IEEE .NET PROJECTS
IEEE .NET PROJECTS |
- A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks
- A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
- A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm
- A feature selection algorithm based on svm average distance
- A Formal Framework for Automated Round-trip Software Engineering in Static Aspect Weaving and Transformations
- A Fusion Approach for Efficient Human Skin Detection
- A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
- A New Cell Counting Based Attack Against Tor
- A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
- A Personalized Ontology Model For Web Information Gathering
- A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group
- A Unified Spectral-Domain Approach for Saliency Detection and Its Application to Automatic Object Segmentation
- Active Visual Segmentation
- Alert Based Monitoring of Stock Trading Systems
- AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
- An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks
- An Empirical Study of Test Case Filtering Techniques Based on Exercising Information Flows
- Analysis of x-means and global k-means using tumor classification
- Anonymous Query Processing in Road Networks
- API-Based and Information-Theoretic Metrics for Measuring the Quality of Software Modularization
- Approximate Entropy-Based Epileptic EEG Detection Using Artificial Neural Networks
- Automatic Reconfiguration for Large-Scale Reliable Storage Systems
- Bridging domains using world wide knowledge for transfer learning
- Bridging Socially-Enhanced Virtual Communities
- Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels
- Collaborative Sensing to Improve Information Quality for Target Tracking in Wireless Sensor Networks
- Contrast-Independent Curvilinear Structure Detection in Biomedical Images
- Cooperative download in vehicular environments - 2012
- Cross-Layer Design in Multihop Wireless Networks
- Data Integrity Proofs In Cloud Storage
- Data leakage detection
- Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive Click Points
- Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
- Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs
- Digital Image hiding using curve let transform
- Digital Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
- Digital Image Tracing by Sequential Multiple Watermarking
- Discovering Characterizations of the Behavior of Anomalous Sub-populations
- Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups
- Distributed Throughput Maximization in Wireless Networks via Random Power Allocation
- Dynamic Authentication for Cross-Realm SOA-Based Business Processes
- Efficient Audit Service Outsourcing for Data Integrity in Clouds snifer
- Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries
- Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
- Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud
- Exploring Application-Level Semantics For Data Compression
- Fast Algorithms for Resource Allocation in Cellular Networks
- FiVaTech Page-Level Web Data Extraction from Template Pages
- Fusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
- Fuzzy based ant miner algorithm in datamining for hepatitiss
- Fuzzy Keyword Search over Encrypted Data in Cloud Computing
- Image Retargeting
- Image Super resolution Using Support Vector Regression
- Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
- Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
- Integration Of Sound Signature In Graphical Password Authentication System
- Intrusion detection: An Energy efficient approach in heterogeneous WSN
- Learning and Matching of Dynamic Shape Manifolds for Human Action recognition
- Load Balancing Multipath Switching System with Flow Slice
- Localized Multicast Efficient And Distributed Replica Detection In Large-Scale Sensor Networks
- Maximizing Rewards in Wireless Networks with Energy
- Monitoring Service Systems From A Language-Action Perspective - 2011
- Multicast Multi-path Power Efficient Routing in Mobile ADHOC Networks
- Multiple Exposure Fusion for High Dynamic Range Image Acquisition Image Processing
- NABS Novel Approaches for Biometric Systems
- Network Assisted Mobile Computing with Optimal Uplink Query Processing
- On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability
- One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases
- Optical Character Recognition for printed Tamil text using Unicode
- Optimal Service Pricing For A Cloud Cache
- Outsourced Similarity Search on Metric Data Assets
- PDE-Based Enhancement of Color Images in RGB Space
- Privacy Preserving public Auditing Data for data storage security in Cloud computing
- Publishing Search Logs – A Comparative Study Of Privacy Guarantees
- Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
- Risk-Aware Mitigation for MANET Routing Attacks
- S4 Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks
- Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
- Secure Client-Side ST-DM Watermark Embedding
- Secure Data Collection In Wireless Sensor Networks Using Randomized Dispersive Routes
- Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
- Segmentation and Sampling of Moving Object Trajectories Based on Representativeness
- Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval
- Session scheduling algorithm of grid computing
- Slow Adaptive OFDMA Systems Through Chance Constrained Programming
- Software Effort, Quality, and Cycle Time: A Study of CMM Level 5 Projects
- SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare Emergency
- Target Tracking Using a Joint Acoustic Video System
- The Awareness Network, To Whom Should I Display My Actions And, Whose Actions
- The role of context in image interpretation
- The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
- The World In A Nutshell: Concise Range Queries
- Toward Optimal Network Fault Correction in Externally Managed Overlay Networks
- VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
- View-invariant action recognition based on Artificial Neural Networks
- WSCE: A Crawler Engine for Large-Scale Discovery of Web Services
ENJOY:IEEE .NET PROJECTS
No comments:
Post a Comment