiable
adon application driven overlay network-as-a-servi
achieving energy efficiency in data centers using
a superprocess with upper confidence bounds for co
a novel statistical cost model and an algorithm fo
a modified hierarchical attribute based encryption
a data and task co scheduling algorithm for scient
a context aware service evaluation approach over b
a methodology for extracting standing human bodies
face recognition across non uniform motion blur
and pose
illumination
2015-2016
finalyearproject
ieee
deniable attribute based encryption
civil projects ieee projects
diploma mechanical projects
mechanical projects
embedded mini projects
diploma embedded projects
power system ieee projects
power electronics ieee projects
hadoop ieee projects
vlsi ieee projects
digital image processing ieee projects
matlab ieee projects
embedded ieee projects
android ieee projects
dotnet ieee projects
java ieee projects
dotnet ieee projects 2018-2019
dotnet ieee projects titles 2018-2019
dotnet ieee projects 2017-2018
ieee 2018-2019 titles
ieee 2019 project titles
ieee 2018 titles
video stream analysis in clouds an object detecti
using crowdsourcing to provide qo s for mobile cl
unlicensed spectra fusion and interference coordin
text mining the contributors to rail accidents
stochastic load balancing for virtual resource man
service usage classification with encrypted intern
publicly verifiable inner product over outsourced
providing user security guarantees in public infra
on the vulnerabilities of voronoi based approaches
on the performance impact of data access middlewar
model driven development patterns for mobile servi
See more
Users being followed by Finalyearprojects Toall