2010 new titles Dotnet 1. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing 2. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs 3. AI and Opinion Mining 4. An AbuseFree Fair Contract Signing Protocol Based on the RSA Signature 5. An economic approach for scalable and highly-available distributed applications 6. Analysis of P2P File Sharing Network’s Credit 7. Conditional Shortest Path Routing in Delay Tolerant Networks 8. Dynamic Authentication for Cross-Realm SOA-Based Business Processes 9. Efficient and Robust Detection of Duplicate Videos in a Large Database 10. Fuzzy Keyword Search over Encrypted Data in Cloud Computing 11. Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks 12. MABS Multicast Authentication Based on Batch Signature 13. Privacy-Preserving Public Auditing for Data Storage 14. SigFree A Signature-free Buffer Overflow Attack Blocker 15. Data Leakage Detection 16. Inference From Aging Information 17. VEBEK__Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks 18. A Study for Important Criteria of Feature Selection in Text Categorization Java 1. Layered Approach Using Conditional Random Fields for Intrusion Detection
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
2010 new titlesDotnet
1. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing2. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs3. AI and Opinion Mining4. An AbuseFree Fair Contract Signing Protocol Based on the RSA Signature5. An economic approach for scalable and highly-available distributed applications6. Analysis of P2P File Sharing Network’s Credit7. Conditional Shortest Path Routing in Delay Tolerant Networks8. Dynamic Authentication for Cross-Realm SOA-Based Business Processes9. Efficient and Robust Detection of Duplicate Videos in a Large Database10. Fuzzy Keyword Search over Encrypted Data in Cloud Computing11. Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor
Networks12. MABS Multicast Authentication Based on Batch Signature13. Privacy-Preserving Public Auditing for Data Storage14. SigFree A Signature-free Buffer Overflow Attack Blocker15. Data Leakage Detection16. Inference From Aging Information17. VEBEK__Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks18. A Study for Important Criteria of Feature Selection in Text Categorization
Java1. Layered Approach Using Conditional Random Fields for Intrusion Detection2. IRM Integrated File Replication and Consistency Maintenance in P2P Systems3. A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming4. Ensuring Data Storage Security in Cloud Computing5. Cooperative Caching in Wireless P2PNetworks Design, Implementation, And Evaluation6. Always Acyclic Distributed Path Computation7. A Review of the Applications of Agent Technology In Traffic and Transportation Systems8. Host-to-Host Congestion Control for TCP9. Mesh Based Multicast Routing in MANET Stable Link Based Approach10. Random Access Transport Capacity11. BinRank Scaling Dynamic Authority-Based Search Using Materialized Subgraphs12. Closeness: A New Privacy Measure for Data Publishing13. A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless
Networks14. Managing Multidimensional HistoricalAggregate Data in Unstructured P2P Networks15. Efficient and Dynamic Routing Topology Inference From End-to-End Measurements16. Novel defense mechanism against data flooding attacks in wireless ad hoc networks17. Mitigating selective forwarding attacks with a channel-aware approach in WMNS18. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability
19. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
20. PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
21. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes22. Bandwidth recycling in IEEE 802.16 Networks23. Distributed Explicit Rate Schemes in Multi -Input–Multi-Output Network Systems24. POPI A User-level Tool for Inferring Router Packet Forwarding Priority25. on MultiHop Distances in Wireless Sensor Networks with Random Node Locations26. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems27. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks28. on Modeling, Analysis, and Optimization of Packet Aggregation Systems
Java Project Titles
Domine: NETWORKING
S.No CodeProject title Description Type Year
1 SJNW01 Lightweight Online Performance Monitoringand Tuning with Embedded Gossip
In this project , a new performance monitoring approach called Embedded Gossip (EG) is designed to enable lightweight online performance monitoring and tuning.
IEEE 2009
2 SJNW02 Privacy-Aware Collaborative Spam Filtering In this project, we propose a privacy-aware framework for collaborative spam filtering , preserving message transformance technique that is highly resilient against the latest kinds of spam attacks.
IEEE 2009
3 SJNW03 Dynamic Search Algorithm in UnstructuredPeer-to-Peer Networks
In this project, we propose the dynamic serach(DS) algorithm which is a generalization of flooding and RW.
IEEE 2009
4 SJNW04 A Decentralized Method for Scaling UpGenome Similarity Search Services
This paper tackles this problem in a novel wat, which treats sequence search requests as content requests to both genome databases and similarity detection methods.
IEEE 2009
5 SJNW05 Plexus: A Scalable Peer-to-Peer ProtocolEnabling Efficient Subset Search
In this project, Plexus a peer-to-peer search protocol that provides an efficient mechanism for advertising a bit sequence(pattern), and discovering it using any subset of its 1-bits.
IEEE 2009
6 SJNW06 Cooperative Secondary Authorization Recycling In this project, an approach where each application server recycles previously received authorizations and shares them with other application servers to mask authorization server failures and network delays.
IEEE 2009
7 SJNW07 Robust Rate Control for HeterogeneousNetwork Access in Multihomed Environments
In this project, a novel robust flow control framework for heterogeneous network access by devices with multi-homing capabilities.
IEEE 2009
Domain: Datamining
S.No CodeProject title Description Type Year
1 SJDM01 Catching the Trend: A Framework for ClusteringConcept-Drifting Categorical Data
In this project, the framework is practical for detecting drifting concepts in time-evolving categorical data.
We dealt with content selection problem withy content should be outsourced in CDN’s surrogate servers.
IEEE 2009
3 SJDM03 IMine: Index Support for Item Set Mining The IMine index is a novel index structure that supports efficient item set mining into a relational DBMS.
IEEE 2009
4 SJDM04 Progressive Parametric Query Optimization We propose instead to progressively explore the parameter space and build a parametric plan during several executions of the same query.
IEEE 2009
Domain: Mobile Computing
S.No Code Project title Description Type Year
1 SJMC01 A Tabu Search Algorithm for Cluster Buildingin Wireless Sensor Networks
In this project the main challenge in wireless sensor network deployment pertains to optimizing energy consumption when collecting data from sensor nodes.
IEEE 2009
2 SJMC02 Efficient Broadcasting in MobileAd Hoc Networks
In our project two efficient broadcasting algorithms based on 1-hop neighbor information. In the first part of the paper, we consider sender-based broadcasting
IEEE 2009
algorithms, specifically the algorithm proposed by Liu et al.
3 SJMC03 Headlight Prefetching and Dynamic Chaining for Cooperative Media Streaming in Mobile Environments
In this project our goal is to sharing audio and video resources between Media environments.
In this project Location Guard—a location hiding technique for securing overlay file storage systems from targeted file attacks
IEEE 2009
2 SJNS02 A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
In this project novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other.
IEEE 2009
3 SJNS03 Dynamic Routing with Security Considerations In this project a dynamic routing algorithm that could randomize delivery paths for data transmission.
IEEE 2009
4 SJNW04 Efficient Node Admission and CertificatelessSecure Communication in Short-Lived MANETs
This project, we focus on a common type of MANETS that is formed on a temporary efficient, and a fully no interactive admission technique geared for this type of network.
IEEE 2009
Domain: Grid Computing
S.No CodeProject title Description Type Year
1 SJGC01 Bi-Criteria Scheduling of Scientific Grid Workflows In this project we propose a new bi-criteria scheduling specifiucation method defining for the secondary criterion a sliding constraint as a function of the primary criterion.
IEEE 2009
2 SJGC02 TCP Performance in Flow-Based Mix Networks:Modeling and Analysis
In this project, we systematically address TCP performance issues of flow-based mix networks. A mix’s batching and reordering schemes can dramatically reduce TCP throughput due to out-of-order packet delivery
IEEE 2009
3 SJGC03 Adaptive Task Checkpointing and Replication:Toward Efficient Fault-Tolerant Grids
In this project we introduce several heuristics that dynamically adapt to various parameters based on information on grid status to provide high job throughput in the presence of failure while reducing the system overhead.
IEEE 2009
Sno Project Title -JAVA Type Year01 Flexible Rollback Recovery in Dynamic
Heterogeneous Grid ComputingIEEE 2009
02 A Divide-and-Conquer Approach for Minimum Spanning Tree-Based Clustering
IEEE 2009
03 AN OPTIMIZED SOLUTION FOR MOBILE
COMPUTING
IEEE 2009
04 Detecting Malacious Packet IEEE 2009
05 Dynamic Routing with Security Considerations IEEE 200906 EnergyMaps For Mobile Wireless networks
coherence Time Versues SpredIEEE 20009
07 Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
IEEE 2009
08 Interactive Correction and Recommendation forComputer Language Learning and Training
IEEE 2009
09 Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
IEEE 2009
10 Large Connectivity for Dynamic RandomGeometric Graphs
IEEE 2009
11 Measuring Capacity Bandwidth of TargetedPath Segments
IEEE 2009
12 Mitigation of Control Channel Jamming under Node Capture Attacks
IEEE 2009
13 Mobility Management Approaches for
Mobile IP Networks
IEEE 2009
14 Monitoring the Application-Layer DDoS Attacks for Popular Websites
IEEE 2009
`15 Multiple Routing Configurations for Fast IP
Network Recovery
IEEE 2009
16 RAAM: ROUTING ALGORITHM USING ANT
AGENTS FOR MANETS
IEEE 2009
17 Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
IEEE 2009
18 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
IEEE 2008
19 A Geometric Approach to Improving ActivePacket Loss Measurement
IEEE 2008
20 A LOSSLESS COMPRESSION SCHEME FOR BAYER COLOR FILTER ARRAY IMAGES
IEEE 2008
21 A Model-Based Approach to Evaluation of the IEEE 200822 A NEW HEURISTIC FOR MINIMIZING THE
DELAY VARIATION IN MULTICASTINGIEEE 2008
23 A PRECISE TERMINATION CONDITION OF THE PROBABIISTIC PACKET MARKING ALGORITHM
IEEE 2008
24 An Efficient Association Rule Mining Algorithm In Distributed Databases
IEEE 2008
25 An Efficient Clustering Scheme to Exploit IEEE 200826 Bandwidth Estimation for IEEE 802.11-Based Ad
Hoc NetworksIEEE 2008
27 Constructing Inter-Domain Packet Filters to
Control IP Spoofing Based on BGP Updates
IEEE 2008
28 C-TREND: Temporal Cluster Graphs for Identifying and Visualizing Trends in Multiattribute Transactional Data
IEEE 2008
29 Efficient and Secure Content Processing
and Distribution by Cooperative Intermediaries
IEEE 2008
30 Efficient and Secure Content Processing
and Distribution by Cooperative Intermediaries
IEEE 2008
31 Image Restoration Using Space-Variant GaussianScale Mixtures in Over complete Pyramids
IEEE 2008
32 Incremental Learning of Chunk Data for Online
Pattern Classification Systems
IEEE 2008
33 Measurement-Based Admission Control at Edge
Routers
IEEE 2008
34 Modeling and Automated containment of worms IEEE 2008
35 Modeling and AutomatedContainment of Worms
IEEE 2008
36 NDT: A Model-Driven Approach
For Web Requirements
IEEE 2008
37 Performance Analysis and Optimization of
Handoff Algorithms in Heterogeneous Wireless
Networks
IEEE 2008
38 Problem Oriented Software EngineeringSolving the Package Router Control Problem
IEEE 2008
39 Sequential Object Sharing for Edge Services IEEE 2008
40 An Integrated Framework for Security and
Dependability
IEEE 2008
41 A Signature-Based Indexing Method for Efficient
Content-Based Retrieval of Relative Temporal
Patterns
IEEE 2008
42 Truth Discovery with Multiple Conflicting InformationProviders on the Web.
IEEE 2008
43 Two Techniques for Fast Computation ofConstrained Shortest Paths
IEEE 2008
44Using the Conceptual Cohesion of Classes for
Fault Prediction in Object-Oriented Systems
IEEE 2008
45 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
IEEE 2008
46 Dual Link Failure Resiliency through IEEE 200847 EFFICIENT RESOURCE ALLOCATION FOR IEEE 200848 Efficient Routing in Intermittently Connected
Mobile NetworksIEEE 2008
49 Enhancing Search Performance in IEEE 200850 Mitigating Performance Degradation in Congested
Sensor NetworksIEEE 2008
51 On the Performance Benefits of IEEE 200852 ONLINE INDEX RECOMMENDATIONS FOR
HIGHIEEE 2008
53 Optimal State Allocation for Multicast IEEE 200854 PROBABILISTIC GROUP NEAREST NEIGHBOR
QUERY IN UNCERTAIN DATABASEIEEE 2008
55 Ranked Reverse Nearest Search IEEE 200856 Securing User IEEE 200857 Strategy proof Mechanisms for Scheduling
Divisible Loads in BusIEEE 2008
58 The Server Reassignment Problem for Load Balancing in Structured Peer to Peer Systems
IEEE 2008
59 USING THE CONCEPTUAL COHESION OF CLASSES FOR FAULT PREDICTION IN OBJECT
IEEE 2008
60 An Adaptive Programming Model IEEE 200761 Detecting Phishing Web Pages with Visual
Similarity Assessment Based on Earth Mover’s
Distance (EMD)
IEEE 2006
62 Detecting Internet Applications Using Neural Networks
IEEE 2006
63 Distributed Cache Updating for the Dynamic Source Routing Protocol
IEEE 2006
64 Personal Authentication Using 3-D Finger Geometry
IEEE 2006
65 Face Recognition Using Laplacianfaces IEEE 200566 Voice Based Security System IEEE 200567 Authentication of People by their typing patterns IEEE 200468 Distributed Database Architecture for Global
Roaming in Next –Generation Mobile Network
IEEE 2004
69 Network Border Patrol: Preventing Congestion
Collapse
IEEE 2004
70 ODAM IEEE 200471 Noise Reduction by Fuzzy Image Filtering IEEE 2003
72 Telecom Connection System WEB -73 Automated Ballot Vote WEB -74 Corporate Help Desk WEB -75 Digital Tunes WEB -76 Easy Journey WEB -77 Elegant Trade Supervision System WEB -78 File Tracking System WEB -79 Friendz Avenue WEB -80 Grumell Cell WEB -81 High-Fi Infromary WEB -82 Insurance WEB -83 Intra Communication Software WEB -84 IT Enabled Acadamic WEB -85 James Mailing System WEB -86 Mobile Banking WEB -87 Multi Banking System WEB -88 My Mission Without Crime WEB -89 Net Auction WEB -90 Online Tele Network WEB -91 Organizational Conference WEB -92 Resorts Management WEB -93 Resource Pool WEB -94 Unified Database Interface WEB -95 Voyage Management WEB -96 Web Pharmaceuticals WEB -97 Web based Mail client WEB -98 Web Locker WEB -99 File Splitter WEB -100 SAX-XML Parser WEB -101 Virtual Class Room WEB -102 Stock Agent WEB -103 Search Engine WEB -104 Customer Support Service Operation WEB -105 Distributed Channel Management Syste1 WEB -
106 Chart Generator NET -107 Computer Resource Management System NET -
108 COREBANKING NET -109 DBReport NET -110 Desk Share Introdution NET -111 DeskShare NET -112 Digital Water Marking NET -113 Distributed Channel Management System NET -114 DNSSERVER NET -115 EautoMarket NET -116 ENTERPRISE RESOURCE INFORMATION
SYSTEMNET -
117 FTPC introduction NET -118 FTPM NET -119 Image Processing NET -120 INTRANET CHATTING NET -121 Intranet Protocal NET -122 IRC-CLIENT Itroduction NET -123 Jedit NET -124 JFSecurity NET -125 JMOL NET -126 JWAVE NET -127 NetProxey introduction NET -128 PDF Parser NET -129 PTSM NET -130 SEARCH DESK NET -131 SQL Client NET -132 Stock-Agent introduction NET -133 Virtual TV NET -
Dot Net Project Titles
Domine: NETWORKING
S.No CodeProject title Description Type Year
1 SDNW01 A Trace-Driven Approach to Evaluate the Scalability of P2P-Based Video-on-Demand Service
This model proposes improving the scalability of video-on-demand service over internet by analyzing user behavior
IEEE 2009
2 SDNW02 A Parameterized Approach to Spam-ResilientLink Analysis of the Web
This paper propose ranking of url based on counting total no. visitors online on the url& counting total no. visitors on the application.
IEEE 2009
3 SDNW03 Effective Collaboration with InformationSharing in Virtual Universities This paper aims to
build a new rule-based framework to identify and address issues of sharing in virtual university environments through role-based access control (RBAC) managememt for e-learning systems.
IEEE 2009
4 SDNW04 Enhancing Downlink Performance inWireless Networks by SimultaneousMultiple Packet Transmission In this paper , we
consider using simultaneous Multiple Packet Transmission(MPT) to improve the downlink performance of networks. The sender can send two compatible packets simultaneous to two distinct receivers.
IEEE 2009
5 SDNW05 Network-Coding-Based Signal Recovery forEfficient Scheduling in Wireless Networks
In this paper, we propose some practicle schemes to recover the useful signal from the collided signals for different types of wireless channels; thus, the throughput and network efficiency can greatly be increased. The proposed schemes are based on the network coding
IEEE 2009
technique and performed on the physical layer.
6 SDNW06 Measuring Capacity Bandwidth of Targeted Path Segments.
In this project we are measuring the capacity of network bandwidth using1 single packet probing method.2 packet bunch probing method.3 uniform packet-pair probing method.4 non-uniform packet pair probing method.
IEEE 2009
7 SDNW07 Histogram-Based Global Load Balancingin Structured Peer-to-Peer Systems
This project explains load balancing in networks.1 Maintaining the load information.2. Redistributing the load if it exceeds the limit.
IEEE 2009
Domain: Datamining
S.No CodeProject title Description Type Year
1 SDDM01Optimal Lot Sizing Policies for Sequential Online Auctions
This project is to Reduce lots( number of items) sizes for onhline selling or buying.
IEEE 2009
2 SDDM02 Distributional Features for Text Categorization This project explains use of the semantic communities and the emerging semantic
IEEE 2009
relations in a dynamic complex network of learning resources.
Domain: Network Security
S.No CodeProject title Description Type Year
1 SDNS01 Enhanced Security for Online ExamsUsing Group Cryptography
This project proposes enhanced secure online exam management environment mediated by group cryptography using remote monitoring and control of ports
IEEE 2009
2 SDNS02 A Secure Mobile Healthcare System usingTrust-Based Multicast Scheme
This project shows about the technique of trust evaluation without a centeralized trust managent authority and propose a trust evaluation model that can efficiently calculate the trustworthiness of mobile healthcare.
IEEE 2009
3 SDNS03 Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens
In this project, we explored private information-sharing Behaviour of preteen and early teen internet users by social congnitive theory and rotection motivation theory.
IEEE 2009
Domain: Image Processing
S.No Code Project title Description Type Year
1 SDIP01 Gradient Estimation Using Wide Support Operators
This project proposes Removing noise from picture by detecting edges.
IEEE 2009
2 SDIP02 Sharpening Dermatological Color ImagesIn the Wavelet Domain
This project proposes finding boundaries in the image and adaptive
IEEE 2009
image demising.3 SDIP03 Continuous Glass Patterns for Painterly
RenderingIn this project, we are converting digital photograph into painting image.
IEEE 2009
Domain: Software Engineering
S.No Code Project title Description Type Year
1 SDSE01 Variability and Reproducibility in Software Engineering: A Study of Four Companiesthat Developed the Same System
This project proposes increasing reproducibility and quality in software product
IEEE 2009
2 SDSE02 Predicting Project Velocity in XP Using aLearning Dynamic Bayesian Network Model
This project, Accurate prediction and risk assessment in XP using Bayesian Network Model
IEEE 2009
Domain: Multimedia
S.No Code Project title Description Type Year
1 SDMM01 AUTOMATED BIDDING FOR MEDIA SERVICES AT THE EDGE OF A CONTENT DELIVERY NETWORK
This project downloading and transmitting data’s depending on user accounts.
IEEE 2009
Domain: Mobile Computing
S.No Code Project title Description Type Year
1 SDMC01 Overlapped Carrier-Sense Multiple Access(OCSMA) in Wireless Ad Hoc Networks
This project proposed for enchancing network throughput through transferring content to station(source to destination) is done
IEEE 2009
by transferring data through nearby nodes.
2 SDMC02 Signaling for Multimedia Conferencingin Stand-Alone Mobile Ad Hoc Networks
This project, passing data through invitation of neighboring nodes and an algorithm proposed for the same.
IEEE 2009
Dot Net Project Titles
S.No Project Title Dot Net Type Year1 A Gen2-Based RFID Authentication Protocol for Security and Privacy IEEE 20092 A Tabu Search Algorithm for Cluster Building IEEE 20093 Analysis of Shortest Path Routing for Large IEEE 20094 Biased Random Walks in Uniform Wireless Networks IEEE 20095 Cell Breathing Techniques for Load Balancing in Wireless LANs IEEE 2009
6Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period IEEE 2009
7Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows IEEE 2009
8English to Spanish Translation of Signboard Images from Mobile Phone Camera IEEE 2009
9Explicit Load Balancing Technique for NGEO Satellite IP Networks with On IEEE 2009
10 Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks IEEE 2009
11Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking IEEE 2009
12Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks IEEE 2009
13On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint Routing and Coverage Constraint IEEE 2009
14RandomCast An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks IEEE 2009
15Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications IEEE 2009
16Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services IEEE 2009
17 Route Stability in MANETs under the Random Direction Mobility Model IEEE 200918 Secure and Policy-Compliant Source Routing IEEE 200919 The Effectiveness of Checksums for Embedded Control Networks IEEE 2009
20Two Blocking Algorithms on Adaptive Binary Splitting Single and Pair Resolutions for RFID Tag Identification IEEE 2009
21A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems IEEE 2008
22 A Geometric Approach to Improving Active Packet Loss Measurement IEEE 200823 A New Model For Dissemination Of XML Content IEEE 2008
24A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video IEEE 2008
25A Self-Repairing Tree Topology Enabling Content-Based Routing in Mobile Ad Hoc Networks IEEE 2008
26A Wavelet-Laplace Variation Technique For Image Deconvolution and Inpainting IEEE 2008
27 Active Learning Methods for Interactive Image Retrieval IEEE 2008
28An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis IEEE 2008
30 Analyzing and Managing Role-Based Access Control Policies IEEE 200831 Bandwidth-Satisfied Multicast Trees in MANETs IEEE 200832 BENEFIT-BASED DATA CACHING IN AD HOC NETWORKS IEEE 200833 Computation-Efficient Multicast Key Distribution IEEE 2008
34Continuous Delivery Message Dissemination Problems under the Multicasting IEEE 2008
35 Credit Card Fraud Detection Using Hidden Markov Model IEEE 2008
36Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups IEEE 2008
37 Distributed Mobility Management for Target Tracking in IEEE 2008
38 Efficient 2-D Grayscale Morphological Transformations With Arbitraly Flat Structuring Elements IEEE 2008
39 Efficient Broadcasting Using Network Coding IEEE 200840 Efficient Resource Allocation for Wireless Multicast IEEE 2008
41Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case IEEE 2008
42 Estimation of Defects Based on Defect Decay Model: ED3M IEEE 200843 Grid Service Discovery with Rough Sets IEEE 200844 Hardware enhanced association rule mining with Hashing and Pipelining IEEE 2008
45HBA: Distributed Metadata Management for Large Cluster-Based Storage Systems IEEE 2008
46 High resolution Animated Scenes from Stills IEEE 2008
47Image Interpolation by Adaptive 2-D Autoregressive Modeling and Soft-Decision Estimation IEEE 2008
48 Incentive-Based Scheduling for Market-Like Computational Grids IEEE 200849 Localized Sensor Area Coverage with Low Communication Overhead IEEE 200850 Mining Weighted Association Rules without Pre-assigned Weights IEEE 200851 On Guaranteed Smooth Switching for Buffered Crossbar Switches IEEE 200852 On the Computational Complexity and Effectiveness of N IEEE 2008
53Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High- Capacity Approach IEEE 2008
54Piecewise Linear Digital Curve Representation And Compression Using Graph Theory And a Line Segment Alphabet IEEE 2008
55 Probabilistic Packet Marking for Large Scale IP Trace back IEEE 2008
56Rate Allocation and Network Lifetime Problems for Wireless Sensor Networks IEEE 2008
57 Rateless Forward Error Correction for Topology-Transparent Scheduling IEEE 200858 Semantic Ideation Learning for Agent IEEE 200859 Semantics-Based Design for Secure Web Services IEEE 200860 SSL Backend Forwarding scheme in Cluster IEEE 200861 Statistical Techniques for Detecting Traffic Anomalies through Packet IEEE 2008
62Temporal Partitioning of Communication Resources in an Integrated Architecture IEEE 2008
63Trustworthy Computing under Resource Constraints with the DOWN Policy IEEE 2008
64Vision Processing for Real-time 3-D Data Acquisition Based on Coded Structured Light IEEE 2008
65Watermarking Relational Databases Using Optimization-Based Techniques IEEE 2008
66A Coupled Statistical Model for Face Shape Recovery From Brightness Images IEEE 2007
67Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks IEEE 2007
68A Formal Framework for Automated Round-trip Software Engineering in Static Aspect Weaving and Transformations IEEE 2007
69 Adaptive Route Optimization in Hierarchical Mobile IPV6 Networks IEEE 200770 Alert Based Monitoring of Stock Trading Systems IEEE 2007
71An Empirical Study of Test Case Filtering Techniques Based on Exercising Information Flows IEEE 2007
72API-Based and Information Theoretic Metrics for Measuring the Quality of Software Modularization IEEE 2007
73 Detecting Wide Lines Using Isotropic Nonlinear Filtering IEEE 200774 Detection and removal of cracks and in digitized Paintings IEEE 200775 Digital Image Tracing by Sequential Multiple Watermarking IEEE 200776 Distributed Collaborative Key Agreement for Dynamic Peer Groups IEEE 200777 EEG Automated Detection of Epilepsy Using Neural Networks IEEE 200778 Efficient Approximate Query Processing in Peer-to-Peer Networks IEEE 2007
79Efficient Broadcasting with Guaranteed Coverage in Mobile AD-HOC Networks IEEE 2007
80 High Resolution Animated Scenes from Stills IEEE 200781 Image Superresolution Using Support Vector Regression IEEE 2007
82Learning and Matching of Dynamic Shape Manifolds for Human Action Recognition IEEE 2007
83Morphological Granulometric Features of Nucleus in Automatic Bone Marrow White Blood Cell Classification IEEE 2007
84 Perceptual Color Correction Through Variational Techniques IEEE 2007
85Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols IEEE 2007
86 Vehicle detection and tracking using acoustic and video sensors IEEE 200787 Web Search and Information Retrieval using pFusion Architecture IEEE 200788 Web Server load Balancing using SSL Back-End Forwarding Method IEEE 2007
89Digital Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paint IEEE 2006
90 APGENCO Web91 AQA India Web92 Back to My Village Web93 BACKUP AND RECOVERY SCHEDULER Web94 Client Server Based Live Meeting Web95 Cool cab Service Web96 Corporate Project Team Management Web97 Custoer Care Service Web98 Distributed Payroll Management System Web99 Eazy Shop Web
100 Evaluation of Employee Performance Web101 EmentoringForWomen Web102 Employee Functioning Maintenance Web103 EWebsite for Placement Consultant Portal Web104 fianance and accounting Web105 HireWebPortal Web106 Image Gallary Web107 India Mart Web108 Insurance On InternetAbstract Web109 Inventory Web110 JobOrderSystem Web111 LANMGR Web112 ManagementofProjectTrackingandEmployeeTestcenter Web113 Municipal Administration Abstract Web114 NetworkBasedStockPileAuditor_Over Web
115An Integrated and Intelligent System for Issue Tracking, Auto Routing and Lead Management Web
116 Online community for students of college with help desk facility Web117 Organizationinternalsurvey Web118 PARCEL TRACKING Web119 SayNoToAddict Web120 StudentRecordSystemAbstract Web121 VirtualClassRoomAbstract Web122 Visamanagementsystem Web123 Web Alerts Web124 WEBSITE CONTENT ADMINISTRATION TOOL Web125 Work Share Point Web126 Affable Circle Web127 ALUMINI Web128 AUTOMATED REFORMATORY Web129 Automation of Indemnity Policy Web130 Balance Sheet Supervision Web131 Buggy Engage Web132 BUNGLE HANDLING Web