JAVA IEEE-2009 Project's:- Continue Click NEXT
1.Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use Recommendations.
View:-:Abstract | Basepaper | Video Demo
2.Multipath Dissemination in Regular Mesh Topologies.
View:-:Abstract | Basepaper
3.Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments.
View:-:Abstract | Basepaper
4.Detecting Malicious Packet Losses.
View:-:Abstract | Basepaper
5.Dynamic Routing with Security Considerations.
View:-:Abstract | Basepaper
6.Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
View:-:Abstract | Basepaper
7.Mitigation of Control Channel Jamming under Node Capture Attacks.
View:-:Abstract | Basepaper
8.Security Analysis of the SASI(strong authentication and strong integrity) Protocol.
View:-:Abstract | Basepaper
9.Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures.
View:-:Abstract | Basepaper
9.Energy-Efficient SINR-Based Routing for Multi-hop Wireless Networks.
View:- Abstract | Basepaper
10.Mitigation of Control Channel Jamming under Node Capture Attacks.
View:- Abstract | Basepaper
11 .Dynamic Routing with Security Considerations.
View:- Abstract | Basepaper
12 .Detecting Malicious Packet Losses.
View:- Abstract | Basepaper
13 .Multipath Dissemination in Regular Mesh Topologies.
View:- Abstract | Basepaper
14 .A Faithful Distributed Mechanism for Sharing theCost of Multicast Transmissions.
View:- Abstract | Basepaper
15 .Movement-Assisted Connectivity Restoration inWireless Sensor and Actor Networks.
View:- Abstract | Basepaper
16 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
View:- Abstract | Basepaper
17 .The Effectiveness of Checksums for Embedded Control Networks.
View:- Abstract | Basepaper
18 .Multiple Routing Configurations for Fast IP Network Recovery.
View:- Abstract | Basepaper
19 .Monitoring the Application-Layer DDoS Attacks for Popular Websites.
View:- Abstract | Basepaper
20 .Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
View:- Abstract | Basepaper
21 .Scalable Routing in Cyclic Mobile Networks.
View:- Abstract | Basepaper
22 .Enforcing Minimum-Cost Multicast Routingagainst Selfish Information Flows.
View:- Abstract | Basepaper
23 .SIMPS: Using Sociology for Personal Mobility.
View:- Abstract | Basepaper
24 .Capturing Router Congestion and Delay.
View:- Abstract | Basepaper
25 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures.
View:- Abstract | Basepaper
26.Security Analysis of the SASI Protocol.
View:- Abstract | Basepaper
27.Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments.
View:- Abstract | Basepaper
28.Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
View:- Abstract | Basepaper
29.Congestion Control Algorithm for Tree-based Reliable Multicast Protocols.
View:- Abstract
30 .Security Agents for Network Traffic Analysis (SANTA).
View:-: Abstract
31 .Capturing Router Congestion and Delay.
View:- Abstract
32 .Detecting Malicious Packet Losses.
View:- Abstract
33 .Dynamic Routing with Security Considerations.
View:- Abstract
34 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
View:- Abstract
35 .FEBA: A Bandwidth Allocation Algorithm for Service Differentiation in IEEE 802.16 Mesh Networks.
View:- Abstract
36 .Joint Task Migration and Power Management in Wireless Computing.
View:- Abstract
37 .Large Connectivity for Dynamic Random Geometric Graphs.
View:- Abstract
38 .Measuring Capacity Bandwidth of Targeted Path Segments .
View:- Abstract
39 .Mitigating Denial-of-Service Attacks on The Chord Overlay Network:A Location Hiding Approach .
View:- Abstract
40 .Mitigatation Of Control Channel Jamming Under Node Capture Attacks.
View:- Abstract
41 .Monitoring the Application-Layer DDoS Attacks for Popular Websites .
View:- Abstract
42.Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
View:- Abstract
43 .SIMPS: Using Sociology for Personal Mobility.
View:- Abstract
44 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures .
View:- Abstract
45.Multi-core Supported Network and System Security and Security in Next Generation Wireless Networks.
View:- Abstract
46 .Mobile Agents and Security.
View:- Abstract
48 .Configuring BlueStars: Multihop Scatternet Formation for Bluetooth Networks.
View:- :Abstract
49 .Agent Mobility for Large-scale Network Monitoring.
View:- :Abstract
50 .Active Distributed Monitoring system based on mobile agents.
View:- :Abstract
51 .Network Security using HoneyPot.
View:- :Abstract
52 .Multiresolution Data Integration using Mobile Agent in Distributed Sensor Networks.
View:- Abstract
53 .Distributed Algorithm for Source based Energy Efficient Multicasting in wireless AdHoc Networks.
View:- :Abstract
1.Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use Recommendations.
View:-:Abstract | Basepaper | Video Demo
2.Multipath Dissemination in Regular Mesh Topologies.
View:-:Abstract | Basepaper
3.Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments.
View:-:Abstract | Basepaper
4.Detecting Malicious Packet Losses.
View:-:Abstract | Basepaper
5.Dynamic Routing with Security Considerations.
View:-:Abstract | Basepaper
6.Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
View:-:Abstract | Basepaper
7.Mitigation of Control Channel Jamming under Node Capture Attacks.
View:-:Abstract | Basepaper
8.Security Analysis of the SASI(strong authentication and strong integrity) Protocol.
View:-:Abstract | Basepaper
9.Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures.
View:-:Abstract | Basepaper
9.Energy-Efficient SINR-Based Routing for Multi-hop Wireless Networks.
View:- Abstract | Basepaper
10.Mitigation of Control Channel Jamming under Node Capture Attacks.
View:- Abstract | Basepaper
11 .Dynamic Routing with Security Considerations.
View:- Abstract | Basepaper
12 .Detecting Malicious Packet Losses.
View:- Abstract | Basepaper
13 .Multipath Dissemination in Regular Mesh Topologies.
View:- Abstract | Basepaper
14 .A Faithful Distributed Mechanism for Sharing theCost of Multicast Transmissions.
View:- Abstract | Basepaper
15 .Movement-Assisted Connectivity Restoration inWireless Sensor and Actor Networks.
View:- Abstract | Basepaper
16 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
View:- Abstract | Basepaper
17 .The Effectiveness of Checksums for Embedded Control Networks.
View:- Abstract | Basepaper
18 .Multiple Routing Configurations for Fast IP Network Recovery.
View:- Abstract | Basepaper
19 .Monitoring the Application-Layer DDoS Attacks for Popular Websites.
View:- Abstract | Basepaper
20 .Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
View:- Abstract | Basepaper
21 .Scalable Routing in Cyclic Mobile Networks.
View:- Abstract | Basepaper
22 .Enforcing Minimum-Cost Multicast Routingagainst Selfish Information Flows.
View:- Abstract | Basepaper
23 .SIMPS: Using Sociology for Personal Mobility.
View:- Abstract | Basepaper
24 .Capturing Router Congestion and Delay.
View:- Abstract | Basepaper
25 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures.
View:- Abstract | Basepaper
26.Security Analysis of the SASI Protocol.
View:- Abstract | Basepaper
27.Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments.
View:- Abstract | Basepaper
28.Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
View:- Abstract | Basepaper
29.Congestion Control Algorithm for Tree-based Reliable Multicast Protocols.
View:- Abstract
30 .Security Agents for Network Traffic Analysis (SANTA).
View:-: Abstract
31 .Capturing Router Congestion and Delay.
View:- Abstract
32 .Detecting Malicious Packet Losses.
View:- Abstract
33 .Dynamic Routing with Security Considerations.
View:- Abstract
34 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
View:- Abstract
35 .FEBA: A Bandwidth Allocation Algorithm for Service Differentiation in IEEE 802.16 Mesh Networks.
View:- Abstract
36 .Joint Task Migration and Power Management in Wireless Computing.
View:- Abstract
37 .Large Connectivity for Dynamic Random Geometric Graphs.
View:- Abstract
38 .Measuring Capacity Bandwidth of Targeted Path Segments .
View:- Abstract
39 .Mitigating Denial-of-Service Attacks on The Chord Overlay Network:A Location Hiding Approach .
View:- Abstract
40 .Mitigatation Of Control Channel Jamming Under Node Capture Attacks.
View:- Abstract
41 .Monitoring the Application-Layer DDoS Attacks for Popular Websites .
View:- Abstract
42.Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
View:- Abstract
43 .SIMPS: Using Sociology for Personal Mobility.
View:- Abstract
44 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures .
View:- Abstract
45.Multi-core Supported Network and System Security and Security in Next Generation Wireless Networks.
View:- Abstract
46 .Mobile Agents and Security.
View:- Abstract
48 .Configuring BlueStars: Multihop Scatternet Formation for Bluetooth Networks.
View:- :Abstract
49 .Agent Mobility for Large-scale Network Monitoring.
View:- :Abstract
50 .Active Distributed Monitoring system based on mobile agents.
View:- :Abstract
51 .Network Security using HoneyPot.
View:- :Abstract
52 .Multiresolution Data Integration using Mobile Agent in Distributed Sensor Networks.
View:- Abstract
53 .Distributed Algorithm for Source based Energy Efficient Multicasting in wireless AdHoc Networks.
View:- :Abstract
54.Privacy-Aware Collaborative Spam Filtering.
55.Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks.
56.A Decentralized Method for Scaling Up Genome Similarity Search Services.
57.Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search .
58.Cooperative Secondary Authorization Recycling.
59.Robust Rate Control for Heterogeneous Network Access in Multihomed Environments .
60.Catching the Trend: A Framework for Clustering Concept-Drifting Categorical Data .
61.CDNs Content Outsourcing via Generalized Communities .
62.IMine: Index Support for Item Set Mining.
63.Progressive Parametric Query Optimization.
64.Headlight Prefetching and Dynamic Chaining for Cooperative Media Streaming in Mobile Environments.
65.A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks.
67.Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
68.Lightweight Online Performance Monitoring and Tuning with Embedded Gossip.
69.Bi-Criteria Scheduling of Scientific Grid Workflows.
70.TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
71.Adaptive Task Checkpointing and Replication: Toward Efficient Fault-Tolerant Grids.
59.Robust Rate Control for Heterogeneous Network Access in Multihomed Environments .
60.Catching the Trend: A Framework for Clustering Concept-Drifting Categorical Data .
61.CDNs Content Outsourcing via Generalized Communities .
62.IMine: Index Support for Item Set Mining.
63.Progressive Parametric Query Optimization.
64.Headlight Prefetching and Dynamic Chaining for Cooperative Media Streaming in Mobile Environments.
65.A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks.
67.Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
68.Lightweight Online Performance Monitoring and Tuning with Embedded Gossip.
69.Bi-Criteria Scheduling of Scientific Grid Workflows.
70.TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
71.Adaptive Task Checkpointing and Replication: Toward Efficient Fault-Tolerant Grids.






0 comments:
Post a Comment