IEEE 2010 JAVA/.NET PROJECT LIST |
| 1.Layered Approach Using Conditional Random Fields for Intrusion Detection. View : Abstract Basepaper |
| 2.Host-to-Host Congestion Control for TCP. View : Abstract Basepaper |
| 3 .Adaptive Join Operators for Result Rate Optimization on Streaming Inputs. View : Abstract Basepaper |
| 4.A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming. View : Abstract Basepaper |
| 5 .Fuzzy Keyword Search over Encrypted Data in Cloud Computing. View : Abstract Basepaper |
| 6 .AI AND OPINION MINING. View : Abstract Basepaper |
| 7 .Bandwidth Recycling in IEEE 802.16 Networks. View : Abstract Basepaper |
| 8 .Distributed Explicit Rate Schemes in Multi -Input–Multi-Output Network Systems. View : Abstract Basepaper |
| 9 .Correlation-Based Traffic Analysis Attacks on Anonymity Networks. View : Abstract Basepaper |
| 10 .A Review of the Applications of Agent Technology In Traffic and Transportation Systems. View : Abstract Basepaper |
| 11 .On Modeling, Analysis, and Optimization of Packet Aggregation Systems. View : Abstract Basepaper |
| 12 .Label-Based DV-Hop Localization AgainstWormhole Attacks in Wireless Sensor Networks. View : Abstract Basepaper |
| 13 .Conditional Shortest Path Routing in Delay Tolerant Networks. View : Abstract Basepaper |
| 14.Slow Adaptive OFDMA Systems Through Chance Constrained Programming. View : Abstract Basepaper |
| 15.Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems. View : Abstract Basepaper |
| 16.POPI A User-level Tool for Inferring Router Packet Forwarding Priority. View : Abstract Basepaper |
| 17.Staying Connected in a Mobile Healthcare System: Experiences from the MediNet Project View : Abstract Basepaper |
| 18 .Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks. View : Abstract Basepaper |
| 19.An AbuseFree Fair Contract Signing Protocol Based on the RSA Signature. View : Abstract Basepaper |
| 20.Pricing under Constraints in Access Networks Revenue Maximization and Congestion Management. View : Abstract Basepaper |
| 21.SigFree A Signature-free Buffer Overflow Attack Blocker. View : Abstract Basepaper |
| 22.Data Leakage Detection . View : Abstract Basepaper |
| 23.Mesh Based Multicast Routing in MANET Stable Link Based Approach. View : Abstract Basepaper |
| 24.Random Access Transport Capacity. View : Abstract Basepaper |
| 25.KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services. View : Abstract Basepaper |
| 26.Cooperative Caching in Wireless P2P Networks Design, Implementation, and Evaluation. View : Abstract Basepaper |
| 27.Ensuring Data Storage Security in Cloud Computing. View : Abstract Basepaper |
| 28.Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes. View : Abstract Basepaper |
| 29.on Multihop Distances in Wireless Sensor Networks with Random Node Locations. View : Abstract Basepaper |
| 30.Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. View : Abstract Basepaper |
| 31.Client-side Load Balancer using Cloud. View : Abstract Basepaper |
| 32.Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. View : Abstract Basepaper |
| 33.Always Acyclic Distributed Path Computation. View : Abstract Basepaper |
| 34.Dynamic Authentication for Cross-Realm SOA-Based Business Processes. View : Abstract Basepaper |
| 35.Achieving Network Level Privacy in Wireless Sensor Networks. View : Abstract Basepaper |
| 36.Modified DSR (Preemptive) to reduce link breakage and routing overhead for MANET using Proactive Route Maintenance (PRM). View : Abstract Basepaper |
| 37.Secure Data Objects Replication in Data Grid. View : Abstract Basepaper |
| 38.Toward Optimal Network Fault Correction in Externally Managed Overlay Networks. View : Abstract Basepaper |
| 39.TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks. View : Abstract Basepaper |
| 40.IRM Integrated File Replication and Consistency Maintenance in P2P Systems. View : Abstract Basepaper |
| 41.Anonymous Query Processing in Road Networks. View : Abstract Basepaper |
| 42.Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks. View : Abstract Basepaper |
| 43.Castor Scalable Secure Routing for Ad Hoc Networks. View : Abstract Basepaper |
| 44.Equilibrium of Heterogeneous Congestion Control Optimality and Stability. View : Abstract Basepaper |
| 45.Replication routing in DTNs: a resource allocation approach. View : Abstract Basepaper |
| 46.MABS Multicast Authentication Based on Batch Signature. View : Abstract Basepaper |
| 47.Inside the Permutation-Scanning WormsPropagation Modeling and Analysis. View : Abstract Basepaper |
| 48.Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks. View : Abstract Basepaper |
| 49 .Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks. View : Abstract Basepaper |
| 50.Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation. View : Abstract Basepaper |
| 51.Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. View : Abstract Basepaper |
| 52.A Cooperative Diversity-based Robust MAC Protocol in Wireless Ad Hoc Networks. View : Abstract Basepaper |
| 53.A General Framework for Service Availability for Bandwidth-Efficient Connection-Oriented Networks. View : Abstract Basepaper |
| 54.A Novel Cross Layer Intrusion Detection System in MANET. View : Abstract Basepaper |
| 55.Network-Based Traitor-Tracing Technique Using Traffic Pattern. View : Abstract Basepaper |
| 56 .Multicast Scaling Laws with Hierarchical Cooperation. View : Abstract Basepaper |
| 57.Supporting Pattern Matching Queries over Trajectories on Road Networks. View : Abstract Basepaper |
| 58.Reputation Estimation and Query in Peer-to-Peer Networks. View : Abstract Basepaper |
| 59.Achieving Guaranteed Anonymity in GPSTraces via Uncertainty-Aware Path Cloaking. View : Abstract Basepaper |
| 60.Handling Mobility in Wireless Sensor and Actor Networks. View : Abstract Basepaper |
| 61 .Clustering and Cluster-Based Routing Protocol for Delay-Tolerant Mobile Networks. View : Abstract Basepaper |
| 62 .Dynamic Multichannel Access With Imperfect Channel State Detection. View : Abstract Basepaper |
| 63 .Practical Algorithm For Minimum Delay Peer-to-Peer Media Streaming. View : Abstract Basepaper |
| 64.Engineering Wireless Mesh Networks:Joint Scheduling, Routing, Power Control,and Rate Adaptation. View : Abstract Basepaper |
| 65 .Adaptive Directional Wavelet Transform Based on Directional Prefiltering. View : Abstract Basepaper |
| 66 .Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks. View : Abstract Basepaper |
| 67 .Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks. View : Abstract Basepaper |
| 68 .Analysing GOP Structure and Packet Loss Effects on Error Propagation in MPEG–4 Video Streams. View : Abstract Basepaper |
| 69 .Privacy-Conscious Location-Based Queries in Mobile Environments. View : Abstract Basepaper |
| 70 .LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs. View : Abstract Basepaper |
| 71 .Reduced-Complexity Near-Capacity Downlink Iteratively Decoded Generalized Multi-Layer Space-Time Coding Using Irregular Convolutional Codes. View : Abstract Basepaper |
| 72 .Layered Steered Space–Time-Spreading-Aided Generalized MC DS-CDMA. View : Abstract Basepaper |
| 73 .Supporting Pattern Matching Queries over Trajectories on Road Networks. View : Abstract Basepaper |
| 74 .Weighted Spectral Distribution for Internet Topology Analysis: Theory and Applications. View : Abstract Basepaper |
| 75 .Chunk distribution in Mesh-Based Large Scale P2P Streaming Systems: A fluid approach. View : Abstract Basepaper |
| 76 .Cross-Layer Design in Multihop Wireless Networks. View : Abstract Basepaper |
| 77 .Interference-Limited Opportunistic Relaying with Reactive Sensing. View : Abstract Basepaper |
| 78 .On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network. View : Abstract Basepaper |
| 79 .Super-Diffusive Behavior of Mobile Nodes and its Impact on Routing Protocol Performance. View : Abstract Basepaper |
| 80 .A Lock-Free, Cache-Efficient Multi-Core Synchronization Mechanism for Line-Rate Network Traffic Monitoring. View : Abstract Basepaper |
| 81 .Toward Optimal Network Fault Correction in Externally Managed Overlay Networks. View : Abstract Basepaper |
| 82 .Preamble-Based Channel Estimation for CP-OFDM and OFDM/OQAM Systems: A Comparative Study. View : Abstract Basepaper |
| 83.Layered Steered Space–Time-Spreading-Aided Generalized MC DS-CDMA. View : Abstract Basepaper |
| 84 .Fast Maximum-Likelihood Decoding of the Golden Code. View : Abstract Basepaper |
| 85 .Rate-Distortion Optimized Bitstream Extractor for Motion Scalability in Wavelet-Based Scalable Video Coding. View : Abstract Basepaper |
| 86 .Selective Data Pruning-Based Compression Using High-Order Edge-Directed Interpolation . View : Abstract Basepaper |
| 87 .Efficient Stereoscopic Ranging via Stochastic Sampling of Match Quality. View : Abstract Basepaper |
| 88 .Unequal Power Allocation for JPEG Transmission Over MIMO Systems. View : Abstract Basepaper |
| 89 .Motion Tuned Spatio-temporal Quality Assessment of Natural Videos. View : Abstract Basepaper |
| 90 .Improving Shape Retrieval by Spectral Matching and Meta Similarity. View : Abstract Basepaper |
| 91 .Image Super-Resolution via Sparse Representation. View : Abstract Basepaper |
| 92 .Learning With l1-Graph for Image Analysis. View : Abstract Basepaper |






0 comments:
Post a Comment