You are on page 1of 16

S.

N
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

2011 IEEE Project Titles


Forward Correction and Fountain Codes in Delay Tolerant Networks A Personalized Ontology Model For Web Information Gathering Continuous Neighbor Discovery in Asynchronous Sensor Networks Adaptive Provisioning Of Human Expertise In Service-Oriented Systems Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports Bridging Socially-Enhanced Virtual Communities Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration Data Integrity Proofs In Cloud Storage ROC: Resilient Online Coverage for Surveillance Applications Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud Live Streaming With Receiver-Based Peer-Division Multiplexing Exploring Application-Level Semantics For Data Compression Optimal Service Pricing For A Cloud Cache A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems Digital Image hiding using curve let transform A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Publishing Search Logs A Comparative Study Of Privacy Guarantees MANET Routing Protocols vs Mobility Models: A Performance Evaluation The Awareness Network, To Whom Should I Display My Actions And, Whose Actions Effective Navigation of Query Results Based on Concept Hierarchies Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Integration Of Sound Signature In Graphical Password Authentication System

26 27 28 29 30 31 32 33 34 35 36 37

Modeling And Detection Of Camouflaging Worm Monitoring Service Systems From A Language-Action Perspective One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases Nymble Blocking Misbehaving Users in Anonymizing Networks Data Integrity Proofs In Cloud Storage The World In A Nutshell: Concise Range Queries A Generic Multilevel Architecture For Time Series Prediction Intrusion detection: An Energy efficient approach in heterogeneous WSN NABS Novel Approaches for Biometric Systems A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification A Link Analysis Extension Of Correspondence

38 Analysis For Mining Relational Databases 39 40 41 42 43 44 45 46 47 48 49 50 A Dual Framework And Algorithms For Targeted Online Data Delivery Adaptive Cluster Distance Bounding For High-Dimensional Indexing Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Clustering with Multi- View Point Based Similarity Measure Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Going Back and Forth Efficient Multi deployment and Multi snap shutting on Clouds Secure and Practical Outsourcing of Linear Programming in Cloud Computing A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks

51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71

Extended XML Tree Pattern Matching: Theories and Algorithms Buffer Sizing for 802.11 Based Networks Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks Discovering Conditional Functional Dependencies Effective Navigation of Query Results Based on Concept Hierarchies Load Shedding in Mobile Systems with MobiQual Nymble: Blocking Misbehaving Users in Anonymizing Networks Ranking Spatial Data by Quality Preferences SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks Secure and Practical Outsourcing of Linear Programming in Cloud Computing Selfish Overlay Network Creation and Maintenance SPAF: Stateless FSA-based Packet Filters Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis A Query Formulation Language for the Data Web Automated Certification for Compliant Cloud-based Business Processes Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems The Geometric Efficient Matching Algorithm for Firewalls Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks Throughput Optimization in High Speed Downlink Packet Access

Year 2011/platform
JAVA .NET JAVA .NET JAVA .NET JAVA .NET JAVA .NET .NET JAVA .NET .NET JAVA .NET JAVA JAVA .NET JAVA .NET JAVA .NET .NET .NET

Domain
Networking Data Mining Networking Data Mining Networking Networking Networking Cloud Computing Networking Data Mining Data mining Networking Data mining Data Mining Network Security Secure Computing Network Network Data Mining Network Data Mining Data Mining Data Mining Data mining Data Mining

JAVA .NET .NET JAVA .NET .NET JAVA .NET .NET JAVA .NET .NET JAVA

Secure Computing Service Computing Data mining Network Software Engineering Data mining Data mining Network Security Secure Computing Data mining Data mining Data mining

Data mining JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA .NET JAVA Data mining Data mining Network Network Security Data mining Network Cloud Computing Cloud Computing Network Network Network MOBILE COMPUTING

JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA .NET .NET .NET .NET .NET .NET .NET JAVA JAVA

KNOWLEDGE AND DATA ENGINEERING NETWORKING NETWORKING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING SECURE COMPUTING KNOWLEDGE AND DATA ENGINEERING SECURE COMPUTING CLOUD COMPUTING NETWORKING NETWORKING Data Mining

Cloud Computing WIRELESS COMMUNICATIONS SECURE COMPUTING SECURE COMPUTING Network Network Network

S.N
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

2011 IEEE Project Titles


Forward Correction and Fountain Codes in Delay Tolerant Networks A Personalized Ontology Model For Web Information Gathering Continuous Neighbor Discovery in Asynchronous Sensor Networks Adaptive Provisioning Of Human Expertise In Service-Oriented Systems Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports Bridging Socially-Enhanced Virtual Communities Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration Data Integrity Proofs In Cloud Storage ROC: Resilient Online Coverage for Surveillance Applications Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud Live Streaming With Receiver-Based Peer-Division Multiplexing Exploring Application-Level Semantics For Data Compression Optimal Service Pricing For A Cloud Cache A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems Digital Image hiding using curve let transform A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Publishing Search Logs A Comparative Study Of Privacy Guarantees MANET Routing Protocols vs Mobility Models: A Performance Evaluation The Awareness Network, To Whom Should I Display My Actions And, Whose Actions

Year
2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net

22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Effective Navigation of Query Results Based on Concept Hierarchies Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Integration Of Sound Signature In Graphical Password Authentication System Modeling And Detection Of Camouflaging Worm Monitoring Service Systems From A Language-Action Perspective One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases Nymble Blocking Misbehaving Users in Anonymizing Networks Data Integrity Proofs In Cloud Storage The World In A Nutshell: Concise Range Queries A Generic Multilevel Architecture For Time Series Prediction Intrusion detection: An Energy efficient approach in heterogeneous WSN NABS Novel Approaches for Biometric Systems A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification A Link Analysis Extension Of Correspondence

2011/J2EE 2011/ .Net 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net

38 Analysis For Mining Relational Databases 39 40 41 42 A Dual Framework And Algorithms For Targeted Online Data Delivery Adaptive Cluster Distance Bounding For High-Dimensional Indexing Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

2011/ Java

2011/ Java 2011/ Java 2011/ Java 2011/ Java

43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64

Clustering with Multi- View Point Based Similarity Measure Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Going Back and Forth Efficient Multi deployment and Multi snap shutting on Clouds Secure and Practical Outsourcing of Linear Programming in Cloud Computing A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks Throughput Optimization in High Speed Downlink Packet Access Sketch4Match-Content Based Image Retrival System Using Sketches Embedded Extended Visual Cryptography Schemes A Competitive Study of Cryptography Techniques over Block Cipher Roboust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding Online Intrusion Alert Aggregation with Generative Data Stream Modeling A More Secure Steganography Method in Spatial Domain A User-oriented Image Retrieval System Based on Interactive Genetic Algorithm A Web Search Engine Based Approach to Measure Semantic Similarity Between Words Weighted Energy Detection for Noncoherent Ultra-Wideband Receiver Design Problems and Solutions of Web Search Engines Adaptive Cluster Distance Bounding for High Dimensional Indexing Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems

2011/ Java

2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ .Net 2011/ .Net 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net

65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86

Live Streaming with Receiver-based Peer-division Multiplex in Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection Secure High-Throughput Multicast Routing in Wireless Mesh Networks Optimal Stochastic Location Updates in Mobile Ad Hoc Network Throughput Optimization in Mobile Backbone Networks RITAS: Services for Randomized Intrusion Tolerance Selfish Overlay Network Creation and Maintenance Comparative Evaluation of Spoofing Defenses SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks Topological Transformation Approaches to TCAM-Based Packet Classification Ranking Spatial Data by Quality Preferences A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks Extended XML Tree Pattern Matching: Theories and Algorithms Buffer Sizing for 802.11 Based Networks Discovering Conditional Functional Dependencies Effective Navigation of Query Results Based on Concept Hierarchies Load Shedding in Mobile Systems with MobiQual SPAF: Stateless FSA-based Packet Filters Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis A Query Formulation Language for the Data Web Automated Certification for Compliant Cloud-based Business Processes Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems

2011/ .Net 2011/ .Net 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/JAVA 2011/JAVA 2011/JAVA 2011/JAVA 2011/JAVA 2011/JAVA 2011/JAVA 2011/.NET 2011/.NET 2011/.NET 2011/.NET

87 88 89 90

The Geometric Efficient Matching Algorithm for Firewalls Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking Cloud Computing for Agent-Based Urban Transportation Systems ProgME: Towards Programmable Network Measurement

2011/.NET 2011/.NET 2011/JAVA 2011/JAVA

Domain
Networking Data Mining Networking Data Mining Networking Networking Networking Cloud Computing Networking Data Mining Data mining Networking Data mining Data Mining Network Security Secure Computing Network Network Data Mining Network Data Mining

Data Mining Data Mining Data mining Data Mining Secure Computing Service Computing Data mining Network Software Engineering Data mining Data mining Network Security Secure Computing Data mining Data mining Data mining

Data mining

Data mining Data mining Network Network Security

Data mining Network Cloud Computing Cloud Computing Network Network Network Network Network Network Image Processing Secure Computing Secure Computing Multimedia Network Security Secure Computing Image Processing Data Mining Network Web Mining Data Mining Network

Network Network Mobile Computing Mobile Computing Mobile Computing Network Security Network Network Security Network Security Network Data Mining MOBILE COMPUTING KNOWLEDGE AND DATA ENGINEERING NETWORKING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING NETWORKING Data Mining

Cloud Computing WIRELESS COMMUNICATIONS

SECURE COMPUTING SECURE COMPUTING INTELLIGENT SYSTEMS NETWORKING

You might also like