S3 INFOTECH +919884848198 JAVA IEEE 2014 TITLES Fully Completed List S.No Project Title YEAR S3C_1 Secure_Message_Passing_In_Cloud IEEE 2014 S3C_2 Fault_Localization_For_Dynamic_Web_Applications IEEE 2014 Mining_Social_Media_Data_For_Understanding_Students'_Learning S3C_3 _Experiences IEEE 2014 S3C_4 Decentralized_Access_Control_Of_Data_Stored_In_Cloud IEEE 2014 S3C_5 Real_Estate_Management_System IEEE 2014 S3C_6 Circular_Ranking_For_Visual_Search IEEE 2014 S3C_7 Attribute Based Encryption with Privacy Protection in Clouds IEEE 2014 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud S3C_8 Storage IEEE 2014 Disturbed, concurrent and independent access to encrypted cloud S3C_9 database IEEE 2014 Accuracy Constrained Privacy Preserving Access Control S3C_10 Mechanism for Relational Data IEEE 2014 S3C_11 Supporting privacy protection in personalized web search IEEE 2014 S3C_12 Human effects of enhanced privacy management models IEEE 2014 Analysis, modeling and simulation of workload patterns in a large S3C_13 scale utility cloud IEEE 2014 # 10/1, Jones Road, Saidapet, Chennai – 15. Ph: 044-3201 7467, 9884848198. www.s3computers.com E-Mail: info@s3computers.com S3 INFOTECH +919884848198 S3C_14 Identifying code of individual features in client side web application IEEE 2014 Efficient Algorithms for Mining High Utility Itemsets from S3C_15 Transactional Databases IEEE 2014 CipherXRay: Exposing Cryptographic Operations and Transient S3C_16 Secrets from Monitored Binary Execution IEEE 2014 S3_JCC02 A Mechanism Design Approach to Resource Procurement in Cloud Computing Cloud Procurement S3_JCC03 A Hybrid Cloud Approach for Secure Authorized Deduplication Hybrid Cloud S3_JCC04 A Provenance-based Adaptive Scheduling Heuristic for Parallel Scientific Workflows in Clouds Scientific Work flows S3_JCC05 Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users Key Management S3_JCC06 A green energy-efficient scheduling algorithm using the DVFS technique for cloud datacenters Cloud Scheduling S3_JCC07 Information Flow Control for Secure Cloud Computing Cloud Computing S3_JCC08 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing Cloud Security S3_JCC09 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Security S3_JBD10 Cost Minimization for Big Data Processing in Geo-Distributed Data Centers Big Data S3_JBD11 Evolutionary Scheduling of Dynamic Multitasking Workloads for Big-Data Analytics in Elastic Cloud S3_JBD12 Data Mining with Big Data Task Scheduling Big Data Mining # 10/1, Jones Road, Saidapet, Chennai – 15. Ph: 044-3201 7467, 9884848198. www.s3computers.com E-Mail: info@s3computers.com IEEE 2014 Cloud, Auditing, Security Struts2,Web Frame Work , RDF A Computational Dynamic Trust Model for User Authorization TECHNOLOG Y IEEE 2014 Big Data, Mining Hadoop File System S3_JCC01 APPLICATI ON Secure Computing PROJECT TITLE S3_JDM1 4 S3_JDM1 5 S3_JDM1 6 S3_JDM1 7 A Semantically Enriched Context-Aware OER Recommendation Strategy and Its Application to a Computer Science OER Repository Recommendat ion System On Skyline Groups Skyline Query Online Feature Selection and Its Applications Toward Scalable Indexing for Top-k Queries Online Learning Query Retrieval Personalized Web Search Using Browsing History And Domain Knowledge Web Mining S3_JDM1 8 Interpreting the Public Sentiment Variations on Twitter Sentiment / Opinion Mining S3_JDM1 9 Automatic Generation of the Domain Module from Electronic Textbooks: Method and Validation S3_JNS20 Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks S3_JNS21 Collusion-Resistance in Optimistic Fair Exchange S3_JNS22 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs Pattern Mining Information Security Collusion Recover Intrusion Detection S3_JNS23 On the Security of Trustee-Based Social Authentications Network Security S3_JNS24 Receiver-Based Flow Control for Networks in Overload Networking S3_JNS25 An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation Information Security S3_JNS26 Measurement of Globally Visible DNS Injection S3_JNS27 Identity-Based Secure Distributed Data Storage Schemes Networking Distributed Network Securing Broker less Publish/Subscribe Systems Using Identity Based Encryption Distributed Sensing for High-Quality Structural Health S3_JNS29 Monitoring using WSNs S3_JNS28 Pub/Sub System WSN # 10/1, Jones Road, Saidapet, Chennai – 15. Ph: 044-3201 7467, 9884848198. www.s3computers.com IEEE 2014 Opinion Mining, Query Analysis Struts2, J2EE S3_JDM1 3 +919884848198 E-Mail: info@s3computers.com IEEE 2014 Network Security, DOS Attack , IDS, CAPTCHA Struts2, J2EE, Web Frameworks S3 INFOTECH Security Analysis and Related Usability of Motionbased CAPTCHAs: Decoding Code words in Motion Captcha Security S3_JSS31 Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes Software Engineering S3_JSS32 A Framework for Goal-Oriented Discovery of Resources in the RESTful Architecture Web Services S3_JSS33 QoS Ranking Prediction for Cloud Services QOS Ranking S3_JMC3 4 S3_JMC3 5 S3_JMC3 6 S3_JMC3 7 S3_JMC3 8 S3_JMC3 9 Secloud: A cloud-based comprehensive and lightweight security solution for smartphones Quality-Control Algorithm for Adaptive Streaming Services over Wireless Channels EasySMS: A Protocol for End-to-End Secure Transmission of SMS Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks S3_JIM40 Reversible Image Data Hiding with Contrast Enhancement Stenography S3_JIM41 Spatial Resolution Enhancement of Earth Observation Products Using an Acceleration Technique for Iterative Methods Image Enhancement S3_JIM42 Text Detection and Recognition on Traffic Panels From Street-Level Imagery Using Visual Appearance Visual Mining S3_JIM43 Inferring User Image-Search Goals Under the Implicit Guidance of Users Image Mining S3_JIM44 Adaptive region matching for region-based image retrieval by constructing region importance index Image Ret rival S3_JIM45 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia Wikipedia Mining S3_JIM46 Multi-Focus Image Fusion Based on Spatial Frequency in Discrete Cosine Transform Domain Mobile Security Mobile Streaming SMS Risk Detection Profile Matching Home Healthcare Fusion # 10/1, Jones Road, Saidapet, Chennai – 15. Ph: 044-3201 7467, 9884848198. www.s3computers.com E-Mail: info@s3computers.com IEEE 2014 Android, Ontology Security, Streaming S3_JNS30 IEEE 2014 Qos Prediction Web Services +919884848198 IEEE 2014 Image Retrieval, Data Hiding, Medical , Fusion J2EE, Image Analysis S3 INFOTECH S3 INFOTECH +919884848198 # 10/1, Jones Road, Saidapet, Chennai – 15. Ph: 044-3201 7467, 9884848198. www.s3computers.com E-Mail: info@s3computers.com