IEEE JAVA PROJECTS
- A Chat Application in Lift
- A Cooperative Diversity Based Handoff Management Scheme
- A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming - 2010
- A Dual Framework And Algorithms For Targeted Online Data Delivery - 2011
- A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service - 2011
- A Fully Distributed Proactively Secure Threshold- Multisignature Scheme
- A Generic Multilevel Architecture For Time Series Prediction - 2011
- A Link Analysis Extension Of Correspondence Analysis For Mining Relational Databases - 2011
- A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts - 2011
- A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems - 2011
- A New TCP for Persistent Packet Reordering
- A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
- A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks - 2011
- A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization - 2010
- A Survey of Payment Card Industry Data Security Standard
- A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows - 2011
- A Visual Backchannel for Large-Scale Events
- Achieving Guaranteed Anonymity in GPS Traces via Uncertainty Aware Path Cloaking - 2010
- Adaptive Cluster Distance Bounding For High-Dimensional Indexing - 2011
- Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks - 2010
- An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks - 2012
- An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System - 2012
- An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic analysis
- Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks - 2011
- Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
- Cloud Computing Security From Single to Multi-Clouds - 2012
- Clustering with Multi- View Point Based Similarity Measure - 2011
- Computation-Efficient Multicast Key Distribution
- Conditional Shortest Path Routing in Delay Tolerant Networks - 2010
- Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation - 2010
- Continuous Neighbor Discovery in Asynchronous Sensor Networks - 2011
- Controlling IP Spoofing through Interdomain Packet Filters
- Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage - 2012
- Copuled Based Metric
- Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing
- Deriving Concept-Based User Profiles from Search Engine Logs - 2010
- Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ
- Distributed Algorithms for Minimum Cost Multicast with Network Coding in Wireless Networks - 2010
- Distributional Features for Text Categorization
- Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion
- Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service - 2011
- Dynamic Load Balancing
- Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks - 2011
- Effective Navigation of Query Results Based on Concept Hierarchies - 2011
- Efficient and Robust Local Mutual Exclusion in Mobile Ad Hoc Networks
- Efficient Approximate Query Processing in Peer-to-Peer Networks
- Efficient Resource Allocation for Wireless Multicast
- Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case
- Energy-Aware Tag Anti collision Protocols for RFID Systems
- Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols - 2012
- Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common Interest
- Ensuring Distributed Accountability for Data Sharing in the Cloud - 2012
- E-School: A Web-Service Oriented Resource Based E- Iearning System
- E-science and web
- Face Recognition for smart interaction
- Fast Data Collection in Tree-Based Wireless Sensor Networks - 2012
- Fast Matrix Embedding by Matrix Extending - 2012
- Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration - 2011
- Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks - 2010
- FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks - 2012
- FireCol A Collaborative Protection Network for the Detection of Flooding DDoS Attacks - 2012
- Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
- Forward Correction and Fountain Codes in Delay Tolerant Networks - 2011
- GLIP: A Concurrency Control Protocol for Clipping Indexing
- ieee java projects list
- Image Thumbnails That Represent Blur and Noise - 2010
- Image Transmissions with Security Enhancement Based on Region and Path Diversity in Wireless Sensor Networks
- Image Transmissions with Security Enhancement Based on Region and Path Diversity in WSN/w
- Independently Verifiable Decentralized Role-Based Delegation
- Inside the Permutation-Scanning Worms Propagation Modeling and Analysis - 2010
- IRM Integrated File Replication and Consistency Maintenance in P2P Systems - 2010
- KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services - 2010
- Label-Based DV-Hop Localization Against Wormhole Attacks In Wireless Sensor Networks - 2010
- Layered Approach Using Conditional Random Fields for Intrusion Detection - 2010
- Learn to Personalized Image Search from the Photo Sharing Websites - 2012
- Live Streaming With Receiver-Based Peer-Division Multiplexing - 2011
- Load Balancing Multipath Switching System with Flow Slice - 2012
- Lord of the Links: A Framework for Discovering Missing Links in the Internet Topology
- MABS: Multicast Authentication Based on Batch Signature - 2010
- Malicious Packet Losses
- Managing Health Care Through Social Networks
- MANET Routing Protocols vs Mobility Models: A Performance Evaluation - 2011
- Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast - 2010
- Modeling And Detection Of Camouflaging Worm - 2011
- Multicast Routing with Delay and Delay Variation Constraints for Collaborative Applications on Overlay Networks
- Museum Gallery Review
- Nymble Blocking Misbehaving Users in Anonymizing Networks - 2011
- OCGRR: A New Scheduling Algorithm for Differentiated Services Networks
- On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
- On the Performance Benefits of Multihoming Route Control
- On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network - 2010
- Online Index Recommendations for High-Dimensional Databases Using Query Workloads
- Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks - 2010
- Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks - 2010
- Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding
- Optimizing Cloud Resources for Delivering IPTV Services through Virtualization - 2012
- Packet-Hiding Methods for Preventing Selective Jamming Attacks - 2012
- Packet-Hiding Methods for Preventing Selective Jamming Attacks Dependable and Secure Computing - 2012
- PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects - 2010
- pCloud: A Distributed System for Practical PIR Dependable and Secure Computing - 2012
- PDCS: Security and Privacy Support for Data-Centric Sensor Networks Ion for
- Performance Evaluation of Video Streaming over Multi-Hop Wireless Local Area Networks - 2010
- Pie Cooperative Peer-To-Peer Information Exchange In Network Coding Enabled Wireless Networks - 2010
- POPI: A User-Level Tool For Inferring Router Packet Forwarding Priority - 2010
- Portable Cloud Services Using TOSCA - 2012
- Privacy- and Integrity-Preserving Range Queries in Sensor Networks - 2012
- Privacy-Conscious Location-Based Queries in Mobile Environments - 2010
- Probabilistic Group Nearest Neighbor Queries in Uncertain Databases
- Progressive Parametric Query Optimization
- Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols
- Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks - 2010
- Radio Sleep Mode Optimization in Wireless Sensor Networks
- Randomized Protocols for Duplicate Elimination in Peer- to-Peer Storage Systems
- Ranked Reverse Nearest Neighbor Search
- Ranking Model Adaptation for Domain-Specific Search - 2012
- Rate Adaptation in Congested Wireless Networks through Real-Time Measurements - 2010
- Research on construct e-commerce site
- ROC: Resilient Online Coverage for Surveillance Applications - 2011
- Rules of Designing Routing Metrics for Greedy, Face, and Combined Greedy-Face Routing
- SAR Image Regularization With Fast Approximate Discrete Minimization
- Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports - 2011
- Secure and Practical Outsourcing of Linear Programming in Cloud Computing - 2011
- Secure Data Objects Replication in Data Grid - 2010
- Secure Socket Layer (SSL) is the redominant
- Securing User-Controlled Routing Infrastructures
- Social Connect Services
- SparkClouds: Visualizing Trends in Tag Clouds
- Stateless Multicasting in Mobile Ad Hoc Networks
- Strategyproof Mechanisms for Scheduling Divisible Loads in Bus-Networked Distributed Systems
- Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks - 2011
- TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Networks - 2010
- Team Multicasting In Mobile Adhoc Networks
- The Design and Evaluation of a Self-Organizing Superpeer Network
- The Server Reassignment Problem for Load Balancing in Structured P2P Systems
- Throughput Optimization in High Speed Downlink Packet Access - 2011
- Topology Control in Mobile Ad Hoc Networks with Cooperative Communications - 2012
- Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks - 2010
- Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks - 2012
- Towards Accurate Mobile Sensor Network Localization in Noisy Environments - 2012
- Transmission Network Planning Under Security and Environmental Constraints
- Two Techniques for Fast Computation of Constrained Shortest Paths
- Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems
- VOICE-TO-PHONEME conversion algorithoms for spaker indipendent voice-tag application in embedded platform
- WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
- XLP: A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks
Enjoy:IEEE JAVA PROJECTS
No comments:
Post a Comment