Sunteți pe pagina 1din 5

info@eruditeinfo.

com

+91-9014131492 IEEE BASED DOTNET PROJECTS

S.N O
EIDN 01 EIDN 02 EIDN 03 EIDN 04 EIDN 05 EIDN 06 EIDN 07 EIDN 08 EIDN 09 EIDN 10 EIDN 11 EIDN 12 EIDN 13 EIDN 14 EIDN 15

PROJECT TITLES
HOMOMORPHIC PROPERTY-BASED CONCURRENT ERROR DETECTION OF RSA: A COUNTERMEASURE TO FAULT ATTACK VARIABILITY-AWARE TASK ALLOCATION FOR ENERGYEFFICIENT QUALITY OF SERVICE PROVISIONING IN EMBEDED STREAMING MULTIMEDIA APPLICATIONS STRUCTURAL REDUCTION TECHNIQUES FOR LOGIC-CHAIN BRIDGING FAULT DIAGNOSIS EFFICIENT 2-APPROXIMATION ALGORITHMS FOR COMPUTING 2-CONNECTED STEINER MINIMAL NETWORKS A FULLY DISTRIBUTED METHOD TO DETECT AND REDUCE CUT VERTICES IN LARGE-SCALE OVERLAY NETWORKS A PATTERN GENERATION TECHNIQUE FOR MAXIMIZING SWITCHING SUPPLY CURRENTS CONSIDERING GATE LAYS FAST IDE NTIFICATION OF UNDETECTABLE TRANSITION FAULTS UNDERFUNCTIONAL BROAD SI TESTS UNEQUAL ERROR PROTECTION FOR STREAMING MEDIA BASED ON RATELESS CODES LOCALITY-PRESERVING CLUSTERING AND DISCOVERY OF RESOURCES IN WI -AREA DISTRIBUTED COMPUTATIONAL GRIDS TRAID: EXPLOITING TEMPORAL REDUNDANCY AND SPATIAL REDUNDANCY TO BOOST TRANSACTION PROCESSING SYSTEMS PERFORMANCE LOAD-BALANCING MULTIPATH SWITCHING SYSTEM WITH FLOW SLICE APPROXIMATING RATE-DISTORTION GRAPHS OF INDIVIDUAL DATA: EXPERIMENTS IN LOSSY COMPRESSION AND NOISING DISTRIBUTED MINIMUM SPANNING TREE MAINTENANCE FOR TRANSIENT NO FAILURES AN ONLINE FAILURE DETECTION METHOD FOR DATA BUSES USING MULTITHRESHOLD RECEIVING LOGIC CENTRALIZED AND CLUSTERED K-COVERAGE PROTOCOLS FOR WIRELESS SENSOR NETWORKS

DOMAIN
NETWORKING

YEA R
2012

NETWORKING

2012

NETWORKING NETWORKING NETWORKING NETWORKING NETWORKING NETWORKING NETWORKING

2012 2012 2012 2012 2012 2012 2012

NETWORKING

2012

NETWORKING NETWORKING

2012 2012

NETWORKING NETWORKING NETWORKING

2012 2012 2012

#11-13-916/52, II Floor,Greenhills colony, Raod No 1, Kothapet. Hyd-35. Ph:04064609797

info@eruditeinfo.com
EIDN 16 EIDN 17 EIDN 18 EIDN 19 EIDN 20 EIDN 21 EIDN 22 EIDN 23 EIDN 24 EIDN 25 EIDN 26 EIDN 27 EIDN 28 EIDN 29 EIDN 30 EIDN 31 EIDN 32 EIDN 33

+91-9014131492
NETWORKING NETWORKING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING DISTRIBUTED COMPUTING DISTRIBUTED COMPUTING DISTRIBUTED COMPUTING DISTRIBUTED COMPUTING DISTRIBUTED COMPUTING DISTRIBUTED COMPUTING DISTRIBUTED COMPUTING DISTRIBUTED COMPUTING DATA ENGINEERING 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012

EFFECTIVE RECONSTRUCTION OF DATA PERTURBED BY RANDOM PROJECTIONS LOW OVERHEAD SOFT ERROR MITIGATION TECHNIQUES FOR HIGH-PERFORMANCE AND AGGRESSIVE SIGNS A SPARSE REGULATORY NETWORK OF COPY-NUMBER DRIVEN GENE EXPRESSION REVEALS PUTATIVE BREAST CANCER ONCOGENES IDENTIFYING GENE PATHWAYS ASSOCIATED WITH CANCER CHARACTERISTICS VIA SPARSE STATISTICAL METHODS DENSITY-BASED MULTIFEATURE BACKGROUND SUBTRACTION WITH SUPPORT VECTOR MACHINE INFERENCE OF BIOLOGICAL S-SYSTEM USING THE SEPARABLE ESTIMATION METHOD AND THE GENETIC ALGORITHM DETECTION OF OUTLIER RESIDUES FOR IMPROVING INTERFACE PREDICTION IN PROTEIN HETEROCOMPLEXES TRACKING PEDESTRIANS USING LOCAL SPATIO-TEMPORAL MOTION PATTERNS IN EXTREMELY CROWD SCENES VISION-BASED ANALYSIS OF SMALL GROUPS IN PEDESTRIAN CROWDS DRAGON: DETECTION AND TRACKING OF DYNAMIC AMORPHOUS EVENTS IN WIRELESS SENSOR NETWORKS ON THE SIGN AND DEPLOYMENT OF RFID ASSISTED NAVIGATION SYSTEMS FOR VANETS TOPOLOGY ENHANCEMENTS IN WIRELESS MULTIHOP NETWORKS: A TOP-DOWN APPROACH ADAPTIVE APPROXIMATE DATA COLLECTION FOR WIRELESS SENSOR NETWORKS AN ONLINE DATA ACCESS PREDICTION AND OPTIMIZATION APPROACH FOR DISTRIBUTED SYSTEMS DETECTING CONCURRENCY BUGS FROM THE PERSPECTIVES OF SYNCHRONIZATION INTENTIONS ENERGY-EFFICIENT CAPTURE OF STOCHASTIC EVENTS UNDER PERIODIC NETWORK COVERAGE AND COORDINATED SLEEP AN EFFICIENT ADAPTIVE DEADLOCK-FREE ROUTING ALGORITHM FOR TORUS NETWORKS QUERY PLANNING FOR CONTINUOUS AGGREGATION QUERIES OVER A NETWORK OF DATA AGGREGATORS

#11-13-916/52, II Floor,Greenhills colony, Raod No 1, Kothapet. Hyd-35. Ph:04064609797

info@eruditeinfo.com
EIDN 34 EIDN 35 EIDN 36 EIDN 37 EIDN 38 EIDN 39 EIDN 40 EIDN 41 EIDN 42 EIDN 43 EIDN 44 EIDN 45 EIDN 46 EIDN 47 EIDN 48 EIDN 49 EIDN 50 EIDN 51 EIDN 52

+91-9014131492
DATA ENGINEERING DATA ENGINEERING DATA ENGINEERING DATA ENGINEERING DATA ENGINEERING SOFTWARE ENGINEERING SOFTWARE ENGINEERING SOFTWARE ENGINEERING SOFTWARE ENGINEERING SOFTWARE ENGINEERING SOFTWARE ENGINEERING SOFTWARE ENGINEERING MOBILE COMMUNICATION MOBILE COMMUNICATION MOBILE COMMUNICATION MOBILE COMMUNICATION MOBILE COMMUNICATION NETWORK SECURITY NETWORK SECURITY 2012 2012 2012 2012 2012 2011 2011 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012

SOFTWARE FAULT PREDICTION USING QUAD TREE-BASED K-MEANS CLUSTERING ALGORITHM AN EFFICIENT FORMULATION OF THE IMPROVED VISUAL ASSESSMENT OF CLUSTER TENDENCY (IVAT) ALGORITHM ANNIMOS: AN LP-BASED APPROACH FOR ANONYMIZING WEIGHTED SOCIAL NETWORK GRAPHS TSCAN: A CONTENT ANATOMY APPROACH TO TEMPORAL TOPIC SUMMARIZATION OPTIMIZING BLOOM FILTER SETTINGS IN PEER-TO-PEER MULTIKEYWORD SEARCHING A THEORETICAL AND EMPIRICAL ANALYSIS OF THE ROLE OF TEST SEQUENCE LENGTH IN SOFTWARE TESTING FOR STRUCTURAL COVERAGE COMPARING SEMI-AUTOMATED CLUSTERING METHODS FOR PERSONAL DEVELOPMENT MODEL CHECKING SEMANTICALLY ANNOTATED SERVICES FAULT LOCALIZATION FOR DYNAMIC WEB APPLICATIONS DATA MINING TECHNIQUES FOR SOFTWARE EFFORT ESTIMATION: A COMPARATIVE STUDY WORK ITEM TAGGING: COMMUNICATING CONCERNS IN COLLABORATIVE SOFTWARE DEVELOPMENT GENPROG: A GENERIC METHOD FOR AUTOMATIC SOFTWARE REPAIR MOBILE AD HOC NANO NETWORKS WITH COLLISION-BASED MOLECULAR COMMUNICATION SHAPING THROUGHPUT PROFILES IN MULTIHOP WIRELESS NETWORKS: A RESOURCE-BIASING APPROACH LOCAL BROADCAST ALGORITHMS IN WIRELESS AD HOC NETWORKS: REDUCING THE NUMBER OF TRANSMISSIONS LOCAL GREEDY APPROXIMATION FOR SCHEDULING IN MULTIHOP WIRELESS NETWORKS SMOOTH TRA -OFFS BETWEEN THROUGHPUT AND LAY IN MOBILE AD HOC NETWORKS JAMMING-AWARE TRAFFIC ALLOCATION FOR MULTIPLEPATH ROUTING USING PORTFOLIO SELECTION VULNERABILITY ANALYSIS IN SOA-BASED BUSINESS PROCESSES

#11-13-916/52, II Floor,Greenhills colony, Raod No 1, Kothapet. Hyd-35. Ph:04064609797

info@eruditeinfo.com
EIDN 53 EIDN 54 EIDN 55 EIDN 56 EIDN 57 EIDN 58 EIDN 59 EIDN 60 EIDN 61 EIDN 62 EIDN 63 EIDN 64 EIDN 65 EIDN 66 EIDN 67 EIDN 69 EIDN 69 EIDN 70

+91-9014131492
NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY NETWORK SECURITY DATA MINING DATA ENGINEERING DATA ENGINEERING SERVICE COMPUTING DATA ENGINEERING DATA ENGINEERING DATA ENGINEERING DATA ENGINEERING SOFTWARE ENGINEERING DATA ENGINEERING SECURE COMPUTING 2011 NETWORKING WIRELESS COMMUNICATION 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011

SECURE CLIENT-SIDE ST-DM WATERMARK EMBEDDING ACHIEVING SECURE WATERMARKING TECHNIQUE FOR INFORMATION & NETWORK SECURITY A METHOD OF OBTAINING HASTY QUANTUM KEY DISTRIBUTION SYSTEM FOR REAL-TIME KEY GENERATION SIMPLE & EFFECTIVE APPROACH FOR PRIVACY PRESERVING INFORMATION APPORTION FLEXIBLE DISTINCTIVENESS MISBEHAVIOR DETECTION USED TO FIND THE ILLEGAL USAGES OF CREDIT CARD TRANSACTION EFFICIENT COMPUTATION OF RANGE AGGREGATES AGAINST UNCERTAIN LOCATION BASED QUERIES EXPLORING APPLICATION-LEVEL SEMANTICS FOR DATA COMPRESSION IMPROVING AGGREGATE RECOMMENDATION DIVERSITY USING RANKING-BASED TECHNIQUES MONITORING SERVICE SYSTEMS FROM A LANGUAGEACTION PERSPECTIVE ONE SIZE DOES NOT FIT ALL: TOWARDS USER- AND QUERY-DEPENDENT RANKING FOR WEB DATABASES OPTIMAL SERVICE PRICING FOR A CLOUD CACHE PUBLISHING SEARCH LOGS A COMPARATIVE STUDY OF PRIVACY GUARANTEES A PERSONALIZED ONTOLOGY MODEL FOR WEB INFORMATION GATHERING THE AWARENESS NETWORK, TO WHOM SHOULD I DISPLAY MY ACTIONS? AND, WHOSE ACTIONS SHOULD I MONITOR? THE WORLD IN A NUTSHELL: CONCISE RANGE QUERIES ADAPTIVE FAULT TOLERANT QOS CONTROL ALGORITHMS FOR MAXIMIZING SYSTEM LIFETIME OF QUERY-BASED WIRELESS SENSOR NETWORKS CONTINUOUS NEIGHBOR DISCOVERY IN ASYNCHRONOUS SENSOR NETWORKS DISTRIBUTED ADAPTATION OF QUANTIZED FEEDBACK FOR DOWNLINK NETWORK MIMO SYSTEMS

#11-13-916/52, II Floor,Greenhills colony, Raod No 1, Kothapet. Hyd-35. Ph:04064609797

info@eruditeinfo.com
EIDN 71 EIDN 72 EIDN 73 EIDN 74 EIDN 75 EIDN 76 EIDN 77

+91-9014131492
SECURE COMPUTING SECURE COMPUTING CLOUD COMPUTING WIRELESS COMMUNICATION CLOUD COMPUTING WIRELESS COMMUNICATION CLOUD COMPUTING 2011 2011 2011 2011 2011 2011 2011

ROBUST CORRELATION OF ENCRYPTED ATTACK TRAFFIC THROUGH STEPPING STONES BY FLOW WATERMARKING THE GEOMETRIC EFFICIENT MATCHING ALGORITHM FOR FIREWALLS DATA INTEGRITY PROOFS IN CLOUD STORAGE NETWORK CODING BASED PRIVACY PRESERVATION AGAINST TRAFFIC ANALYSIS IN MULTI-HOP WIRELESS NETWORKS PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA THROUGHPUT OPTIMIZATION IN HIGH SPEED DOWNLINK PACKET ACCESS (HSDPA) EXPLOITING DYNAMIC RESOURCE ALLOCATION FOR EFFICIENT PARALLEL DATA PROCESSING IN THE CLOUD

#11-13-916/52, II Floor,Greenhills colony, Raod No 1, Kothapet. Hyd-35. Ph:04064609797

S-ar putea să vă placă și