Friday, August 27, 2010

IEEE PROJECTS TITLES Java/2010

Privacy-Conscious Location-Based Queries in Mobile Environments Parallel & Distributed 2010/Java
On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network Parallel & Distributed 2010/Java
Layered Approach Using Conditional Random Fields for Intrusion Detection Secure Computing 2010/ Java
IRM Integrated File Replication and Consistency Maintenance in P2P Systems Parallel & Distributed 2010/Java
Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks Network 2010/Java
Engineering Wireless Mesh Networks Joint Scheduling, Routing, Power Control,and Rate Adaptation Network 2010/Java
Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation Network 2010/Java
Anonymous Query Processing in Road Networks Data Engineering 2010/Java
Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks Secure Computing 2010/Java
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming Parallel & Distributed 2010/Java
Rate Control With Pair wise Intersession Network Coding Network 2010/Java
Equilibrium of Heterogeneous Congestion Control: Optimality and Stability Network 2010/Java
Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks Mobile Computing 2010/Java
Providing Witness Anonymity Under Peer-to-Peer Settings Network Security 2010/Java
On the Performance Bounds of Practical Wireless Network Coding Mobile Computing 2010/Java
Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis Network 2010/Java
VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks Mobile Computing 2010/Java
Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility Network 2010/Java
A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame Theory Network Security 2010/Java
MABS: Multicast Authentication Based on Batch signature Mobile Computing 2010/Java
SigFree: A Signature-Free Buffer Overflow Attack Blocker Network Security 2010/Java
SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments Mobile Computing 2010/Java
Layered Approach Using Conditional Random Fields for Intrusion Detection Network Security 2010/Java
Modeling Power Saving Protocols for Multicast Services in 802.11 Wireless LANs Mobile Computing 2010/Java
A General Framework for Service Availability for Bandwidth- Network 2010/Java
Efficient Connection-Oriented Networks
Secure Data Objects Replication in Data Grid Network Security 2010/Java
DCAR: Distributed Coding-Aware Routing in Wireless Networks Mobile Computing 2010/Java
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications Network 2010/Java
Shifting Inference Control to User Side: Architecture and Protocol Network Security 2010/Java
Optimal Relay Station Placement in Broadband Wireless Access Networks Mobile Computing 2010/Java
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats Network Security 2010/Java
A Parallel Self-Routing Rearrangeable Non-blocking Multi-Photonic Switching Network Network 2010/Java
Energy-Aware Tag Anti-collision Protocols for RFID Systems Mobile Computing 2010/Java
An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature Network Security 2010/Java
A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks Network 2010/Java
Channel Assignment for Multi-hop Cellular Networks: Minimum Delay Mobile Computing 2010/Java
Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks Network 2010/Java
Secure Client-Side ST-DM Watermark Embedding Network Security 2010/Java
Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks Network 2010/Java
TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Network 2010/Java

No comments:

Post a Comment