SlideShare a Scribd company logo
2013201320132013 ---- 2014201420142014 IEEE ProjectsIEEE ProjectsIEEE ProjectsIEEE Projects @@@@ JP iNFOTeCHJP iNFOTeCHJP iNFOTeCHJP iNFOTeCH
JAVAJAVAJAVAJAVA
CLOUD COMPUTINGCLOUD COMPUTINGCLOUD COMPUTINGCLOUD COMPUTING
1. JPJ1301 - A Stochastic Model to Investigate Data Center Performance and QoS in
IaaS Cloud Computing Systems
2. JPJ1302 - CloudMoV: Cloud-based Mobile Social TV
3. JPJ1303 - Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment
4. JPJ1304 - Error-Tolerant Resource Allocation and Payment Minimization for
Cloud System
5. JPJ1305 - Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of
Linear Equations
6. JPJ1306 - Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the
Cloud
7. JPJ1307 - PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
8. JPJ1308 - Privacy-Preserving Public Auditing for Secure Cloud Storage
9. JPJ1309 - Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
10. JPJ1310 - Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
11. JPJ1344 - A Load Balancing Model Based on Cloud Partitioning for the Public
Cloud
12. JPJ1354 - Load Rebalancing for Distributed File Systems in Clouds
13. JPJ1359 – Optimizing Cloud Resources for Delivering IPTV Services Through
Virtualization
14. JPJ1363 – Privacy Preserving Delegated Access Control in Public Clouds
KNOWLEDGE AND DATA ENGINEERINGKNOWLEDGE AND DATA ENGINEERINGKNOWLEDGE AND DATA ENGINEERINGKNOWLEDGE AND DATA ENGINEERING
15. JPJ1311 - A Fast Clustering-Based Feature Subset Selection Algorithm for High-
Dimensional Data
16. JPJ1312 - A New Algorithm for Inferring User Search Goals with Feedback
Sessions
17. JPJ1313 - Annotating Search Results from Web Databases
18. JPJ1314 - Anomaly Detection via Online Over-Sampling Principal Component
Analysis
19. JPJ1315 - Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor
Networks
20. JPJ1316- m-Privacy for Collaborative Data Publishing
21. JPJ1317 - Protecting Sensitive Labels in Social Network Data Anonymization
22. JPJ1318 - Tweet Analysis for Real-Time Event Detection and Earthquake
Reporting System Development
23. JPJ1345 - Document Clustering for Forensic Analysis: An Approach for Improving
Computer Inspection
24. JPJ1346 - A Method for Mining Infrequent Causal Associations and Its
Application in Finding Adverse Drug Reaction Signal Pairs
25. JPJ1347 - Clustering Sentence-Level Text Using a Novel Fuzzy Relational
Clustering Algorithm
26. JPJ1358 - Crowdsourcing Predictors of Behavioral Outcomes
27. JPJ1362 - Facilitating Document Annotation using Content and Querying Value
28. JPJ1365 - A Generalized Flow-Based Method for Analysis of Implicit
Relationships on Wikipedia
29. JPJ1366 - A System to Filter Unwanted Messages from OSN User Walls
30. JPJ1367 - Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering
31. JPJ1370 - Intrusion Detection Technique by using K-means, Fuzzy Neural
Network and SVM classifiers. (CONFERENCE PAPER)
SECURE COMPUTINGSECURE COMPUTINGSECURE COMPUTINGSECURE COMPUTING
32. JPJ1319 - EAACK—A Secure Intrusion-Detection System for MANETs
33. JPJ1320 - Identity-Based Secure Distributed Data Storage Schemes
34. JPJ1321 - Modeling the Pairwise Key Predistribution Scheme in the Presence of
Unreliable Links
35. JPJ1322 - NICE: Network Intrusion Detection and Countermeasure Selection in
Virtual Network Systems
36. JPJ1323 - Privacy Preserving Data Sharing With Anonymous ID Assignment
37. JPJ1324 - Securing Class Initialization in Java-like Languages
38. JPJ1325 - Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
39. JPJ1326 -SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
40. JPJ1327 - WARNINGBIRD: A Near Real-time Detection System for Suspicious
URLs in Twitter Stream
41. JPJ1348 - Two tales of privacy in online social networks
42. JPJ1361 - Secure Encounter-based Mobile Social Networks: Requirements,
Designs, and Tradeoffs.
43. JPJ1364 - Twitsper: Tweeting Privately
44. JPJ1371 - Combining Cryptographic Primitives to Prevent Jamming Attacks in
Wireless Networks (CONFERENCE PAPER)
NETWORKINGNETWORKINGNETWORKINGNETWORKING
45. JPJ1328 - A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor
Networks
46. JPJ1329 - Delay-Based Network Utility Maximization
47. JPJ1330 - Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
48. JPJ1349 - Minimum Cost Blocking Problem in Multi-path Wireless Routing
Protocols
49. JPJ1350 - On the Node Clone Detection in Wireless Sensor Networks
50. JPJ1351 - Opportunistic MANETs: Mobility Can Make Up for Low Transmission
Power
51. JPJ1352 - Back-Pressure-Based Packet-by-Packet Adaptive Routing in
Communication Networks
52. JPJ1353- Fast Transmission to Remote Cooperative Groups: A New Key
Management Paradigm
53. JPJ1360 - Participatory Privacy: Enabling Privacy in Participatory Sensing
PARALLEL AND DISTRIBUTED SYSTEMSPARALLEL AND DISTRIBUTED SYSTEMSPARALLEL AND DISTRIBUTED SYSTEMSPARALLEL AND DISTRIBUTED SYSTEMS
54. JPJ1331 - A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
55. JPJ1332 - Security Analysis of a Privacy-Preserving Decentralized Key-Policy
Attribute-Based Encryption Scheme
56. JPJ1333 - IP-Geolocation Mapping for Moderately Connected Internet Regions
57. JPJ1334 - Optimal Client-Server Assignment for Internet Distributed Systems
MOBILE COMPUTINGMOBILE COMPUTINGMOBILE COMPUTINGMOBILE COMPUTING
58. JPJ1335 - Content Sharing over Smartphone-Based Delay-Tolerant Networks
59. JPJ1336 - DCIM: Distributed Cache Invalidation Method for Maintaining Cache
Consistency in Wireless Mobile Networks
60. JPJ1337 - Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
61. JPJ1338 - Efficient Rekeying Framework for Secure Multicast with Diverse-
Subscription-Period Mobile Users
62. JPJ1355 - Toward a Statistical Framework for Source Anonymity in Sensor
Networks
63. JPJ1356 - Mobile Relay Configuration in Data-Intensive Wireless Sensor
Networks
64. JPJ1357 - Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
65. JPJ1368 - Toward Privacy Preserving and Collusion Resistance in a Location Proof
Updating System
PATTERNPATTERNPATTERNPATTERN ANALYSIS AND MACHINE INTELLIGENCEANALYSIS AND MACHINE INTELLIGENCEANALYSIS AND MACHINE INTELLIGENCEANALYSIS AND MACHINE INTELLIGENCE
66. JPJ1339 - A Framework for Mining Signatures from Event Sequences and Its
Applications in Healthcare Data
SERVICES COMPUTINGSERVICES COMPUTINGSERVICES COMPUTINGSERVICES COMPUTING
67. JPJ1340 - A Decentralized Service Discovery Approach on Peer-to-Peer Networks
68. JPJ1341 - Personalized QoS-Aware Web Service Recommendation and
Visualization
69. JPJ1342 - Privacy-Enhanced Web Service Composition
SOFTWARE ENGINEERINGSOFTWARE ENGINEERINGSOFTWARE ENGINEERINGSOFTWARE ENGINEERING
70. JPJ1343 - Whole Test Suite Generation
MULTIMEDIAMULTIMEDIAMULTIMEDIAMULTIMEDIA
71. JPJ1369 - Understanding the External Links of Video Sharing Sites: Measurement
and Analysis

More Related Content

PDF
final year ieee projects in pondicherry 2013
DOCX
Java project 2013
PDF
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
DOCX
CREC List.docx
DOC
Low cost Java IEEE Projects 2013
DOC
Ieee 2014 2014 java project titles
PDF
Shakas project titles 2014 2015
DOC
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
final year ieee projects in pondicherry 2013
Java project 2013
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
CREC List.docx
Low cost Java IEEE Projects 2013
Ieee 2014 2014 java project titles
Shakas project titles 2014 2015
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES

What's hot (16)

DOC
Projecttitles 2013
DOC
Ieee 2014 java projects list
DOC
Novel secure communication protocol basepaper
DOCX
2013-2014 IEEE Projects & Application Projects
DOC
2013 2014 ieee projects titles
DOCX
Original titles
DOC
Ieee 2013 dot net projects list
PDF
2013-2014 IEEE Projects titles
DOCX
Low cost Java 2013 IEEE projects
PDF
2015 application projects
DOCX
The three tier security scheme in wireless
DOC
Ieee 2013 java projects list
DOC
Ieee java projects list
DOC
Ieee 2014 dot net projects list
PDF
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
PDF
2013 2014 ieee java project titles
Projecttitles 2013
Ieee 2014 java projects list
Novel secure communication protocol basepaper
2013-2014 IEEE Projects & Application Projects
2013 2014 ieee projects titles
Original titles
Ieee 2013 dot net projects list
2013-2014 IEEE Projects titles
Low cost Java 2013 IEEE projects
2015 application projects
The three tier security scheme in wireless
Ieee 2013 java projects list
Ieee java projects list
Ieee 2014 dot net projects list
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
2013 2014 ieee java project titles
Ad

Viewers also liked (15)

PDF
2012 ieee android project titles
PPTX
Sindrome compartimental expo 1
PDF
Whadddyathink
DOCX
A trigger identification service for defending reactive jammers in wireless s...
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
PDF
Android ieee projects 2012
PDF
2012 13 eee ieee projects - jp infotech
DOCX
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
DOCX
A stochastic model of multivirus dynamics
DOCX
Adaptive membership functions for hand written character recognition by voron...
DOCX
A gossip protocol for dynamic resource management in large cloud environments
PDF
The China Analyst - September 2011
2012 ieee android project titles
Sindrome compartimental expo 1
Whadddyathink
A trigger identification service for defending reactive jammers in wireless s...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Android ieee projects 2012
2012 13 eee ieee projects - jp infotech
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
A stochastic model of multivirus dynamics
Adaptive membership functions for hand written character recognition by voron...
A gossip protocol for dynamic resource management in large cloud environments
The China Analyst - September 2011
Ad

Similar to IEEE PROJECTS 2013 for me (20)

PDF
Java ieee titles2016 student
PDF
2013 2014 ieee dotnet project titles
PDF
2013 IEEE PROJECT TITLES FOR CSE
PDF
final year ieee projects in pondicherry
PDF
2013 ieee java project titles for cse, it and mca
PDF
ieee projects 2013 for m.tech.
PDF
ieee 2013 best project titles with latest techniques
PDF
Java 2015 project list
PDF
Java 2015
DOCX
2013 2014 ieee project titles
DOCX
2013 2014 bulk ieee projects
DOCX
IEEE 2014 .Net & Java Projects List
PDF
ieee projects for cse 2013
PDF
msc projects in chennai
PDF
2018 ieee java project titles | 2019 java final year project titles
DOCX
2014 and 2015 Java,Android,Dotnet ieee projects list @TMKS Infotech
DOCX
2014 and 2015 ieee projects list in Karnataka @ Bangalore
PDF
Java titles 2017 2018
DOCX
2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
2014 and 2015 ieee projects list in Bangalore
Java ieee titles2016 student
2013 2014 ieee dotnet project titles
2013 IEEE PROJECT TITLES FOR CSE
final year ieee projects in pondicherry
2013 ieee java project titles for cse, it and mca
ieee projects 2013 for m.tech.
ieee 2013 best project titles with latest techniques
Java 2015 project list
Java 2015
2013 2014 ieee project titles
2013 2014 bulk ieee projects
IEEE 2014 .Net & Java Projects List
ieee projects for cse 2013
msc projects in chennai
2018 ieee java project titles | 2019 java final year project titles
2014 and 2015 Java,Android,Dotnet ieee projects list @TMKS Infotech
2014 and 2015 ieee projects list in Karnataka @ Bangalore
Java titles 2017 2018
2014 and 2015 ieee projects list @ TMKS Infotech
2014 and 2015 ieee projects list in Bangalore

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Institutional Correction lecture only . . .
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Classroom Observation Tools for Teachers
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
VCE English Exam - Section C Student Revision Booklet
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Pharma ospi slides which help in ospi learning
Basic Mud Logging Guide for educational purpose
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
human mycosis Human fungal infections are called human mycosis..pptx
Institutional Correction lecture only . . .
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial disease of the cardiovascular and lymphatic systems
TR - Agricultural Crops Production NC III.pdf
Complications of Minimal Access Surgery at WLH
Classroom Observation Tools for Teachers
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
2.FourierTransform-ShortQuestionswithAnswers.pdf
Microbial diseases, their pathogenesis and prophylaxis
VCE English Exam - Section C Student Revision Booklet

IEEE PROJECTS 2013 for me

  • 1. 2013201320132013 ---- 2014201420142014 IEEE ProjectsIEEE ProjectsIEEE ProjectsIEEE Projects @@@@ JP iNFOTeCHJP iNFOTeCHJP iNFOTeCHJP iNFOTeCH JAVAJAVAJAVAJAVA CLOUD COMPUTINGCLOUD COMPUTINGCLOUD COMPUTINGCLOUD COMPUTING 1. JPJ1301 - A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2. JPJ1302 - CloudMoV: Cloud-based Mobile Social TV 3. JPJ1303 - Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 4. JPJ1304 - Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 5. JPJ1305 - Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 6. JPJ1306 - Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 7. JPJ1307 - PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 8. JPJ1308 - Privacy-Preserving Public Auditing for Secure Cloud Storage 9. JPJ1309 - Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 10. JPJ1310 - Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 11. JPJ1344 - A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 12. JPJ1354 - Load Rebalancing for Distributed File Systems in Clouds
  • 2. 13. JPJ1359 – Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization 14. JPJ1363 – Privacy Preserving Delegated Access Control in Public Clouds KNOWLEDGE AND DATA ENGINEERINGKNOWLEDGE AND DATA ENGINEERINGKNOWLEDGE AND DATA ENGINEERINGKNOWLEDGE AND DATA ENGINEERING 15. JPJ1311 - A Fast Clustering-Based Feature Subset Selection Algorithm for High- Dimensional Data 16. JPJ1312 - A New Algorithm for Inferring User Search Goals with Feedback Sessions 17. JPJ1313 - Annotating Search Results from Web Databases 18. JPJ1314 - Anomaly Detection via Online Over-Sampling Principal Component Analysis 19. JPJ1315 - Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 20. JPJ1316- m-Privacy for Collaborative Data Publishing 21. JPJ1317 - Protecting Sensitive Labels in Social Network Data Anonymization 22. JPJ1318 - Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development 23. JPJ1345 - Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection 24. JPJ1346 - A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 25. JPJ1347 - Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
  • 3. 26. JPJ1358 - Crowdsourcing Predictors of Behavioral Outcomes 27. JPJ1362 - Facilitating Document Annotation using Content and Querying Value 28. JPJ1365 - A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 29. JPJ1366 - A System to Filter Unwanted Messages from OSN User Walls 30. JPJ1367 - Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 31. JPJ1370 - Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers. (CONFERENCE PAPER) SECURE COMPUTINGSECURE COMPUTINGSECURE COMPUTINGSECURE COMPUTING 32. JPJ1319 - EAACK—A Secure Intrusion-Detection System for MANETs 33. JPJ1320 - Identity-Based Secure Distributed Data Storage Schemes 34. JPJ1321 - Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links 35. JPJ1322 - NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 36. JPJ1323 - Privacy Preserving Data Sharing With Anonymous ID Assignment 37. JPJ1324 - Securing Class Initialization in Java-like Languages 38. JPJ1325 - Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 39. JPJ1326 -SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems 40. JPJ1327 - WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream 41. JPJ1348 - Two tales of privacy in online social networks
  • 4. 42. JPJ1361 - Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs. 43. JPJ1364 - Twitsper: Tweeting Privately 44. JPJ1371 - Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks (CONFERENCE PAPER) NETWORKINGNETWORKINGNETWORKINGNETWORKING 45. JPJ1328 - A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 46. JPJ1329 - Delay-Based Network Utility Maximization 47. JPJ1330 - Dynamic Control of Coding for Progressive Packet Arrivals in DTNs 48. JPJ1349 - Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols 49. JPJ1350 - On the Node Clone Detection in Wireless Sensor Networks 50. JPJ1351 - Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power 51. JPJ1352 - Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks 52. JPJ1353- Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm 53. JPJ1360 - Participatory Privacy: Enabling Privacy in Participatory Sensing
  • 5. PARALLEL AND DISTRIBUTED SYSTEMSPARALLEL AND DISTRIBUTED SYSTEMSPARALLEL AND DISTRIBUTED SYSTEMSPARALLEL AND DISTRIBUTED SYSTEMS 54. JPJ1331 - A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 55. JPJ1332 - Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme 56. JPJ1333 - IP-Geolocation Mapping for Moderately Connected Internet Regions 57. JPJ1334 - Optimal Client-Server Assignment for Internet Distributed Systems MOBILE COMPUTINGMOBILE COMPUTINGMOBILE COMPUTINGMOBILE COMPUTING 58. JPJ1335 - Content Sharing over Smartphone-Based Delay-Tolerant Networks 59. JPJ1336 - DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks 60. JPJ1337 - Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 61. JPJ1338 - Efficient Rekeying Framework for Secure Multicast with Diverse- Subscription-Period Mobile Users 62. JPJ1355 - Toward a Statistical Framework for Source Anonymity in Sensor Networks 63. JPJ1356 - Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 64. JPJ1357 - Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks 65. JPJ1368 - Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
  • 6. PATTERNPATTERNPATTERNPATTERN ANALYSIS AND MACHINE INTELLIGENCEANALYSIS AND MACHINE INTELLIGENCEANALYSIS AND MACHINE INTELLIGENCEANALYSIS AND MACHINE INTELLIGENCE 66. JPJ1339 - A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data SERVICES COMPUTINGSERVICES COMPUTINGSERVICES COMPUTINGSERVICES COMPUTING 67. JPJ1340 - A Decentralized Service Discovery Approach on Peer-to-Peer Networks 68. JPJ1341 - Personalized QoS-Aware Web Service Recommendation and Visualization 69. JPJ1342 - Privacy-Enhanced Web Service Composition SOFTWARE ENGINEERINGSOFTWARE ENGINEERINGSOFTWARE ENGINEERINGSOFTWARE ENGINEERING 70. JPJ1343 - Whole Test Suite Generation MULTIMEDIAMULTIMEDIAMULTIMEDIAMULTIMEDIA 71. JPJ1369 - Understanding the External Links of Video Sharing Sites: Measurement and Analysis