Most of mobile object trajectory clustering analysis to date has been focused on clustering the location points or sub-trajectories extracted from trajectory data. This paper presents TRACEMOB, a systematic approach to clustering whole trajectories of mobile objects traveling in road networks. TRACEMOB as a whole trajectory clustering framework has three unique features. First, we design […]
Efficient Distance-Aware Influence Maximization in Geo-Social Networks
Given a social network G and a positive integer k, the influence maximization problem aims to identify a set of k nodes in G that can maximize the influence spread under a certain propagation model. As the proliferation of geo-social networks, location-aware promotion is becoming more necessary in real applications. In this paper, we study […]
Efficient Pattern-Based Aggregation on Sequence Data
A Sequence OLAP (S-OLAP) system provides a platform on which pattern-based aggregate (PBA) queries on a sequence database are evaluated. In its simplest form, a PBA query consists of a pattern template T and an aggregate function F. A pattern template is a sequence of variables, each is defined over a domain. Each variable is […]
IEEE Projects 2017 Java Information and Forensics Topics Abstract Title List
TECHNOLOGY: JAVA DOMAIN: Information and Forensics Security S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks Multi-user broadcast authentication is an important security service in wireless sensor networks (WSNs), as it allows a large number of mobile users of the WSNs to […]
IEEE Projects 2017 Dotnet Information and Forensics Topics Abstract Title List
TECHNOLOGY: Dot Net DOMAIN: Information and Forensics Security S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks Multi-user broadcast authentication is an important security service in wireless sensor networks (WSNs), as it allows a large number of mobile users of the WSNs […]
IEEE 2017 Java Mobile Computing Projects List Abstract Title Topics
TECHNOLOGY: JAVA DOMAIN: Mobile Computing S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks In wireless networks, location distinction aims to detect location changes or facilitate authentication of wireless users. To achieve location distinction, recent research has focused on investigating the […]
IEEE 2017 .net Image Processing Projects Title Abstract Topics List
TECHNOLOGY: Dot Net DOMAIN: Image Processing S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 Image Re-Ranking Based on Topic Diversity Social media sharing Websites allow users to annotate images with free tags, which significantly contribute to the development of the web image retrieval. Tag-based image search is an important method to find […]
IEEE 2017 Java Image Processing Projects Title Abstract Topics List
TECHNOLOGY: JAVA DOMAIN: Image Processing S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 Image Re-Ranking Based on Topic Diversity Social media sharing Websites allow users to annotate images with free tags, which significantly contribute to the development of the web image retrieval. Tag-based image search is an important method to find images […]
IEEE 2017 Dotnet Network Security Projects Title List Abstract Topics
TECHNOLOGY: Dot Net DOMAIN: Network Security S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 A Novel Class of Robust Covert Channels Using Out-of-Order Packets Covert channels are usually used to circumvent security policies and allow information leakage without being observed. In this paper, we propose a novel covert channel technique using […]
IEEE Projects 2017 Java Network Security Title Topics Abstract
TECHNOLOGY: JAVA DOMAIN: Network Security S. No. IEEE TITLE ABSTRACT IEEE YEAR 1 A Novel Class of Robust Covert Channels Using Out-of-Order Packets Covert channels are usually used to circumvent security policies and allow information leakage without being observed. In this paper, we propose a novel covert channel technique using the […]
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- …
- 108
- Next Page »