Friday, September 17, 2010

2010 IEEE Project Title Base Paper

2010 IEEE Project Title Base Paper- Dot NET

1. Download Link: 

http://rapidshare.com/files/419563061/Dot_NET_2010.rar

MD5: 781C23EB3BA7DF159C8AFF7C7999C55A

------------------------------------------------------------------------------------

2010 IEEE Project Title Base Paper - Java

1. Download Link:

http://rapidshare.com/files/419562650/Java_2010.rar
MD5: BEDFA78C6E1A2A871AE2E9B930B9B070

Saturday, August 28, 2010

2008_IEEE_Project_Title_Base_Paper

1. Download Link: Click here to download file

http://rapidshare.com/files/415596690/2008_IEEE_Project_Title_Base_Paper.rar
MD5: 78A5BF827298D399D52529D5BCB8BF59

2009_IEEE_Java_Project_Title_and_Base_Paper

1. Download Link: Click here to download file

http://rapidshare.com/files/415597815/2009_IEEE_Java_Project_Title_and_Base_Paper.rar
MD5: 5177CBEA93EDFD1AE77EE20CC907EBC1

2009_IEEE_Dot_Net_Project_Title_and_Base_Paper

2009_IEEE_Dot_Net_Project_Title_and_Base_Paper

1. Download Link: Click here to download file

http://rapidshare.com/files/415597434/2009_IEEE_Dot_Net_Project_Title_and_Base_Paper.rar
MD5: 359A3A0A4FE5A111579A8E45E7E8C03B

J2EE IEEE 2010

J2EE IEEE

1. Download Link: Click here to download file

http://rapidshare.com/files/415434167/J2EE_IEEE.rar
MD5: 84275D50E8CB43777C1147FAF4123C58

JAVA IEEE 2010

Updated Links by august 2011

JAVA IEEE.part1


1. Download Link: Click here to download file

https://rapidshare.com/files/3257166503/JAVA_IEEE.part1.rar

-------------------------------------------------------------------------------------------------

JAVA IEEE.part2


1. Download Link: Click here to download file

https://rapidshare.com/files/2811484843/JAVA_IEEE.part2.rar

-------------------------------------------------------------------------------------------------

JAVA IEEE.part3

1. Download Link: Click here to download file

https://rapidshare.com/files/3313192544/JAVA_IEEE.part3.rar

-------------------------------------------------------------------------------------------------

DOTNET IEEE 2010

Updated Links by august 2011

DOTNET IEEE.part1

1. Download Link: Click here to download file

https://rapidshare.com/files/3165096908/DOTNET_IEEE.part1.rar


DOTNET IEEE.part2

1. Download Link: Click here to download file
https://rapidshare.com/files/2128958325/DOTNET_IEEE.part2.rar


DOTNET IEEE.part3

1. Download Link: Click here to download file
https://rapidshare.com/files/1470586984/DOTNET_IEEE.part3.rar


DOTNET_IEEE.part4

1. Download Link: Click here to download file
https://rapidshare.com/files/2120170418/DOTNET_IEEE.part4.rar

IEEE 2010

Download Link: Click here to download file

http://rapidshare.com/files/415433541/ieee_2010.rar
MD5: 6AE5CEC0608A51EE4095F0C8FC11CA41

IEEE_2010_PROJECTS_TITLES

1. Download Link: Click here to download file

http://rapidshare.com/files/415572847/IEEE_2010_PROJECTS_TITLES.docx
MD5: CD9F0820441F3CD9C6C45E650730A440

IEEE2008_2009_PROJECTS_TITLES

1. Download Link: Click here to download file

http://rapidshare.com/files/415572839/IEEE2008_2009_PROJECTS_TITLES.docx
MD5: 3C6F9A74794C40FB91EE7D9AB0C030CE

IEEE2007_-_2002_PROJECTS_TITLES

1. Download Link: Click here to download file

http://rapidshare.com/files/415572834/IEEE2007_-_2002_PROJECTS_TITLES.docx
MD5: 7077F2666B8F725376B529258A690D11

ICMCS'2009: International Conference on Multimedia Computing and Systems


Welcome to ICMCS

A leading network and technology consulting firm that has been providing quality services in the Computer Industry since 1983, excelling in a broad knowledge base of Software and Hardware in the ever changing marketplace. ICMCS provides quality and cost-effective Local Area/Wide Area Network (LAN/WAN) integration services. We also provide/design secure Virtual Private Network (VPN) that lets you connect offices, partners and even remote employees without a heavy investment. We offer these services across a comprehensive range of technologies from simple UTP wiring to broadband and beyond. We can help you design and create new networks or evolve and reconfigure existing ones to enhance your business and minimize Server downtime.

We specialize in the following areas:
Custom-built File/SQL/Exchange/E-mail/Terminal/Backup Domain Servers with Microsoft Windows Operating Systems.
Custom-built Workstation with Microsoft Windows Desktop Operating Systems (OS) and Application Software pre-installed.
Server setup/configuration and Workstation setup/authentication.
Cable/DSL Modem/Router - Installation/Setup.
Web Hosting and E-mail Redirect using the Microsoft Windows Internet Information Server (IIS) which allows you to access up-to-date information.
Professional Website design and maintenance for fractional costs.
7-24 On & Off-site support/maintenance/repair Servers/Workstations.
7-24 Virus removal/quarantine/protection and definitions Live Update.
Installation/support of Custom-built Application Software.
On & Off-site (Remote) Data backup and recovery.
Commercial GPS Tracking Systems and related monitoring services for corporate fleet tracking and management
Voice over IP (VOIP) phone system installation
Certified Data and Phone Cabling

www.icmcs.com

Updated Links by august 2011

1. Download Link: Click here to download file

https://rapidshare.com/files/2675273403/ICMCS-2009_proceedings.zip

IWSSIP-2010 Proceedings


IWSSIP was founded by Professor Kalman Fazekas from the Budapest University of Technology and Economics, Budapest, Hungary, who initiated it in June 1994 as a scientific event meant to stir the research in theory, methodology, systems and applications of signal and image processing, and to attract and stimulate young researchers.

IWSSIP 2010
17th International Conference on Systems, Signals and Image Processing
June 17-19, 2010
Rio de Janeiro, Brazil
Link to IWSSIP 2010 web-site
Archived IWSSIP 2010 web-site
General Chair: Aura Conci; Proceedings Chair: Fabiana R. Leta
126 regular papers and 10 invited papers were published on the CD-ROM Proceedings

http://www.iwssip.org/

IWSSIP-2010 Proceedings


Updated Links by august 2011


1. Download Link: Click here to download file

https://rapidshare.com/files/4059698746/IWSSIP-2010_Proceedings.zip



ICITST-2009: The 4th International Conference for Internet Technology and Secured Transactions


ICITST-2009: The 4th International Conference for Internet Technology and Secured Transactions

When: Monday November 9, 2009 - Thursday November 12, 2009 from 9:00am - 6:00pm

Where: London UK

The 4th International Conference for Internet Technology and Secured Transactions (ICITST-2009) is Technical Co-sponsored by IEEE UK/RI Section.

The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forumthat promotes collaborative excellence between academia and industry.

The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2009 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.

All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore.

All the ICITST papers are indexed by DBLP.

Website: http://www.icitst.org

Updated Links by august 2011

1. Download Link

https://rapidshare.com/files/851422033/ICITST-2009_Proceedings.rar


Friday, August 27, 2010

IEEE PROJECTS TITLES Java/2010

Privacy-Conscious Location-Based Queries in Mobile Environments Parallel & Distributed 2010/Java
On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network Parallel & Distributed 2010/Java
Layered Approach Using Conditional Random Fields for Intrusion Detection Secure Computing 2010/ Java
IRM Integrated File Replication and Consistency Maintenance in P2P Systems Parallel & Distributed 2010/Java
Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks Network 2010/Java
Engineering Wireless Mesh Networks Joint Scheduling, Routing, Power Control,and Rate Adaptation Network 2010/Java
Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation Network 2010/Java
Anonymous Query Processing in Road Networks Data Engineering 2010/Java
Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks Secure Computing 2010/Java
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming Parallel & Distributed 2010/Java
Rate Control With Pair wise Intersession Network Coding Network 2010/Java
Equilibrium of Heterogeneous Congestion Control: Optimality and Stability Network 2010/Java
Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks Mobile Computing 2010/Java
Providing Witness Anonymity Under Peer-to-Peer Settings Network Security 2010/Java
On the Performance Bounds of Practical Wireless Network Coding Mobile Computing 2010/Java
Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis Network 2010/Java
VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks Mobile Computing 2010/Java
Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility Network 2010/Java
A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame Theory Network Security 2010/Java
MABS: Multicast Authentication Based on Batch signature Mobile Computing 2010/Java
SigFree: A Signature-Free Buffer Overflow Attack Blocker Network Security 2010/Java
SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments Mobile Computing 2010/Java
Layered Approach Using Conditional Random Fields for Intrusion Detection Network Security 2010/Java
Modeling Power Saving Protocols for Multicast Services in 802.11 Wireless LANs Mobile Computing 2010/Java
A General Framework for Service Availability for Bandwidth- Network 2010/Java
Efficient Connection-Oriented Networks
Secure Data Objects Replication in Data Grid Network Security 2010/Java
DCAR: Distributed Coding-Aware Routing in Wireless Networks Mobile Computing 2010/Java
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications Network 2010/Java
Shifting Inference Control to User Side: Architecture and Protocol Network Security 2010/Java
Optimal Relay Station Placement in Broadband Wireless Access Networks Mobile Computing 2010/Java
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats Network Security 2010/Java
A Parallel Self-Routing Rearrangeable Non-blocking Multi-Photonic Switching Network Network 2010/Java
Energy-Aware Tag Anti-collision Protocols for RFID Systems Mobile Computing 2010/Java
An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature Network Security 2010/Java
A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks Network 2010/Java
Channel Assignment for Multi-hop Cellular Networks: Minimum Delay Mobile Computing 2010/Java
Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks Network 2010/Java
Secure Client-Side ST-DM Watermark Embedding Network Security 2010/Java
Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks Network 2010/Java
TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Network 2010/Java

IEEE PROJECTS TITLES 2010/ .Net

Toward Optimal Network Fault Correction in Externally Managed Overlay Networks Parallel & Distributed 2010/ .Net
Slow Adaptive OFDMA Systems Through Chance Constrained Programming Network 2010/ .Net
Multicast Multi-path Power Efficient Routing in Mobile ADHOC Networks Network Security 2010/ .Net
Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams Mobile Computing 2010/ .Net
Edge Adaptive Image Steganography Based on LSB Matching Revisited Network Security 2010/ .Net
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes Mobile Computing 2010/ .Net
Predictive Network Anomaly Detection and Visualization Network Security 2010/ .Net
Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks Mobile Computing 2010/ .Net
SVD-Based Universal Spatial Domain Image Steganalysis Network Security 2010/ .Net
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks Network Security 2010/ .Net
Power Control and Channel Allocation in Cognitive Radio Networks with Primary Users’ Cooperation Mobile Computing 2010/ .Net
A Survey on the Encryption of Converge cast Traffic with In-Network Processing Network Security 2010/ .Net
Cost Analysis of Short Message Retransmissions Mobile Computing 2010/ .Net
In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm Network Security 2010/ .Net
Multiple RFID Tags Access Algorithm Mobile Computing 2010/ .Net
Step Construction of Visual Cryptography Schemes Network Security 2010/ .Net
Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks Mobile Computing 2010/ .Net
Reversible Image Watermarking Using Interpolation Technique Network Security 2010/ .Net
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements Mobile Computing 2010/ .Net
Beacon-Assisted Spectrum Access with Cooperative Cognitive Transmitter and Receiver Mobile Computing 2010/ .Net
Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks Network 2010/ .Net
S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks Network 2010/ .Net
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks Network 2010/ .Net
Fast Algorithms for Resource Allocation in Wireless Cellular Networks Network 2010/ .Net
Distributed Algorithms for Minimum Cost Multicast With Network Coding Network 2010/ .Net
Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast Network 2010/ .Net
Replication Routing in DTNs: A Resource Allocation Approach Network 2010/ .Net
A Fitting Report Position Scheme for the Gated IPACT Dynamic Bandwidth Algorithm in EPONs Network 2010/ .Net
POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority Network 2010/ .Net
Always Acyclic Distributed Path Computation Network 2010/Java

IEEE PROJECTS TITLES Java/2009

IEEE PROJECTS TITLES Java/2009 YEAR PLATFORM
Agent Mining: The Synergy of Agents and Data Mining - Data Mining Java/2009
Sub ontology-Based Resource Management for Web-Based e-Learning - Data Mining Java/2009
Mitigation of Control Channel Jamming under Node Capture Attacks Java/2009
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Java/2009
Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems - Data Mining Java/2009
Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments Java/2009
Security Analysis of the SASI Protocol Java/2009
Capturing Router Congestion and Delay Java/2009
SIMPS Using Sociology for Personal Mobility Java/2009
Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows Java/2009
Scalable Routing in Cyclic Mobile Networks Java/2009
Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing Java/2009
Monitoring the Application-Layer DDoS Attacks for Popular Websites Java/2009
Multiple Routing Configurations for Fast IP Network Recovery Java/2009
A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions Java/2009
Multipath Dissemination in Regular Mesh Topologies Java/2009
Detecting Malicious Packet Losses Java/2009
Dynamic Routing with Security Considerations Java/2009
Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures Java/2009
The Effectiveness of Checksums for Embedded Control Networks Java/2009
Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks Java/2009

IEEE PROJECTS TITLES .Net/2009

IEEE PROJECTS TITLES .Net/2009 YEAR PLATFORM
A scene-based video watermarking technique using SVMs - Image Processing .Net/2009
Route Stability in MANETs under the Random Direction Mobility Model .Net/2009
On the Security of Route Discovery in MANETs .Net/2009
Dynamics of Multiple-Seller and Multiple Buyer Spectrum Trading in Cognitive Radio Networks A GamenTheoretic Modeling Approach .Net/2009
RandomCast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks .Net/2009
A Gen2 Based RFID Authentication Protocol for Security and Privacy .Net/2009
Greedy Routing with Anti Void Traversal for Wireless Sensor Networks .Net/2009
On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint .Net/2009
Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking .Net/2009
Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period .Net/2009
An Integrated Approach to Sensor Role Selection .Net/2009
A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks .Net/2009
Biased Random Walks in Uniform Wireless Networks .Net/2009
Halting viruses in scale-free networks .Net/2009
The Effectiveness of Checksums for Embedded Control Networks .Net/2009
On Monitoring and Failure Localization in Mesh All-Optical Networks .NET2009
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths .Net/2009
Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling .Net/2009
Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic .Net/2009
Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc Networks .Net/2009
Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise .Net/2009
On Optimal Collusion Strategies For Fingerprinting .NET2009
PRESTO Feedback-Driven Data Management in Sensor Networks .Net/2009
Natural Watermarking spectrum technique for WOA .NET2009
Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images .Net/2009
Spread Spectrum Watermarking Security .NET2009
Secure and Policy-Compliant Source Routing .Net/2009
Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications .Net/2009
Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks .Net/2009
halting viruses in scale-free networks .Net/2009
Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag Identification .Net/2009
Explicit Load Balancing Technique for NGEO Satellite IP Networks With On-Board Processing Capabilities .Net/2009
Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows .Net/2009
Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks .Net/2009
Cell Breathing Techniques for Load Balancing in Wireless LANs .Net/2009
The Effectiveness of Checksums for Embedded Control Networks .Net/2009
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis .Net/2009
HARDWARE ENHANCED ASSOCIATION RULE MINING WITH HASHING AND PIPELINING .Net/2009
HBA Distributed Metadata Management for Large Cluster-Based Storage Systems .Net/2009
Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target.rar .Net/2009
Probabilistic Packet Marking For Large Scale IP Trace Back .Net/2009
Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications .Net/2009
Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services .Net/2009
Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data .Net/2009
Trustworthy Computing under Resource Constraints with the DOWN Policy .Net/2009
Fast Query Point Movement Techniques for Large CBIR Systems .Net/2009
Page Ranking Algorithms: A Survey TOWARD A FUZZY DOMAIN ONTOLOGY EXTRACTION METHOD FOR SEARCH ENGINE .Net/2009
RFID and Wireless Sensor Networks exemplify computationally constrained environments .Net/2009

IEEE PROJECTS TITLES 2008/Java

IEEE PROJECTS TITLES2008/Java YEAR PLATFORM
Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks [Network] 2008/Java
QUIVER: Consistent Object Sharing For Edge Services [Network] 2008/Java
Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing 2008/Java
Geometric Approach to Improving Active Packet Loss Measurement 2008/Java
A Precise Termination Condition of the Probabilistic Packet Marking Algorithm 2008/Java
Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks 2008/Java
Benefit Based Data Caching In Ad Hoc Networks 2008/Java
Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks 2008/Java
Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction 2008/Java
Two Techniques for Fast Computation of Constrained Shortest Paths 2008/Java
Controlling IP Spoofing Through Inter Domain Packet Filters 2008/Java
A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns 2008/Java
Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems 2008/Java
Truth Discovery with Multiple Conflicting Information Providers on Web 2008/Java
Location Based Spatial Query Processing In Wireless Broadcast Environments 2008/Java
Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks 2008/Java
Modeling & Automated Containment of Worms 2008/Java
Security In Large Networks Using Mediator Protocols 2008/Java
An Efficient Association Rule Mining Algorithm In Distributed Databases 2008/Java
BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks 2008/Java
Scalable and Efficient End-To-End Network Topology Inference 2008/Java
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries 2008/Java
Protection of Database Security via Collaborative Inference Detection 2008/Java
Dual-Link Failure Resiliency through Backup Link Mutual Exclusion 2008/Java
Securing User-Controlled Routing Infrastructures 2008/Java
Online Index Recommendations for High-Dimensional Databases Using Query Workloads 2008/Java
Mitigating Performance Degradation in Congested Sensor Networks 2008/Java
Security in Large Networks Using Mediator Protocols 2008/Java
Temporal Partioning of Communication Resources in an Integrated Architecture
Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
Probabilistic Packet Marking For Large Scale IP Trace Back
Personal Authentication Using 3-D Finger Geometry
Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provisio
Credit Card Fraud Detection Using Hidden Markov Models
Active Queue Management For Fair Resource Allocation In Wireless Networks
A Memory Learning Framework for Effective Image Retrieval

IEEE PROJECTS TITLES 2008/ .Net

S.NO IEEE PROJECTS TITLES YEAR PLATFORM
1 Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case[Mobile Computing] 2008/ .Net
2 A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers 2008/ .Net
3 Watermarking Relational Databases Using Optimization Based Techniques 2008/ .Net
4 A New Model for Dissemination of XML Content 2008/ .Net
5 Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements 2008/ .Net
6 Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision 2008/ .Net
7 Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks 2008/ .Net
8 Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light 2008/ .Net
9 Probabilistic Packet Marking For Large Scale IP Trace Back 2008/ .Net
10 Estimation of Defects Based On Defect Decay Model: ED3M 2008/ .Net
11 Active Learning Methods for Interactive Image Retrieval 2008/ .Net
12 Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach 2008/ .Net
13 Efficient Resource Allocation For Wireless Multicast 2008/ .Net
14 Localized Sensor Area Coverage With Low Communication Overhead 2008/ .Net
15 Trustworthy Computing Under Resource Constraints With The Down Policy 2008/ .Net
16 Credit Card Fraud Detection Using Hidden Markov Models 2008/ .Net
17 Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data 2008/ .Net
18 HBA Distributed Metadata Management for Large Cluster-Based Storage Systems 2008/ .Net
19 Temporal Portioning of Communication Resources in an Integrated Architecture 2008/ .Net
20 Hardware enhanced association rule mining with Hashing and Pipelining 2008/ .Net
21 A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video 2008/ .Net

Friday, January 8, 2010

IEEE XPLORE PROJECT’S TITLE 8

  • TOPOLOGY OPTIMIZATION OF SMART STRUCTURES USING A HOMOGENIZATION APPROACH
  • TOWARDS MPI PROGRESSION LAYER ELIMINATION WITH TCP AND SCTP
  • TOWARDS A DYNAMICAL MODEL FOR WIRELESS SENSOR NETWORKS
  • ENERGY-EFFICIENT SURVEILLANCE SYSTEM USING WIRELESS SENSOR NETWORKS
  • SECURITY MODELS FOR WIRELESS SENSOR NETWORKS
  • TRANSPORT LAYER MULTIHOMING FOR FAULT TOLERANCE IN FCS NETWORKS
·         TUNNELING OF SCTP OVER SINGLE UDP PORT
  • A KEY ESTABLISHMENT PROTOCOL FOR BLUETOOTH SCATTERNETS
  • UDP BASED P2P GAME TRAFFIC CLASSIFICATION WITH TRANSPORT LAYER BEHAVIORS
  • UDP IDENTIFICATION AND ERROR MITIGATION IN TOA-BASED INDOOR LOCALIZATION SYSTEMS USING NEURAL NETWORK ARCHITECTURE
  • UNRELIABLE SENSOR GRIDS: COVERAGE, CONNECTIVITY AND DIAMETER
  • USE OF SCTP FOR IP HANDOVER SUPPORT
  • USING CMT IN SCTP-BASED MPI TO EXPLOIT MULTIPLE INTERFACES IN CLUSTER NODES
  • USING EXPLICIT CONGESTION NOTIFICATION IN STREAM CONTROL TRANSMISSION PROTOCOL IN LOSSY NETWORKS
  • USING SCTP TO HIDE LATENCY IN MPI PROGRAMS
  • USING SCTP WITH PARTIAL RELIABILITY FOR MPEG-4 MULTIMEDIA STREAMING
  • USING A DIVERSITY SCHEME TO REDUCE ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
  • USING PARALLEL DRAM TO SCALE ROUTER BUFFERS
  • USING PERFORMANCE MAPS TO UNDERSTAND THE BEHAVIOR OF WEB CACHING POLICIES
  • A SWITCH MODEL FOR IMPROVING THROUGHPUT AND POWER FAIRNESS IN BLUETOOTH PICONETS
  • BUILDING UNDERWATER AD-HOC NETWORKS AND SENSOR NETWORKS FOR LARGE SCALE REAL-TIME AQUATIC APPLICATIONS
  • VIDEO CONFERENCING WITH MULTICAST SUPPORT
  • VIRTUAL ROUTING NETWORK EMULATION FRAMEWORK
  • MOBILITY ISSUES IN HYBRID AD-HOC WIRELESS SENSOR NETWORKS
  • WIRELESS SENSOR NETWORK SECURITY: A SURVEY
  • WAP OVER BLUETOOTH
  • WEB SERVICES FOR INFORMATION EXTRACTION FROM THE WEB
  • BUILDING A SECURE, MOBILE VOIP NETWORK OVER BLUETOOTH
  • WIMP-SCTP: MULTI-PATH TRANSMISSION USING STREAM CONTROL TRANSMISSION PROTOCOL (SCTP) IN WIRELESS NETWORKS
  • WIP: WEB SERVICE INITIATION PROTOCOL FOR MULTIMEDIA AND VOICE COMMUNICATION OVER IP
  • WIRELESS COMMUNICATIONS AN ANALYSIS OF WIRELESS STANDARDS IN THE TELECOMMUNICATIONS BUSINESS SECTOR OF NEW ZEALAND
  • WIRELESS SENSOR NETWORK SECURITY: A SURVEY
  • A WIRELESS EMBEDDED SENSOR ARCHITECTURE FOR SYSTEM-LEVEL OPTIMIZATION
  • WIRELESS SENSOR NETWORK MODELING USING MODIFIED RECURRENT NEURAL NETWORKS: APPLICATION TO FAULT DETECTION
  • WIRELESS SENSOR NETWORKS: A SURVEY
  • WIRELESS SENSOR NETWORKS AND APPLICATIONS: A SURVEY
  • WISE: BEST-PATH SELECTION IN WIRELESS MULTIHOMING ENVIRONMENTS
  • A WISE EXTENSION OF SCTP FOR WIRELESS NETWORKS
  • MULTIMEDIA WIRELESS NETWORKS FROM A TELETRAFFIC PERSPECTIVE
  • WORKFLOW MINING: DISCOVERING PROCESS MODELS FROM EVENT LOGS
  • WIRELESS SENSOR NETWORKS AND APPLICATIONS
  • WSNMP: A NETWORK MANAGEMENT PROTOCOL FOR WIRELESS SENSOR NETWORKS
  • WIRELESS SENSOR NETWORKS: A NEW REGIME FOR TIME SYNCHRONIZATION

· PERFORMANCE OF IEEE 802.11 BASED WIRELESS SENSOR NETWORKS IN NOISY ENVIRONMENTS

  • AN IMPLEMENTATION OF WIRELESS SENSOR NETWORK FOR SECURITY SYSTEM USING BLUETOOTH
  • A COMPACT ALGORITHM FOR MULTI-HOP BLUETOOTH SCATTERNET FORMATION (CAMBS)
  • A DESIGN AND IMPLEMENTATION OF WIRELESS SENSOR NETWORK ROUTING ON NANO-QPLUS PLATFORM
  • LOW POWER LOCATING ALGORITHMS FOR WIRELESS SENSORS NETWORK
  • 914 MHz PATH LOSS PREDICITION MODELS FOR INDOOR WIRELESS COMMUNICATIONS IN MULTIFLOORED BUILDINGS
  • BASESTATION COLLABORATION IN BLUETOOTH VOICE NETWORKS
  • MITIGATING THE EFFECTS OF INTERMITTENT INTERFERENCE ON BLUETOOTH AD HOC NETWORKS
  • SECURE CONNECTIONS IN BLUETOOTH SCATTERNETS
  • IMPROVING FILE TRANSFERS USING SCTP MULTISTREAMING
  • RESEARCH AND ANALYSIS ON ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS
  • DIRECTED FLOODING: A FAULT-TOLERANT ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
  • EVALUATION AND ACCELERATING BLUETOOTH DEVICE DISCOVERY
  • A NEW TRANSPORT LAYER SENSOR NETWORK PROTOCOL
  • A COVERAGE-PRESERVING NODE SCHEDULING SCHEME BASED ON TRUST SELECTION MODEL IN WIRELESS SENSOR NETWORKS
  • A MODEL OF IN HOMHOGENEITY FOR ADHOC NETWORKS
  • AN OVERVIEW OF WORLD WIDE WEB CACHING
  • ANALYSIS OF ROUTING ALGORITHM IN EVENT-BASED MIDDLEWARE
  • CLUSTER-BASED ROUTING IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGE
  • DESIGN AND IMPLEMENTATION OF A NETWORK APPLICATION ARCHITECTURE OF THIN CLIENTS
  • TEAKFOREST: AN ORGANICALLY GROWING PEER TO PEER SOCIAL AND CONTENT SHARING NETWORK
  • IMPACT OF INTERFERENCE ON MULTI-HOP WIRELESS NETWORK PERFORMANCE
  • KNOWLEDGE MANAGEMENT AND REPRESENTATION USING TOPIC MAPS
  • INTRANET CACHING PROTOCOL
  • IPCC-SCTP: AN ENCHANCEMENT TO THE STANDARD SCTP TO SUPPORT MULTI-HOMING EFFICIENTLY
  • FORMAL VERIFICATION OF GEOGRAPHIC VIRTUAL CIRCUIT ROUTING PROTOCOL USING SPIN MODEL CHECKER
  • ON COMMUNICATION MODELS FOR ALGORITHM DESIGN IN NETWORKED SENSOR SYSTEMS: A CASE STUDY
  • ON EFFICIENT DEPLOYMENT OF SENSORS ON PLANAR GRID
  • OPTIMAL SENSOR SELECTION AND PARAMETER ESTIMATION FOR REAL-TIME OPTIMIZATION
  • SCTP SIMULATION ON NS
  • SCTPSCAN & SIGTRAN RESEARCH PAPER
  • TRANSPARENT DISTRIBUTED WEB CACHING
  • UTILITY-BASED DECISION-MAKING IN WIRELESS SENSOR NETWORKS

IEEE XPLORE PROJECT’S TITLE 7

  • RFC 3286 - AN INTRODUCTION TO THE STREAM CONTROL TRANSMISSION PROTOCOL (SCTP)
  • RELAY NODE PLACEMENT IN WIRELESS SENSOR NETWORKS
  • ROBUST CONGESTION SIGNALING
  • ROBUST OPTIMIZATION MODELS FOR ENERGY-LIMITED WIRELESS SENSOR NETWORKS UNDER DISTANCE UNCERTAINTY
  • ROBUST OPTIMIZATION OF CONTAMINANT SENSOR PLACEMENT FOR COMMUNITY WATER SYSTEMS
  • ROBUST SENSOR NETWORK DESIGN FOR FAULT DIAGNOSIS
  • ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY
  • WIRELESS SENSOR BASED ON BLUETOOTH TECHNOLOGY
  • RTT BASED CONGESTION CONTROL AND PATH SWITCHING SCHEME FOR SCTP
  • SADDLEPOINT APPROXIMATION FOR SENSOR NETWORK OPTIMIZATION
  • SAMPLING BASED SENSOR-NETWORK DEPLOYMENT
  • SASHA: TOWARD A SELF-HEALING HYBRID SENSOR NETWORK ARCHITECTURE
  • BLUETOOTH SCATTERNET FORMATION AND INTERNETWORKING WITH 802.11 AND GPRS
  • SCALABLE HIGH-PERFORMANCE HEURISTICS FOR SENSOR PLACEMENT IN WATER DISTRIBUTION NETWORKS
  • SCOPING IN WIRELESS SENSOR NETWORKS A POSITION PAPER
  • SCTP IN BATTLEFIELD NETWORKS
  • SCTP: AN INNOVATIVE TRANSPORT LAYER PROTOCOL FOR THE WEB
  • SCTP – PERFORMANCE AND SECURITY

  • SCTP AND TCP VARIANTS: CONGESTION CONTROL UNDER MULTIPLE LOSSES
  • SCTP-BASED HANDOFF BASED ON MIH TRIGGERS INFORMATION IN CAMPUS NETWORKS
  • SCTP-BASED HANDOVER FOR VOIP OVER IEEE802. 11 WLAN USING DEVICE VIRTUALIZATION
  • SCTP BASED HANDOVER MECHANISM FOR VOIP OVER IEEE 802.11B WIRELESS LAN WITH HETEROGENEOUS TRANSMISSION RATES
  • SCTP-BASED TRANSPORT PROTOCOLS FOR CONCURRENT MULTIPATH TRANSFER
  • SCTP CONGESTION CONTROL: INITIAL SIMULATION STUDIES
  • SCTP EXTENSION FOR EGPRS/WLAN HANDOVER DATA
  • SCTP MULTIHOMING SUPPORT FOR HANDOFFS ACROSS HETEROGENEOUS NETWORKS
  • SCTP MULTISTREAMING: PREFERENTIAL TREATMENT AMONG STREAMS
  • SCTP OVER SATELLITE NETWORKS
  • SCTP: STATE OF THE ART IN RESEARCH, PRODUCTS, AND TECHNICAL CHALLENGES
  • SCTP versus TCP for MPI
  • SCTP VS TCP : PERFORMANCE COMPARISON IN MANETS
  • SCTP WITH AN IMPROVED COOKIE MECHANISM FOR WIRELESS NETWORKS THROUGH MODELING AND SIMULATION1
  • SCTP WITH AN IMPROVED COOKIE MECHANISM FOR MOBILE AD-HOC NETWORKS
  • USING SCTP TO HIDE LATENCY IN MPI PROGRAMS
  • SCTP-BASED MIDDLEWARE FOR MPI INWIDE-AREA NETWORKS
  • MAKING SCTP MORE ROBUST TO CHANGEOVER
  • IMPROVING FILE TRANSFER IN FCS NETWORKS

  • SCTP MULTIHOMING SUPPORT FOR HANDOFFS ACROSS HETEROGENEOUS NETWORKS
  • RETRANSMISSION POLICIES WITH TRANSPORT LAYER MULTIHOMING
  • SCTP AND TCP VARIANTS: CONGESTION CONTROL UNDER MULTIPLE LOSSES_
  • SCTP: AN INNOVATIVE TRANSPORT LAYER PROTOCOL FOR THE WEB
  • SECURITY SERVICES IN WIRELESS SENSOR NETWORKS USING SPARSE RANDOM CODING
  • SECURE ROUTING FOR MOBILE AD HOC NETWORKS
  • SECURE ROUTING IN WIRELESS SENSOR NETWORKS: ATTACKS AND COUNTERMEASURES
  • SECURE AND FAULT-TOLERANT EVENT BOUNDARY DETECTION IN WIRELESS SENSOR NETWORKS
  • POSTER ABSTRACT SECURE LOCATIONS: ROUTING ON TRUST AND ISOLATING COMPROMISED SENSORS IN LOCATION-AWARE SENSOR NETWORKS
  • SECURITY IN WIRELESS SENSOR NETWORKS
  • SECURITY MODELS FOR WIRELESS SENSOR NETWORKS
  • SECURITY VULNERABILITIES IN AD HOC NETWORKS
  • SELF-HEALING FOR SELF-ORGANIZING CLUSTER SENSOR NETWORKS
  • SELF-HEALING WIRELESS SENSOR NETWORKS
  • SELF-MANAGED FAULT MANAGEMENT IN WIRELESS SENSOR NETWORKS
  • SEMIDEFINITE PROGRAMMING LIEVEN VANDENBERGHEy AND STEPHEN BOYDz
  • SENSOR DEPLOYMENT USING INTERLEAVED EXPERIMENTATION, MODELING, AND OPTIMIZATION

  • SENSOR INFORMATIONNETWORKING ARCHITECTURE AND APPLICATIONS
  • SENSOR LOCATION AND OPTIMIZATION TOOL SET (SLOTS)
  • SENSOR NETWORK CONFIGURATION AND THE CURSE OF DIMENSIONALITY
  • SENSOR PLACEMENT FOR GRID COVERAGE UNDER IMPRECISE DETECTIONS
  • SENSOR PLATFORM OPTIMIZATION AND SIMULATION FOR SURVEILLANCE OF LARGE SCALE TERRAINS
  • SF-SCTP: AN EXTENSION OF STREAM CONTROL TRANSMISSION PROTOCOL TO SUPPORT QOS
  • SIGNALING TRANSPORT OVER IP-BASED NETWORKS USING IETF STANDARDS
  • SIMULATING NETWORKS OF WIRELESS SENSORS
  • SMSCTP: A FAST TRANSPORT LAYER HANDOVER METHOD USING SINGLE WIRELESS INTERFACE
  • SPINS: SECURITY PROTOCOLS FOR SENSOR NETWORKS
  • STATE-DRIVEN ENERGY OPTIMIZATION IN WIRELESS SENSOR NETWORKS
  • STOCHASTIC ANALYSIS OF SCALABLE TCP
  • STREAM CONTROL TRANSMISSION PROTOCOL (SCTP) PERFOIMANCE OVER THE LAND MOBILE SATELLITE CHANNEL
  • STRUCTURED STREAMS: A NEW TRANSPORT ABSTRACTION
  • STUDY OF SOFTWARE SECURITY BASED ON SLDMRP MULTICAST ROUTING PROTOCOL
  • SURVEY OF PROTOCOLS AND MECHANISMS FOR ENHANCED TRANSPORT OVER LONG FAT PIPES
  • A SURVEY ON CLUSTERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS
  • SURVEY ON SENSOR NETWORKS
  • SYNCHRONIZATION ALGORITHM FOR SCTP NETWORK
  • SYSTEM ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
  • SYSTEM-LEVEL ENERGY TRADEOFFS FOR COLLABORATIVE COMPUTATION IN
  • WIRELESS NETWORKS

  • A TAXONOMY OF WIRELESS MICRO-SENSOR NETWORK MODELS _
  • TCP WINDOW-BASED FLOW-ORIENTED DYNAMIC ASSEMBLY ALGORITHM FOR OBS NETWORKS
  • TCP-ACK TRIGGERED BANDWIDTH REQUEST SCHEME IN IEEE 802.16E SYSTEMS
  • TCP/IP MODEL AND INTRUSION DETECTION SYSTEMS
  • TELECOMMUNICATION CLUSTERING USING LINEAR AND SEMIDEFINITE PROGRAMMING
  • THE CASE FOR MULTISTREAMED WEB TRANSPORT IN HIGH LATENCY NETWORKS
  • THE DESIGN SPACE OF WIRELESS SENSOR NETWORKS
  • THE PERFORMANCE COMPARISON OF PRSCTP, TCP AND UDP FOR MPEG-4 MULTIMEDIA TRAFFIC IN MOBILE NETWORK
  • THE PERFORMANCE STUDY OF TRANSMITTING MPEG4 OVER SCTP
  • THE QUEST FOR SECURITY IN MOBILE AD HOC NETWORKS
  • THE USE OF SCTP FAILOVER MECHANISM FOR EFFICIENT NETWORK HANDOVER ON MOBILE IPV6
  • THE ANALYSIS OF IPV6 ADAPTATION TO THE INDUSTRIAL NETWORK PROTOCOL
  • THE ART AND SCIENCE OF INTEGRATED SYSTEMS DESIGN
  • THE AUTOMATIC LOCATION OF BASE-STATIONS FOR
  • OPTIMISED CELLULAR COVERAGE: A NEW COMBINATORIAL APPROACH
  • THE DESIGN AND EVALUATION OF A HYBRID SENSOR NETWORK FOR CANE-TOAD MONITORING
  • THE EFFECT AND STRATEGY RESEARCH OF THE E-COMMERCE BY THE APPLICATION OF P2P
  • THE RESEARCH ON RELIABILITY OF WIRELESS SENSORS NETWORK
  • ACCESS CONTROL USING BLUETOOTH
  • THROUGHPUT ANALYSIS OF SCTP OVER A MULTI-HOMED ASSOCIATION
  • ADHOC MULTICAST ROUTING ON RESOURCE LIMITED SENSOR NODES
  • TINYSEC: A LINK LAYER SECURITY ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
  • TOPOLOGICAL HOLE DETECTION IN WIRELESS SENSOR NETWORKS AND ITS APPLICATIONS
  • TOPOLOGY {AWARE PLACEMENT AND ROLE ASSIGNMENT FOR ENERGY-EFFICIENT INFORMATION GATHERING IN SENSOR NETWORKS}

IEEE XPLORE PROJECT’S TITLE 6

  • RELAY PLACEMENT IN SENSOR NETWORKS
  • MAXIMIZING NETWORK UTILIZATION WITH MAX-MIN FAIRNESS IN WIRELESS SENSOR NETWORKS
  • MAXIMIZING THE FUNCTIONAL LIFETIME OF SENSOR NETWORKS
  • MEADOWS: MODELING, EMULATION, AND ANALYSIS OF DATA OF WIRELESS SENSOR NETWORKS
  • MEAN RESPONSE TIME ESTIMATION FOR HTTP OVER SCTP IN WIRELESS ENVIRONMENT
  • MEASURING SCTP THROUGHPUT AND JITTER OVER HETEROGENEOUS NETWORKS
  • REMOVING SYSTEMATIC ERROR IN NODE LOCALISATION USING SCALABLE DATA FUSION
  • MIRRORING AND LOAD BALANCING
  • MITIGATING ROUTING MISBEHAVIOR IN MOBILE AD HOC NETWORKS
  • TOWARD RESILIENT SECURITY IN WIRELESS SENSOR NETWORKS
  • PROBLEMS WITH DEPLOYMENT OF MULTI-DOMAINED, MULTI-HOMED MOBILE NETWORKS
  • MOBILE AD HOC NETWORKS SECURITY
  • MOBILE-ASSISTED LOCALIZATION IN WIRELESS SENSOR NETWORKS
  • SIMULATION OF BLACK HOLE ATTACK IN WIRELESS AD-HOC NETWORKS
  • MODELING AND PERFORMANCE EVALUATION OF SCTP AS TRANSPORT PROTOCOL FOR FIREWALL CONTROL
  • MODELING AND OPTIMIZATION OF TRANSMISSION SCHEMES IN ENERGY CONSTRAINED WIRELESS SENSOR NETWORKS
  • MODELING LINK QUALITIES IN A SENSOR NETWORK
  • MODELING OF SENSOR NETWORKS USING XRM
  • MODELING THE PERFORMANCE OF WIRELESS SENSOR NETWORKS
  • MODELS AND SOLUTIONS FOR RADIO IRREGULARITY IN WIRELESS SENSOR NETWORKS
  • USING CMT IN SCTP-BASED MPI TO EXPLOIT MULTIPLE INTERFACES IN CLUSTER NODES

· MULTICAST VIDEO PERFORMANCE EVALUATION FOR EMERGENCY RESPONSE COMMUNICATIONS

  • MULTI-MODE SCTP IN BATTLEFIELD NETWORKS AND ANALYTIC MODELING
  • MULTIPATH ON-DEMAND ROUTING IN SENSOR NETWORK TOPOLOGIES
  • MULTIPATH ROUTING IN MOBILE AD HOC NETWORKS: ISSUES AND CHALLENGES
  • STREAM CONTROL TRANSMISSION PROTOCOL (SCTP)PARTIAL RELIABILITY EXTENSION
  • NETWORK ANALYSER
  • NEURAL NETWORK-BASED FACE DETECTION
  • NEW ALGORITHM TO CONTROL TCP BEHAVIOR OVER LOSSY LINKS
  • SINGLE TO MULTIPLAYER BLUETOOTH GAMING FRAMEWORK
  • MANET–ISSUES AND THEIR EFFECTS ON CONTROL APPLICATIONS
  • NON-RENEGABLE SELECTIVE ACKNOWLEDGMENTS (NR-SACKS) FOR SCTP
  • ON IMPROVING THE PERFORMANCE OF RELIABLE SERVER POOLING SYSTEMS FOR DISTANCE-SENSITIVE DISTRIBUTED APPLICATIONS
  • ON SOME OPEN ISSUES IN LOAD SHARING IN SCTP
  • ON THE PREVALENCE AND EVALUATION OF RECENT TCP ENHANCEMENTS
  • ON ENERGY PROVISIONING AND RELAY NODE PLACEMENT FOR WIRELESS SENSOR NETWORKS
  • ON OPTIMIZATION OF SENSOR SELECTION FOR AIRCRAFT GAS TURBINE ENGINES
  • ON PEER-TO-PEER CLIENT WEB CACHE SHARING
  • ON SENSOR NETWORK LIFETIME AND DATA DISTORTION
  • ON THE LIFETIME OF WIRELESS SENSOR NETWORKS
  • OPEN STANDARD DEVELOPMENT PLATFORMS FOR DISTRIBUTED SENSOR NETWORKS
  • OPTIMAL 3-DIMENSIONAL SENSOR DEPLOYMENT STRATEGY
  • OPTIMAL COORDINATE SENSOR PLACEMENTS FOR ESTIMATING MEAN AND VARIANCE COMPONENTS OF VARIATION SOURCES
  • OPTIMAL ENERGY AWARE CLUSTERING IN SENSOR NETWORKS
  • OPTIMAL PLACEMENT OF NODES IN LARGE SENSOR NETWORKS UNDER A GENERAL PHYSICAL LAYER MODEL
  • OPTIMAL ROUTING, LINK SCHEDULING AND POWER CONTROL IN MULTI-HOP WIRELESS NETWORKS
  • OPTIMAL WIRELESS SENSOR NETWORKS (WSNS) DEPLOYMENT: MINIMUM COST WITH LIFETIME CONSTRAINT
  • AN ANALYSIS AND APPLICATION OF DISTRIBUTED CONSTRAINT SATISFACTION AND OPTIMIZATION ALGORITHMS IN SENSOR NETWORKS
  • OPTIMIZATION IN TELECOMMUNICATION NETWORKS STAN VAN HOESEL

· OPTIMISATION OF FOREST FIRE SENSOR NETWORK USING GIS TECHNOLOGY

  • OPTIMIZATION OF TASK ALLOCATION IN A CLUSTER–BASED SENSOR NETWORK
  • ORGANIZING A GLOBAL COORDINATE SYSTEM FROM LOCAL INFORMATION ON AN AD HOC SENSOR NETWORK
  • P2P FILE SHARING SOFTWARE IN IPV4/IPV6 NETWORK
  • PEERSTAR: AN ATTRACTIVE ALTERNATIVE TO EXISTING PEER-TO-PEER TOPOLOGIES
  • PERFORMANCE ANALYSIS OF STREAM CONTROL TRANSMISSION PROTOCOL
  • PERFORMANCE EVALUATION AND OPTIMIZATION OF SCTP INWIRELESS AD-HOC NETWORKS
  • PERFORMANCE EVALUATION OF SCTP WITH ADAPTIVE MULTISTREAMING OVER LEO SATELLITE NETWORKS
  • PERFORMANCE EVALUATION OF THE STREAM CONTROL TRANSMISSION PROTOCOL
  • PERFORMANCE IMPLICATIONS OF A BOUNDED RECEIVE BUFFER IN CONCURRENT MULTIPATH TRANSFER
  • PERFORMANCE IMPROVEMENTS OF MOBILE SCTP IN INTEGRATED HETEROGENEOUS WIRELESS NETWORKS
  • PERFORMANCE MODELING OF SCTP MULTIHOMING
  • PERFORMANCE OF MULTIMEDIA RATE CONTROL PROTOCOLS IN INTERPLANETARY INTERNET
  • PERFORMANCE ADAPTIVE UDP FOR HIGH-SPEED BULK DATA TRANSFER OVER DEDICATED LINKS
  • PERFORMANCE OF A NEW BLUETOOTH SCATTERNET FORMATION PROTOCOL
  • PLANNING MOBILE SENSOR NET DEPLOYMENT FOR NAVIGATIONALLY-CHALLENGED SENSOR NODES
  • AN OVERVIEW OF WIRELESS SENSOR NETWORK AND APPLICATIONS
  • A COMPREHENSIVE STUDY OF BLUETOOTH SIGNAL PARAMETERS FOR LOCALIZATION
  • ACCELERATING BLUETOOTH INQUIRY FOR PERSONAL AREA NETWORKS
  • POWER EFFICIENT TOPOLOGIES FORWIRELESS SENSOR NETWORKS
  • POWER-AWARE NODE DEPLOYMENT IN WIRELESS SENSOR NETWORKS
  • POWER EFFICIENT SENSOR PLACEMENT AND TRANSMISSION STRUCTURE FOR DATA GATHERING UNDER DISTORTION CONSTRAINTS
  • POWER EFFICIENT SYSTEM FOR SENSOR NETWORKS
  • RICOCHETING BLUETOOTH
  • PREFERENTIAL TREATMENT OF SCTP SUBFLOWS: ANALYSIS AND SIMULATION
  • SCTP MULTISTREAMING: PREFERENTIAL TREATMENT AMONG STREAMS
  • PROBABILISTIC COVERAGE IN WIRELESS SENSOR NETWORKS
  • PROVIDING ANONYMITY IN WIRELESS SENSOR NETWORKS
  • PSFQ: A RELIABLE TRANSPORT PROTOCOL FOR WIRELESS SENSOR NETWORKS
  • INFORMATION ASSURANCE INWIRELESS SENSOR NETWORKS
  • QOS CONTROL FOR SENSOR NETWORKS
  • QUALITY OF DEPLOYMENT IN SURVEILLANCE WIRELESS SENSOR NETWORKS
  • BLUETOOTH IN WIRELESS COMMUNICATION

  • RADIO COVERAGE OPTIMIZATION WITH GENETIC ALGORITHMS
  • PERFORMANCE IMPLICATIONS OF A BOUNDED RECEIVE BUFFER IN CONCURRENT MULTIPATH TRANSFER
  • REAL-TIME IMPLEMENTATION OF FAULT DETECTION IN WIRELESS SENSOR NETWORKS USING NEURAL NETWORKS
  • RECENT ADVANCES IN OPTIMIZATION OF SMART STRUCTURES AND ACTUATORS
  • REDUNDANCY VERSUS LIFETIME TRADEOFF ANALYSIS FOR ENVIRONMENT MONITORING USING WIRELESS SENSOR NETWORKS
  • RELAYING NODE DEPLOYMENT IN HETEROGENEOUS WIRELESS SENSOR NETWORKS
  • RELAY NODE DEPLOYMENT STRATEGIES IN HETEROGENEOUS WIRELESS SENSOR NETWORKS: SINGLE-HOP COMMUNICATION CASE
  • RELAY PLACEMENT IN SENSOR NETWORKS
  • RELIABILITY MODELING IN WIRELESS SENSOR NETWORKS
  • RELIABLE AND EFFICIENT COMMUNICATIONS IN SENSOR NETWORKS
  • FORWARD RTO-RECOVERY (F-RTO): AN ALGORITHM FOR DETECTING SPURIOUS RETRANSMISSION TIMEOUTS WITH TCP AND THE STREAM CONTROL TRANSMISSION PROTOCOL (SCTP)
  • RESOURCE ALLOCATION ALGORITHMS FOR ENERGY EFFICIENT WIRELESS NETWORKS
  • RETRANSMISSION POLICIES FOR CONCURRENT MULTIPATH TRANSFER USING SCTP MULTIHOMING
  • A REVIEW OF SOME CURRENT RESEARCH IN MICROELECTROMECHANICAL SYSTEMS (MEMS) WITH DEFENCE APPLICATIONS
  • STREAM CONTROL TRANSMISSION PROTOCOL
  • STREAM CONTROL TRANSMISSION PROTOCOL APPLICABILITY STATEMENT
  • AN INTRODUCTION TO THE STREAM CONTROL TRANSMISSION PROTOCOL (SCTP)
  • STREAM CONTROL TRANSMISSION PROTOCOL (SCTP) PARTIAL RELIABILITY EXTENSION