ieee projects download, base paper for ieee projects, ieee projects list, ieee projects titles, ieee projects for cse, ieee projects on networking, ieee projects, ieee projects 2013, final year project, computer science final year projects, final year projects for information technology, ieee final year projects, final year students projects, students projects in java, students projects download, students projects in java with source code, students projects architecture, free ieee papers
Sunday, July 29, 2012
Wednesday, July 25, 2012
Embedded Systems Project Titles (IEEE 2012)
EMBEDDED SYSTEM IEEE 2012 PROJECT TITLES
· Automatic Control of Irrigation Systems Aiming at High Energy Efficiency in Rice Crops· A Reliable Transmission Protocol for ZigBee-Based Wireless Patient Monitoring
· A Zigbee-Based Wearable Physiological Parameters Monitoring System
· Dew-Based Wireless Mini Module for Respiratory Rate Monitoring
· Wireless Sensor Networks in Biomedical Body Area Networks
· Electronic Voting Machine - A Review
· A Method of Remote Control for Home Appliance Using Free Hand Gesture
· Hand gesture based remote control for home appliances Handmote
· Wheelchair Motion Control Guide Using Eye Gaze and Blinks Based on Point Bug Algorithm
· Automatic Ambulance Rescue System
· GSM based Power Meter Reading and Control System
· Mobility Tracking using GPS, WiFi and Cell ID
· Design and Implementation of Industrial Network Monitoring Protocol for Networked Industrial Sensors
· Ethernet Enabled Digital 10 Control in Embedded Systems
· Microcontroller-Based High-Power-Factor Electronic Ballast to Supply Metal Halide Lamps
· Microcontroller-Based Peak Current Mode Control Using Digital Slope Compensation
· A New AMR Approach for Energy Saving in Smart Grids Using Smart Meter and Partial Power Line Communication
· Design of an Intelligent White-OLED Lighting System using Power Line Communication
· A Monoball Robot Based on LEGO Mindstorms
· A Vision-Based Tracking System for a Street-Crossing Robot
· An Active Uprighting Mechanism for Flying Robots
· Design and Implementation of a ZigBee-Based Wireless Automatic Meter Reading System
· Design and Motion Planning of a Two-Module Collaborative Indoor Pipeline Inspection Robot
· Inertial Sensor based Wireless Control of a Robotic Arm
· Modeling and Control of a Snake-Like Robot Using the Screw-Drive Mechanism
· Real-Time Detection and Tracking of Traffic Sign in Video Sequences for Autonomous Mobile Robot
· Simultaneous Localization of Multiple Unknown and Transient Radio Sources Using a Mobile Robot
· Smart Host Microcontroller for Optimal Battery Charging in a Solar-Powered Robotic Vehicle
· A Low Power Wireless Sensor Network for Gully Pot Monitoring in Urban Catchments
· A Path-Connected-Cluster Wireless Sensor Network and its Formation, Addressing, and Routing Protocols
· An Analytical Energy Consumption Model for Packet Transfer over Wireless Links
· An Enhanced ZigBee Indoor Positioning System with an Ensemble Approach
· Building Lighting Automation through the Integration of DALI with Wireless Sensor Networks
· Design of remote automatic meter reading system based on ZigBee and GPRS
· Design of Remote Intelligent Home System Based on ZigBee and GPRS technology
· Designing of an Automated Power Meter Reading with Zigbee Communication
· ZigBee MAC Wireless Network Implementation Using a Remote Virtual Interface
· A Low-Cost Stand-Alone Multichannel Data Acquisition, Monitoring, and Archival System With On-Chip Signal Preprocessing
· A Microcontroller-Based Power Management System for Standalone Microgrids With Hybrid Power Supply
· A Parallel Simulation Technique for Multicore Embedded Systems and Its Performance Analysis
· An Ill-Structured PBL-Based Microprocessor Course Without Formal Laboratory
· An Open Traffic Light Control Model for Reducing Vehicles' CO2 Emissions Based on ETC Vehicles
· Automatic Calibration of a Motion Capture System based on Inertial Sensors for Tele-Manipulation
· Block-Based Major Color Method for Foreground Object Detection on Embedded SoC Platforms
· Bus-Stop Control Strategies Based on Fuzzy Rules for the Operation of a Public Transport System
· Capacitive Pressure Sensing Based Key in PCB Technology for Industrial Applications
· Design and Implementation of Multiple Maximum Power Point Trackers for Multi-String PV Panels in DC Distribution Systems
· Design and Realization of Remote-control Terminal Based on GPRS
· Design and Simulation of a Wireless DAQ-IC for Foot Plantar Pressure
· Designing an Adaptive Acoustic Modem for Underwater Sensor Networks
· Detection System Design of Traffic Flow Color Video Based on ARM9
· Differential Amplifier With Current-Mirror Load In fluence of Current Gain, Early Voltage, and Supply Voltage on the DC Output Voltage
· Distributed Compressive Sampling for Lifetime Optimization in Dense Wireless Sensor Networks
· Enhancing Mine Safety with Wireless Sensor Networks using Zigbee Technology
· ETC Assisted Traffic Light Control Scheme for Reducing Vehicles' CO2 Emissions
· Floating Car Data Augmentation Based on Infrastructure Sensors and Neural Networks
· Intelligent Selection of Calibration Points Using a Modified Progressive Polynomial Method
· IPT Charged Wireless Sensor Module for River Sedimentation Detection
· Leakage Fault Diagnosis for an Internet-Based Three-Tank System An Experimental Study
· Low-Cost Capacitive Humidity Sensor for Application Within Flexible RFID Labels Based on Microcontroller Systems
· Low-Cost Undergraduate Control Systems Experiments Using Microcontroller-Based Control of a DC Motor
· Magic Mirror Table for Social-Emotion Alleviation in the Smart Home
· Monitoring Roll Chock Temperature
· Multi-parameter Monitoring System for Coal Mine based on Wireless Sensor Network Technology
· Multichannel Superframe Scheduling for IEEE 802.15.4 Industrial Wireless Sensor Networks
· On Design and Implementation of Neural-Machine Interface for Artificial Legs
· Optimal Power Management of Residential Customers in the Smart Grid
· Polynomial Control Method of DC DC Converters for DC-Bus Voltage and Currents Management-Battery and Supercapacitors
· Real Time Smart Car Lock Security System Using Face Detection and Recognition
· Robust Railway Crack Detection Scheme (RRCDS) Using LED-LDR Assembly
· Safety Benefits of Forward Collision Warning, Brake Assist, and Autonomous Braking Systems in Rear-End Collisions
· Sensor Network Based Oilwell Health Monitoring and Intelligent Control
· Simple Vehicle Powertrain Model for Modeling Intelligent Vehicle Applications
· Smart "Stick-on" Sensors for the Smart Grid
· Speech Codecs for High-Quality Voice over ZigBee Applications Evaluation and Implementation Challenges
· System Identification and Energy-aware Processor Utilization Control
· The Recognition and Tracking of Traffic Lights Based on Color Segmentation
· Wireless Sensor Network Based Home Monitoring System for Wellness Determination of Elderly
· Multiple Working Mode Control of Door-Opening With a Mobile Modular and Reconfigurable Robot
· Design of A Hexapod Robot
· Wireless Underwater Mobile Robot System Based on Zigbee
· Self-recognition of Vehicle Position Using UHF Passive RFID Tags
· An Autonomous Robot Based on a Wheelchair
· Autonomous Navigation Robot For Landmine Detection Applications
· Wireless Vision-Based Stabilization of Indoor Micro-helicopter
· Robot Navigation System with RFID and Sensors
· Multisensor Fusion and Integration: A Review on Approaches and Its Applications in Mechatronics
· An Online Stair-Climbing Control Method for a Transformable Tracked Robot
· Providing Accident Detection in Vehicular Networks Through OBD-II Devices and Android-based Smart-phones
· Remotely Controlled Communication and Control System for Limited Mobility Individuals
· A Smartphone-in-the-Loop Active State-of-Charge Manager for Electric Vehicles
· A Wireless Sensory Feedback Device for Real-Time Gait Feedback and Training
· Evaluation of a Smartphone Platform as a Wireless Interface Between Tongue Drive System and Electric-Powered Wheelchairs
· A Multiple Inductive Loop Vehicle Detection System for Heterogeneous and Lane-Less Traffic
· Water-Cluster-Detecting Breath Sensor and Applications in Cars for Detecting Drunk or Drowsy Driving
· Real-Time Combinatorial Optimization for Elevator Group Dispatching
· The House Intelligent Switch Control Network Based on CAN Bus
· An Effective Pedestrian Detection Method For Driver Assistance System
· A Reconfigurable Snake Robot Based on CAN-Bus
· The Design of the Steering Wheel with Anti-fatigue Driving for Vehicles Based on Pattern Recognition
· Design of Distributed Greenhouse Big Awning Monitoring System Based on Field-bus
· Hand-Motion Crane Control Using Radio-Frequency Real-Time Location Systems
· A New Method for Detecting Leaks in Underground Water Pipelines
· Multiple-Target Tracking for Intelligent Headlights Control
· Study on the Embedded CAN Bus Control System in the Vehicle
· On the Impact of Virtual Traffic Lights on Carbon Emissions Mitigation
· Ship Detection with Wireless Sensor Networks
· A Wireless Surveillance and Safety System for Mine Workers based on Zigbee
· Design a wireless capacitive sensor detection system with power line communication for liquid volume of intravenous drip measurement
· Low Cost Weather Station with Remote Control
· Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems
· Energy-Aware Pipeline Monitoring System Using Piezoelectric Sensor
· Identification of Missing Objects with Group Coding of RF tags
· In-Building Lighting Management System with Wireless Communications
· Intelligent wireless street lighting system
· Zigbee Based Energy Efficient Outdoor Lighting Control System
· Multi sensor Railway Track Geometry Surveying System
· Bus Monitoring System Based On Zigbee And GPRS
· A Real-Time Conductor Sag Measurement System Using a Differential GPS
· Wireless Black Box Using MEMS Accelerometer and GPS Tracking for Accidental Monitoring of Vehicles
· Automatic Measurement and Reporting System of Water Quality Based on GSM
· Aided Navigation Techniques for Indoor and Outdoor Unmanned Vehicles
· Design of Concealed Alarm System Based on GSM
· Positioning and Tracing System Study Of All Terrain Forest Fire Patrolling and Fighting Vehicle
· Remote Energy Monitoring, Profiling and Control Through GSM Network
· Realization of Intelligence Monitoring System Based on Remote Sensor Technology
· The Design and Implementation of Remote Real Time Monitor System for Embedded Devices Based on GPRS
· Design of Intelligent Home Appliance Control System Based on ARM and Zigbee
· MEMS Accelerometer Based Nonspecific-User Hand Gesture Recognition
· Optical Device Indicating a Safe Free Path to Blind People
· Target Detection and Classification Using Seismic and PIR Sensors
· Automatic Detection and Recognition of Road Sign forDriver Assistance System
· Design of User Specific Intelligent Cell Phone Jammer
· Embedded System Integrated Into a Wireless Sensor Network for Online Dynamic Torque and Efficiency Monitoring in Induction Motors
· Battery Energy Storage for Enabling Integration of Distributed Solar Power Generation
· Smart Solar Home System with Safety Device Low Voltage Alert
· Compact Emergency Lamp Using Power LEDs
· Hybrid Optoelectronic Sensor for Current and Temperature Monitoring in Overhead Transmission Lines
· Low Cost Solar ECG with Bluetooth transmitter
· Design and Performance Analysis of Water Pumping Using Solar PV
· Energy Monitoring System using Sensor Networks in Residential Houses
· Smart Charge: Cutting the Electricity Bill in Smart Homes with Energy Storage
· Design Optimization of TRIAC-Dimmable AC-DC Converter in LED Lighting
· Research on an Improved PWM Control Mode of DC Motor
· Design for Middle-Way of Intelligent Energy-Saving System with Embedded System
· A Fast and Easy-to-Use ECG Acquisition and Heart Rate Monitoring System Using a Wireless Steering Wheel.
· A Passive Radio-Frequency pH-Sensing Tag for Wireless Food-Quality Monitoring
· A Wearable Inertial Sensor Node for Body Motion Analysis
· Sensors-Based Wearable Systems for Monitoring of Human Movement and Falls
· A Single Supply Standard 8051 Microcontroller based Medical K-grade Isolation ECG Module with Graphics LCD
Dot Net Project Titles (IEEE 2012, 2011 Dot Net IEEE Project List)
DOT NET - CLOUD COMPUTING PROJECTS
CLOUD COMPUTING, 2012 IEEE PROJECT TITLES* Cloud Chamber A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants
* Cluster as a Service for self-deployable cloud applications
* A Cloud Infrastructure for Optimization of a Massive Parallel Sequencing Workflow
* A Multi-Objective Approach for Workflow Scheduling in Heterogeneous Environments
* Design and Implementation of a Secure Healthcare Social Cloud System
* Enhanced Energy-efficient Scheduling for Parallel Applications in Cloud
* A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
* A Seeded Cloud Approach to Health Cyberinfrastructure Preliminary Architecture Design and Case Applications
* A Time-series Pattern based Noise Generation Strategy for Privacy Protection in Cloud Computing
* An Autonomous Reliability Aware Negotiation Strategy for Cloud Computing Environments
* Mining Concept drifting Network traffic in cloud computing environments
* On Handling Large-Scale Polynomial Multiplications in Compute Cloud Environments using Divisible Load Paradigm
* Optical Networks for Grid and Cloud Computing Applications
* Automated Tagging for the Retrieval of Software Resources in Grid and Cloud Infrastructures
* Environmental and Disaster Sensing Using Cloud Computing Infrastructure
* Global Futures a Multithreaded Execution Model for Global Arrays-based Applications
* Optimal Reconfiguration of the Cloud Network for Maximum Energy Savings
* Performance Analysis of Cloud Computing Centers Using M =G=m=m_ r Queuing Systems
* Performance analysis of content-based mobile application on Content Delivery Networks
* Performance evaluation of multimedia services over wireless LAN using routing protocol Optimized Link State Routing (OLSR)
* Perspectives of UnaCloud An Opportunistic Cloud Computing Solution For Facilitating Research
* Pseudo Random Number Generation for Parallelized Jobs on Clusters
* Revenue Management for Cloud Providers - A Policy-based Approach under Stochastic Demand
* Scalable Join Queries in Cloud Data Stores
* SLA-based Optimization of Power and Migration Cost in Cloud Computing
* Time and Cost Sensitive Data-Intensive Computing on Hybrid Clouds
* Visualizing Nonmanifold and Singular Implicit Surfaces with Point Clouds
* CLOUDTPS: Scalable Transactions for Web Applications in the Cloud, IEEE 2011
* Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE 2011
* Heuristics Based Query Processing for Large RDF Graphs using Cloud Computing, IEEE 2011
* Improving Utilization of Infrastructure Clouds, IEEE 2011
* Multilevel intrusion detection system and log management in cloud computing, IEEE 2011
* Secure and Practical Outsourcing of Linear Programming in Cloud Computing, IEEE 2011
* Towards Secure and Dependable Storage Services in Cloud Computing, IEEE 2011
* Checkpoint-based Fault-tolerant Infrastructure for Virtualized Service Providers, IEEE 2010
* Dynamic Auction Mechanism for Cloud Resource Allocation, IEEE 2010
* Elastic Site - Using Clouds to Elastically Extend Site Resources, IEEE 2010
* Fuzzy Keyword Search over Encrypted Data in Cloud Computing, IEEE 2010
* Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, IEEE 2010
DOT NET - MOBILE COMPUTING PROJECTS
* A Fade-Level Skew-Laplace Signal Strength Model for Device-Free Localization with Wireless Networks
* A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks
* An MIMO Configuration Mode and MCS Level Selection Scheme by Fuzzy Q-Learning for HSPA Systems
* Channel Estimation for Opportunistic Spectrum Access Uniform and Random Sensing
* Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
* Delay Optimal Scheduling for Cognitive Radios with Cooperative Beamforming A Structured Matrix-Geometric Method
* Efficient Virtual Backbone Construction with Routing Cost Constraint in Wireless Networks Using Directional Antennas
* Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
* Modeling and Performance Analysis for Duty-Cycled MAC Protocols with Applications to S-MAC and X-MAC
* Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMACA Networks
* ProSpect A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel
* STORM A Framework for Integrated Routing, Scheduling and Traffic Management in Ad Hoc Networks
* The Boomerang Protocol Tying Data to Geographic Locations in Mobile Disconnected Networks
* Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks Computational Complexity and Efficient Approximations
* A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks, IEEE 2011
* Autonomous Deployment of Heterogeneous Mobile Sensors, IEEE 2011
* Effective Scheduling in Infrastructure Based Cognitive Radio Networks, IEEE 2011
* Fast Detection of Mobile Replica node attacks in wireless sensor networks, IEEE 2011
* Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems, IEEE 2011
* Mobile Sampling of Sensor Field Data Using Controlled Broadcast, IEEE 2011
* Model and Protocol for Energy-Efficient Routing over Mobile Ad Hoc Networks, IEEE 2011
* Throughput Optimization in Mobile Backbone Networks, IEEE 2011
* A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks, IEEE 2010
* Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService, IEEE 2010
* Energy-Optimal Scheduling with Dynamic Channel Acquisition in Wireless Downlinks, IEEE 2010
* On Multihop Distances in Wireless Sensor Networks with Random Node Locations, IEEE 2010
* Optimal Accounting Policies for AAA Systems in Mobile Telecommunications Networks, IEEE 2010
* VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks, IEEE 2010
* A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice, IEEE 2009
* A Tabu Searching Algorithm For Cluster Building in Wireless Sensor Networks, IEEE 2009
* Biased Random Walks in Uniform Wireless Networks, IEEE 2009
* Cell Breathing Techniques for Load Balancing in Wireless LANs, IEEE 2009
* An Gen3 based Authentication Protocol, IEEE 2009
* Contention-Aware Performance Analysis of Mobility-Assisted Routing, IEEE 2009
* Energy Maps For Mobile Wireless Networks, IEEE 2009
* Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks, IEEE 2009
* Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking, IEEE 2009
* Minimizing Recovery State in Geographic Ad Hoc Routing, IEEE 2009
* On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint Route, IEEE 2009
* Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks, IEEE 2009
* Random Cast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks, IEEE 2009
* Route Stability in MANETs under the Random Direction Mobility Model, IEEE 2009
DOT NET - KNOWLEDGE & DATA ENGINEERING
KNOWLEDGE AND DATA ENGINEERING, 2012 IEEE PROJECTS* A Decision-Theoretic Framework for Numerical Attribute Value Reconciliation
* Discriminative Feature Selection by Nonparametric Bayes Error Minimization
* EDISC A Class-Tailored Discretization Technique for Rule-Based Classification
* Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
* A Knowledge-Driven Approach to Activity Recognition in Smart Homes
* A Look-Ahead Approach to Secure Multiparty Protocols
* Adding Temporal Constraints to XML Schema
* Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
* Segmentation and Sampling of Moving Object Trajectories Based on Representativeness
* Using Rule Ontology in Repeated Rule Acquisition from Similar Web Sites
* Maximum Ambiguity-Based Sample Selection in Fuzzy Decision Tree Induction
* Protecting Location Privacy against Location-Dependent Attacks in Mobile Services
* Saturn Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems
* Combining Tag and Value Similarity for Data Extraction and Alignment
* Data Mining for XML Query-Answering Support
* Dense Subgraph Extraction with Application to Community Detection
* Efficient and Progressive Algorithms for Distributed Skyline Queries over Uncertain Data
* Efficient Computation of Range Aggregates against Uncertain Location-Based Queries
* Energy Efficient Schemes for Accuracy-Guaranteed Sensor Data Aggregation Using Scalable Counting
* Energy-Efficient Reverse Skyline Query Processing over Wireless Sensor Networks
* A Performance Anomaly Detection and Analysis Framework for DBMS Development
* A Unified Probabilistic Framework for Name Disambiguation in Digital Library
* Evaluating Path Queries over Frequently Updated Route Collections
* Extending Recommender Systems for Disjoint UserItem Sets The Conference Recommendation Problem
* Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias Detection
* Mining Online Reviews for Predicting Sales Performance A Case Study in the Movie Domain
* On the Complexity of View Update Analysis and Its Application to Annotation Propagation
* Weakly Supervised Joint Sentiment-Topic Detection from Text
* A Generic Multilevel Architecture for Time Series Prediction, IEEE 2011
* A Personalized Ontology Model for Web Information Gathering, IEEE 2011
* A Web Search Engine-Based Approach to Measure Semantic Similarity between Words, IEEE 2011
* Energy time series forecasting based on pattern sequence similarity, IEEE 2011
* Optimal Service Pricing for a Cloud Cache, IEEE 2011
* Publishing Search Logs—A Comparative Study of Privacy Guarantees, IEEE 2011
* Data Leakge Detection, IEEE 2011
* Anonymous Query processing in Road Networks, IEEE 2010
* Automated classification of customer e mails via association rule mining, IEEE 2010
* ISO-MAP: Energy-Efficient Contour Mapping in Wireless Sensor Networks, IEEE 2010
* LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs, IEEE 2010
* Record Matching over Query Results from Multiple Web Databases, IEEE 2010
* ViDE A Vision Based Approach for Deep Web Data Extraction, IEEE 2010
* Bridging Domains Using World Wide Knowledge for Transfer Learning, IEEE 2010
* A Relation-Based Page Rank Algorithm for Semantic Web Search Engines, IEEE 2009
* Clustering and Sequential Pattern Mining of Online Collaborative Learning Data, IEEE 2009
* Online Scheduling Sequential Objects with Periodicity for dynamic Information Dissemination, IEEE 2009
* Hardware enhanced association rule mining with Hashing and Pipelining, IEEE 2008
* Location-Based Spatial Queries with Data Sharing in Wireless Broadcast Environments, IEEE 2008
* Watermarking Relational Databases Using Optimization Based Techniques, IEEE 2008
* DRYADEPARENT An Efficient and Robust Closed Attribute Tree Mining Algorithm, IEEE 2008
DOT NET - NETWORKING PROJECTS
NETWORKING, 2012 IEEE PROJECTS* A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization
* Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using -Structures
* Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks
* Adaptive Selective Verification An Efficient Adaptive Countermeasure to Thwart DoS Attacks
* Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
* Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks
* Congestion-Dependent Pricing and Forward Contracts for Complementary Segments of a Communication Network
* Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
* Design of Wireless Sensor Networks for Mobile Target Detection
* Efficient Network Tomography for Internet Topology Discovery
* Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
* ESM Efficient and Scalable Data Center Multicast Routing
* On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths
* Reliable Collective Communications With Weighted SRLGs in Optical Networks
* A Novel Approach for Failure Localization in All-Optical Mesh Networks, IEEE 2011
* Continuous Neighbor Discovery in Asynchronous Sensor Networks, IEEE 2011
* Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks, IEEE 2011
* Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration, IEEE 2011
* Jamming Aware Traffic Allocation for Multiple Path Routing Using Portfolio Selection, IEEE 2011
* Tofu:semi truthful online frequency allocation mechanism for wireless networks, IEEE 2011
* Service Overlay Network Capacity Adaptation for Profit Maximization, IEEE 2010
* Improving TLS Security By Quantum Cryptography, IEEE 2010
* Conditional Shortest Path Routing in Delay Tolerant Networks, IEEE 2010
* Constrained Relay Node Placement in Wireless Sensor Networks Formulation and Approximations, IEEE 2010
* Demand-Aware Content Distribution on the Internet, IEEE 2010
* On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow, IEEE 2010
* Privacy Aware Role Based Access Control, IEEE 2010
* S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks, IEEE 2010
* PRESTO Feedback-Driven Data Management in Sensor Networks, IEEE 2009
* Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks, IEEE 2009
* Explicit Load Balancing Technique for NGEO Satellite Ip Networks With On-Board Processing Capabilities, IEEE 2009
* Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications, IEEE 2009
* Virus Spread in Networks, IEEE 2009
* Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic, IEEE 2009
* Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services, IEEE 2009
* Secure and Policy-Complaint Source Routing, IEEE 2009
* Single-Link Failure Detection in All-Optical Networks, IEEE 2009
* Two Blocking Algorithm on Adaptive Binary Splitting Single and Pair Resolutions for RFID Tag Identification, IEEE 2009
* Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks, IEEE 2008
* Probabilistic Packet Marking For Large Scale IP Trace Back, IEEE 2008
* Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data, IEEE 2008
* A Distributed And Scalable Routing Table Manager For The Next Generation Of IP Routers, IEEE 2008
* Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case, IEEE 2008
* Efficient Broadcasting Using Network Coding, IEEE 2008
DOT NET - DEPENDABLE & SECURE COMPUTING
DEPENDABLE AND SECURE COMPUTING, 2012 IEEE PROJECTS* Automated Security Test Generation with Formal Threat Models
* Detecting and Resolving Firewall Policy Anomalies
* Detecting Anomalous Insiders in Collaborative Information Systems
* DoubleGuard Detecting Intrusions in Multitier Web Applications
* Enforcing Mandatory Access Control in Commodity OS to Disable Malware
* Enhanced Privacy ID A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
* Ensuring Distributed Accountability for Data Sharing in the Cloud
* Give2Get Forwarding in Social Mobile Wireless Networks of Selfish Individuals
* Incentive Compatible Privacy-Preserving Distributed Classification
* Iterative Trust and Reputation Management Using Belief Propagation
* JS-Reduce Defending Your Data from Sequential Background Knowledge Attacks
* Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts
* On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks
* Remote Attestation with Domain-Based Integrity Model and Policy Analysis
* Resilient Authenticated Execution of Critical Applications in Untrusted Environments
* Secure Failure Detection and Consensus in TrustedPals
* A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree, IEEE 2011
* Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks, IEEE 2011
* ELMO:Energy aware local monitoring in sensor networks, IEEE 2011
* Layered Approach Using Conditional Random Fields for Intrusion Detection, IEEE 2010
* Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise, IEEE 2009
* The Effectiveness of Checksums for Embedded Control Networks, IEEE 2009
* Credit Card Fraud Detection Using Hidden Markov Models, IEEE 2008
* Temporal Portioning of Communication Resources in an Integrated Architecture, IEEE 2008
* Trustworthy Computing Under Resource Constraints With The Down Policy, IEEE 2008
DOT NET - PARALLEL & DISTRIBUTED SYSTEM
PARALLEL AND DISTRIBUTED SYSTEMS, 2012 IEEE PROJECTS* Reliable and Energy-Efficient Multipath Communications in Underwater Sensor Networks
* Topology Enhancements in Wireless Multihop Networks A Top-Down Approach
* A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming
* DRAGON Detection and Tracking of Dynamic Amorphous Events in Wireless Sensor Networks
* Embedded Transitive Closure Network for Runtime Deadlock Detection in Networks-on-Chip
* A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
* A Survey of Parallel Programming Models and Tools in the Multi and Many-Core Era
* An Online Data Access Prediction and Optimization Approach for Distributed Systems
* Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
* Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths
* Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
* Distributed Diagnosis of Dynamic Events in Partitionable Arbitrary Topology Networks
* Distributed Privacy-Preserving Access Control in Sensor Networks
* Energy-Efficient Capture of Stochastic Events under Periodic Network Coverage and Coordinated Sleep
* Large-Scale Transient Stability Simulation of Electrical Power Systems on Parallel GPUs
* On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling
* Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks
* Trustworthy Coordination of Web Services Atomic Transactions
* A Data Throughput prediction & optimized server for widely distributed many task computing, IEEE 2011
* Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud, IEEE 2011
* Network Immunization with Distributed Autonomy Oriented Entities, IEEE 2011
* Timing based scheme for rogue ap detection, IEEE 2011
* A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming, IEEE 2010
* Resource Bundles Using Aggregation for Statistical Large-Scale Resource Discovery and Management, IEEE 2010
* Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling, IEEE 2009
* Enforcing Minimum-Cost Multicast Routing against Shellfish Information Flows, IEEE 2009
* Movement-Assisted Connectivity Restoration in Wireless Sensor, 2009
* SORD A Fault-Resilient Service Overlay for Media Port Resource Discovery, IEEE 2009
* HBA Distributed Metadata Management for Large Cluster-Based Storage Systems, IEEE 2008
* Quiver On the Edge Consistent Scalable Edge Services, IEEE 2008
* An SSL Back-End Forwarding Scheme in Cluster-based Web Servers, IEEE 2007
* pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval, IEEE 2007
DOT NET - WIRELESS COMMUNICATIONS
* Clustering and Cluster-Based Routing Protocol for Delay-Tolerant Mobile Networks, IEEE 2010* Fast Algorithms for Joint Power Control and Scheduling in Wireless Networks, IEEE 2010
* Enhancing Cell-Edge Performance A Downlink Dynamic Interference Avoidance Scheme with Inter-Cell Coordination, IEEE 2010
* Fairness-Aware Radio Resource Management in Downlink OFDMA Cellular Relay Networks, IEEE 2010
* Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks, IEEE 2010
DOT NET - COMMUNICATION SYSTEM
2012 IEEE PROJECTS* A Fourier Based Method for Approximating the Joint Detection Probability in MIMO Communications
* Achieving Joint Diversity in Decode-and-Forward MIMO Relay Networks with Zero-Forcing Equalizers
* Characterization of OFDM Radio Link Under PLL-Based Oscillator Phase Noise and Multipath Fading Channel
* Performance Modeling and Analysis of Cognitive Mesh Networks
DOT NET - IMAGE PROCESSING
IMAGE PROCESSING, 2012 IEEE PROJECTS* A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications
* A Multiplicative Iterative Algorithm for Box-Constrained Penalized Likelihood Image Restoration
* Cognition and Removal of Impulse Noise With Uncertainty
* Combining Head Pose and Eye Location Information for Gaze Estimation
* Higher Degree Total Variation (HDTV) Regularization for Image Recovery
* Image Super-Resolution With Sparse Neighbor Embedding
* Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers
* Object Segmentation of Database Images by Dual Multiscale Morphological Reconstructions and Retrieval Applications
* Posterior-Mean Super-Resolution With a Causal Gaussian Markov Random Field Prior
* Wavelet-Based Compressed Sensing Using a Gaussian Scale Mixture Model
* Blind Separation of Image Sources via Adaptive Dictionary Learning
* ViBe: A Universal Background Subtraction Algorithm for Video Sequences, IEEE 2011
* Efficient 2-D Grayscale Morphological Transformations With Arbitrary Flat Structuring Elements, IEEE 2008
* Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light, IEEE 2008
* Active Learning Methods for Interactive Image Retrieval, IEEE 2008
* A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video, IEEE 2008
* Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High-Capacity Approach, IEEE 2008
* Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings, IEEE 2008
* Neural Networks for Unicode Optical Character Recognition, IEEE 2008
DOT NET - NETWORK AND SERVICE MANAGEMENT
2012 IEEE PROJECTS* A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services
* A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments
* A Security Management Architecture for Supporting Routing Services on WANETs
* Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
DOT NET - SERVICES COMPUTING
2012 IEEE PROJECTS* A Dataflow-Based Scientific Workflow Composition Framework
* Dynamic Authentication for Cross-Realm SOA-Based Business Processes
* Expert Discovery and Interactions in Mixed Service-Oriented Systems
* Runtime Enforcement of Web Service Message Contracts with Data
DOT NET - SOFTWARE ENGINEERING
* An Autonomous Engine for Services Configuration and Deployment
* Comparing Semi-Automated Clustering Methods for Persona Development
* Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
* Exploiting Dynamic Information in IDEs Improves Speed and Correctness of Software Maintenance Tasks
* QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems
* StakeRare Using Social Networks and Collaborative Filtering for Large-Scale Requirements Elicitation
DOT NET - FUZZY SYSTEMS
2012 IEEE PROJECTS* A Generalization of Distance Functions for Fuzzy c -Means Clustering With Centroids of Arithmetic Means
* Adaptive Control Schemes for Discrete-Time T-S Fuzzy Systems With Unknown Parameters and Actuator Failures
* Grouping, Overlap, and Generalized Bientropic Functions for Fuzzy Modeling of Pairwise Comparisons
DOT NET - LEARNING TECHNOLOGIES
2012 IEEE PROJECTS* Case-Based Learning, Pedagogical Innovation, and Semantic Web Technologies
* Facilitating Trust in Privacy-Preserving E-Learning Environments
* Spatial Learning Using Locomotion Interface to Virtual Environment
* Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning
DOT NET - PATTERN ANALYSIS & MACHINE INTELLIGENCE
* A Closed-Form Solution to Tensor Voting Theory and Applications
* Bilinear Modeling via Augmented Lagrange Multipliers (BALM)
* Difference-Based Image Noise Modeling Using Skellam Distribution
* Discriminative Latent Models for Recognizing Contextual Group Activities
* Edge Structure Preserving 3D Image Denoising by Local Surface Approximation
* Fast Rotation Invariant 3D Feature Computation Utilizing Efficient Local Neighborhood Operators
* IntentSearch Capturing User Intention for One-Click Internet Image Search
* Trainable Convolution Filters and Their Application to Face Recognition
DOT NET - OTHERS
* One Size Does Not Fit All: A Group-Based Service Selection for Web-Based Business Processes - Adv Information Networking, IEEE 2011* Adaptive provisioning of human expertise in service-oriented systems - Applied Computing, IEEE 2011
* Bridging Socially-Enhanced Virtual Communities - Applied Computing, IEEE 2011
* Data integrity proofs in cloud storage - Communication Systems and Networks, IEEE 2011
* Secure Neighbor Discovery in Mobile Ad Hoc Networks - Mobile adhoc networks, IEEE 2011
* Monitoring Service Systems from a Language-Action Perspective - Services Computing, IEEE 2011
* The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor? - Software Engineering, IEEE 2011
* An Intrusion Detection model fuzzy class assocation rule mining using genetic network programming - Systems and cybernetics, IEEE 2011
* A bounded and adaptive memory based approach to mine frequent patterns from very large database - Systems, man, and cybernetics, IEEE 2011
* Improving the perfotmance of wireless adhoc network by using MAC Layer Design - Wireless communication, IEEE 2011
* Multicast Multipath Power Efficient Routingin Mobile Adhoc - Computer Science And Network Security, IEEE 2010
* Edge Adaptive Image Steganography Based on LSB Matching Revisited - Information Forensics And Security, IEEE 2010
* Data Mining for Risk Management in Hospital Information Systems - Medical Engineering, IEEE 2010
* Slow Adaptive OFDMA Systems Through Chance Constrained Programming - Signal Processing, IEEE 2010
* Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks A Game-Theoretic Modeling Approach – Computer Theory And Engineering, IEEE 2009
* A New Model For Dissemination Of XML Content – Systems, Man, And Cybernetics, IEEE 2008
* Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision - Transportation System, IEEE 2008
* Schema Conversion from Relation to XML with Semantic Constraints – Fuzzy Systems And Knowledge Discovery, IEEE 2007
* E-Secure Transactions - Secure Electronic Data Interchange over Internet – Internet Computing, IEEE 2005
* Estimation of Defects Based On Defect Decay Model ED3M - Software Engineering, IEEE 2008
* Effective Software Merging in the Presence of Object-Oriented Refactorings - Software Engineering, IEEE 2008
* Provable Protection Against Web Application Vulnerabilities Related to Session Data Dependencies - Software Engineering, IEEE 2008
Tuesday, July 24, 2012
Java Project Titles (IEEE 2012, 2011 Java IEEE Project List)
JAVA MOBILE COMPUTING PROJECTS
JAVA MOBILE COMPUTING, 2012 IEEE PROJECTS
* A Fade-Level Skew-Laplace Signal Strength Model for Device-Free Localization with Wireless Networks
* A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks
* An MIMO Configuration Mode and MCS Level Selection Scheme by Fuzzy Q-Learning for HSPA_ Systems
* Approximation Algorithms for Data Broadcast in Wireless Networks
* Chameleon A Color-Adaptive Web Browser for Mobile OLED Displays
* Channel Estimation for Opportunistic Spectrum Access Uniform and Random Sensing
* Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
* Controlled mobility sensor networks for target tracking using ant colony optimization
* Delay Optimal Scheduling for Cognitive Radios with Cooperative Beamforming A Structured Matrix-Geometric Method
* Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks
* Efficient and Fair Bandwidth Allocation in Multi-Channel Cognitive Radio Networks
* Efficient Virtual Backbone Construction with Routing Cost Constraint in Wireless Networks Using Directional Antennas
* FESCIM Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks
* Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks Investigation of Context Prediction Accuracy for Different Context Abstraction Levels
* Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design
* Modeling and Performance Analysis for Duty-Cycled MAC Protocols with Applications to S-MAC and X-MAC
* Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMACA Networks
* Nature-Inspired Self-Organization, Control, and Optimization in Heterogeneous Wireless Networks
* On the Cost of Knowledge of Mobility in Dynamic Networks An Information-Theoretic Approach
* On the Vulnerabilities of CSI in MIMO Wireless Communication Systems
* ProSpect A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel
* STORM A Framework for Integrated Routing, Scheduling and Traffic Management in Ad Hoc Networks
* The Boomerang Protocol Tying Data to Geographic Locations in Mobile Disconnected Networks
* Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks Computational Complexity and Efficient Approximations
* Understanding Node Localizability of Wire-less Ad-hoc and Sensor Networks
* A Privacy preseving location monitoring system for wireless sensor Network, IEEE 2011
* BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks, IEEE 2011
* Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks, IEEE 2011
* Dynamic Switching based data forwarding for low duty cycle wireless sensor networks, IEEE 2011
* Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems, IEEE 2011
* Mobile Sampling of Sensor Field Data using controlled Broadcast, IEEE 2011
* Multicast Throughput for Hybrid Wireless Networks under Gaussian Channel Model, IEEE 2011
* On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents, IEEE 2011
* Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE 2011
* Spatial -Temporal Coverage optimization in wireless Sensor Network, IEEE 2011
* Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks, IEEE 2011
* A Scalable and Energy Efficient Context Monitoring Framework for Mobile Personal, IEEE 2010
* Energy-Efficient VoIP over Wireless LANs, IEEE 2010
* Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks, IEEE 2010
* MABS Multicast Authentication Based on Batch Signature, IEEE 2010
* Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink, IEEE 2010
* Optimal Jamming Attack Strategies and Network Defense, IEEE 2010
* Secure Data Collection in Wireless Sensor netwoks using Randomised Desperive Routes, IEEE 2010
* TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks, IEEE 2010
* A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice, IEEE 2009
* Contention-Aware Performance Analysis of Mobility-Assisted Routing, IEEE 2009
* Energy Maps For Mobile Wireless networks coherence Time Versus Spreading Period, IEEE 2009
* Energy-Efficient SINR-Based Routing for Multihop Wireless, IEEE 2009
* Mobility Management Approaches for Mobile IP Networks, IEEE 2009
* Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks, IEEE 2009
* Continuous Monitoring of Spatial Queries in Wireless Broadcast, IEEE 2009
* RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks, IEEE 2009
* Large Connectivity for Dynamic Random Geometric Graphs, IEEE 2009
* Mitigation of Control Channel Jamming Under Node Capture Attacks, IEEE 2009
* Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless, IEEE 2008
* Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks, IEEE 2008
* Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks, IEEE 2008
* A Fade-Level Skew-Laplace Signal Strength Model for Device-Free Localization with Wireless Networks
* A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks
* An MIMO Configuration Mode and MCS Level Selection Scheme by Fuzzy Q-Learning for HSPA_ Systems
* Approximation Algorithms for Data Broadcast in Wireless Networks
* Chameleon A Color-Adaptive Web Browser for Mobile OLED Displays
* Channel Estimation for Opportunistic Spectrum Access Uniform and Random Sensing
* Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
* Controlled mobility sensor networks for target tracking using ant colony optimization
* Delay Optimal Scheduling for Cognitive Radios with Cooperative Beamforming A Structured Matrix-Geometric Method
* Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks
* Efficient and Fair Bandwidth Allocation in Multi-Channel Cognitive Radio Networks
* Efficient Virtual Backbone Construction with Routing Cost Constraint in Wireless Networks Using Directional Antennas
* FESCIM Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks
* Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks Investigation of Context Prediction Accuracy for Different Context Abstraction Levels
* Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design
* Modeling and Performance Analysis for Duty-Cycled MAC Protocols with Applications to S-MAC and X-MAC
* Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMACA Networks
* Nature-Inspired Self-Organization, Control, and Optimization in Heterogeneous Wireless Networks
* On the Cost of Knowledge of Mobility in Dynamic Networks An Information-Theoretic Approach
* On the Vulnerabilities of CSI in MIMO Wireless Communication Systems
* ProSpect A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel
* STORM A Framework for Integrated Routing, Scheduling and Traffic Management in Ad Hoc Networks
* The Boomerang Protocol Tying Data to Geographic Locations in Mobile Disconnected Networks
* Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks Computational Complexity and Efficient Approximations
* Understanding Node Localizability of Wire-less Ad-hoc and Sensor Networks
* A Privacy preseving location monitoring system for wireless sensor Network, IEEE 2011
* BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks, IEEE 2011
* Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks, IEEE 2011
* Dynamic Switching based data forwarding for low duty cycle wireless sensor networks, IEEE 2011
* Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems, IEEE 2011
* Mobile Sampling of Sensor Field Data using controlled Broadcast, IEEE 2011
* Multicast Throughput for Hybrid Wireless Networks under Gaussian Channel Model, IEEE 2011
* On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents, IEEE 2011
* Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE 2011
* Spatial -Temporal Coverage optimization in wireless Sensor Network, IEEE 2011
* Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks, IEEE 2011
* A Scalable and Energy Efficient Context Monitoring Framework for Mobile Personal, IEEE 2010
* Energy-Efficient VoIP over Wireless LANs, IEEE 2010
* Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks, IEEE 2010
* MABS Multicast Authentication Based on Batch Signature, IEEE 2010
* Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink, IEEE 2010
* Optimal Jamming Attack Strategies and Network Defense, IEEE 2010
* Secure Data Collection in Wireless Sensor netwoks using Randomised Desperive Routes, IEEE 2010
* TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks, IEEE 2010
* A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice, IEEE 2009
* Contention-Aware Performance Analysis of Mobility-Assisted Routing, IEEE 2009
* Energy Maps For Mobile Wireless networks coherence Time Versus Spreading Period, IEEE 2009
* Energy-Efficient SINR-Based Routing for Multihop Wireless, IEEE 2009
* Mobility Management Approaches for Mobile IP Networks, IEEE 2009
* Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks, IEEE 2009
* Continuous Monitoring of Spatial Queries in Wireless Broadcast, IEEE 2009
* RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks, IEEE 2009
* Large Connectivity for Dynamic Random Geometric Graphs, IEEE 2009
* Mitigation of Control Channel Jamming Under Node Capture Attacks, IEEE 2009
* Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless, IEEE 2008
* Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks, IEEE 2008
* Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks, IEEE 2008
JAVA NETWORKING PROJECTS
JAVA NETWORKING, 2012 IEEE PROJECTS
* A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization
* A Theory for the Connectivity Discovered by Routing Protocols
* Accelerating Multipattern Matching on Compressed HTTP Traffic
* Adaptive Selective Verification An Efficient Adaptive Countermeasure to Thwart DoS Attacks
* Balancing Reliability and Utilization in Dynamic Spectrum Access
* Concise Lookup Tables for IPv4 and IPv6 Longest Prefix Matching in Scalable Routers
* Congestion-Dependent Pricing and Forward Contracts for Complementary Segments of a Communication Network
* Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
* Design of Wireless Sensor Networks for Mobile Target Detection
* Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using -Structures
* Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks
* Efficient Network Tomography for Internet Topology Discovery
* Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
* ESM Efficient and Scalable Data Center Multicast Routing
* Greedy Geographic Routing in Large-Scale Sensor Networks A Minimum Network Decomposition Approach
* Multicast Performance With Hierarchical Cooperation
* On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths
* Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
* Performance of PCN-Based Admission Control Under Challenging Conditions
* Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks
* Reliable Collective Communications With Weighted SRLGs in Optical Networks
* Router Support for Fine-Grained Latency Measurements
* Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection
* Spatio-Temporal Compressive Sensing and Internet Traffic Matrices (Extended Version)
* Component-Based Localization in Sparse Wireless Networks, IEEE 2011
* Continuous Neighbor Discovery in Asynchronous Sensor Networks, IEEE 2011
* Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks, IEEE 2011
* Design and Implementation of a Fast Dynamic Packet Filter, IEEE 2011
* Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration, IEEE 2011
* Forward Correction and Fountain Codes in Delay-Tolerant Networks, IEEE 2011
* Jamming Aware traffic allocation for multipath routing using Routing using portfolio Selection, IEEE 2011
* Live Streaming With Receiver-Based Peer-Division Multiplexing, IEEE 2011
* Model-Based Identification of Dominant Congested Links, IEEE 2011
* On the Complexity of the Regenerator Placement Problem in Optical Networks, IEEE 2011
* Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks, IEEE 2011
* Parametric Methods for Anomaly Detection in Aggregate Traffic, IEEE 2011
* Performance analysis of an unclosed CSMA in the multi channel cognitive radio networks, IEEE 2011
* Prog ME - Towards Programmable Network Measurement, IEEE 2011
* ROC Resilient Online Coverage for Surveillance Applications, IEEE 2011
* Throughput-Competitive Advance Reservation With Bounded Path Dispersion, IEEE 2011
* TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks, IEEE 2011
* Topological Transformation Approaches to TCAM-Based Packet Classification, IEEE 2011
* Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks, IEEE 2010
* Conditional Shortest Path Routing in Delay Tolerant Networks, IEEE 2010
* Constrained Relay node placement in Wireless Sensor Network, IEEE 2010
* Demand-Aware Content Distribution on the Internet, IEEE 2010
* Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks, IEEE 2010
* Host-to-Host Congestion Control for TCP, IEEE 2010
* Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks, IEEE 2010
* Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast, IEEE 2010
* On Multihop Distances in Wireless Sensor Networks with Random Node Locations, IEEE 2010
* POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority, IEEE 2010
* Rendered Path Range-Free Localization in Anisotropic Sensor Networks With Holes, IEEE 2010
* TCAM Razor A Systematic Approach Towards Minimizing Packet Classifiers in TCAMS, IEEE 2010
* The Optimality of Two PricesMaximizing Revenue in a stochastic Communication System, IEEE 2010
* Virtual Database Technology for Distributed Database, IEEE 2010
* Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks, IEEE 2009
* A New Reliable Broadcasting in Mobile Ad Hoc Networks, IEEE 2009
* A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution, IEEE 2009
* Anonymity in Wireless Broadcast Networks, IEEE 2009
* Capturing Router Congestion and Delay, IEEE 2009
* Channel Access Protocols for Multihop Opportunistic Networks, Challenges and Recent Developments, IEEE 2009
* Entropy Based Adaptive Flow Aggregation, IEEE 2009
* Measuring Capacity Bandwidth of Targeted Path Segments, IEEE 2009
* Monitoring the Application-Layer DDoS Attacks for Popular Websites, IEEE 2009
* Multiple Routing Configurations for Fast IP Network Recovery, IEEE 2009
* Node Isolation model and age-based neighbor selection in unstructured P2P networks, IEEE 2009
* SIMPS Using Sociology for Personal Mobility, IEEE 2009
* A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization
* A Theory for the Connectivity Discovered by Routing Protocols
* Accelerating Multipattern Matching on Compressed HTTP Traffic
* Adaptive Selective Verification An Efficient Adaptive Countermeasure to Thwart DoS Attacks
* Balancing Reliability and Utilization in Dynamic Spectrum Access
* Concise Lookup Tables for IPv4 and IPv6 Longest Prefix Matching in Scalable Routers
* Congestion-Dependent Pricing and Forward Contracts for Complementary Segments of a Communication Network
* Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
* Design of Wireless Sensor Networks for Mobile Target Detection
* Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using -Structures
* Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks
* Efficient Network Tomography for Internet Topology Discovery
* Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
* ESM Efficient and Scalable Data Center Multicast Routing
* Greedy Geographic Routing in Large-Scale Sensor Networks A Minimum Network Decomposition Approach
* Multicast Performance With Hierarchical Cooperation
* On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths
* Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
* Performance of PCN-Based Admission Control Under Challenging Conditions
* Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks
* Reliable Collective Communications With Weighted SRLGs in Optical Networks
* Router Support for Fine-Grained Latency Measurements
* Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection
* Spatio-Temporal Compressive Sensing and Internet Traffic Matrices (Extended Version)
* Component-Based Localization in Sparse Wireless Networks, IEEE 2011
* Continuous Neighbor Discovery in Asynchronous Sensor Networks, IEEE 2011
* Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks, IEEE 2011
* Design and Implementation of a Fast Dynamic Packet Filter, IEEE 2011
* Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration, IEEE 2011
* Forward Correction and Fountain Codes in Delay-Tolerant Networks, IEEE 2011
* Jamming Aware traffic allocation for multipath routing using Routing using portfolio Selection, IEEE 2011
* Live Streaming With Receiver-Based Peer-Division Multiplexing, IEEE 2011
* Model-Based Identification of Dominant Congested Links, IEEE 2011
* On the Complexity of the Regenerator Placement Problem in Optical Networks, IEEE 2011
* Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks, IEEE 2011
* Parametric Methods for Anomaly Detection in Aggregate Traffic, IEEE 2011
* Performance analysis of an unclosed CSMA in the multi channel cognitive radio networks, IEEE 2011
* Prog ME - Towards Programmable Network Measurement, IEEE 2011
* ROC Resilient Online Coverage for Surveillance Applications, IEEE 2011
* Throughput-Competitive Advance Reservation With Bounded Path Dispersion, IEEE 2011
* TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks, IEEE 2011
* Topological Transformation Approaches to TCAM-Based Packet Classification, IEEE 2011
* Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks, IEEE 2010
* Conditional Shortest Path Routing in Delay Tolerant Networks, IEEE 2010
* Constrained Relay node placement in Wireless Sensor Network, IEEE 2010
* Demand-Aware Content Distribution on the Internet, IEEE 2010
* Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks, IEEE 2010
* Host-to-Host Congestion Control for TCP, IEEE 2010
* Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks, IEEE 2010
* Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast, IEEE 2010
* On Multihop Distances in Wireless Sensor Networks with Random Node Locations, IEEE 2010
* POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority, IEEE 2010
* Rendered Path Range-Free Localization in Anisotropic Sensor Networks With Holes, IEEE 2010
* TCAM Razor A Systematic Approach Towards Minimizing Packet Classifiers in TCAMS, IEEE 2010
* The Optimality of Two PricesMaximizing Revenue in a stochastic Communication System, IEEE 2010
* Virtual Database Technology for Distributed Database, IEEE 2010
* Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks, IEEE 2009
* A New Reliable Broadcasting in Mobile Ad Hoc Networks, IEEE 2009
* A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution, IEEE 2009
* Anonymity in Wireless Broadcast Networks, IEEE 2009
* Capturing Router Congestion and Delay, IEEE 2009
* Channel Access Protocols for Multihop Opportunistic Networks, Challenges and Recent Developments, IEEE 2009
* Entropy Based Adaptive Flow Aggregation, IEEE 2009
* Measuring Capacity Bandwidth of Targeted Path Segments, IEEE 2009
* Monitoring the Application-Layer DDoS Attacks for Popular Websites, IEEE 2009
* Multiple Routing Configurations for Fast IP Network Recovery, IEEE 2009
* Node Isolation model and age-based neighbor selection in unstructured P2P networks, IEEE 2009
* SIMPS Using Sociology for Personal Mobility, IEEE 2009
JAVA CLOUD COMPUTING PROJECTS
JAVA CLOUD COMPUTING, 2012 IEEE PROJECTS
* A Cloud Infrastructure for Optimization of a Massive Parallel Sequencing Workflow
* A Multi-Objective Approach for Workflow Scheduling in Heterogeneous Environments
* A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
* A Seeded Cloud Approach to Health Cyberinfrastructure Preliminary Architecture Design and Case Applications
* A Time-series Pattern based Noise Generation Strategy for Privacy Protection in Cloud Computing
* An Autonomous Reliability Aware NEgotiation Strategy for Cloud Computing Environments
* Automated Tagging for the Retrieval of Software Resources in Grid and Cloud Infrastructures
* Automating Data-Throttling Analysis for Data-Intensive Workflows
* Cloud Chamber A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants
* Cluster as a Service for self-deployable cloud applications
* Design and Implementation of a Secure Healthcare Social Cloud System
* Enhanced Energy-efficient Scheduling for Parallel Applications in Cloud
* Environmental and Disaster Sensing Using Cloud Computing Infrastructure
* Framework on Large Public Sector Implementation of Cloud Computing
* Global Futures a Multithreaded Execution Model for Global Arrays-based Applications
* Lightweight Resource Scaling for Cloud Applications
* Mining Concept drifting Network traffic in cloud computing environments
* On Handling Large-Scale Polynomial Multiplications in Compute Cloud Environments using Divisible Load Paradigm
* Optimal Reconfiguration of the Cloud Network for Maximum Energy Savings
* Performance Analysis of Cloud Computing Centers Using M =G=m=m_ r Queuing Systems
* Performance analysis of supporting QoS for multimedia in IEEE 802.11e
* Performance evaluation of multimedia services over wireless LAN using routing protocol Optimized Link State Routing (OLSR)
* Perspectives of UnaCloud An Opportunistic Cloud Computing Solution For Facilitating Research
* Pseudo Random Number Generation for Parallelized Jobs on Clusters
* Revenue Management for Cloud Providers - A Policy-based Approach under Stochastic Demand
* Reward Scheduling for QoS in Cloud Applications
* SLA-based Optimization of Power and Migration Cost in Cloud Computing
* Visualizing Nonmanifold and Singular Implicit Surfaces with Point Clouds
* A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service, IEEE 2011
* Enabling public Auditability and data dynamics for storage security in clouding Computing, IEEE 2011
* Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud, IEEE 2011
* Going Back and forth Efficient Multideployment and multisnap shotting on clouds, IEEE 2011
* Modeling and Analysis of Cloud Computing Availability based on Eucalyptus Platform for E-Government Data Center, IEEE 2011
* Towards Secure and Dependable Storage Services in Cloud Computing, IEEE 2011
* A Cloud Infrastructure for Optimization of a Massive Parallel Sequencing Workflow
* A Multi-Objective Approach for Workflow Scheduling in Heterogeneous Environments
* A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
* A Seeded Cloud Approach to Health Cyberinfrastructure Preliminary Architecture Design and Case Applications
* A Time-series Pattern based Noise Generation Strategy for Privacy Protection in Cloud Computing
* An Autonomous Reliability Aware NEgotiation Strategy for Cloud Computing Environments
* Automated Tagging for the Retrieval of Software Resources in Grid and Cloud Infrastructures
* Automating Data-Throttling Analysis for Data-Intensive Workflows
* Cloud Chamber A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants
* Cluster as a Service for self-deployable cloud applications
* Design and Implementation of a Secure Healthcare Social Cloud System
* Enhanced Energy-efficient Scheduling for Parallel Applications in Cloud
* Environmental and Disaster Sensing Using Cloud Computing Infrastructure
* Framework on Large Public Sector Implementation of Cloud Computing
* Global Futures a Multithreaded Execution Model for Global Arrays-based Applications
* Lightweight Resource Scaling for Cloud Applications
* Mining Concept drifting Network traffic in cloud computing environments
* On Handling Large-Scale Polynomial Multiplications in Compute Cloud Environments using Divisible Load Paradigm
* Optimal Reconfiguration of the Cloud Network for Maximum Energy Savings
* Performance Analysis of Cloud Computing Centers Using M =G=m=m_ r Queuing Systems
* Performance analysis of supporting QoS for multimedia in IEEE 802.11e
* Performance evaluation of multimedia services over wireless LAN using routing protocol Optimized Link State Routing (OLSR)
* Perspectives of UnaCloud An Opportunistic Cloud Computing Solution For Facilitating Research
* Pseudo Random Number Generation for Parallelized Jobs on Clusters
* Revenue Management for Cloud Providers - A Policy-based Approach under Stochastic Demand
* Reward Scheduling for QoS in Cloud Applications
* SLA-based Optimization of Power and Migration Cost in Cloud Computing
* Visualizing Nonmanifold and Singular Implicit Surfaces with Point Clouds
* A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service, IEEE 2011
* Enabling public Auditability and data dynamics for storage security in clouding Computing, IEEE 2011
* Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud, IEEE 2011
* Going Back and forth Efficient Multideployment and multisnap shotting on clouds, IEEE 2011
* Modeling and Analysis of Cloud Computing Availability based on Eucalyptus Platform for E-Government Data Center, IEEE 2011
* Towards Secure and Dependable Storage Services in Cloud Computing, IEEE 2011
JAVA DEPENDABLE & SECURE COMPUTING
JAVA DEPENDABLE AND SECURE COMPUTING, 2012 IEEE PROJECTS
* Packet Hiding Method For Preventing Selective Jamming Attacks
* Secure Trust:- A dynamic trust compilation model for secured communication in multiagent system
* Automated Security Test Generation with Formal Threat Models
* Detecting and Resolving Firewall Policy Anomalies
* Detecting Anomalous Insiders in Collaborative Information Systems
* Enforcing Mandatory Access Control in Commodity OS to Disable Malware
* Enhanced Privacy ID A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
* Ensuring Distributed Accountability for Data Sharing in the Cloud
* Give2Get Forwarding in Social Mobile Wireless Networks of Selfish Individuals
* Iterative Trust and Reputation Management Using Belief Propagation
* JS-Reduce Defending Your Data from Sequential Background Knowledge Attacks
* Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts
* On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks
* Remote Attestation with Domain-Based Integrity Model and Policy Analysis
* Resilient Authenticated Execution of Critical Applications in Untrusted Environments
* ZoneTrust Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing
* Analyzing a Family of Key Protection Schemes against Modification Attacks, IEEE 2011
* Anomaly Detection in Network Traffic Based on Statistical Inference and -Stable Modeling, IEEE 2011
* Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks, IEEE 2011
* Modeling and Detection of Camouflaging Worm, IEEE 2011
* Nymble: Blocking Misbehaving Users in Anonymizing Networks, IEEE 2011
* Packet-Hiding Methods for Preventing Selective Jamming Attacks, IEEE 2011
* Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking, IEEE 2011
* SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks, IEEE 2011
* Layered Approach Using Conditional Random Fields for Intrusion Detection, IEEE 2010
* SiGFree A signature based free buffer overflow attack blocker, IEEE 2010
* Secure Data Objects Replication in Data Grid, IEEE 2010
* Evaluating the Vulnerability of Network Traffic Using Joint, IEEE 2009
* Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing, IEEE 2009
* Security Analysis of the SASI Protocol, IEEE 2009
* Modeling & Automated Containment of Worms, IEEE 2008
* Controlling IP Spoofing Through Inter Domain Packet Filters, IEEE 2008
* A Precise Termination Condition of the Probabilistic Packet Marking Algorithm, IEEE 2008
* An Adaptive Programming Model for Fault Tolerant Distributed Computing, IEEE 2007
* Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes, IEEE 2007
* Packet Hiding Method For Preventing Selective Jamming Attacks
* Secure Trust:- A dynamic trust compilation model for secured communication in multiagent system
* Automated Security Test Generation with Formal Threat Models
* Detecting and Resolving Firewall Policy Anomalies
* Detecting Anomalous Insiders in Collaborative Information Systems
* Enforcing Mandatory Access Control in Commodity OS to Disable Malware
* Enhanced Privacy ID A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
* Ensuring Distributed Accountability for Data Sharing in the Cloud
* Give2Get Forwarding in Social Mobile Wireless Networks of Selfish Individuals
* Iterative Trust and Reputation Management Using Belief Propagation
* JS-Reduce Defending Your Data from Sequential Background Knowledge Attacks
* Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts
* On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks
* Remote Attestation with Domain-Based Integrity Model and Policy Analysis
* Resilient Authenticated Execution of Critical Applications in Untrusted Environments
* ZoneTrust Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing
* Analyzing a Family of Key Protection Schemes against Modification Attacks, IEEE 2011
* Anomaly Detection in Network Traffic Based on Statistical Inference and -Stable Modeling, IEEE 2011
* Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks, IEEE 2011
* Modeling and Detection of Camouflaging Worm, IEEE 2011
* Nymble: Blocking Misbehaving Users in Anonymizing Networks, IEEE 2011
* Packet-Hiding Methods for Preventing Selective Jamming Attacks, IEEE 2011
* Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking, IEEE 2011
* SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks, IEEE 2011
* Layered Approach Using Conditional Random Fields for Intrusion Detection, IEEE 2010
* SiGFree A signature based free buffer overflow attack blocker, IEEE 2010
* Secure Data Objects Replication in Data Grid, IEEE 2010
* Evaluating the Vulnerability of Network Traffic Using Joint, IEEE 2009
* Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing, IEEE 2009
* Security Analysis of the SASI Protocol, IEEE 2009
* Modeling & Automated Containment of Worms, IEEE 2008
* Controlling IP Spoofing Through Inter Domain Packet Filters, IEEE 2008
* A Precise Termination Condition of the Probabilistic Packet Marking Algorithm, IEEE 2008
* An Adaptive Programming Model for Fault Tolerant Distributed Computing, IEEE 2007
* Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes, IEEE 2007
JAVA KNOWLEDGE & DATA ENGINEERING
JAVA KNOWLEDGE AND DATA ENGINEERING, 2012 IEEE PROJECTS
* ROAD: A New Spatial Object Search Framework for Road Networks
* Slicing: A New Approach for Privacy Preserving Data Publishing
* A Decision-Theoretic Framework for Numerical Attribute Value Reconciliation
* A Knowledge-Driven Approach to Activity Recognition in Smart Homes
* A Look-Ahead Approach to Secure Multiparty Protocols
* A Performance Anomaly Detection and Analysis Framework for DBMS Development
* A Temporal Pattern Search Algorithm for Personal History Event Visualization
* A Unified Probabilistic Framework for Name Disambiguation in Digital Library
* Combining Tag and Value Similarity for Data Extraction and Alignment
* Data Mining for XML Query-Answering Support
* Dense Subgraph Extraction with Application to Community Detection
* Discriminative Feature Selection by Nonparametric Bayes Error Minimization
* EDISC A Class-Tailored Discretization Technique for Rule-Based Classification
* Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
* Efficient Computation of Range Aggregates against Uncertain Location-Based Queries
* Efficient Fuzzy Type-Ahead Search in XML Data
* Efficient Processing of Uncertain Events in Rule-Based Systems
* Energy Efficient Schemes for Accuracy-Guaranteed Sensor Data Aggregation Using Scalable Counting
* Energy-Efficient Reverse Skyline Query Processing over Wireless Sensor Networks
* Evaluating Path Queries over Frequently Updated Route Collections
* Extending Recommender Systems for Disjoint UserItem Sets The Conference Recommendation Problem
* Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias Detection
* Holistic Top-k Simple Shortest Path Join in Graphs
* Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
* Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
* Maximum Ambiguity-Based Sample Selection in Fuzzy Decision Tree Induction
* Mining Online Reviews for Predicting Sales Performance A Case Study in the Movie Domain
* On the Complexity of View Update Analysis and Its Application to Annotation Propagation
* Protecting Location Privacy against Location-Dependent Attacks in Mobile Services
* Saturn Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems
* Segmentation and Sampling of Moving Object Trajectories Based on Representativeness
* Using Rule Ontology in Repeated Rule Acquisition from Similar Web Sites
* A fuzzy self Constructing Feature Clustering Alg for text Classfication, IEEE 2011
* A Generic Multilevel Architecture for Time Series Prediction, IEEE 2011
* A Machine learning approach for identifying disease treatment relations in short test, IEEE 2011
* Adaptive Cluster Distance Bounding for High-Dimensional Indexing, IEEE 2011
* Analysis on Credit Card Fraud Detection Methods, IEEE 2011
* Continous Monitoring of distance based range query, IEEE 2011
* Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme, IEEE 2011
* Data Leakage Detection, IEEE 2011
* Data Mining to Generate Adverse Drug Events Detection Rules, IEEE 2011
* Decision Trees for Uncertain Data, IEEE 2011
* Finding Top-k Answers in Keyword Search over Relational Databases Using Tuple Units, IEEE 2011
* Adaptive Join Operators for Result Rate optimization, IEEE 2010
* False Negative Problem of Counting Bloom Filter, IEEE 2010
* FiVaTech Page-Level Web Data Extraction from Template Pages, IEEE 2010
* K-Anonymity in the Presence of External Databases, IEEE 2010
* LIGHT A Query-Efficient Yet Low-Maintenance --DHT, IEEE 2010
* PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects, IEEE 2010
* Prospective Infectious Disease Outbreak detection using Markov switching model, IEEE 2010
* Queries Optimization in SQL using Linear Recursion, IEEE 2010
* Approximate Distributed K-Means Clustering over a Peer-to-Peer Network, IEEE 2009
* OLEX : effective Rule Learning for Text Categorization, IEEE 2009
* ANGEL - Enhancing the Utility of Generalization for Privacy Preserving Publication, IEEE 2009
* Efficient Range Query Processing in Peer-to-Peer Systems, IEEE 2009
* Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments, IEEE 2008
* Online Index Recommendations for High-Dimensional Databases Using Query Workloads, IEEE 2009
* BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection, IEEE 2009
* A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern, IEEE 2009
* Distributed Suffix Tree Overlay for Peer-to-Peer Search, IEEE 2009
* ROAD: A New Spatial Object Search Framework for Road Networks
* Slicing: A New Approach for Privacy Preserving Data Publishing
* A Decision-Theoretic Framework for Numerical Attribute Value Reconciliation
* A Knowledge-Driven Approach to Activity Recognition in Smart Homes
* A Look-Ahead Approach to Secure Multiparty Protocols
* A Performance Anomaly Detection and Analysis Framework for DBMS Development
* A Temporal Pattern Search Algorithm for Personal History Event Visualization
* A Unified Probabilistic Framework for Name Disambiguation in Digital Library
* Combining Tag and Value Similarity for Data Extraction and Alignment
* Data Mining for XML Query-Answering Support
* Dense Subgraph Extraction with Application to Community Detection
* Discriminative Feature Selection by Nonparametric Bayes Error Minimization
* EDISC A Class-Tailored Discretization Technique for Rule-Based Classification
* Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
* Efficient Computation of Range Aggregates against Uncertain Location-Based Queries
* Efficient Fuzzy Type-Ahead Search in XML Data
* Efficient Processing of Uncertain Events in Rule-Based Systems
* Energy Efficient Schemes for Accuracy-Guaranteed Sensor Data Aggregation Using Scalable Counting
* Energy-Efficient Reverse Skyline Query Processing over Wireless Sensor Networks
* Evaluating Path Queries over Frequently Updated Route Collections
* Extending Recommender Systems for Disjoint UserItem Sets The Conference Recommendation Problem
* Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias Detection
* Holistic Top-k Simple Shortest Path Join in Graphs
* Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
* Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
* Maximum Ambiguity-Based Sample Selection in Fuzzy Decision Tree Induction
* Mining Online Reviews for Predicting Sales Performance A Case Study in the Movie Domain
* On the Complexity of View Update Analysis and Its Application to Annotation Propagation
* Protecting Location Privacy against Location-Dependent Attacks in Mobile Services
* Saturn Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems
* Segmentation and Sampling of Moving Object Trajectories Based on Representativeness
* Using Rule Ontology in Repeated Rule Acquisition from Similar Web Sites
* A fuzzy self Constructing Feature Clustering Alg for text Classfication, IEEE 2011
* A Generic Multilevel Architecture for Time Series Prediction, IEEE 2011
* A Machine learning approach for identifying disease treatment relations in short test, IEEE 2011
* Adaptive Cluster Distance Bounding for High-Dimensional Indexing, IEEE 2011
* Analysis on Credit Card Fraud Detection Methods, IEEE 2011
* Continous Monitoring of distance based range query, IEEE 2011
* Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme, IEEE 2011
* Data Leakage Detection, IEEE 2011
* Data Mining to Generate Adverse Drug Events Detection Rules, IEEE 2011
* Decision Trees for Uncertain Data, IEEE 2011
* Finding Top-k Answers in Keyword Search over Relational Databases Using Tuple Units, IEEE 2011
* Adaptive Join Operators for Result Rate optimization, IEEE 2010
* False Negative Problem of Counting Bloom Filter, IEEE 2010
* FiVaTech Page-Level Web Data Extraction from Template Pages, IEEE 2010
* K-Anonymity in the Presence of External Databases, IEEE 2010
* LIGHT A Query-Efficient Yet Low-Maintenance --DHT, IEEE 2010
* PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects, IEEE 2010
* Prospective Infectious Disease Outbreak detection using Markov switching model, IEEE 2010
* Queries Optimization in SQL using Linear Recursion, IEEE 2010
* Approximate Distributed K-Means Clustering over a Peer-to-Peer Network, IEEE 2009
* OLEX : effective Rule Learning for Text Categorization, IEEE 2009
* ANGEL - Enhancing the Utility of Generalization for Privacy Preserving Publication, IEEE 2009
* Efficient Range Query Processing in Peer-to-Peer Systems, IEEE 2009
* Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments, IEEE 2008
* Online Index Recommendations for High-Dimensional Databases Using Query Workloads, IEEE 2009
* BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection, IEEE 2009
* A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern, IEEE 2009
* Distributed Suffix Tree Overlay for Peer-to-Peer Search, IEEE 2009
JAVA PARALLEL & DISTRIBUTED SYSTEMS
JAVA PARALLEL AND DISTRIBUTED SYSTEMS, 2012 IEEE PROJECTS
* BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
* A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming
* A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
* A Sequentially Consistent Multiprocessor Architecture for Out-of-Order Retirement of Instructions
* A Survey of Parallel Programming Models and Tools in the Multi and Many-Core Era
* An Online Data Access Prediction and Optimization Approach for Distributed Systems
* Comparison-Based System-Level Fault Diagnosis A Neural Network Approach
* Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths
* Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
* Distributed Diagnosis of Dynamic Events in Partitionable Arbitrary Topology Networks
* Distributed Privacy-Preserving Access Control in Sensor Networks
* DRAGON Detection and Tracking of Dynamic Amorphous Events in Wireless Sensor Networks
* Embedded Transitive Closure Network for Runtime Deadlock Detection in Networks-on-Chip
* Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
* Energy-Efficient Capture of Stochastic Events under Periodic Network Coverage and Coordinated Sleep
* Exploring the Optimal Replication Strategy in P2P-VoD Systems Characterization and Evaluation
* Flash Crowd in P2P Live Streaming Systems Fundamental Characteristics and Design Implications
* Formal Semantics, Compilation and Execution of the GALS Programming Language DSystemJ
* Hamiltonian Decomposition of the Rectangular Twisted Torus
* Large-Scale Transient Stability Simulation of Electrical Power Systems on Parallel GPUs
* Load Balancing Hashing in Geographic Hash Tables
* On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling
* On the Design and Deployment of RFID Assisted Navigation Systems for VANETs
* Optimal Construction of All Shortest Node-Disjoint Paths in Hypercubes with Applications
* Performance and Reliability of Non-Markovian Heterogeneous Distributed Computing Systems
* Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks
* Reliable and Energy-Efficient Multipath Communications in Underwater Sensor Networks
* Topology Enhancements in Wireless Multihop Networks A Top-Down Approach
* Trustworthy Coordination of Web Services Atomic Transactions
* Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing, IEEE 2011
* A Distributed Protocol to Serve Dynamic Groups for Peer to Peer Streaming, IEEE 2010
* Cooperative Caching in Wireless P2P Networks Design Implementation and Evaluation, IEEE 2010
* IRM Integrated File Replication and Consistency Maintenance, IEEE 2010
* Privacy-Conscious Location-Based Queries in Mobile Environments, IEEE 2010
* Detecting Malicious Packet Losses, IEEE 2009
* Dynamic Routing with Security Considerations, IEEE 2009
* Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks, IEEE 2009
* Virtual-Force-Based Geometric Routing Protocol in MANETs, IEEE 2009
* A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment, IEEE 2009
* A Tree-Based Peer-to-Peer Network with Quality Guarantees, IEEE 2008
* Computation Efficient Multicast Key Distribution, IEEE 2008
* Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, IEEE 2008
* Peer talk a Peer-to-Peer Multi-Party Voice-Over-IP System, IEEE 2008
* QUIVER Consistent Object Sharing For Edge Services, IEEE 2008
* The Server Reassignment Problem for Load Balancing in Structured P2P Systems, IEEE 2008
* Continuous Delivery Message Dissemination Problems Under the Multicasting Communication Mode, IEEE 2008
* Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding, IEEE 2008
* BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
* A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming
* A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
* A Sequentially Consistent Multiprocessor Architecture for Out-of-Order Retirement of Instructions
* A Survey of Parallel Programming Models and Tools in the Multi and Many-Core Era
* An Online Data Access Prediction and Optimization Approach for Distributed Systems
* Comparison-Based System-Level Fault Diagnosis A Neural Network Approach
* Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths
* Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
* Distributed Diagnosis of Dynamic Events in Partitionable Arbitrary Topology Networks
* Distributed Privacy-Preserving Access Control in Sensor Networks
* DRAGON Detection and Tracking of Dynamic Amorphous Events in Wireless Sensor Networks
* Embedded Transitive Closure Network for Runtime Deadlock Detection in Networks-on-Chip
* Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
* Energy-Efficient Capture of Stochastic Events under Periodic Network Coverage and Coordinated Sleep
* Exploring the Optimal Replication Strategy in P2P-VoD Systems Characterization and Evaluation
* Flash Crowd in P2P Live Streaming Systems Fundamental Characteristics and Design Implications
* Formal Semantics, Compilation and Execution of the GALS Programming Language DSystemJ
* Hamiltonian Decomposition of the Rectangular Twisted Torus
* Large-Scale Transient Stability Simulation of Electrical Power Systems on Parallel GPUs
* Load Balancing Hashing in Geographic Hash Tables
* On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling
* On the Design and Deployment of RFID Assisted Navigation Systems for VANETs
* Optimal Construction of All Shortest Node-Disjoint Paths in Hypercubes with Applications
* Performance and Reliability of Non-Markovian Heterogeneous Distributed Computing Systems
* Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks
* Reliable and Energy-Efficient Multipath Communications in Underwater Sensor Networks
* Topology Enhancements in Wireless Multihop Networks A Top-Down Approach
* Trustworthy Coordination of Web Services Atomic Transactions
* Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing, IEEE 2011
* A Distributed Protocol to Serve Dynamic Groups for Peer to Peer Streaming, IEEE 2010
* Cooperative Caching in Wireless P2P Networks Design Implementation and Evaluation, IEEE 2010
* IRM Integrated File Replication and Consistency Maintenance, IEEE 2010
* Privacy-Conscious Location-Based Queries in Mobile Environments, IEEE 2010
* Detecting Malicious Packet Losses, IEEE 2009
* Dynamic Routing with Security Considerations, IEEE 2009
* Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks, IEEE 2009
* Virtual-Force-Based Geometric Routing Protocol in MANETs, IEEE 2009
* A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment, IEEE 2009
* A Tree-Based Peer-to-Peer Network with Quality Guarantees, IEEE 2008
* Computation Efficient Multicast Key Distribution, IEEE 2008
* Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, IEEE 2008
* Peer talk a Peer-to-Peer Multi-Party Voice-Over-IP System, IEEE 2008
* QUIVER Consistent Object Sharing For Edge Services, IEEE 2008
* The Server Reassignment Problem for Load Balancing in Structured P2P Systems, IEEE 2008
* Continuous Delivery Message Dissemination Problems Under the Multicasting Communication Mode, IEEE 2008
* Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding, IEEE 2008
JAVA IMAGE PROCESSING
JAVA IMAGE PROCESSING, 2012 IEEE PROJECTS
* A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications
* A Multiplicative Iterative Algorithm for Box-Constrained Penalized Likelihood Image Restoration
* Cognition and Removal of Impulse Noise With Uncertainty
* Combining Head Pose and Eye Location Information for Gaze Estimation
* Groupwise Registration of Multimodal Images by an Efficient Joint Entropy Minimization Scheme
* Higher Degree Total Variation (HDTV) Regularization for Image Recovery
* Image Deblurring Using Derivative Compressed Sensing for Optical Imaging Application
* Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers
* Model-Assisted Adaptive Recovery of Compressed Sensing with Imaging Applications
* Multiple Descriptions Coinciding Lattice Vector Quantizer for Wavelet Image Coding
* Object Segmentation of Database Images by Dual Multiscale Morphological Reconstructions and Retrieval Applications
* Posterior-Mean Super-Resolution With a Causal Gaussian Markov Random Field Prior
* Three-Dimensional Near-Field MIMO Array Imaging Using Range Migration Techniques
* Wavelet-Based Compressed Sensing Using a Gaussian Scale Mixture Model
* A memory learning framework for effective image retrieval, IEEE 2011
* Unequal Power Allocation for JPEG Transmission Over MIMO Systems, IEEE 2010
* Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos, IEEE 2009
* Hierarchical Bayesian sparse image reconstruction with application to MRFM, IEEE 2009
* Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos, IEEE 2009
* Image Transformation using Grid, IEEE 2006
* A Memory Learning Framework for Effective Image Retrieval, IEEE 2005
* Application of BPCS steganography to wavelet compressed video, IEEE 2004
* Identification of Humans Using Gait, IEEE 2004
* A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications
* A Multiplicative Iterative Algorithm for Box-Constrained Penalized Likelihood Image Restoration
* Cognition and Removal of Impulse Noise With Uncertainty
* Combining Head Pose and Eye Location Information for Gaze Estimation
* Groupwise Registration of Multimodal Images by an Efficient Joint Entropy Minimization Scheme
* Higher Degree Total Variation (HDTV) Regularization for Image Recovery
* Image Deblurring Using Derivative Compressed Sensing for Optical Imaging Application
* Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers
* Model-Assisted Adaptive Recovery of Compressed Sensing with Imaging Applications
* Multiple Descriptions Coinciding Lattice Vector Quantizer for Wavelet Image Coding
* Object Segmentation of Database Images by Dual Multiscale Morphological Reconstructions and Retrieval Applications
* Posterior-Mean Super-Resolution With a Causal Gaussian Markov Random Field Prior
* Three-Dimensional Near-Field MIMO Array Imaging Using Range Migration Techniques
* Wavelet-Based Compressed Sensing Using a Gaussian Scale Mixture Model
* A memory learning framework for effective image retrieval, IEEE 2011
* Unequal Power Allocation for JPEG Transmission Over MIMO Systems, IEEE 2010
* Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos, IEEE 2009
* Hierarchical Bayesian sparse image reconstruction with application to MRFM, IEEE 2009
* Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos, IEEE 2009
* Image Transformation using Grid, IEEE 2006
* A Memory Learning Framework for Effective Image Retrieval, IEEE 2005
* Application of BPCS steganography to wavelet compressed video, IEEE 2004
* Identification of Humans Using Gait, IEEE 2004
JAVA NETWORK AND SERVICE MANAGEMENT
2012 IEEE PROJECTS
* A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services
* A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments
* A Security Management Architecture for Supporting Routing Services on WANETs
* Characterization of ISP Traffic Trends, User Habits, and Access Technology Impact
* Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
* A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services
* A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments
* A Security Management Architecture for Supporting Routing Services on WANETs
* Characterization of ISP Traffic Trends, User Habits, and Access Technology Impact
* Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
JAVA SERVICES COMPUTING
2012 IEEE PROJECTS
* A Dataflow-Based Scientific Workflow Composition Framework
* Dynamic Authentication for Cross-Realm SOA-Based Business Processes
* Energy-Aware Autonomic Resource Allocation in Multitier Virtualized Environments
* Expert Discovery and Interactions in Mixed Service-Oriented Systems
* Runtime Enforcement of Web Service Message Contracts with Data
* A Dataflow-Based Scientific Workflow Composition Framework
* Dynamic Authentication for Cross-Realm SOA-Based Business Processes
* Energy-Aware Autonomic Resource Allocation in Multitier Virtualized Environments
* Expert Discovery and Interactions in Mixed Service-Oriented Systems
* Runtime Enforcement of Web Service Message Contracts with Data
JAVA SOFTWARE ENGINEERING
2012 IEEE PROJECTS
* An Autonomous Engine for Services Configuration and Deployment
* Comparing Semi-Automated Clustering Methods for Persona Development
* Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
* Exploiting Dynamic Information in IDEs Improves Speed and Correctness of Software Maintenance Tasks
* Pointcut Rejuvenation Recovering Pointcut Expressions in Evolving Aspect-Oriented Software
* QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems
* StakeRare Using Social Networks and Collaborative Filtering for Large-Scale Requirements Elicitation
* An Autonomous Engine for Services Configuration and Deployment
* Comparing Semi-Automated Clustering Methods for Persona Development
* Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
* Exploiting Dynamic Information in IDEs Improves Speed and Correctness of Software Maintenance Tasks
* Pointcut Rejuvenation Recovering Pointcut Expressions in Evolving Aspect-Oriented Software
* QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems
* StakeRare Using Social Networks and Collaborative Filtering for Large-Scale Requirements Elicitation
JAVA COMMUNICATION SYSTEM
2012 IEEE PROJECTS
* A Fourier Based Method for Approximating the Joint Detection Probability in MIMO Communications
* Achieving Joint Diversity in Decode-and-Forward MIMO Relay Networks with Zero-Forcing Equalizers
* Characterization of OFDM Radio Link Under PLL-Based Oscillator Phase Noise and Multipath Fading Channel
* Performance Modeling and Analysis of Cognitive Mesh Networks
* A Secure Single Sign-On Mechanism for Distributed Computer Networks
* A Fourier Based Method for Approximating the Joint Detection Probability in MIMO Communications
* Achieving Joint Diversity in Decode-and-Forward MIMO Relay Networks with Zero-Forcing Equalizers
* Characterization of OFDM Radio Link Under PLL-Based Oscillator Phase Noise and Multipath Fading Channel
* Performance Modeling and Analysis of Cognitive Mesh Networks
* A Secure Single Sign-On Mechanism for Distributed Computer Networks
JAVA FUZZY SYSTEMS
2012 IEEE PROJECTS
* A Generalization of Distance Functions for Fuzzy c -Means Clustering With Centroids of Arithmetic Means
* Adaptive Control Schemes for Discrete-Time T-S Fuzzy Systems With Unknown Parameters and Actuator Failures
* Grouping, Overlap, and Generalized Bientropic Functions for Fuzzy Modeling of Pairwise Comparisons
* A Generalization of Distance Functions for Fuzzy c -Means Clustering With Centroids of Arithmetic Means
* Adaptive Control Schemes for Discrete-Time T-S Fuzzy Systems With Unknown Parameters and Actuator Failures
* Grouping, Overlap, and Generalized Bientropic Functions for Fuzzy Modeling of Pairwise Comparisons
JAVA LEARNING TECHNOLOGIES
2012 IEEE PROJECTS
* Case-Based Learning, Pedagogical Innovation, and Semantic Web Technologies
* Facilitating Trust in Privacy-Preserving E-Learning Environments
* LaaN Convergence of Knowledge Management and Technology-Enhanced Learning
* Spatial Learning Using Locomotion Interface to Virtual Environment
* Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning
* Case-Based Learning, Pedagogical Innovation, and Semantic Web Technologies
* Facilitating Trust in Privacy-Preserving E-Learning Environments
* LaaN Convergence of Knowledge Management and Technology-Enhanced Learning
* Spatial Learning Using Locomotion Interface to Virtual Environment
* Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning
JAVA PATTERN ANALYSIS & MACHINE INTELLIGENCE
2012 IEEE PROJECTS
* A Closed-Form Solution to Tensor Voting Theory and Applications
* Bilinear Modeling via Augmented Lagrange Multipliers (BALM)
* Convergent Iterative Closest-Point Algorithm to Accomodate Anisotropic and Inhomogenous Localization Error
* Difference-Based Image Noise Modeling Using Skellam Distribution
* Discriminative Latent Models for Recognizing Contextual Group Activities
* Edge Structure Preserving 3D Image Denoising by Local Surface Approximation
* Fast Rotation Invariant 3D Feature Computation Utilizing Efficient Local Neighborhood Operators
* IntentSearch Capturing User Intention for One-Click Internet Image Search
* Robust and Efficient Ridge-Based Palmprint Matching
* Trainable Convolution Filters and Their Application to Face Recognition
* A Closed-Form Solution to Tensor Voting Theory and Applications
* Bilinear Modeling via Augmented Lagrange Multipliers (BALM)
* Convergent Iterative Closest-Point Algorithm to Accomodate Anisotropic and Inhomogenous Localization Error
* Difference-Based Image Noise Modeling Using Skellam Distribution
* Discriminative Latent Models for Recognizing Contextual Group Activities
* Edge Structure Preserving 3D Image Denoising by Local Surface Approximation
* Fast Rotation Invariant 3D Feature Computation Utilizing Efficient Local Neighborhood Operators
* IntentSearch Capturing User Intention for One-Click Internet Image Search
* Robust and Efficient Ridge-Based Palmprint Matching
* Trainable Convolution Filters and Their Application to Face Recognition
JAVA WIRELESS COMMUNICATION
* Throughput Optimization in High Speed Downlink Packet Access (HSDPA) Random access Transport Capacity, IEEE 2010
* Adaptive Multi-Node Incremental Relaying for Hybrid-ARQ in AF Relay Networks, IEEE 2010
* Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary, IEEE 2009
* SAT- Solving Approaches to Context-Aware Enterprise Network Security Management, IEEE 2009
* Continuous Flow Wireless Data Broadcasting for High Speed Environments, IEEE 2009
* Multi-Service Load Sharing for Resource Management in the Cellular WLAN Integrated Network, IEEE 2009
* Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks, IEEE 2009
* Robust cooperative routing protocol in mobile wireless sensor networks, IEEE 2009
* Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks, IEEE 2009
* SIR – analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets, IEEE 2009
* Adaptive Multi-Node Incremental Relaying for Hybrid-ARQ in AF Relay Networks, IEEE 2010
* Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary, IEEE 2009
* SAT- Solving Approaches to Context-Aware Enterprise Network Security Management, IEEE 2009
* Continuous Flow Wireless Data Broadcasting for High Speed Environments, IEEE 2009
* Multi-Service Load Sharing for Resource Management in the Cellular WLAN Integrated Network, IEEE 2009
* Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks, IEEE 2009
* Robust cooperative routing protocol in mobile wireless sensor networks, IEEE 2009
* Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks, IEEE 2009
* SIR – analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets, IEEE 2009
JAVA OTHERS
* Sketch4Match – Content-based Image Retrieval System Using Sketches - Applied Machine Intelligence and Informatics, IEEE 2011
* Remote Display solution for mobile cloud computing - Computer, IEEE 2011
* A bounded and adaptive memory based approach to mine frequent patterns from very large database - Cybernetics, IEEE 2011
* Embedded Extended Visual Cryptography Schemes - Information Forensics and Security, IEEE 2011
* Cloud Computing for Agent-Based Urban Transportation Systems - Intelligent Transport System, IEEE 2011
* Locating Equivalent servants over p2p networks - Network and Service Management, IEEE 2011
* Ensuring Data Storage Security in Cloud Computing - Cloud Computing, IEEE 2010
* CHARMY: A Framework for Designing and Verifying Architectural Specifications, Software Engineering - IEEE 2009
* Optimized Resource Allocation for Software Release Planning, Software Engineering - IEEE 2009
* Using the Conceptual Cohesion of Classes for Fault Prediction in Object oriented Systems, Software Engineering - IEEE 2008
* Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies, Software Engineering - IEEE 2008
* An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, Information Forensics and Security - IEEE 2010
* SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks, Information Forensics and Security - IEEE 2009
* Network Topology against Distributed Denial of Service Attacks DDOS, Information Forensics and Security - IEEE 2006
* Personal Authentication Using 3-D Finger Geometry, Information Forensics and Security - IEEE 2006
* Effects of Denial of sleep attacks on wireless sensor networks MAC protocols - Vehicular Technology, IEEE 2010
* Face Recognition using Laplacian Faces - Pattern Analysis and Machine Intelligence, IEEE 2005
* Online Handwritten Script Recognition - Pattern Analysis and Machine Intelligence, IEEE 2004
* Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions - Neural Networks, IEEE 2009
* A Survey of Learning-Based Techniques of Email Spam Filtering - Neural Networks, IEEE 2008
* DAIOS - Efficient Dynamic Web Service Invocation - Internet Computing, IEEE 2009
* E-Secure Transactions - Secure Electronic Data Interchange over Internet - Internet Computing, IEEE 2005
* Agent Mining: The Synergy of Agents and Data Mining - Intelligent Systems, IEEE 2009
* Protection of Database Security via Collaborative Inference Detection - Intelligence and Security Informatics, IEEE 2008
* EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks - Industrial Informatics, IEEE 2009
* Face Recognition for Smart Recognitions - Gesture Recognition, IEEE 2008
* Analysis of Computational Time of Simple Estimation of Distribution Algorithms - Evolutionary Computation, IEEE 2010
* Data Mining Techniques For Dynamically Classifying And Analyzing Library Database - Datamining, IEEE 2010
* High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths - Consumer Electronics, IEEE 2008
* Upper Bounds for Dynamic Memory Allocation - Computers, IEEE 2009
* Collusive piracy prevention in P2P content delivery network - Computers, IEEE 2009
* Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs - Computer Science & Network Security, IEEE 2007
* Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol - Computer and Communication Engineering, IEEE 2008
* Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies - Biomedicine, IEEE 2009
* Remote Display solution for mobile cloud computing - Computer, IEEE 2011
* A bounded and adaptive memory based approach to mine frequent patterns from very large database - Cybernetics, IEEE 2011
* Embedded Extended Visual Cryptography Schemes - Information Forensics and Security, IEEE 2011
* Cloud Computing for Agent-Based Urban Transportation Systems - Intelligent Transport System, IEEE 2011
* Locating Equivalent servants over p2p networks - Network and Service Management, IEEE 2011
* Ensuring Data Storage Security in Cloud Computing - Cloud Computing, IEEE 2010
* CHARMY: A Framework for Designing and Verifying Architectural Specifications, Software Engineering - IEEE 2009
* Optimized Resource Allocation for Software Release Planning, Software Engineering - IEEE 2009
* Using the Conceptual Cohesion of Classes for Fault Prediction in Object oriented Systems, Software Engineering - IEEE 2008
* Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies, Software Engineering - IEEE 2008
* An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, Information Forensics and Security - IEEE 2010
* SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks, Information Forensics and Security - IEEE 2009
* Network Topology against Distributed Denial of Service Attacks DDOS, Information Forensics and Security - IEEE 2006
* Personal Authentication Using 3-D Finger Geometry, Information Forensics and Security - IEEE 2006
* Effects of Denial of sleep attacks on wireless sensor networks MAC protocols - Vehicular Technology, IEEE 2010
* Face Recognition using Laplacian Faces - Pattern Analysis and Machine Intelligence, IEEE 2005
* Online Handwritten Script Recognition - Pattern Analysis and Machine Intelligence, IEEE 2004
* Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions - Neural Networks, IEEE 2009
* A Survey of Learning-Based Techniques of Email Spam Filtering - Neural Networks, IEEE 2008
* DAIOS - Efficient Dynamic Web Service Invocation - Internet Computing, IEEE 2009
* E-Secure Transactions - Secure Electronic Data Interchange over Internet - Internet Computing, IEEE 2005
* Agent Mining: The Synergy of Agents and Data Mining - Intelligent Systems, IEEE 2009
* Protection of Database Security via Collaborative Inference Detection - Intelligence and Security Informatics, IEEE 2008
* EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks - Industrial Informatics, IEEE 2009
* Face Recognition for Smart Recognitions - Gesture Recognition, IEEE 2008
* Analysis of Computational Time of Simple Estimation of Distribution Algorithms - Evolutionary Computation, IEEE 2010
* Data Mining Techniques For Dynamically Classifying And Analyzing Library Database - Datamining, IEEE 2010
* High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths - Consumer Electronics, IEEE 2008
* Upper Bounds for Dynamic Memory Allocation - Computers, IEEE 2009
* Collusive piracy prevention in P2P content delivery network - Computers, IEEE 2009
* Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs - Computer Science & Network Security, IEEE 2007
* Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol - Computer and Communication Engineering, IEEE 2008
* Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies - Biomedicine, IEEE 2009
Subscribe to:
Posts (Atom)