Asp.net Project List
Sl. No. |
Asp .Net Title |
1 |
Cloud Armor: Supporting Reputation-Based Trust Management Or Cloud Services |
2 |
Public Integrity Auditing For Shared Dynamic Cloud Data With Group User Revocation |
3 |
Citation Networks And The Emergence Of Knowledge Core |
4 |
A Two-Level Topic Model Towards Knowledge Discovery From Citation Networks |
5 |
Data Mining With Big Data |
6 |
Dealing With Concept Drifts In Process Mining |
7 |
Seed Block Algorithm: A Remote Smart Data Back-Up Technique For Cloud Computing |
8 |
Accuracy-Constrained Privacy-Preserving Access Control Mechanism For Relational Data |
9 |
Towards Semantically Secure Outsourcing Of Association Rule |
10 |
Mining On Categorical Data |
11 |
Building Confidential And Efficient Query Services In The Cloud With Rasp Data Perturbation |
12 |
Control Flow-Based Malware Variant Detection |
13 |
Efficient Authentication For Mobile And Pervasive Computing |
14 |
An Empirical Performance Evaluation Of Relational Keyword Search Techniques |
15 |
Enabling Data Integrity Protection In Regenerating-Coding-Based Cloud Storage |
16 |
Enforcing Obligations Within Relational Database Management Systems |
17 |
Evaluation Of Web Security Mechanisms Using Vulnerability & Attack Injection |
18 |
Exploiting Service Similarity For Privacy In |
19 |
Location Based Search Queries |
20 |
Identity-Based Remote Data Possession Checking In Public Clouds |
21 |
Key-Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage |
22 |
A Mechanism Design Approach To Resource Procurement In Cloud Computing |
23 |
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks |
24 |
Privacy-Preserving Optimal Meeting Location Determination On Mobile Devices |
25 |
Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data |
26 |
Secure Outsourced Attribute-Based Signatures |
27 |
Supporting Privacy Protection In Personalized Web Search |
28 |
Content Based Image Retrieval Using Color And Textural Features |
29 |
Towards Understanding Cyberbullying Behavior In A Semi-Anonymous Social Network |
30 |
Governing Software Process Improvements In Globally Distributed Product Development |
31 |
Schedulability Analysis Of Deferrable Scheduling Algorithms For Maintaining Real-Time Data Freshness |
32 |
Secure Mining Of Association Rules In Horizontally Distributed Databases |
33 |
Favorable Meeting Location Sharing With Logical Privacy |
34 |
Probabilistic Aspect Mining Model For Drug Reviews |
35 |
Sentiment Analysis On Reviews Of Mobile Users |
36 |
A Log-Based Approach To Make Digital Forensics Easier On Cloud Computing |
37 |
Attribute-Based Access To Scalable Media In Cloud-Assisted Content Sharing Networks |
38 |
Beyond Text QA: Multimedia Answer Generation By Harvesting Web Information |
39 |
Cost-Based Optimization Of Service Compositions |
40 |
Cost-Based Optimization Of Service Compositions |
41 |
Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud |
42 |
Optimal Multiserver Configuration For Profit Maximization In Cloud Computing |
43 |
QOS Ranking Prediction For Cloud Services |
44 |
Secure Mining Of Association Rules In Horizontally Distributed Databases |
45 |
A Novel Economic Sharing Model In A Federation Of Selfish Cloud Providers |
46 |
Attribute-Based Access To Scalable Media In Cloud-Assisted Content Sharing Networks |
47 |
Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud |
48 |
Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud |
49 |
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute-Based Encryption |
50 |
Secure Mining Of Association Rules In Horizontally Distributed Databases |
51 |
Structure-Based Algorithm For Presentation Mapping In |
52 |
Graphical Knowledge Display |
53 |
Mining Social Media Data For Understanding students’ Learning Experiences |