Java is one of the world’s most important and widely used computer languages, and it has held this distinction for many years. Unlike some other computer languages whose influence has weared with passage if time, while java’s has grown.

IEEE 2016-2017 Cloud Computing
1.Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming





Abstracts Base Paper Enquiry
2.ID2S Password-Authenticated Key Exchange Protocols





Abstracts Base Paper Enquiry
3.Dynamic and Public Auditing with Fair Arbitration for Cloud Data





Abstracts Base Paper Enquiry
4.Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption





Abstracts Base Paper Enquiry
5.Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts





Abstracts Base Paper Enquiry

Results 1-2 of 2

IEEE 2016-2017 Data Mining
1.Booster in High Dimensional Data Classification





Abstracts Base Paper Enquiry
2.Relevance Feedback Algorithms Inspired By Quantum Detection





Abstracts Base Paper Enquiry
3.Top-k dominating queries on incomplete data





Abstracts Base Paper Enquiry
4.Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings





Abstracts Base Paper Enquiry
5.Crowdsourcing for top-K query processing over uncertain data





Abstracts Base Paper Enquiry

Results 1-2 of 2

IEEE 2016-2017 Information & Forensic Security
1.An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing





Abstracts Base Paper Enquiry
2.Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data





Abstracts Base Paper Enquiry
3.Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage





Abstracts Base Paper Enquiry
4.Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms





Abstracts Base Paper Enquiry
5.Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates





Abstracts Base Paper Enquiry

Results 1-2 of 2

IEEE 2016-2017 Parallel And Distributed System
1.Dictionary Based Secure Provenance Compression for Wireless Sensor Networks





Abstracts Base Paper Enquiry
2.CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services





Abstracts Base Paper Enquiry
3.An Efficient Privacy-Preserving Ranked Keyword Search Method





Abstracts Base Paper Enquiry
4.Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud





Abstracts Base Paper Enquiry
5.Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing





Abstracts Base Paper Enquiry

Results 1-2 of 2

IEEE 2016-2017 Secure Computing
1.FRoDO: Fraud Resilient Device for Off-Line Micro-Payments





Abstracts Base Paper Enquiry
2.Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data





Abstracts Base Paper Enquiry
3.An enhanced system to identify mischievous social malwares on Facebook applications





Abstracts Base Paper Enquiry
IEEE 2016-2017 Multimedia
1.Social Friend Recommendation Based on Multiple Network Correlation





Abstracts Base Paper Enquiry
IEEE 2016-2017 Networking
1.STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users





Abstracts Base Paper Enquiry
2.Detecting Malicious Facebook Applications





Abstracts Base Paper Enquiry
3.Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks





Abstracts Base Paper Enquiry
4.On Denial of Service Attacks in Software Defined Networks





Abstracts Base Paper Enquiry
5.Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks





Abstracts Base Paper Enquiry
IEEE 2016-2017 Fuzzy Systems
1.Answering Approximate Queries Over XML Data





Abstracts Base Paper Enquiry
IEEE 2016-2017 Internet Of Things
1.EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data





Abstracts Base Paper Enquiry
IEEE 2016-2017 Software Engineering
1.Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation





Abstracts Base Paper Enquiry
IEEE 2016-2017 Big Data
1.Personalized Travel Sequence Recommendation on Multi-Source Big Social Media





Abstracts Base Paper Enquiry
IEEE 2016-2017 Intelligent Systems
1.Trust Agent-Based Behavior Induction in Social Networks





Abstracts Base Paper Enquiry
IEEE 2016-2017 Mobile Computing
1.Energy and Memory Efficient Clone Detection in Wireless Sensor Networks





Abstracts Base Paper Enquiry
2.Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach





Abstracts Base Paper Enquiry
3.Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks





Abstracts Base Paper Enquiry
IEEE 2016-2017 Data Analysis and Networking
1.Analysis of customer churn prediction in telecom industry using decision trees and logistic regression





Abstracts Base Paper Enquiry
IEEE 2016-2017 Cybernetics
1.TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds





Abstracts Base Paper Enquiry
IEEE 2016-2017 Image Processing
1.Learning of Multimodal Representations With Random Walks on the Click Graph





Abstracts Base Paper Enquiry
2.Hiding The Text And Image Message Of Variable Size Using Encryption And Compression Algorithms In Video Steganography





Abstracts Base Paper Enquiry
IEEE 2016-2017 Services Computing
1.CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System





Abstracts Base Paper Enquiry
2.KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage





Abstracts Base Paper Enquiry
3.Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation





Abstracts Base Paper Enquiry
4.Privacy-Preserving Location Sharing Services for Social Networks





Abstracts Base Paper Enquiry
5.SecRBAC: Secure data in the Clouds





Abstracts Base Paper Enquiry