You are on page 1of 2

S.

N
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27.

2011 IEEE Project Titles


Forward Correction and Fountain Codes in Delay Tolerant Networks A Personalized Ontology Model For Web Information Gathering Continuous Neighbor Discovery in Asynchronous Sensor Networks Adaptive Provisioning Of Human Expertise In Service-Oriented Systems Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports Bridging Socially-Enhanced Virtual Communities Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration Data Integrity Proofs In Cloud Storage ROC: Resilient Online Coverage for Surveillance Applications Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud Live Streaming With Receiver-Based Peer-Division Multiplexing Exploring Application-Level Semantics For Data Compression Optimal Service Pricing For A Cloud Cache A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems Digital Image hiding using curve let transform A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Publishing Search Logs A Comparative Study Of Privacy Guarantees MANET Routing Protocols vs Mobility Models: A Performance Evaluation The Awareness Network, To Whom Should I Display My Actions And, Whose Actions Effective Navigation of Query Results Based on Concept Hierarchies Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems Improving Aggregate Recommendation Diversity Using RankingBased Techniques Integration Of Sound Signature In Graphical Password Authentication System Modeling And Detection Of Camouflaging Worm Monitoring Service Systems From A Language-Action Perspective

Year
2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ Java 2011/ Java 2011/ .Net 2011/ Java 2011/ .Net 2011/J2EE 2011/ .Net 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net

Domain
Networking Data Mining Networking Data Mining Networking Networking Networking Cloud Computing Networking Data Mining Data mining Networking Data mining Data Mining Network Security Secure Computing Network Network Data Mining Network Data Mining Data Mining Data Mining Data mining Data Mining Secure Computing Service

Computing 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases Nymble Blocking Misbehaving Users in Anonymizing Networks Data Integrity Proofs In Cloud Storage The World In A Nutshell: Concise Range Queries A Generic Multilevel Architecture For Time Series Prediction Intrusion detection: An Energy efficient approach in heterogeneous WSN NABS Novel Approaches for Biometric Systems A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification A Link Analysis Extension Of Correspondence Analysis For Mining Relational Databases A Dual Framework And Algorithms For Targeted Online Data Delivery Adaptive Cluster Distance Bounding For High-Dimensional Indexing Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Clustering with Multi- View Point Based Similarity Measure Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Going Back and Forth Efficient Multi deployment and Multi snap shutting on Clouds Secure and Practical Outsourcing of Linear Programming in Cloud Computing A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks Throughput Optimization in High Speed Downlink Packet Access 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ Java Data mining Network Software Engineering Data mining Data mining Network Security Secure Computing Data mining Data mining Data mining Data mining Data mining Data mining Network Network Security Data mining Network 2011/ Java 2011/ Java 2011/ Java 2011/ Java 2011/ .Net 2011/ .Net 2011/ Java 2011/ Java Cloud Computing Cloud Computing Network Network Network Network Network Network

You might also like