Sunteți pe pagina 1din 3

.

NET IEEE PROJECTS


SNO Project Title Domain Year
VEBEK: Virtual Energy-Based Encryption and
1 Mobile Computing 2010
Keying for Wireless Sensor Networks
Conditional Shortest Path Routing in Delay
2 Networking 2010
Tolerant Networks
Efficient and Robust Detection of Duplicate Circuits and Systems for Video
3 2010
Videos in a Large Database Technology
Knowledge and
4 Data Leakage Detection 2010
Data Engineering
A Study for Important Criteria of Feature Knowledge and
5 2010
Selection in Text Categorization Data Engineering
6 Inference From Aging Information Nural Networks 2010
Dynamic Authentication for Cross-Realm SOA-
7 Service Computing 2010
Business Processor
8 AI and Opinion Mining Intelligent Systems 2010
Achieving Secure, Scalable, and Fine-grained
9 Cloud Computing 2010
Data Access Control in Cloud Computing
Privacy-Preserving Public Auditing for Data
10 Cloud Computing 2010
Storage Security in Cloud Computing
A Gen2-Based RFID Authentication Protocol for
11 Mobile Computing 2009
Security and Privacy
12 A Tabu Search Algorithm for Cluster Building Mobile Computing 2009
Biased Random Walks in Uniform Wireless
13 Mobile Computing 2009
Networks
Cell Breathing Techniques for Load Balancing in
14 Mobile Computing 2009
Wireless LANs
15 Energy Maps for Mobile Wireless Networks Mobile Computing 2009
Greedy Routing with Anti-Void Traversal
16 Mobile Computing 2009
Wireless Sensor NWS
Information Content-Based Sensor Selection
17 and Transmission Power Adjustment for Mobile Computing 2009
Collaborative Target
Signaling for Multimedia conferencing in Stand-
18 Mobile Computing 2009
Alone Mobile Ad Hoc Networks
Analysis of Shortest Path Routing for Large
19 Networking 2009
Multi-Hop Wireless Networks
Explicit Load Balancing Technique for NGEO
20 Satellite IP Networks with On-Board Processing Networking 2009
Capabilities
Random Cast An Energy Efficient
21 Communication Scheme for Mobile Ad Hoc Networking 2009
Networks
Resequencing Analysis Stop-and-Wait ARQ for
22 Networking 2009
Parallel Multi-Channel Communication
23 Resource Allocation in OFDMA Wireless Networking 2009
24 Secure and Policy-Complaint Source Routing Networking 2009
25 Histogram-Based Global Load Balancing in Networking 2009
Structured Peer-to-Peer Systems
A Trace-Driven Approach to Evaluate the
26 Scalability of P2P-Based Video-on-Demand Networking 2009
Service
A Parameterized Approach to Spam-Resilient
27 Networking 2009
Link Analysis of the Web
Measuring Capacity Bandwidth of Targeted Path
28 Networking 2009
Segments
Effective Collaboration with Information Sharing
29 Networking 2009
in Virtual Universities
Network-Coding-Based Signal Recovery for
30 Networking 2009
Efficient Scheduling in Wireless Network
Enforcing Minimum-Cost Multicast Routing
31 Parallel And Distributed System 2009
Against Selfish Information Flows
Movement-Assisted Connectivity Restoration In
32 Parallel And Distributed System 2009
Wireless Sensor and Actor Networks
Variability and Reproducibility in Software
Knowledge and Data
33 Engineering A Study of Four Companies that 2009
Engineering
Developed the Same System
Design and Evaluation of the iMed Intelligent
34 Data Mining 2009
medical Search Engine
35 Distributional Features for Text Categorization Data Mining 2009
Design of a robust and secure digital signature
36 scheme for image authentication over wireless Network Securities 2009
channel
Enhanced Security for Online Exams Using
37 Network Securities 2009
Group Cryptography
Internet and Online Information Privacy: An
38 Network Securities 2009
Exploratory Study of Preteens and Early Teens
A Secure Mobile Healthcare System using
39 Network Securities 2009
Trust-Based Multicast Scheme
Gradient Estimation Using Wide Support
40 Image Processing 2009
Operators
Continuous Glass Patterns for Painterly
41 Image Processin9 2009
Rendering
Automated Bidding for Media Services at the
42 MultiMedia 2009
Edge of a Content Delivery Network
43 Benefit Based Data Caching in Ad Hoc Networks Mobile Computing 2008
Location Based Spatial Query Processing in
44 Mobile Computing 2008
Wireless Broadcast Environments
Characterizing Unstructured Overlay Topologies
45 Networking 2008
in p2p file sharing systems
46 Efficient Broadcasting Using Network Coding Networking 2008
On the Computational Complexity and
47 Networking 2008
Effectiveness of N-Hub Shortest-Path Routing
Probabilistic Packet Marking for Large-Scale IP
48 Networking 2008
Traceback
Securing User Controlled Routing
49 Networking 2008
Infrastructures
Statistical techniques for detecting Traffic
50 Networking 2008
Anomalies Through Packet Header Data
51 Incentive based scheduling for market like Parallel and Distributed 2008
Computational Grids Systems
A Web Usage Mining Framework for Mining Knowledge and Data
52 2008
Evolving User Profiles in Dynamic Web Sites Engineering
An Efficient Clustering Scheme to Exploit Knowledge and Data
53 2008
hierarchical data in Network Traffic Analysis Engineering
On the Design of Distributed Object Placement
Knowledge and Data
54 and Load Balancing Strategies in Large-Scale 2008
Engineering
Networked Multimedia Storage Systems
Semantic Ideation Learning for Agent- Based E- Knowledge and Data
55 2008
Brainstorming-2008 Engineering
An efficient time-bound hierarchically key Dependable and Secure
56 2008
Management Scheme for Secure Broadcasting Computing
CREDIT CARD Fraud Detection Using Dependable and Secure
57 2008
Hidden Markov Model Computing
Security Requirements Engineering: A
58 Software Engineering 2008
Framework for Representation and Analysis

S-ar putea să vă placă și