Tuesday, April 15, 2014

JAVA PROJECTS LIST


Java Projects IEEE List
Java Projects List

  1. Ensuring Distributed Accountability for Data Sharing in the Cloud - 2012
  2. Fast Matrix Embedding by Matrix Extending - 2012
  3. FireCol A Collaborative Protection Network for the Detection of Flooding DDoS Attacks - 2012
  4. Learn to Personalized Image Search from the Photo Sharing Websites - 2012
  5. Load Balancing Multipath Switching System with Flow Slice - 2012
  6. Privacy- and Integrity-Preserving Range Queries in Sensor Networks - 2012
  7. Ranking Model Adaptation for Domain-Specific Search - 2012
  8. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications - 2012
  9. Towards Accurate Mobile Sensor Network Localization in Noisy Environments - 2012
  10. Fast Data Collection in Tree-Based Wireless Sensor Networks - 2012
  11. Packet-Hiding Methods for Preventing Selective Jamming Attacks - 2012
  12. Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols - 2012
  13. FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks - 2012
  14. Portable Cloud Services Using TOSCA - 2012
  15. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks - 2012
  16. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization - 2012
  17. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System - 2012
  18. Cloud Computing Security From Single to Multi-Clouds - 2012
  19. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage - 2012
  20. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks - 2012
  21. Throughput Optimization in High Speed Downlink Packet Access - 2011
  22. pCloud: A Distributed System for Practical PIR Dependable and Secure Computing - 2012
  23. Packet-Hiding Methods for Preventing Selective Jamming Attacks Dependable and Secure Computing - 2012
  24. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks - 2011
  25. A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows - 2011
  26. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks - 2011
  27. Secure and Practical Outsourcing of Linear Programming in Cloud Computing - 2011
  28. Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks - 2011
  29. Clustering with Multi- View Point Based Similarity Measure - 2011
  30. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks - 2011
  31. Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service - 2011
  32. Adaptive Cluster Distance Bounding For High-Dimensional Indexing - 2011
  33. A Dual Framework And Algorithms For Targeted Online Data Delivery - 2011
  34. A Link Analysis Extension Of Correspondence Analysis For Mining Relational Databases - 2011
  35. A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts - 2011
  36. A Generic Multilevel Architecture For Time Series Prediction - 2011
  37. Nymble Blocking Misbehaving Users in Anonymizing Networks - 2011
  38. Modeling And Detection Of Camouflaging Worm - 2011
  39. Effective Navigation of Query Results Based on Concept Hierarchies - 2011
  40. MANET Routing Protocols vs Mobility Models: A Performance Evaluation - 2011
  41. Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
  42. A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service - 2011
  43. A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems - 2011
  44. Live Streaming With Receiver-Based Peer-Division Multiplexing - 2011
  45. ROC: Resilient Online Coverage for Surveillance Applications - 2011
  46. Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration - 2011
  47. Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports - 2011
  48. Continuous Neighbor Discovery in Asynchronous Sensor Networks - 2011
  49. Forward Correction and Fountain Codes in Delay Tolerant Networks - 2011
  50. PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects - 2010
  51. POPI: A User-Level Tool For Inferring Router Packet Forwarding Priority - 2010
  52. KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services - 2010
  53. Image Thumbnails That Represent Blur and Noise - 2010
  54. Pie Cooperative Peer-To-Peer Information Exchange In Network Coding Enabled Wireless Networks - 2010
  55. Label-Based DV-Hop Localization Against Wormhole Attacks In Wireless Sensor Networks - 2010
  56. Performance Evaluation of Video Streaming over Multi-Hop Wireless Local Area Networks - 2010
  57. Distributed Algorithms for Minimum Cost Multicast with Network Coding in Wireless Networks - 2010
  58. Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks - 2010
  59. Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks - 2010
  60. Achieving Guaranteed Anonymity in GPS Traces via Uncertainty Aware Path Cloaking - 2010
  61. Privacy-Conscious Location-Based Queries in Mobile Environments - 2010
  62. Inside the Permutation-Scanning Worms Propagation Modeling and Analysis - 2010
  63. Deriving Concept-Based User Profiles from Search Engine Logs - 2010
  64. TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Networks - 2010
  65. MABS: Multicast Authentication Based on Batch Signature - 2010
  66. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks - 2010
  67. Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks - 2010
  68. Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast - 2010
  69. Conditional Shortest Path Routing in Delay Tolerant Networks - 2010
  70. A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization - 2010
  71. A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming - 2010
  72. Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks - 2010
  73. Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation - 2010
  74. Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks - 2010
  75. IRM Integrated File Replication and Consistency Maintenance in P2P Systems - 2010
  76. Layered Approach Using Conditional Random Fields for Intrusion Detection - 2010
  77. On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network - 2010
  78. Secure Data Objects Replication in Data Grid - 2010
  79. Rate Adaptation in Congested Wireless Networks through Real-Time Measurements - 2010
  80. On the Performance Benefits of Multihoming Route Control
  81. Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding
  82. Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion
  83. Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common Interest
  84. Two Techniques for Fast Computation of Constrained Shortest Paths
  85. The Server Reassignment Problem for Load Balancing in Structured P2P Systems
  86. Securing User-Controlled Routing Infrastructures
  87. Strategyproof Mechanisms for Scheduling Divisible Loads in Bus-Networked Distributed Systems
  88. Multicast Routing with Delay and Delay Variation Constraints for Collaborative Applications on Overlay Networks
  89. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems
  90. WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
  91. Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case
  92. Efficient Resource Allocation for Wireless Multicast
  93. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
  94. Computation-Efficient Multicast Key Distribution
  95. Controlling IP Spoofing through Interdomain Packet Filters
  96. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
  97. Ranked Reverse Nearest Neighbor Search
  98. An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic analysis
  99. Probabilistic Group Nearest Neighbor Queries in Uncertain Databases
  100. Dynamic Load Balancing
  101. A New TCP for Persistent Packet Reordering
  102. Randomized Protocols for Duplicate Elimination in Peer- to-Peer Storage Systems
  103. Efficient Approximate Query Processing in Peer-to-Peer Networks
  104. VOICE-TO-PHONEME conversion algorithoms for spaker indipendent voice-tag application in embedded platform
  105. A Fully Distributed Proactively Secure Threshold- Multisignature Scheme
  106. Copuled Based Metric
  107. Face Recognition for smart interaction
  108. OCGRR: A New Scheduling Algorithm for Differentiated Services Networks
  109. Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols
  110. Secure Socket Layer (SSL) is the redominant
  111. Malicious Packet Losses
  112. Distributional Features for Text Categorization
  113. Progressive Parametric Query Optimization
  114. GLIP: A Concurrency Control Protocol for Clipping Indexing
  115. Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
  116. SAR Image Regularization With Fast Approximate Discrete Minimization
  117. PDCS: Security and Privacy Support for Data-Centric Sensor Networks Ion for
  118. Team Multicasting In Mobile Adhoc Networks
  119. Image Transmissions with Security Enhancement Based on Region and Path Diversity in Wireless Sensor Networks
  120. Image Transmissions with Security Enhancement Based on Region and Path Diversity in WSN/w
  121. Lord of the Links: A Framework for Discovering Missing Links in the Internet Topology
  122. Efficient and Robust Local Mutual Exclusion in Mobile Ad Hoc Networks
  123. Energy-Aware Tag Anti collision Protocols for RFID Systems
  124. A Cooperative Diversity Based Handoff Management Scheme
  125. Stateless Multicasting in Mobile Ad Hoc Networks
  126. Rules of Designing Routing Metrics for Greedy, Face, and Combined Greedy-Face Routing
  127. Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing
  128. Independently Verifiable Decentralized Role-Based Delegation
  129. A Visual Backchannel for Large-Scale Events
  130. SparkClouds: Visualizing Trends in Tag Clouds
  131. Transmission Network Planning Under Security and Environmental Constraints
  132. A Survey of Payment Card Industry Data Security Standard
  133. Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ
  134. XLP: A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks
  135. Radio Sleep Mode Optimization in Wireless Sensor Networks
  136. On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
  137. The Design and Evaluation of a Self-Organizing Superpeer Network
  138. E-science and web
  139. A Chat Application in Lift
  140. Research on construct e-commerce site
  141. E-School: A Web-Service Oriented Resource Based E- Iearning System
  142. Managing Health Care Through Social Networks
  143. Museum Gallery Review
  144. Social Connect Services
Tags: IEEE JAVA PROJECTS LIST, IEEE MATLAB PROJECTS LIST,  IEEE Papers and Projects

No comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...