DOT NET Projects
S NO               PROJECT NAMES                                     
TECHNOLOGY
 1 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing   CLOUD COMPUTING
 2  A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud   CLOUD COMPUTING
 3  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data   CLOUD COMPUTING
 4  CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System   CLOUD COMPUTING
 5  Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email   CLOUD COMPUTING
 6  Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates   CLOUD COMPUTING
 7  Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud   CLOUD COMPUTING
 8  Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud   CLOUD COMPUTING
 9  Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption   CLOUD COMPUTING
 10  A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing   CLOUD COMPUTING
 11  A Novel Recommendation Model Regularized with User Trust and Item Ratings  DATA MINING
 12  Automatically Mining Facets for Queries from Their Search Results  DATA MINING
 13  Crowdsourcing for Top-K Query Processing over Uncertain Data  DATA MINING
 14  Location Aware Keyword Query Suggestion Based on Document Proximity  DATA MINING
 15  Sentiment Embeddings with Applications to Sentiment Analysis  DATA MINING
 16  Rating Prediction based on Social Sentiment from Textual Reviews  DATA MINING

17 Efficient Algorithms for Mining Top-K High Utility Itemsets DATA MINING
18 Nearest Keyword Set Search in Multi-Dimensional Datasets DATA MINING
19 Quantifying Political Leaning from Tweets, Retweets, and Retweeters DATA MINING
20 TopicSketch: Real-time Bursty Topic Detection from Twitter DATA MINING
21 A Stable Approach for Routing Queries in Unstructured P2P Networks

NETWORKING

22 iPath: Path Inference in Wireless Sensor Networks

NETWORKING

23 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks

NETWORKING

24 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

NETWORKING

25 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

NETWORKING

 26 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks  MOBILE COMPUTING
 27 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data MOBILE COMPUTING
28  Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach MOBILE COMPUTING 
 29 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach MOBILE COMPUTING 
30 A Hop-by-Hop Routing Mechanism for Green Internet PARALLEL AND DISTRIBUTED SYSTEMS
31 Continuous Answering Holistic Queries over Sensor Networks PARALLEL AND DISTRIBUTED SYSTEMS
32 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks PARALLEL AND DISTRIBUTED SYSTEMS 
33 The Server Provisioning Problem for Continuous Distributed Interactive Applications PARALLEL AND DISTRIBUTED SYSTEMS 
34 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments SECURE COMPUTING
35 Resolving Multi-party Privacy Conflicts in Social Media

SECURE COMPUTING

36 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata

SECURE COMPUTING

37 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

SECURE COMPUTING

38 Detecting Malicious Facebook Applications SECURE COMPUTING
39 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks IMAGE PROCESSING 
40 A Locality Sensitive Low-Rank Model for Image Tag Completion IMAGE PROCESSING 

 

About Our Company
Management solution and many more. We bestowed the above services not for the client’s satisfaction but delight them. We gained the local, national and international clients due to the dedicate services since 2012 and our corporate office rooted at Hyderabad, Bangalore, Chennai, noida
Contact Us
Phone: +91  868  652  2186
              +91  868  652  2184
Website: www.esystems.co.in
Email:     info@esystems.co.in
 

Visits Total
Good Performance tracking counter

 
All copyrights reserved by E-SYSTEMS