IEEE DOTNET PROJECTS 2012

1 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding.
CLOUD COMPUTING 2012/.NET

2 Cloud Computing Security From Single to Multi-Clouds.CLOUD COMPUTING (IEEE CONFERENCE) 2012/.NET

3 Enhanced Data Security Model for Cloud Computing CLOUD COMPUTING (IEEE CONFERENCE) 2012/.NET

4 Ensuring Distributed Accountability for Data Sharing in the Cloud. CLOUD COMPUTING 2012/.NET

5 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. CLOUD COMPUTING 2012/.NET

6 Outsourced Similarity Search on Metric Data Assets.CLOUD COMPUTING 2012/.NET

7 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING 2012/.NET

8 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. CLOUD COMPUTING 2012/.NET

9 Toward Secure and Dependable Storage Services in Cloud Computing. CLOUD COMPUTING 2012/.NET

10 A Query Formulation Language for the data web KNOWLEDGE AND DATA ENGINEERING 2012/.NET

11 Creating Evolving User Behavior Profiles Automatically KNOWLEDGE AND DATA ENGINEERING 2012/.NET

12 D-Cache: Universal Distance Cache for Metric Access Methods KNOWLEDGE AND DATA ENGINEERING 2012/.NET

13 DDD: A New Ensemble Approach for Dealing with Concept Drift KNOWLEDGE AND DATA ENGINEERING 2012/.NET

14 Efficient Computation of Range Aggregates against Uncertain Location-Based Queries KNOWLEDGE AND DATA ENGINEERING
2012/.NET

15 Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/.NET

16 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis KNOWLEDGE AND DATA ENGINEERING 2012/.NET

17 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques KNOWLEDGE AND DATA ENGINEERING 2012/.NET

18 Measuring the Sky: On Computing Data Cubes via Skylining the Measures KNOWLEDGE AND DATA ENGINEERING 2012/.NET

19 Mining Web Graphs for Recommendations KNOWLEDGE AND DATA ENGINEERING 2012/.NET

20 Organizing User Search Histories KNOWLEDGE AND DATA ENGINEERING 2012/.NET

21 Publishing Search Logs—A Comparative Study of Privacy Guarantees KNOWLEDGE AND DATA ENGINEERING 2012/.NET

22 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators KNOWLEDGE AND DATA ENGINEERING 2012/.NET

23 ROAD: A New Spatial Object Search Framework for Road Networks KNOWLEDGE AND DATA ENGINEERING 2012/.NET

24 Scalable Learning of Collective Behavior KNOWLEDGE AND DATA ENGINEERING 2012/.NET

25 Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/.NET

26 Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings KNOWLEDGE AND DATA ENGINEERING 2012/.NET

27 Bounding the Impact of Unbounded Attacks in Stabilization PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

28 Catching Packet Droppers and Modifiers in Wireless Sensor Networks PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

29 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

30 A New Cell-Counting-Based Attack Against Tor NETWORKING 2012/.NET

31 Optimal Source-Based Filtering of Malicious Traffic NETWORKING 2012/.NET

32 Topology Control in Mobile AD-HOC Networks with Cooperative Communications NETWORKING (IEEE JOURNAL) 2012/.NET

33 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network SECURE COMPUTING (IJCA) 2012/.NET

34 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING 2012/.NET

35 ES-MPICH2: A Message Passing Interface with Enhanced Security SECURE COMPUTING 2012/.NET

36 On the Security and Efficiency of Content Distribution via Network Coding SECURE COMPUTING 2012/.NET

37 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework forMobile-Healthcare Emergency SECURE COMPUTING 2012/.NET

38 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/.NET

39 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/.NET

40 Active Visual Segmentation IMAGE PROCESSING 2012/.NET

41 Image Segmentation Based on the Poincaré Map Method IMAGE PROCESSING 2012/.NET

42 K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER IMAGE PROCESSING (IJEST) 2012/.NET

43 Multiple Exposure Fusion for High Dynamic Range Image Acquisition IMAGE PROCESSING 2012/.NET

44 Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval IMAGE PROCESSING 2012/.NET

45 Smile Detection by Boosting Pixel Differences IMAGE PROCESSING 2012/.NET

46 View-invariant action recognition based on Artificial Neural Networks IMAGE PROCESSING 2012/.NET

47 Cooperative Download in Vehicular Environments MOBILE COMPUTING 2012/.NET

48 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation MOBILE COMPUTING 2012/.NET

49 Network Assisted Mobile Computing with Optimal Uplink Query Processing MOBILE COMPUTING 2012/.NET

50 Protecting Location Privacy in Sensor Networks against a Global Eavesdropper MOBILE COMPUTING 2012/.NET

51 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks MOBILE COMPUTING 2012/.NET

52 Revisiting Defenses against Large-Scale Online Password Guessing Attacks SECURE COMPUTING 2012/.NET

53 A Novel Anti phishing framework based on visual cryptography IMAGE PROCESSING 2012/.NET

54 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies NETWORKING (JOURNAL) 2012/.NET

55 Robust Face-Name Graph Matching for Movie Character Identification MULTIMEDIA 2012/.NET

56 Low-Complexity Compression Method for Hyperspectral Images Based on Distributed Source Coding IMAGE PROCESSING 2012/.NET

57 Balancing the Trade-Offs between Query Delay and Data Availability in MANETs PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

58 Efficient Multidimensional Fuzzy Search for Personal Information Management Systems KNOWLEDGE AND DATA ENGINEERING 2012/.NET

59 Robustness of Offline Signature Verification Based on Gray Level Features IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY
2012/.NET

60 Controllable SecureWatermarking Technique for Tradeoff Between Robustness and Security IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY 2012/.NET

61 A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition IMAGE PROCESSING 2012/.NET

61 A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition IMAGE PROCESSING 2012/.NET

62 Towards Accurate Mobile Sensor Network Localization in Noisy Environments MOBILE COMPUTING 2012/.NET

63 Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism SECURE COMPUTING 2012/.NET

64 Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning LEARNING TECHNOLOGIES 2012/.NET

65 Multi-biometric Cryptosystems Based on Feature-Level Fusion IMAGE PROCESSING 2012/.NET

DOWNLOAD BASE PAPERS:

https://rapidshare.com/files/2544105175/Dot NET.rar

Advertisements

IEEE JAVA PROJECTS 2012

1. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding CLOUD COMPUTING 2012/JAVA

2. Cloud Computing Security: From Single to Multi-Clouds CLOUD COMPUTING 2012/JAVA

3. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage CLOUD COMPUTING 2012/JAVA

4. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing CLOUD COMPUTING 2012/JAVA

5. Outsourced Similarity Search on Metric Data Assets CLOUD COMPUTING 2012/JAVA

6. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption CLOUD COMPUTING 2012/JAVA

7. Toward Secure and Dependable Storage Services in Cloud Computing CLOUD COMPUTING 2012/JAVA

8. Clustering with Multi-viewpoint-Based Similarity Measure KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

9. Efficient Extended Boolean Retrieval KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

10. Ranking Model Adaptation for Domain-Specific Search KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

11. Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

12. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA

13. Payments for Outsourced Computations PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA

14. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks NETWORKING 2012/JAVA

15. Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters NETWORKING 2012/JAVA

16. Independent Directed Acyclic Graphs for Resilient Multipath Routing NETWORKING 2012/JAVA

17. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring NETWORKING 2012/JAVA

18. Privacy- and Integrity-Preserving Range Queries in Sensor Networks NETWORKING 2012/JAVA

19. RIHT: A Novel Hybrid IP Traceback Scheme NETWORKING 2012/JAVA

20. Router Support for Fine-Grained Latency Measurements NETWORKING 2012/JAVA

21. A Stochastic Model of Multi-virus Dynamics SECURE COMPUTING 2012/JAVA

22. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING 2012/JAVA

23. Detecting and Resolving Firewall Policy Anomalies SECURE COMPUTING 2012/JAVA

24. Detecting Spam Zombies by Monitoring Outgoing Messages SECURE COMPUTING 2012/JAVA

25. On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks SECURE COMPUTING 2012/JAVA

26. Online Modeling of Proactive Moderation System for Auction Fraud Detection SECURE COMPUTING 2012/JAVA

27. Packet-Hiding Methods for Preventing Selective Jamming Attacks SECURE COMPUTING 2012/JAVA

28. Risk-Aware Mitigation for MANET Routing Attacks SECURE COMPUTING 2012/JAVA

29. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/JAVA

30. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers IMAGE PROCESSING 2012/JAVA

31. Scalable Coding of Encrypted Images IMAGE PROCESSING 2012/JAVA

32. Learn to Personalized Image Search from the Photo Sharing Websites MULTIMEDIA 2012/JAVA

33. Fast Data Collection in Tree-Based Wireless Sensor Networks MOBILE COMPUTING 2012/JAVA

34. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper MOBILE COMPUTING 2012/JAVA

35. Bootstrapping Ontologies for Web Services SERVICE COMPUTING (WEB SERVICE) 2012/JAVA

36. Handwritten Chinese Text Recognition by Integrating Multiple Contexts IMAGE PROCESSING 2012/JAVA

37. Adaptive Membership Functions for Hand-Written Character Recognition by Voronoi-based Image Zoning IMAGE PROCESSING 2012/JAVA

38. Semantics-Based Automated Service Discovery WEB SERVICE (SOA) 2012/JAVA

39. Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

40. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/JAVA

41. Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks MOBILE COMPUTING 2012/JAVA

DOWNLOAD BASE PAPERS

https://rapidshare.com/files/3188434777/JAVA.rar

IEEE MATLAB PROJECTS 2012

1. A Block-Based Pass-Parallel SPIHT Algorithm IMAGE PROCESSING 2012/MATLAB

2. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IMAGE PROCESSING 2012/MATLAB

3. A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/MATLAB

4. A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability IMAGE PROCESSING 2012/MATLAB

5. A Semisupervised Segmentation Model for Collections of Images IMAGE PROCESSING 2012/MATLAB

6. Active Visual Segmentation IMAGE PROCESSING 2012/MATLAB

7. An Energy Efficient Algrithm Based on LEACH Protocol NETWORKING (CONFERENCE) 2012/MATLAB

8. An Energy-Based Model for the Image Edge-Histogram Specification Problem IMAGE PROCESSING 2012/MATLAB

9. An Extended Visual Cryptography Algorithm for General Access Structures IMAGE PROCESSING 2012/MATLAB

10. Blind Adaptive Sampling of Images IMAGE PROCESSING 2012/MATLAB

11. Enhanced Patterns of Oriented Edge Magnitudes for Face Recognition and Image Matching IMAGE PROCESSING 2012/MATLAB

12. Fast Wavelet-Based Image Characterization for Highly Adaptive Image Retrieval IMAGE PROCESSING 2012/MATLAB

13. Image Reduction Using Means on Discrete Product Lattices IMAGE PROCESSING 2012/MATLAB

14. Image Segmentation Based on the Poincaré Map Method IMAGE PROCESSING 2012/MATLAB

15. Improved Image Recovery From Compressed Data Contaminated With Impulsive Noise IMAGE PROCESSING 2012/MATLAB

16. Low Distortion Transform for Reversible Watermarking IMAGE PROCESSING 2012/MATLAB

17. Outdoor Scene Image Segmentation based on Background Recognition and Perceptual Organization IMAGE PROCESSING 2012/MATLAB

18. Performance Analysis of a Block-Neighborhood- Based Self- Recovery Fragile Watermarking Scheme IMAGE PROCESSING 2012/MATLAB

19. Preconditioning for Edge-Preserving Image Super Resolution IMAGE PROCESSING 2012/MATLAB

20. Riverbed: A Novel User-Steered Image Segmentation Method Based on Optimum Boundary Tracking IMAGE PROCESSING 2012/MATLAB

21. Robust Watermarking of Compressed and Encrypted JPEG 2000 images IMAGE PROCESSING 2012/MATLAB

22. Segmentation of Stochastic Images with a Stochastic Random Walker Method IMAGE PROCESSING 2012/MATLAB

23. Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval. IMAGE PROCESSING 2012/MATLAB

24. Sparse Color Interest Points for Image Retrieval and Object Categorization IMAGE PROCESSING 2012/MATLAB

25. Spatially Adaptive Block-Based Super-Resolution IMAGE PROCESSING 2012/MATLAB

26. Principal Visual Word Discovery for Automatic License Plate Detection IMAGE PROCESSING 2012/MATLAB

DOWNLOAD BASE PAPERS

https://rapidshare.com/files/4276624947/MATLAB.rar

IEEE NS2 PROJECTS 2012

1. A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access MOBILE COMPUTING 2012 / NS2

2. A Trigger Identification Service for Defending Reactive Jammers in WSN MOBILE COMPUTING 2012 / NS2

3. Capacity Scaling of Wireless Ad Hoc Networks: Shannon Meets Maxwell MOBILE COMPUTING 2012 / NS2

4. Connectivity of Multiple Cooperative Cognitive Radio Ad Hoc Networks MOBILE COMPUTING 2012 / NS2

5. CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks MOBILE COMPUTING 2012 / NS2

6. DSDMAC: Dual Sensing Directional MAC Protocol for Ad Hoc Networks with Directional Antennas MOBILE COMPUTING 2012 / NS2

7. FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks MOBILE COMPUTING 2012 / NS2

8. Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network MOBILE COMPUTING 2012 / NS2

9. Improving QoS in High-Speed Mobility Using Bandwidth Maps MOBILE COMPUTING 2012 / NS2

10. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions MOBILE COMPUTING 2012 / NS2

11. Maximal Scheduling in Wireless Ad Hoc Networks with Hyper graph Interference Models VECHICULAR TECHNOLOGIES 2012 / NS2

12. TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks MOBILE COMPUTING 2012 / NS2

13. Throughput and Energy Efficiency in Wireless Ad Hoc Networks With Gaussian Channels NETWORKING 2012 / NS2

14. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL AND DISTRIBUTED SYSTEMS 2012 / NS2

DOWNLOAD BASE PAPERS

https://rapidshare.com/files/159116156/NS2.rar

IEEE ANDROID PROJECTS 2012

1. Safe Driving Using Mobile Phones IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2012/ANDROID

2. EduPad — A tablet based educational system for improving adult literacy in rural India IEEE (CONFERENCE) 2012/ANDROID

3. Designing Mobile Language Learning Applications Using Multimedia: Implications from a Small-scale Prospective Learner Study IEEE (CONFERENCE) 2012/ANDROID

4. Research and design of chatting room system based on Android Bluetooth IEEE (CONFERENCE) 2012/ANDROID

5. Design and Implementation of Improved Authentication System for Android Smartphone Users IEEE (CONFERENCE) 2012/ANDROID

6. Learn to Personalized Image Search from the Photo Sharing Websites IEEE TRANSACTIONS ON MULTIMEDIA 2012/ANDROID

7. SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency PARALLEL AND DISTRIBUTED SYSTEMS 2012/ANDROID

8. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL AND DISTRIBUTED SYSTEMS 2012/ANDROID

9. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption CLOUD COMPUTING, PARALLEL AND DISTRIBUTED SYSTEMS 2012/ANDROID

10. Payments for Outsourced Computations PARALLEL AND DISTRIBUTED SYSTEMS 2012/ANDROID

11. Outsourced Similarity Search on Metric Data Assets KNOWLEDGE AND DATA ENGINEERING 2012/ANDROID

12. A Query Formulation Language for the Data Web IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2012/ANDROID

13. PMSE A Personalized Mobile Search Engine IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2012/ANDROID

14. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators KNOWLEDGE AND DATA ENGINEERING 2012/ANDROID

15. Ranking Model Adaptation for Domain-Specific Search KNOWLEDGE AND DATA ENGINEERING 2012/ANDROID

16. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS SECURE COMPUTING (IJCE) 2012/ANDROID

17. Efficient audit service outsourcing for data integrity in clouds CLOUD COMPUTING (ELSEVIER) 2012/ANDROID

18. Ensuring Distributed Accountability for Data Sharing in the Cloud CLOUD COMPUTING, DEPENDABLE AND SECURE COMPUTING 2012/ANDROID

19. Network Assisted Mobile Computing Optimal Uplink Query Processing MOBILE COMPUTING 2012/ANDROID

20. Tram location and route navigation system using smartphone IEEE (CONFERENCE) 2012/ANDROID

DOWNLOAD BASE PAPERS

https://rapidshare.com/files/2540866611/ANDROID.rar

IEEE 2011 JAVA PROJECTS

MOBILE COMPUTING

 

1. Secure High-Throughput Multicast Routing in Wireless Mesh Networks.

2. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks.

3. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks.

4. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks.

5. Throughput Optimization in Mobile Backbone Networks.

WIRELESS COMMUNICATIONS

 

6. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks.

7. Generalized Analysis of a Distributed Energy Efficient Algorithm for Change Detection.

8. A Threshold-Selective Multiuser Downlink MAC scheme for 802.11n Wireless Networks.

9. Blind Channel Estimation for STBC Systems Using Higher-Order Statistics.

10. Improving the Performance of Wireless Ad Hoc Networks through MAC Layer Design.

11. Fundamental Limits of Information Dissemination in Wireless Ad Hoc Networks–Part II: Multi-Packet Reception.

12. Weighted Energy Detection for No coherent Ultra-Wideband Receiver Design.

NETWORKING

 

13. ProgME: Towards Programmable Network Measurement.

14. Buffer Sizing for 802.11 Based Networks.

15. Monitoring Service Systems from a Language-Action Perspective.

16. Is Cloned Code older than Non-Cloned Code?.

17. A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows.

18. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks

19. Selfish Overlay Network Creation and Maintenance.

20. SPAF: Stateless FSA-based Packet Filters.

21. Topological Transformation Approaches to TCAM-Based Packet Classification.

SECURE COMPUTING

 

22. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum-Diameter Spanning Tree.

23. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks.

24. Chip Self-Organization and Fault-Tolerance in Massively Defective Multicore Arrays.

25. Comparative Evaluation of Spoofing Defenses.

26. Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.

27. Modeling and Detection of Camouflaging Worm.

28. Nymble: Blocking Misbehaving Users in Anonym zing Networks.

29. RITAS: Services for Randomized Intrusion Tolerance.

 

NETWORK AND SERVICE MANAGEMENT

 

30. Locating Equivalent Servants over P2P Networks.

31. Achieving Bounded Matching Delay and Maximized Throughput in Information Dissemination Management Improved division by invariant integers.

 

KNOWLEDGE AND DATA ENGINEERING

 

32. Decision Trees for Uncertain Data.

33. Ranking Spatial Data by Quality Preferences.

34. A Link-Analysis Extension of Correspondence Analysis for Mining Relational Databases.

35. Load Shedding in Mobile Systems with MobiQual .

36. Adaptive Cluster Distance Bounding for High Dimensional Indexing.

37. Effective Navigation of Query Results Based on Concept Hierarchies.

38. Discovering Conditional Functional Dependencies.

39. The CoQUOS Approach to Continuous Queries in Unstructured Overlays.

40. Extended XML Tree Pattern Matching: Theories and Algorithms.

41. Learning Semi-Riemannian Metrics for Semi supervised Feature Extraction .

 

 

 

SOFTWARE ENGINEERING

 

42. Semi-Proving: An Integrated Method for Program Proving, Testing, and Debugging .

43. Verifying the Evolution of Probability Distributions Governed by a DTMC .

44. Software Module Clustering as a Multi–Objective Search Problem .

45. Genetic Algorithms for Randomized Unit Testing.

46. Developing a Single Model and Test Prioritization Strategies for Event-Driven Software.

 

CLOUD COMPUTING

 

48. Improving Utilization of Infrastructure Clouds.

49. Secure and Practical Outsourcing of Linear Programming in Cloud Computing.

50. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds.

 

Download Link:

http://www.scribd.com/ieeexploreprojects

 

IEEE 2011 DOTNET PROJECTS

KNOWLEDGE AND DATA ENGINEERING

 

1. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud.

2. Adaptive Provisioning of Human Expertise in Service-oriented Systems.

3. Bridging Socially-Enhanced Virtual Communities.

4. Data integrity proofs in cloud storage.

5. Efficient Computing of Range Aggregates against Uncertain Location Based Collections.

6. Exploring Application-Level Semantics for Data Compression.

7. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques.

8. Integration of Sound Signature in Graphical Password Authentication System.

9. Monitoring Service Systems from a Language-Action Perspective.

10. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases.

11. Optimal Service Pricing for a Cloud Cache.

12. A Personalized Ontology Model for Web Information Gathering.

13. Publishing Search Logs-A Comparative Study of Privacy Guarantees.

14. Scalable Scheduling of Updates in Streaming Data Warehouse.

15. The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor?.

16. The World in a Nutshell Concise Range Queries.

17. A Unified Probabilistic Framework for Name Disambiguation in Digital Library.

18. Effective Navigation of Query Results Based on Concept Hierarchies.

19. Bridging Domains Using World Wide Knowledge for Transfer Learning.

20. Automatic Template Extraction from Heterogeneous Web Pages.

21. Mining Web Graphs for Recommendations.

22. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis.

23. Document Clustering in Correlations Similarity Measure Space.

24. Scalable learning of collective behavior.

25. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators.

26. A Query Formulation Language for Data web.

27. On the Complexity of View Update Analysis and its Application to Annotation Propagation.

28. Concise Range Queries.

29. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases.

30. Exploring Application-Level Semantics for Data Compression.

 

WIRELESS COMMUNICATIONS

 

31. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks.

32. Throughput Optimization in High Speed Downlink Packet Access (HSDPA).

33. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems.

34. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks.

 

NETWORKING

 

35. Live Streaming with Receiver-based Peer-division Multiplexin.

36. Continuous Neighbor Discovery in Asynchronous Sensor Networks.

37. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection.

 

SECURE COMPUTING

 

38. A Policy Enforcing Mechanism for Trusted Ad Hoc Network.

39. A Tamper-Resistant Programming Language System.

40. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks.

41. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking.

42. The Geometric Efficient Matching Algorithm for Firewalls.

 

SERVICE COMPUTING (SOA)

 

43. Vulnerability Analysis in SOA-based Business Processes.

42. Automated Certification for Compliant Cloud-based Business Processes.

 

NETWORK COMPUTING

 

45. Improved division by invariant integers.

Download Link:

http://www.scribd.com/ieeexploreprojects