Java Projects List |
- Ensuring Distributed Accountability for Data Sharing in the Cloud - 2012
- Fast Matrix Embedding by Matrix Extending - 2012
- FireCol A Collaborative Protection Network for the Detection of Flooding DDoS Attacks - 2012
- Learn to Personalized Image Search from the Photo Sharing Websites - 2012
- Load Balancing Multipath Switching System with Flow Slice - 2012
- Privacy- and Integrity-Preserving Range Queries in Sensor Networks - 2012
- Ranking Model Adaptation for Domain-Specific Search - 2012
- Topology Control in Mobile Ad Hoc Networks with Cooperative Communications - 2012
- Towards Accurate Mobile Sensor Network Localization in Noisy Environments - 2012
- Fast Data Collection in Tree-Based Wireless Sensor Networks - 2012
- Packet-Hiding Methods for Preventing Selective Jamming Attacks - 2012
- Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols - 2012
- FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks - 2012
- Portable Cloud Services Using TOSCA - 2012
- Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks - 2012
- Optimizing Cloud Resources for Delivering IPTV Services through Virtualization - 2012
- An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System - 2012
- Cloud Computing Security From Single to Multi-Clouds - 2012
- Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage - 2012
- An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks - 2012
- Throughput Optimization in High Speed Downlink Packet Access - 2011
- pCloud: A Distributed System for Practical PIR Dependable and Secure Computing - 2012
- Packet-Hiding Methods for Preventing Selective Jamming Attacks Dependable and Secure Computing - 2012
- Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks - 2011
- A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows - 2011
- A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks - 2011
- Secure and Practical Outsourcing of Linear Programming in Cloud Computing - 2011
- Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks - 2011
- Clustering with Multi- View Point Based Similarity Measure - 2011
- Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks - 2011
- Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service - 2011
- Adaptive Cluster Distance Bounding For High-Dimensional Indexing - 2011
- A Dual Framework And Algorithms For Targeted Online Data Delivery - 2011
- A Link Analysis Extension Of Correspondence Analysis For Mining Relational Databases - 2011
- A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts - 2011
- A Generic Multilevel Architecture For Time Series Prediction - 2011
- Nymble Blocking Misbehaving Users in Anonymizing Networks - 2011
- Modeling And Detection Of Camouflaging Worm - 2011
- Effective Navigation of Query Results Based on Concept Hierarchies - 2011
- MANET Routing Protocols vs Mobility Models: A Performance Evaluation - 2011
- Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
- A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service - 2011
- A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems - 2011
- Live Streaming With Receiver-Based Peer-Division Multiplexing - 2011
- ROC: Resilient Online Coverage for Surveillance Applications - 2011
- Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration - 2011
- Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports - 2011
- Continuous Neighbor Discovery in Asynchronous Sensor Networks - 2011
- Forward Correction and Fountain Codes in Delay Tolerant Networks - 2011
- PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects - 2010
- POPI: A User-Level Tool For Inferring Router Packet Forwarding Priority - 2010
- KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services - 2010
- Image Thumbnails That Represent Blur and Noise - 2010
- Pie Cooperative Peer-To-Peer Information Exchange In Network Coding Enabled Wireless Networks - 2010
- Label-Based DV-Hop Localization Against Wormhole Attacks In Wireless Sensor Networks - 2010
- Performance Evaluation of Video Streaming over Multi-Hop Wireless Local Area Networks - 2010
- Distributed Algorithms for Minimum Cost Multicast with Network Coding in Wireless Networks - 2010
- Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks - 2010
- Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks - 2010
- Achieving Guaranteed Anonymity in GPS Traces via Uncertainty Aware Path Cloaking - 2010
- Privacy-Conscious Location-Based Queries in Mobile Environments - 2010
- Inside the Permutation-Scanning Worms Propagation Modeling and Analysis - 2010
- Deriving Concept-Based User Profiles from Search Engine Logs - 2010
- TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Networks - 2010
- MABS: Multicast Authentication Based on Batch Signature - 2010
- Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks - 2010
- Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks - 2010
- Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast - 2010
- Conditional Shortest Path Routing in Delay Tolerant Networks - 2010
- A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization - 2010
- A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming - 2010
- Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks - 2010
- Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation - 2010
- Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks - 2010
- IRM Integrated File Replication and Consistency Maintenance in P2P Systems - 2010
- Layered Approach Using Conditional Random Fields for Intrusion Detection - 2010
- On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network - 2010
- Secure Data Objects Replication in Data Grid - 2010
- Rate Adaptation in Congested Wireless Networks through Real-Time Measurements - 2010
- On the Performance Benefits of Multihoming Route Control
- Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding
- Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion
- Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common Interest
- Two Techniques for Fast Computation of Constrained Shortest Paths
- The Server Reassignment Problem for Load Balancing in Structured P2P Systems
- Securing User-Controlled Routing Infrastructures
- Strategyproof Mechanisms for Scheduling Divisible Loads in Bus-Networked Distributed Systems
- Multicast Routing with Delay and Delay Variation Constraints for Collaborative Applications on Overlay Networks
- Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems
- WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
- Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case
- Efficient Resource Allocation for Wireless Multicast
- A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
- Computation-Efficient Multicast Key Distribution
- Controlling IP Spoofing through Interdomain Packet Filters
- Online Index Recommendations for High-Dimensional Databases Using Query Workloads
- Ranked Reverse Nearest Neighbor Search
- An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic analysis
- Probabilistic Group Nearest Neighbor Queries in Uncertain Databases
- Dynamic Load Balancing
- A New TCP for Persistent Packet Reordering
- Randomized Protocols for Duplicate Elimination in Peer- to-Peer Storage Systems
- Efficient Approximate Query Processing in Peer-to-Peer Networks
- VOICE-TO-PHONEME conversion algorithoms for spaker indipendent voice-tag application in embedded platform
- A Fully Distributed Proactively Secure Threshold- Multisignature Scheme
- Copuled Based Metric
- Face Recognition for smart interaction
- OCGRR: A New Scheduling Algorithm for Differentiated Services Networks
- Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols
- Secure Socket Layer (SSL) is the redominant
- Malicious Packet Losses
- Distributional Features for Text Categorization
- Progressive Parametric Query Optimization
- GLIP: A Concurrency Control Protocol for Clipping Indexing
- Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
- SAR Image Regularization With Fast Approximate Discrete Minimization
- PDCS: Security and Privacy Support for Data-Centric Sensor Networks Ion for
- Team Multicasting In Mobile Adhoc Networks
- Image Transmissions with Security Enhancement Based on Region and Path Diversity in Wireless Sensor Networks
- Image Transmissions with Security Enhancement Based on Region and Path Diversity in WSN/w
- Lord of the Links: A Framework for Discovering Missing Links in the Internet Topology
- Efficient and Robust Local Mutual Exclusion in Mobile Ad Hoc Networks
- Energy-Aware Tag Anti collision Protocols for RFID Systems
- A Cooperative Diversity Based Handoff Management Scheme
- Stateless Multicasting in Mobile Ad Hoc Networks
- Rules of Designing Routing Metrics for Greedy, Face, and Combined Greedy-Face Routing
- Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing
- Independently Verifiable Decentralized Role-Based Delegation
- A Visual Backchannel for Large-Scale Events
- SparkClouds: Visualizing Trends in Tag Clouds
- Transmission Network Planning Under Security and Environmental Constraints
- A Survey of Payment Card Industry Data Security Standard
- Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ
- XLP: A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks
- Radio Sleep Mode Optimization in Wireless Sensor Networks
- On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
- The Design and Evaluation of a Self-Organizing Superpeer Network
- E-science and web
- A Chat Application in Lift
- Research on construct e-commerce site
- E-School: A Web-Service Oriented Resource Based E- Iearning System
- Managing Health Care Through Social Networks
- Museum Gallery Review
- Social Connect Services
Tags: IEEE JAVA PROJECTS LIST, IEEE MATLAB PROJECTS LIST, IEEE Papers and Projects
No comments:
Post a Comment