You are on page 1of 6

IEEE PROJECT TITLES

S.NO 1 2 3 4 5 6 7 8 9 10
11

12 13 14 15 16 17 18 19

SVK TECH IEEE PROJECTS TITLES 2008/2009/2010


JAVA PROJECT TITLES Capturing Router Congestion and Delay Energy-Efficient SINR-Based Routing for Multihop Wireless Mitigation of Control Channel Jamming Under Node Capture Attacks Large Connectivity for Dynamic Random Geometric Graphs Measuring Capacity Bandwidth of Targeted Path Segments Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use Recommendations Multiple Routing Configurations for Fast IP Network Recovery Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks SIMPS Using Sociology for Personal Mobility Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing
A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory Path Diversity over Packet Switched Networks: Performance Analysis and Rate Allocation

Ensuring Data Storage Security in Cloud Computing Hiding data in spatial domain images with distortion tolerance Constrained Skyline Query Processing against Distributed Data Sites Scaling Dynamic Authority-Based Search Using Materialized Subgraphs Secure Data Objects Replication in Data Grid

COURSE JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA

DOMAIN
Mobile Computing Mobile Computing Mobile Computing Mobile Computing Mobile Computing

NETWORKING
Mobile Computing Mobile Computing Mobile Computing Mobile Computing

S.NO 1 2 3 4 5
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24

IEEE PROJECT TITLES


IEEE PROJECT TITLES Biased Random Walks in Uniform Wireless Networks. Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic. Energy Maps for Mobile Wireless Networks. Enforcing Minimum-Cost Multicast Routing against Shelfish Information Flows.

On the Planning of Wirless Sensor Networks Energy-Efficient Clustering under the Joint Routing and Coverage The Effectiveness of Checksums for Embedded Control Networks Resequencing Analysis of Stop-and-Wait ARQ for Parallel multichannel communications Single-Link Failure Detection in All-Optical Networks Using monitoring cycles and paths. PRESTO Feedback-Driven Data Management in Sensor Networks
EFFICIENT PROVABLE OF SECURE KEY DISTRIBUTION MANAGEMENT Blind Authentication: A Secure Crypto- Biometric Verification Protocol CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment Data leakage detection Distributed Algorithms for Minimum Cost Multicast With Network Coding Distributed Resource Sharing-cd

Dtrab: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis Efficient and Dynamic Routing Topology Inference From End-to-End Measurements Automatic mining of Threatening e-mail using Ad Infinitum algorithm
An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems

Step Construction of Visual Cryptography Schemes


Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks.

On Energy Efficient Encryption for Video Streaming in Wireless Sensor Networks

Joint Routing and Coverage Constraint.

You might also like