Sl.No Project code Project title Domain Year Enquiry
1ECDOT_1601 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud CLOUD COMPUTING 2015
2ECDOT_1602 Cloud-Based Multimedia Content Protection System CLOUD COMPUTING 2015
3ECDOT_1603 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers CLOUD COMPUTING 2015
4ECDOT_1604 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds CLOUD COMPUTING 2015
5ECDOT_1605 Identity-Based Distributed Provable Data Possession in Multicloud Storage CLOUD COMPUTING 2015
6ECDOT_1606 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data CLOUD COMPUTING 2015
7ECDOT_1607 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem CLOUD COMPUTING 2015
8ECDOT_1608 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption CLOUD COMPUTING 2015
9ECDOT_1609 PSMPA: Patient Self-Controllable and Multi-Level Privacy- Preserving Cooperative Authentication in Distributed CLOUD COMPUTING 2015
10ECDOT_1610 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data CLOUD COMPUTING 2015
11ECDOT_1611 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation SERVICE COMPUTING (WEB SERVICE) 2015
12ECDOT_1612 Discovery of Ranking Fraud for Mobile Apps DATA MINING 2015
13ECDOT_1613 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites DATA MINING 2015
14ECDOT_1614 PAGE: A Partition Aware Engine for Parallel Graph Computation DATA MINING 2015
15ECDOT_1615 Query Aware Determinization of Uncertain Objects DATA MINING 2015
16ECDOT_1616 Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization NETWORKING 2015
17ECDOT_1617 Universal Network Coding-Based Opportunistic Routing for Unicast NETWORKING 2015
18ECDOT_1618 Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis NETWORKING 2015
19ECDOT_1619 Optimal Configuration of Network Coding in Ad Hoc Networks MOBILE COMPUTING 2015
20ECDOT_1620 Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks MOBILE COMPUTING 2015
21ECDOT_1621 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks MOBILE COMPUTING 2015
22ECDOT_1622 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks MOBILE COMPUTING 2015
23ECDOT_1623 Authenticated Key Exchange Protocols for Parallel Network File Systems PARALLEL AND DISTRIBUTED SYSTEMS 2015
24ECDOT_1624 Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search SECURE COMPUTING 2015
25ECDOT_1625 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System SECURE COMPUTING 2015
26ECDOT_1626 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints SECURE COMPUTING 2015
27ECDOT_1627 Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems SECURE COMPUTING 2015
28ECDOT_1628 Learning Fingerprint Reconstruction: From Minutiae to Image IMAGE PROCESSING 2015
29ECDOT_1629 An Attribute-Assisted Reranking Model for Web Image Search IMAGE PROCESSING 2015
30ECDOT_1630 Single Image Superresolution Based on Gradient Profile Sharpness IMAGE PROCESSING 2015
31ECDOT_1631 Detection and Rectification of Distorted Fingerprints IMAGE PROCESSING 2015
32ECDOT_1632 Multiview Alignment Hashing for Efficient Image Search IMAGE PROCESSING 2015
33ECDOT_1633 Eye Gaze Tracking With a Web Camera in a Desktop Environment IMAGE PROCESSING 2015
34ECDOT_1634 Steganography Using Reversible Texture Synthesis IMAGE PROCESSING 2015
35ECDOT_1635 Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images IMAGE PROCESSING 2015