by nexgentech | Nov 11, 2017 | ieee project
bulk ieee projects PPRANK: ECONOMICALLY SELECTING INITIAL USERS FOR INFLUENCE MAXIMIZATION IN SOCIAL NETWORKS Abstract: This paper focuses on seeking a new heuristic scheme for an influence maximization problem in social networks: how to economically select a subset...
by nexgentech | Nov 11, 2017 | ieee project
bulk ieee projects FACILITATING TIME CRITICAL INFORMATION SEEKING IN SOCIAL MEDIA Abstract: Social media plays a major role in helping people affected by natural calamities. These people use social media to request information and help in situations where time is a...
by nexgentech | Nov 11, 2017 | ieee project
bulk ieee java projects SECURE DATA SHARING AND SEARCHING AT THE EDGE OF CLOUD-ASSISTED INTERNET OF THINGS ABSTRACT: Over the last few years, smart devices are able to communicate with each other and with Internet/cloud from short to long range. As a consequence, a...
by nexgentech | Nov 11, 2017 | ieee project
PRIVACY PROTECTION BASED ACCESS CONTROL SCHEME IN CLOUD-BASED SERVICES ABSTRACT: With the quick advancement of PC innovation, cloud-based administrations have turned into a hotly debated issue. They furnish clients with comfort, as well as bring numerous security...
by nexgentech | Nov 11, 2017 | ieee project
bulk ieee java projects PRIVACY-PRESERVING LOCATION-PROXIMITY FOR MOBILE APPS Abstract: Location Based Services (LBS) have seen alarming privacy breaches in recent years. While there has been much recent progress by the research community on developing...
by nexgentech | Nov 11, 2017 | ieee project
VIRTUAL MACHINE MIGRATION PLANNING IN SOFTWARE-DEFINED NETWORKS Abstract: Live migration is a key technique for virtual machine (VM) management in data center networks, which enables flexibility in resource optimization, fault tolerance, and load balancing. Despite...
by nexgentech | Nov 11, 2017 | ieee project
SECURING CLOUD DATA UNDER KEY EXPOSURE ABSTRACT: Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. ¢ Once the encryption key is exposed, the only...
by nexgentech | Nov 11, 2017 | ieee project
TEES: AN EFFICIENT SEARCH SCHEME OVER ENCRYPTED DATA ON MOBILE CLOUD ABSTRACT Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud trustingly. One way of...
by nexgentech | Nov 11, 2017 | ieee project
PARTIAL UTILITY-DRIVEN SCHEDULING FOR FLEXIBLE SLA AND PRICING ARBITRATION IN CLOUDS Abstract: Cloud SLAs compensate customers with credits when average availability drops below certain levels. This is too inflexible because consumers lose non-measurable amounts of...