PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKSCATTER

7 years ago

ABSTRACT: It is long known attackers may use forged source IP address to conceal their real locations. To capture the…

Optimal Configuration of Network Coding in Ad Hoc Networks

7 years ago

Abstract:  Analyze the impact of network coding (NC) configuration on the performance of ad hoc networks with the consideration of…

ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS

7 years ago

ABSTRACT: MapReduce job, we consider to aggregate data with the same keys before sending them to remote reduce tasks. Although…

Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

7 years ago

Abstract Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community to…

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

7 years ago

ABSTRACT: In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that…

MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE ADHOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING

7 years ago

ABSTRACT: File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The…

Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

7 years ago

Abstract—Media streaming applications have recently attracted a large number of users in the Internet. With the advent of these bandwidth-intensive…

IMPROVING WEB NAVIGATION USABILITY BY COMPARING ACTUAL AND ANTICIPATED USAGE

7 years ago

ABSTRACT: We present a new method to identify navigation related Web usability problems based on comparing actual and anticipated usage…

Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques

7 years ago

Due to the broadcast nature of radio propagation, wireless transmission can be readily overheard by unauthorized users for interception purposes…

IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING

7 years ago

ABSTRACT: Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important…

IDENTITY-BASED DISTRIBUTED PROVABLE DATA POSSESSION IN MULTI-CLOUD STORAGE

7 years ago

ABSTRACT: Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their…

GENERATING SEARCHABLE PUBLIC-KEY CIPHERTEXTS WITH HIDDEN STRUCTURES FOR FAST KEYWORD SEARCH

7 years ago

ABSTRACT: In this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without…

FRIENDBOOK A SEMANTIC-BASED FRIEND RECOMMENDATION

7 years ago

ABSTRACT: Existing social networking services recommend friends to users based on their social graphs, which may not be the most…

ENERGY EFFICIENT VIRTUAL NETWORK EMBEDDING FOR CLOUD NETWORKS

7 years ago

ABSTRACT: In this paper, we propose an energy efficient virtual network embedding (EEVNE) approach for cloud computing networks, where power…

Enabling Fine-grained Multi-keyword Search

7 years ago

Abstract—Using cloud computing, individuals can store their data on remote servers and allow data access to public users through the…

Android Project Ideas

MCA Project Topics

Android Projects Titles

Categories

PHP Project Ideas