Thursday, 25 August 2011

Java System/Networking IEEE-2009 Projects:-


JAVA IEEE-2009 Project's:-                             Continue Click   NEXT

1.Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use Recommendations.
    View:-:Abstract Basepaper
  Video Demo
2.Multipath Dissemination in Regular Mesh Topologies.
    View:-:Abstract 
Basepaper
3.Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments.
    View:-:Abstract Basepaper

4.Detecting Malicious Packet Losses.
    View:-:Abstract Basepaper

5.Dynamic Routing with Security Considerations.
    View:-:Abstract Basepaper

6.Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
     View:-:Abstract 
Basepaper
7.Mitigation of Control Channel Jamming under Node Capture Attacks.
    View:-:Abstract Basepaper

8.Security Analysis of the SASI(strong authentication and strong integrity) Protocol.
    View:-:Abstract Basepaper

9.Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures.
    View:-:Abstract Basepaper

9.Energy-Efficient SINR-Based Routing for Multi-hop Wireless Networks.
   View:- 
Abstract Basepaper 

10.Mitigation of Control Channel Jamming under Node Capture Attacks.
   View:-
 Abstract Basepaper 

11 .Dynamic Routing with Security Considerations.
    View:-
 Abstract Basepaper 

12 .Detecting Malicious Packet Losses.
    View:- Abstract Basepaper 

13 .Multipath Dissemination in Regular Mesh Topologies.
    View:- Abstract Basepaper 

14 .A Faithful Distributed Mechanism for Sharing theCost of Multicast Transmissions.
    View:-
 Abstract Basepaper 

15 .Movement-Assisted Connectivity Restoration inWireless Sensor and Actor      Networks.
    View:- Abstract Basepaper 

16 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing      Analysis.   
    View:- Abstract Basepaper 

17 .The Effectiveness of Checksums for Embedded Control Networks.
    View:- Abstract Basepaper 

18 .Multiple Routing Configurations for Fast IP Network Recovery.
    View:- Abstract Basepaper 

19 .Monitoring the Application-Layer DDoS Attacks for Popular Websites.
    View:- Abstract Basepaper 

20 .Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
    View:- Abstract Basepaper 

21 .Scalable Routing in Cyclic Mobile Networks.
    View:- Abstract Basepaper 

22 .Enforcing Minimum-Cost Multicast Routingagainst Selfish Information       Flows.
    View:-
 Abstract Basepaper 

23 .SIMPS: Using Sociology for Personal Mobility.
    View:- Abstract Basepaper 

24 .Capturing Router Congestion and Delay.
    View:- Abstract Basepaper 

25 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures.
    View:- Abstract Basepaper 

26.Security Analysis of the SASI Protocol.
    View:-
 Abstract Basepaper 

27.Continuous Monitoring of Spatial Queries in Wireless Broadcast      Environments.
    View:- Abstract Basepaper 

28.Evaluating the Vulnerability of Network Traffic Using Joint Security and      Routing Analysis.
    View:- Abstract Basepaper 

29.Congestion Control Algorithm for Tree-based Reliable Multicast Protocols.
     View:-
 Abstract     

30 .Security Agents for Network Traffic Analysis (SANTA).
    View:-: Abstract      

31 .Capturing Router Congestion and Delay.
    View:- Abstract

32 .Detecting Malicious Packet Losses.
    View:- Abstract

33 .Dynamic Routing with Security Considerations.
    View:- Abstract 

34 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.

    View:- Abstract

35 .FEBA: A Bandwidth Allocation Algorithm for Service Differentiation in IEEE 802.16 Mesh Networks.
    View:- Abstract

36 .Joint Task Migration and Power Management in Wireless Computing.
    View:- Abstract

37 .Large Connectivity for Dynamic Random Geometric Graphs.

    View:- Abstract

38 .Measuring Capacity Bandwidth of Targeted Path Segments .
    View:- Abstract 

39 .Mitigating Denial-of-Service Attacks on The Chord Overlay Network:A Location Hiding Approach .
     View:- Abstract 

40 .Mitigatation Of Control Channel Jamming Under Node Capture Attacks.
    View:- Abstract

41 .Monitoring the Application-Layer DDoS Attacks for Popular Websites .
     View:- 
Abstract
42.Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
    View:- Abstract


43 .SIMPS: Using Sociology for Personal Mobility.
    View:- Abstract 

44 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures .
   View:- Abstract


45.Multi-core Supported Network and System Security and Security in Next      Generation Wireless Networks.
    View:-
 Abstract      

46 .Mobile Agents and Security.
     View:-
 Abstract       
  
48 .Configuring BlueStars: Multihop Scatternet Formation for Bluetooth Networks.
     View:- :Abstract        

49 .Agent Mobility for Large-scale Network Monitoring.
     View:- :Abstract   

50 .Active Distributed Monitoring system based on mobile agents.
     View:- :Abstract 

51 .Network Security using HoneyPot.
    View:- :Abstract       

52 .Multiresolution Data Integration using Mobile Agent in Distributed Sensor      Networks.
     View:- Abstract 
53 .Distributed Algorithm for Source based Energy Efficient Multicasting in       wireless AdHoc Networks.
     View:- :Abstract      
54.Privacy-Aware Collaborative Spam Filtering.
55.Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks.
56.A Decentralized Method for Scaling Up Genome Similarity Search Services.
57.Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search .
58.Cooperative Secondary Authorization Recycling.
59.Robust Rate Control for Heterogeneous Network Access in Multihomed Environments .
60.Catching the Trend: A Framework for Clustering Concept-Drifting Categorical Data .
61.CDNs Content Outsourcing via Generalized Communities .
62.IMine: Index Support for Item Set Mining.
63.Progressive Parametric Query Optimization.
64.Headlight Prefetching and Dynamic Chaining for Cooperative Media Streaming in Mobile Environments.
65.A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks.
67.Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
68.Lightweight Online Performance Monitoring and Tuning with Embedded Gossip.
69.Bi-Criteria Scheduling of Scientific Grid Workflows.
70.TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
71.Adaptive Task Checkpointing and Replication: Toward Efficient Fault-Tolerant Grids.

0 comments:

Post a Comment

 
Related Posts Plugin for WordPress, Blogger...