Monday 17 March 2014

IEEE JAVA PROJECTS

 IEEE JAVA PROJECTS

 
IEEE JAVA PROJECTS
IEEE JAVA PROJECTS



  • A Chat Application in Lift
  • A Cooperative Diversity Based Handoff Management Scheme
  • A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming - 2010
  • A Dual Framework And Algorithms For Targeted Online Data Delivery - 2011
  • A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service - 2011
  • A Fully Distributed Proactively Secure Threshold- Multisignature Scheme
  • A Generic Multilevel Architecture For Time Series Prediction - 2011
  • A Link Analysis Extension Of Correspondence Analysis For Mining Relational Databases - 2011
  • A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts - 2011
  • A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems - 2011
  • A New TCP for Persistent Packet Reordering
  • A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
  • A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks - 2011
  • A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization - 2010
  • A Survey of Payment Card Industry Data Security Standard
  • A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows - 2011
  • A Visual Backchannel for Large-Scale Events
  • Achieving Guaranteed Anonymity in GPS Traces via Uncertainty Aware Path Cloaking - 2010

  • Adaptive Cluster Distance Bounding For High-Dimensional Indexing - 2011
  • Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks - 2010
  • An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks - 2012
  • An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System - 2012
  • An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic analysis
  • Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks - 2011
  • Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
  • Cloud Computing Security From Single to Multi-Clouds - 2012
  • Clustering with Multi- View Point Based Similarity Measure - 2011
  • Computation-Efficient Multicast Key Distribution
  • Conditional Shortest Path Routing in Delay Tolerant Networks - 2010
  • Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation - 2010
  • Continuous Neighbor Discovery in Asynchronous Sensor Networks - 2011
  • Controlling IP Spoofing through Interdomain Packet Filters
  • Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage - 2012
  • Copuled Based Metric
  • Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing
  • Deriving Concept-Based User Profiles from Search Engine Logs - 2010
  • Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ
  • Distributed Algorithms for Minimum Cost Multicast with Network Coding in Wireless Networks - 2010
  • Distributional Features for Text Categorization
  • Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion
  • Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service - 2011
  • Dynamic Load Balancing
  • Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks - 2011
  • Effective Navigation of Query Results Based on Concept Hierarchies - 2011
  • Efficient and Robust Local Mutual Exclusion in Mobile Ad Hoc Networks
  • Efficient Approximate Query Processing in Peer-to-Peer Networks
  • Efficient Resource Allocation for Wireless Multicast
  • Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case
  • Energy-Aware Tag Anti collision Protocols for RFID Systems
  • Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols - 2012
  • Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common Interest
  • Ensuring Distributed Accountability for Data Sharing in the Cloud - 2012
  • E-School: A Web-Service Oriented Resource Based E- Iearning System
  • E-science and web
  • Face Recognition for smart interaction
  • Fast Data Collection in Tree-Based Wireless Sensor Networks - 2012
  • Fast Matrix Embedding by Matrix Extending - 2012
  • Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration - 2011
  • Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks - 2010
  • FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks - 2012
  • FireCol A Collaborative Protection Network for the Detection of Flooding DDoS Attacks - 2012
  • Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
  • Forward Correction and Fountain Codes in Delay Tolerant Networks - 2011
  • GLIP: A Concurrency Control Protocol for Clipping Indexing
  • ieee java projects list
  • Image Thumbnails That Represent Blur and Noise - 2010
  • Image Transmissions with Security Enhancement Based on Region and Path Diversity in Wireless Sensor Networks
  • Image Transmissions with Security Enhancement Based on Region and Path Diversity in WSN/w
  • Independently Verifiable Decentralized Role-Based Delegation
  • Inside the Permutation-Scanning Worms Propagation Modeling and Analysis - 2010
  • IRM Integrated File Replication and Consistency Maintenance in P2P Systems - 2010
  • KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services - 2010
  • Label-Based DV-Hop Localization Against Wormhole Attacks In Wireless Sensor Networks - 2010
  • Layered Approach Using Conditional Random Fields for Intrusion Detection - 2010
  • Learn to Personalized Image Search from the Photo Sharing Websites - 2012
  • Live Streaming With Receiver-Based Peer-Division Multiplexing - 2011
  • Load Balancing Multipath Switching System with Flow Slice - 2012
  • Lord of the Links: A Framework for Discovering Missing Links in the Internet Topology
  • MABS: Multicast Authentication Based on Batch Signature - 2010
  • Malicious Packet Losses
  • Managing Health Care Through Social Networks
  • MANET Routing Protocols vs Mobility Models: A Performance Evaluation - 2011
  • Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast - 2010
  • Modeling And Detection Of Camouflaging Worm - 2011
  • Multicast Routing with Delay and Delay Variation Constraints for Collaborative Applications on Overlay Networks
  • Museum Gallery Review
  • Nymble Blocking Misbehaving Users in Anonymizing Networks - 2011
  • OCGRR: A New Scheduling Algorithm for Differentiated Services Networks
  • On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
  • On the Performance Benefits of Multihoming Route Control
  • On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network - 2010
  • Online Index Recommendations for High-Dimensional Databases Using Query Workloads
  • Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks - 2010
  • Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks - 2010
  • Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding
  • Optimizing Cloud Resources for Delivering IPTV Services through Virtualization - 2012
  • Packet-Hiding Methods for Preventing Selective Jamming Attacks - 2012
  • Packet-Hiding Methods for Preventing Selective Jamming Attacks Dependable and Secure Computing - 2012
  • PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects - 2010
  • pCloud: A Distributed System for Practical PIR Dependable and Secure Computing - 2012
  • PDCS: Security and Privacy Support for Data-Centric Sensor Networks Ion for
  • Performance Evaluation of Video Streaming over Multi-Hop Wireless Local Area Networks - 2010
  • Pie Cooperative Peer-To-Peer Information Exchange In Network Coding Enabled Wireless Networks - 2010
  • POPI: A User-Level Tool For Inferring Router Packet Forwarding Priority - 2010
  • Portable Cloud Services Using TOSCA - 2012
  • Privacy- and Integrity-Preserving Range Queries in Sensor Networks - 2012
  • Privacy-Conscious Location-Based Queries in Mobile Environments - 2010
  • Probabilistic Group Nearest Neighbor Queries in Uncertain Databases
  • Progressive Parametric Query Optimization
  • Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols
  • Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks - 2010
  • Radio Sleep Mode Optimization in Wireless Sensor Networks
  • Randomized Protocols for Duplicate Elimination in Peer- to-Peer Storage Systems
  • Ranked Reverse Nearest Neighbor Search
  • Ranking Model Adaptation for Domain-Specific Search - 2012
  • Rate Adaptation in Congested Wireless Networks through Real-Time Measurements - 2010
  • Research on construct e-commerce site
  • ROC: Resilient Online Coverage for Surveillance Applications - 2011
  • Rules of Designing Routing Metrics for Greedy, Face, and Combined Greedy-Face Routing
  • SAR Image Regularization With Fast Approximate Discrete Minimization
  • Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports - 2011
  • Secure and Practical Outsourcing of Linear Programming in Cloud Computing - 2011
  • Secure Data Objects Replication in Data Grid - 2010
  • Secure Socket Layer (SSL) is the redominant
  • Securing User-Controlled Routing Infrastructures
  • Social Connect Services
  • SparkClouds: Visualizing Trends in Tag Clouds
  • Stateless Multicasting in Mobile Ad Hoc Networks
  • Strategyproof Mechanisms for Scheduling Divisible Loads in Bus-Networked Distributed Systems
  • Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks - 2011
  • TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Networks - 2010
  • Team Multicasting In Mobile Adhoc Networks
  • The Design and Evaluation of a Self-Organizing Superpeer Network
  • The Server Reassignment Problem for Load Balancing in Structured P2P Systems
  • Throughput Optimization in High Speed Downlink Packet Access - 2011
  • Topology Control in Mobile Ad Hoc Networks with Cooperative Communications - 2012
  • Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks - 2010
  • Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks - 2012
  • Towards Accurate Mobile Sensor Network Localization in Noisy Environments - 2012
  • Transmission Network Planning Under Security and Environmental Constraints
  • Two Techniques for Fast Computation of Constrained Shortest Paths
  • Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems
  • VOICE-TO-PHONEME conversion algorithoms for spaker indipendent voice-tag application in embedded platform
  • WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
  • XLP: A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks





Enjoy:IEEE JAVA PROJECTS

No comments:

Post a Comment