Java 2013-14 IEEE Project Titles

JAVA PROJECTS, IEEE JAVA PROJECTS 2013-2014
Domain - Mobile Computing
Java 2013-14 IEEE Project Titles in Mobile Computing
* Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
* Vampire attacks:Draining life from wireless ad-hoc sensor networks
* Towards a Statistical Framework for Source Anonymity in Sensor Networks
* A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
* Distributed Cooperative Caching in Social Wireless Networks
* Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
* Joint Optimal Sensor Selection and Scheduling in Dynamic Spectrum Access Networks
* Understanding the Scheduling Performance in Wireless Networks with Successive Interference Cancellation
* Content Sharing over Smartphone-Based Delay-Tolerant Networks
* DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
* Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
* A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks
* Bicriteria Optimization in Multihop Wireless Networks: Characterizing the Throughput-Energy Envelope
* Maximizing Transmission Opportunities in Wireless Multihop Networks
* On the MDP-Based Cost Minimization for Video-on-Demand Services in a Heterogeneous Wireless Network with Multihomed Terminals
* Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective
* Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks
* Dynamic Online-Calibrated Radio Maps for Indoor Positioning in Wireless Local Area Networks
* Estimating Performance of Mobile Services from Comparative Output-Input Analysis of End-to-End Throughput
* Deployment of a Connected Reinforced Backbone Network with a Limited Number of Backbone Nodes


Domain - Networking
Java 2013-14 IEEE Project Titles in Networking
* On the Node Clone Detection in Wireless Sensor Networks
* Cross-domain privacy-preserving cooperative firewall optimization
* Entrusting Private Computation and Data to Untrusted Networks
* ITA: Innocuous Topology Awareness for Unstructured P2P Networks
* Attribute-Based Encryption With Verifiable Outsourced Decryption
* Delay-Based Network Utility Maximization
* Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
* Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
* Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
* Design and Implementation of an “Approximate” Communication System for Wireless Media Applications
* On Distributed and Coordinated Resource Allocation for Interference Mitigation in Self-Organizing LTE Networks
* An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
* Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks
* Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless Networks
* On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability
* Randomized Information Dissemination in Dynamic Environments
* Predicting the Impact of Measures Against P2P Networks: Transient Behavior and Phase Transition
* An Adaptive System Based on Roadmap Profiling to Enhance Warning Message Dissemination in VANETs
* Throughput-Optimal Scheduling in Multihop Wireless Networks Without Per-Flow Information
* Time-Bounded Essential Localization for Wireless Sensor Networks


Domain - Cloud Computing
Java 2013-14 IEEE Project Titles in Cloud Computing
* CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
* AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
* Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
* Load Rebalancing for Distributed File Systems in Clouds
* Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
* A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud
* Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
* A Load Balancing Model Based on Cloud Partitioningfor the Public Cloud
* Privacy-Preserving Public Auditing for Secure Cloud Storage
* Cloud computing for mobile users can offloading compution save energy.
* Mining Contracts for Business Events and Temporal Constraints in Service Engagements.
* Collaboration in Multicloud Computing Environments: Framework and Security Issues.
* Security and Privacy-Enhancing Multi-cloud Architectures
* Toward Secure Multi-keyword Top-k Retrieval over Encrypted Cloud Data
* A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Systems
* Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
* Scalable and Secure Sharing of Personal Health Records in Using Attribute-Based Encryption


Domain - Knowledge and Data Engineering
Java 2013-14 IEEE Project Titles in Knowledge and Data Engineering
* Multiparty Access Control for Online Social Networks: Model and Mechanisms
* Privacy Preserving Delegated Access Control in Public Clouds
* m-Privacy for Collaborative Data Publishing
* Dynamic Query Forms for Database Queries
* A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
* Dynamic Personalized Recommendation on Sparse Data
* Anomaly Detection via Online Oversampling Principal Component Analysis
* A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
* A System to Filter Unwanted Messages from OSN User Walls
* Comparable Entity Mining from Comparative Questions
* Facilitating Effective User Navigation through Website Structure Improvement
* A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
* Incentive Compatible Privacy-Preserving Data Analysis
* A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments
* Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks



Domain - Dependable and Secure Computing
Java 2013-14 IEEE Project Titles in Dependable and Secure Computing
* Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs
* Entrusting Private Computation and Data to Untrusted Networks
* Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
* NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
* On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections
* Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing
* SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
* Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data



Domain - Parallel and Distributed System
Java 2013-14 IEEE Project Titles in Parallel and Distributed System
* Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Network-
* Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
* Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
* Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
* Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
* Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
* Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
* Towards Differential Query Services in Cost-Efficient Clouds
* Adaptive Network Coding for Broadband Wireless Access Networks
* Analysis of Distance-Based Location Management in Wireless Communication Networks
* Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model
* QoS Ranking Prediction for Cloud Services
* A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
* IP-Geolocation Mapping for Moderately Connected Internet Regions
* Optimal Client-Server Assignment for Internet Distributed Systems


Domain - Image Processing
Java 2013-14 IEEE Project Titles in Image Processing
* Local Structure-Based Image Decomposition for Feature Extraction With Applications to Face Recognition
* Multi-View Video Representation Based on Fast Monte Carlo Surface Reconstruction
* Regional Bit Allocation and Rate Distortion Optimization for Multiview Depth Video Coding With View Synthesis Distortion Model
* Two-Dimensional Orthogonal DCT Expansion in Trapezoid and Triangular Blocks and Modified JPEG Image Compression
* Corner Detection and Classification Using Anisotropic Directional Derivative Representations
* Image Inpainting on the Basis of Spectral Structure From 2-D Nonharmonic Analysis
* Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization
* Coupled Variational Image Decomposition and Restoration Model for Blurred Cartoon-Plus-Texture Images With Missing Pixels
* General Framework to Histogram-Shifting-Based Reversible Data Hiding
* Learning Dynamic Hybrid Markov Random Field for Image Labeling
* Rotation Invariant Local Frequency Descriptors for Texture Classification
* Image Quality Assessment Using Multi-Method Fusion
* Scalable Coding of Depth Maps With R-D Optimized Embedding
* Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image Segmentation
* Performance Evaluation Methodology for Historical Document Image Binarization


Domain - Software Engineering
Java 2013-14 IEEE Project Titles in Software Engineering
* Active Learning and Effort Estimation: Finding the Essential Content of Software Effort Estimation Data
* Generating Domain-Specific Visual Language Tools from Abstract Visual Specifications
* MADMatch: Many-to-Many Approximate Diagram Matching for Design Comparison
* Ranking and Clustering Software Cost Estimation Models through a Multiple Comparisons Algorithm
* Scaling Up Spike-and-Slab Models for Unsupervised Feature Learning
* Validating Second-Order Mutation at System Level
* Balancing Privacy and Utility in Cross-Company Defect Prediction



Domain - Pattern Analysis and Machine Learning, PAML
Java 2013-14 IEEE Project Titles in Pattern Analysis and Machine Learning
* 3D Convolutional Neural Networks for Human Action Recognition
* A Globally-Variant Locally-Constant Model for Fusion of Labels from Multiple Diverse Experts without Using Reference Labels
* Efficient Classification for Additive Kernel SVMs
* Fast and Accurate Matrix Completion via Truncated Nuclear Norm Regularization
* Image Transformation Based on Learning Dictionaries across Image Spaces


Domain - Information Forensics and Security
Java 2013-14 IEEE Project Titles in Information Forensics and Security
* Extracting Spread-Spectrum Hidden Data from Digital Media.
* Utility-Privacy Tradeoff in Databases An Information-theoretic Approach.
* TrPF A Trajectory Privacy-Preserving Framework for Participatory Sensor
 



JAVA IEEE PROJECTS TITLES, LIST
Java 2012 IEEE Project Details / Titles / List / Java IEEE Projects / Java Final Year Projects / Java Projects for BE,BTech, ME, MTech, MCA

MOBILE COMPUTING PROJECTS
JAVA MOBILE COMPUTING 2012 IEEE PROJECT TITLES
* A Fade-Level Skew-Laplace Signal Strength Model for Device-Free Localization with Wireless Networks
* A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks
* An MIMO Configuration Mode and MCS Level Selection Scheme by Fuzzy Q-Learning for HSPA_ Systems
* Approximation Algorithms for Data Broadcast in Wireless Networks
* Chameleon A Color-Adaptive Web Browser for Mobile OLED Displays
* Channel Estimation for Opportunistic Spectrum Access Uniform and Random Sensing
* Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
* Controlled mobility sensor networks for target tracking using ant colony optimization
* Delay Optimal Scheduling for Cognitive Radios with Cooperative Beamforming A Structured Matrix-Geometric Method
* Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks
* Efficient and Fair Bandwidth Allocation in Multi-Channel Cognitive Radio Networks
* Efficient Virtual Backbone Construction with Routing Cost Constraint in Wireless Networks Using Directional Antennas
* FESCIM Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks
* Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks Investigation of Context Prediction Accuracy for Different Context Abstraction Levels
* Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design
* Modeling and Performance Analysis for Duty-Cycled MAC Protocols with Applications to S-MAC and X-MAC
* Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMACA Networks
* Nature-Inspired Self-Organization, Control, and Optimization in Heterogeneous Wireless Networks
* On the Cost of Knowledge of Mobility in Dynamic Networks An Information-Theoretic Approach
* On the Vulnerabilities of CSI in MIMO Wireless Communication Systems
* ProSpect A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel
* STORM A Framework for Integrated Routing, Scheduling and Traffic Management in Ad Hoc Networks
* The Boomerang Protocol Tying Data to Geographic Locations in Mobile Disconnected Networks
* Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks Computational Complexity and Efficient Approximations
* Understanding Node Localizability of Wire-less Ad-hoc and Sensor Networks

* A Privacy preseving location monitoring system for wireless sensor Network, IEEE 2011
* BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks, IEEE 2011
* Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks, IEEE 2011
* Dynamic Switching based data forwarding for low duty cycle wireless sensor networks, IEEE 2011
* Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems, IEEE 2011
* Mobile Sampling of Sensor Field Data using controlled Broadcast, IEEE 2011
* Multicast Throughput for Hybrid Wireless Networks under Gaussian Channel Model, IEEE 2011
* On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents, IEEE 2011
* Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE 2011
* Spatial -Temporal Coverage optimization in wireless Sensor Network, IEEE 2011
* Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks, IEEE 2011
* A Scalable and Energy Efficient Context Monitoring Framework for Mobile Personal, IEEE 2010
* Energy-Efficient VoIP over Wireless LANs, IEEE 2010
* Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks, IEEE 2010
* MABS Multicast Authentication Based on Batch Signature, IEEE 2010
* Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink, IEEE 2010
* Optimal Jamming Attack Strategies and Network Defense, IEEE 2010
* Secure Data Collection in Wireless Sensor netwoks using Randomised Desperive Routes, IEEE 2010
* TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks, IEEE 2010
* A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice, IEEE 2009
* Contention-Aware Performance Analysis of Mobility-Assisted Routing, IEEE 2009
* Energy Maps For Mobile Wireless networks coherence Time Versus Spreading Period, IEEE 2009
* Energy-Efficient SINR-Based Routing for Multihop Wireless, IEEE 2009
* Mobility Management Approaches for Mobile IP Networks, IEEE 2009
* Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks, IEEE 2009
* Continuous Monitoring of Spatial Queries in Wireless Broadcast, IEEE 2009
* RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks, IEEE 2009 
* Large Connectivity for Dynamic Random Geometric Graphs, IEEE 2009
* Mitigation of Control Channel Jamming Under Node Capture Attacks, IEEE 2009
* Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless, IEEE 2008
* Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks, IEEE 2008
* Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks, IEEE 2008

*****************************************************************************************************************

NETWORKING PROJECTS
JAVA NETWORKING, 2012 IEEE PROJECT TITLES
* A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization
* A Theory for the Connectivity Discovered by Routing Protocols
* Accelerating Multipattern Matching on Compressed HTTP Traffic
* Adaptive Selective Verification An Efficient Adaptive Countermeasure to Thwart DoS Attacks
* Balancing Reliability and Utilization in Dynamic Spectrum Access
* Concise Lookup Tables for IPv4 and IPv6 Longest Prefix Matching in Scalable Routers
* Congestion-Dependent Pricing and Forward Contracts for Complementary Segments of a Communication Network
* Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
* Design of Wireless Sensor Networks for Mobile Target Detection
* Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using -Structures
* Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks
* Efficient Network Tomography for Internet Topology Discovery
* Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
* ESM Efficient and Scalable Data Center Multicast Routing
* Greedy Geographic Routing in Large-Scale Sensor Networks A Minimum Network Decomposition Approach
* Multicast Performance With Hierarchical Cooperation
* On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths
* Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
* Performance of PCN-Based Admission Control Under Challenging Conditions
* Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks
* Reliable Collective Communications With Weighted SRLGs in Optical Networks
* Router Support for Fine-Grained Latency Measurements
* Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection
* Spatio-Temporal Compressive Sensing and Internet Traffic Matrices (Extended Version)

* Component-Based Localization in Sparse Wireless Networks, IEEE 2011
* Continuous Neighbor Discovery in Asynchronous Sensor Networks, IEEE 2011
* Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks, IEEE 2011
* Design and Implementation of a Fast Dynamic Packet Filter, IEEE 2011
* Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration, IEEE 2011
* Forward Correction and Fountain Codes in Delay-Tolerant Networks, IEEE 2011
* Jamming Aware traffic allocation for multipath routing using Routing using portfolio Selection, IEEE 2011
* Live Streaming With Receiver-Based Peer-Division Multiplexing, IEEE 2011
* Model-Based Identification of Dominant Congested Links, IEEE 2011
* On the Complexity of the Regenerator Placement Problem in Optical Networks, IEEE 2011
* Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks, IEEE 2011
* Parametric Methods for Anomaly Detection in Aggregate Traffic, IEEE 2011
* Performance analysis of an unclosed CSMA in the multi channel cognitive radio networks, IEEE 2011
* Prog ME - Towards Programmable Network Measurement, IEEE 2011
* ROC Resilient Online Coverage for Surveillance Applications, IEEE 2011
* Throughput-Competitive Advance Reservation With Bounded Path Dispersion, IEEE 2011
* TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks, IEEE 2011
* Topological Transformation Approaches to TCAM-Based Packet Classification, IEEE 2011
* Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks, IEEE 2010
* Conditional Shortest Path Routing in Delay Tolerant Networks, IEEE 2010
* Constrained Relay node placement in Wireless Sensor Network, IEEE 2010
* Demand-Aware Content Distribution on the Internet, IEEE 2010
* Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks, IEEE 2010
* Host-to-Host Congestion Control for TCP, IEEE 2010
* Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks, IEEE 2010
* Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast, IEEE 2010
* On Multihop Distances in Wireless Sensor Networks with Random Node Locations, IEEE 2010
* POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority, IEEE 2010
* Rendered Path Range-Free Localization in Anisotropic Sensor Networks With Holes, IEEE 2010
* TCAM Razor A Systematic Approach Towards Minimizing Packet Classifiers in TCAMS, IEEE 2010
* The Optimality of Two PricesMaximizing Revenue in a stochastic Communication System, IEEE 2010
* Virtual Database Technology for Distributed Database, IEEE 2010
* Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks, IEEE 2009
* A New Reliable Broadcasting in Mobile Ad Hoc Networks, IEEE 2009
* A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution, IEEE 2009
* Anonymity in Wireless Broadcast Networks, IEEE 2009
* Capturing Router Congestion and Delay, IEEE 2009
* Channel Access Protocols for Multihop Opportunistic Networks, Challenges and Recent Developments, IEEE 2009
* Entropy Based Adaptive Flow Aggregation, IEEE 2009
* Measuring Capacity Bandwidth of Targeted Path Segments, IEEE 2009
* Monitoring the Application-Layer DDoS Attacks for Popular Websites, IEEE 2009
* Multiple Routing Configurations for Fast IP Network Recovery, IEEE 2009
* Node Isolation model and age-based neighbor selection in unstructured P2P networks, IEEE 2009
* SIMPS Using Sociology for Personal Mobility, IEEE 2009

****************************************************************************************************************

CLOUD COMPUTING PROJECTS
JAVA CLOUD COMPUTING, 2012 IEEE PROJECT TITLES
* A Cloud Infrastructure for Optimization of a Massive Parallel Sequencing Workflow
* A Multi-Objective Approach for Workflow Scheduling in Heterogeneous Environments
* A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
* A Seeded Cloud Approach to Health Cyberinfrastructure Preliminary Architecture Design and Case Applications
* A Time-series Pattern based Noise Generation Strategy for Privacy Protection in Cloud Computing
* An Autonomous Reliability Aware NEgotiation Strategy for Cloud Computing Environments
* Automated Tagging for the Retrieval of Software Resources in Grid and Cloud Infrastructures
* Automating Data-Throttling Analysis for Data-Intensive Workflows
* Cloud Chamber A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants
* Cluster as a Service for self-deployable cloud applications
* Design and Implementation of a Secure Healthcare Social Cloud System
* Enhanced Energy-efficient Scheduling for Parallel Applications in Cloud
* Environmental and Disaster Sensing Using Cloud Computing Infrastructure
* Framework on Large Public Sector Implementation of Cloud Computing
* Global Futures a Multithreaded Execution Model for Global Arrays-based Applications
* Lightweight Resource Scaling for Cloud Applications
* Mining Concept drifting Network traffic in cloud computing environments
* On Handling Large-Scale Polynomial Multiplications in Compute Cloud Environments using Divisible Load Paradigm
* Optimal Reconfiguration of the Cloud Network for Maximum Energy Savings
* Performance Analysis of Cloud Computing Centers Using M =G=m=m_ r Queuing Systems
* Performance analysis of supporting QoS for multimedia in IEEE 802.11e
* Performance evaluation of multimedia services over wireless LAN using routing protocol Optimized Link State Routing (OLSR)
* Perspectives of UnaCloud An Opportunistic Cloud Computing Solution For Facilitating Research
* Pseudo Random Number Generation for Parallelized Jobs on Clusters
* Revenue Management for Cloud Providers - A Policy-based Approach under Stochastic Demand
* Reward Scheduling for QoS in Cloud Applications
* SLA-based Optimization of Power and Migration Cost in Cloud Computing
* Visualizing Nonmanifold and Singular Implicit Surfaces with Point Clouds

* A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service, IEEE 2011
* Enabling public Auditability and data dynamics for storage security in clouding Computing, IEEE 2011
* Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud, IEEE 2011
* Going Back and forth Efficient Multideployment and multisnap shotting on clouds, IEEE 2011
* Modeling and Analysis of Cloud Computing Availability based on Eucalyptus Platform for E-Government Data Center, IEEE 2011
* Towards Secure and Dependable Storage Services in Cloud Computing, IEEE 2011

****************************************************************************************************************

DEPENDABLE & SECURE COMPUTING PROJECTS
JAVA DEPENDABLE AND SECURE COMPUTING, 2012 IEEE PROJECT TITLES
* Packet Hiding Method For Preventing Selective Jamming Attacks
* Secure Trust:- A dynamic trust compilation model for secured communication in multiagent system
* Automated Security Test Generation with Formal Threat Models
* Detecting and Resolving Firewall Policy Anomalies
* Detecting Anomalous Insiders in Collaborative Information Systems
* Enforcing Mandatory Access Control in Commodity OS to Disable Malware
* Enhanced Privacy ID A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
* Ensuring Distributed Accountability for Data Sharing in the Cloud
* Give2Get Forwarding in Social Mobile Wireless Networks of Selfish Individuals
* Iterative Trust and Reputation Management Using Belief Propagation
* JS-Reduce Defending Your Data from Sequential Background Knowledge Attacks
* Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts
* On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks
* Remote Attestation with Domain-Based Integrity Model and Policy Analysis
* Resilient Authenticated Execution of Critical Applications in Untrusted Environments
* ZoneTrust Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing

* Analyzing a Family of Key Protection Schemes against Modification Attacks, IEEE 2011
* Anomaly Detection in Network Traffic Based on Statistical Inference and -Stable Modeling, IEEE 2011
* Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks, IEEE 2011
* Modeling and Detection of Camouflaging Worm, IEEE 2011
* Nymble: Blocking Misbehaving Users in Anonymizing Networks, IEEE 2011
* Packet-Hiding Methods for Preventing Selective Jamming Attacks, IEEE 2011
* Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking, IEEE 2011
* SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks, IEEE 2011
* Layered Approach Using Conditional Random Fields for Intrusion Detection, IEEE 2010
* SiGFree A signature based free buffer overflow attack blocker, IEEE 2010
* Secure Data Objects Replication in Data Grid, IEEE 2010
* Evaluating the Vulnerability of Network Traffic Using Joint, IEEE 2009
* Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing, IEEE 2009
* Security Analysis of the SASI Protocol, IEEE 2009
* Modeling & Automated Containment of Worms, IEEE 2008
* Controlling IP Spoofing Through Inter Domain Packet Filters, IEEE 2008
* A Precise Termination Condition of the Probabilistic Packet Marking Algorithm, IEEE 2008
* An Adaptive Programming Model for Fault Tolerant Distributed Computing, IEEE 2007
* Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes, IEEE 2007

***************************************************************************************************************

KNOWLEDGE & DATA ENGINEERING
JAVA KNOWLEDGE AND DATA ENGINEERING, 2012 IEEE PROJECT TITLES
* ROAD: A New Spatial Object Search Framework for Road Networks
* Slicing: A New Approach for Privacy Preserving Data Publishing
* A Decision-Theoretic Framework for Numerical Attribute Value Reconciliation
* A Knowledge-Driven Approach to Activity Recognition in Smart Homes
* A Look-Ahead Approach to Secure Multiparty Protocols
* A Performance Anomaly Detection and Analysis Framework for DBMS Development
* A Temporal Pattern Search Algorithm for Personal History Event Visualization
* A Unified Probabilistic Framework for Name Disambiguation in Digital Library
* Combining Tag and Value Similarity for Data Extraction and Alignment
* Data Mining for XML Query-Answering Support
* Dense Subgraph Extraction with Application to Community Detection
* Discriminative Feature Selection by Nonparametric Bayes Error Minimization
* EDISC A Class-Tailored Discretization Technique for Rule-Based Classification
* Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
* Efficient Computation of Range Aggregates against Uncertain Location-Based Queries
* Efficient Fuzzy Type-Ahead Search in XML Data
* Efficient Processing of Uncertain Events in Rule-Based Systems
* Energy Efficient Schemes for Accuracy-Guaranteed Sensor Data Aggregation Using Scalable Counting
* Energy-Efficient Reverse Skyline Query Processing over Wireless Sensor Networks
* Evaluating Path Queries over Frequently Updated Route Collections
* Extending Recommender Systems for Disjoint UserItem Sets The Conference Recommendation Problem
* Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias Detection
* Holistic Top-k Simple Shortest Path Join in Graphs
* Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
* Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
* Maximum Ambiguity-Based Sample Selection in Fuzzy Decision Tree Induction
* Mining Online Reviews for Predicting Sales Performance A Case Study in the Movie Domain
* On the Complexity of View Update Analysis and Its Application to Annotation Propagation
* Protecting Location Privacy against Location-Dependent Attacks in Mobile Services
* Saturn Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems
* Segmentation and Sampling of Moving Object Trajectories Based on Representativeness
* Using Rule Ontology in Repeated Rule Acquisition from Similar Web Sites

* A fuzzy self Constructing Feature Clustering Alg for text Classfication, IEEE 2011
* A Generic Multilevel Architecture for Time Series Prediction, IEEE 2011
* A Machine learning approach for identifying disease treatment relations in short test, IEEE 2011
* Adaptive Cluster Distance Bounding for High-Dimensional Indexing, IEEE 2011
* Analysis on Credit Card Fraud Detection Methods, IEEE 2011
* Continous Monitoring of distance based range query, IEEE 2011
* Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme, IEEE 2011
* Data Leakage Detection, IEEE 2011
* Data Mining to Generate Adverse Drug Events Detection Rules, IEEE 2011
* Decision Trees for Uncertain Data, IEEE 2011
* Finding Top-k Answers in Keyword Search over Relational Databases Using Tuple Units, IEEE 2011
* Adaptive Join Operators for Result Rate optimization, IEEE 2010
* False Negative Problem of Counting Bloom Filter, IEEE 2010
* FiVaTech Page-Level Web Data Extraction from Template Pages, IEEE 2010
* K-Anonymity in the Presence of External Databases, IEEE 2010
* LIGHT A Query-Efficient Yet Low-Maintenance --DHT, IEEE 2010
* PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects, IEEE 2010
* Prospective Infectious Disease Outbreak detection using Markov switching model, IEEE 2010
* Queries Optimization in SQL using Linear Recursion, IEEE 2010
* Approximate Distributed K-Means Clustering over a Peer-to-Peer Network, IEEE 2009
* OLEX : effective Rule Learning for Text Categorization, IEEE 2009
* ANGEL - Enhancing the Utility of Generalization for Privacy Preserving Publication, IEEE 2009
* Efficient Range Query Processing in Peer-to-Peer Systems, IEEE 2009
* Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments, IEEE 2008
* Online Index Recommendations for High-Dimensional Databases Using Query Workloads, IEEE 2009
* BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection, IEEE 2009
* A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern, IEEE 2009
* Distributed Suffix Tree Overlay for Peer-to-Peer Search, IEEE 2009

*************************************************************************************************************

PARALLEL & DISTRIBUTED SYSTEMS
JAVA PARALLEL AND DISTRIBUTED SYSTEMS, 2012 IEEE PROJECT TITLES
* BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
* A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming
* A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
* A Sequentially Consistent Multiprocessor Architecture for Out-of-Order Retirement of Instructions
* A Survey of Parallel Programming Models and Tools in the Multi and Many-Core Era
* An Online Data Access Prediction and Optimization Approach for Distributed Systems
* Comparison-Based System-Level Fault Diagnosis A Neural Network Approach
* Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths
* Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
* Distributed Diagnosis of Dynamic Events in Partitionable Arbitrary Topology Networks
* Distributed Privacy-Preserving Access Control in Sensor Networks
* DRAGON Detection and Tracking of Dynamic Amorphous Events in Wireless Sensor Networks
* Embedded Transitive Closure Network for Runtime Deadlock Detection in Networks-on-Chip
* Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
* Energy-Efficient Capture of Stochastic Events under Periodic Network Coverage and Coordinated Sleep
* Exploring the Optimal Replication Strategy in P2P-VoD Systems Characterization and Evaluation
* Flash Crowd in P2P Live Streaming Systems Fundamental Characteristics and Design Implications
* Formal Semantics, Compilation and Execution of the GALS Programming Language DSystemJ
* Hamiltonian Decomposition of the Rectangular Twisted Torus
* Large-Scale Transient Stability Simulation of Electrical Power Systems on Parallel GPUs
* Load Balancing Hashing in Geographic Hash Tables
* On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling
* On the Design and Deployment of RFID Assisted Navigation Systems for VANETs
* Optimal Construction of All Shortest Node-Disjoint Paths in Hypercubes with Applications
* Performance and Reliability of Non-Markovian Heterogeneous Distributed Computing Systems
* Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks
* Reliable and Energy-Efficient Multipath Communications in Underwater Sensor Networks
* Topology Enhancements in Wireless Multihop Networks A Top-Down Approach
* Trustworthy Coordination of Web Services Atomic Transactions
* Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing, IEEE 2011

* A Distributed Protocol to Serve Dynamic Groups for Peer to Peer Streaming, IEEE 2010
* Cooperative Caching in Wireless P2P Networks Design Implementation and Evaluation, IEEE 2010
* IRM Integrated File Replication and Consistency Maintenance, IEEE 2010
* Privacy-Conscious Location-Based Queries in Mobile Environments, IEEE 2010
* Detecting Malicious Packet Losses, IEEE 2009
* Dynamic Routing with Security Considerations, IEEE 2009
* Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks, IEEE 2009
* Virtual-Force-Based Geometric Routing Protocol in MANETs, IEEE 2009
* A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment, IEEE 2009
* A Tree-Based Peer-to-Peer Network with Quality Guarantees, IEEE 2008
* Computation Efficient Multicast Key Distribution, IEEE 2008 
* Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, IEEE 2008 
* Peer talk a Peer-to-Peer Multi-Party Voice-Over-IP System, IEEE 2008 
* QUIVER Consistent Object Sharing For Edge Services, IEEE 2008 
* The Server Reassignment Problem for Load Balancing in Structured P2P Systems, IEEE 2008 
* Continuous Delivery Message Dissemination Problems Under the Multicasting Communication Mode, IEEE 2008
* Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding, IEEE 2008

**************************************************************************************************************

IMAGE PROCESSING PROJECTS
JAVA IMAGE PROCESSING, 2012 IEEE PROJECT TITLES
* A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications
* A Multiplicative Iterative Algorithm for Box-Constrained Penalized Likelihood Image Restoration
* Cognition and Removal of Impulse Noise With Uncertainty
* Combining Head Pose and Eye Location Information for Gaze Estimation
* Groupwise Registration of Multimodal Images by an Efficient Joint Entropy Minimization Scheme
* Higher Degree Total Variation (HDTV) Regularization for Image Recovery
* Image Deblurring Using Derivative Compressed Sensing for Optical Imaging Application
* Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers
* Model-Assisted Adaptive Recovery of Compressed Sensing with Imaging Applications
* Multiple Descriptions Coinciding Lattice Vector Quantizer for Wavelet Image Coding
* Object Segmentation of Database Images by Dual Multiscale Morphological Reconstructions and Retrieval Applications
* Posterior-Mean Super-Resolution With a Causal Gaussian Markov Random Field Prior
* Three-Dimensional Near-Field MIMO Array Imaging Using Range Migration Techniques
* Wavelet-Based Compressed Sensing Using a Gaussian Scale Mixture Model

* A memory learning framework for effective image retrieval, IEEE 2011
* Unequal Power Allocation for JPEG Transmission Over MIMO Systems, IEEE 2010
* Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos, IEEE 2009  
* Hierarchical Bayesian sparse image reconstruction with application to MRFM, IEEE 2009  
* Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos, IEEE 2009 
* Image Transformation using Grid, IEEE 2006 
* A Memory Learning Framework for Effective Image Retrieval, IEEE 2005
* Application of BPCS steganography to wavelet compressed video, IEEE 2004 
* Identification of Humans Using Gait, IEEE 2004

***********************************************************************************************************

NETWORK AND SERVICE MANAGEMENT PROJECTS
JAVA IEEE 2012 NETWORK AND SERVICE MANAGEMENT PROJECTS TITLES
* A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services
* A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments
* A Security Management Architecture for Supporting Routing Services on WANETs
* Characterization of ISP Traffic Trends, User Habits, and Access Technology Impact
* Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection

**************************************************************************************************************

SERVICES COMPUTING
JAVA 2012 IEEE SERVICES COMPUTING PROJECT TITLES
* A Dataflow-Based Scientific Workflow Composition Framework
* Dynamic Authentication for Cross-Realm SOA-Based Business Processes
* Energy-Aware Autonomic Resource Allocation in Multitier Virtualized Environments
* Expert Discovery and Interactions in Mixed Service-Oriented Systems
* Runtime Enforcement of Web Service Message Contracts with Data

***************************************************************************************************************

SOFTWARE ENGINEERING
JAVA 2012 IEEE SOFTWARE ENGINEERING PROJECT TITLES
* An Autonomous Engine for Services Configuration and Deployment
* Comparing Semi-Automated Clustering Methods for Persona Development
* Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
* Exploiting Dynamic Information in IDEs Improves Speed and Correctness of Software Maintenance Tasks
* Pointcut Rejuvenation Recovering Pointcut Expressions in Evolving Aspect-Oriented Software
* QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems
* StakeRare Using Social Networks and Collaborative Filtering for Large-Scale Requirements Elicitation

****************************************************************************************************************

COMMUNICATION SYSTEM PROJECTS
JAVA 2012 IEEE COMMUNICATION SYSTEM PROJECT TITLES
* A Fourier Based Method for Approximating the Joint Detection Probability in MIMO Communications
* Achieving Joint Diversity in Decode-and-Forward MIMO Relay Networks with Zero-Forcing Equalizers
* Characterization of OFDM Radio Link Under PLL-Based Oscillator Phase Noise and Multipath Fading Channel
* Performance Modeling and Analysis of Cognitive Mesh Networks
* A Secure Single Sign-On Mechanism for Distributed Computer Networks

************************************************************************************************************

FUZZY SYSTEMS
JAVA 2012 IEEE FUZZY SYSTEMS PROJECT TITLES
* A Generalization of Distance Functions for Fuzzy c -Means Clustering With Centroids of Arithmetic Means
* Adaptive Control Schemes for Discrete-Time T-S Fuzzy Systems With Unknown Parameters and Actuator Failures
* Grouping, Overlap, and Generalized Bientropic Functions for Fuzzy Modeling of Pairwise Comparisons

*************************************************************************************************************

LEARNING TECHNOLOGIES
JAVA 2012 IEEE LEARNING TECHNOLOGIES PROJECT TITLES
* Case-Based Learning, Pedagogical Innovation, and Semantic Web Technologies
* Facilitating Trust in Privacy-Preserving E-Learning Environments
* LaaN Convergence of Knowledge Management and Technology-Enhanced Learning
* Spatial Learning Using Locomotion Interface to Virtual Environment
* Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning

**************************************************************************************************

PATTERN ANALYSIS & MACHINE INTELLIGENCE
JAVA 2012 IEEE PATTERN ANALYSIS & MACHINE INTELLIGENCE PROJECT TITLES
* A Closed-Form Solution to Tensor Voting Theory and Applications
* Bilinear Modeling via Augmented Lagrange Multipliers (BALM)
* Convergent Iterative Closest-Point Algorithm to Accomodate Anisotropic and Inhomogenous Localization Error
* Difference-Based Image Noise Modeling Using Skellam Distribution
* Discriminative Latent Models for Recognizing Contextual Group Activities
* Edge Structure Preserving 3D Image Denoising by Local Surface Approximation
* Fast Rotation Invariant 3D Feature Computation Utilizing Efficient Local Neighborhood Operators
* IntentSearch Capturing User Intention for One-Click Internet Image Search
* Robust and Efficient Ridge-Based Palmprint Matching
* Trainable Convolution Filters and Their Application to Face Recognition

*********************************************************************************************************

JAVA WIRELESS COMMUNICATION PROJECT TITLES
* Throughput Optimization in High Speed Downlink Packet Access (HSDPA) Random access Transport Capacity, IEEE 2010
* Adaptive Multi-Node Incremental Relaying for Hybrid-ARQ in AF Relay Networks, IEEE 2010
* Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary, IEEE 2009
* SAT- Solving Approaches to Context-Aware Enterprise Network Security Management, IEEE 2009
* Continuous Flow Wireless Data Broadcasting for High Speed Environments, IEEE 2009
* Multi-Service Load Sharing for Resource Management in the Cellular WLAN Integrated Network, IEEE 2009
* Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks, IEEE 2009 
* Robust cooperative routing protocol in mobile wireless sensor networks, IEEE 2009
* Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks, IEEE 2009
* SIR – analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets, IEEE 2009

*************************************************************************************************************

OTHER DOMAINS, JAVA PROJECT TITLES
* Sketch4Match – Content-based Image Retrieval System Using Sketches - Applied Machine Intelligence and Informatics, IEEE 2011
* Remote Display solution for mobile cloud computing - Computer, IEEE 2011
* A bounded and adaptive memory based approach to mine frequent patterns from very large database - Cybernetics, IEEE 2011
* Embedded Extended Visual Cryptography Schemes - Information Forensics and Security, IEEE 2011
* Cloud Computing for Agent-Based Urban Transportation Systems - Intelligent Transport System, IEEE 2011
* Locating Equivalent servants over p2p networks - Network and Service Management, IEEE 2011
* Ensuring Data Storage Security in Cloud Computing - Cloud Computing, IEEE 2010
* CHARMY: A Framework for Designing and Verifying Architectural Specifications, Software Engineering - IEEE 2009 
* Optimized Resource Allocation for Software Release Planning, Software Engineering - IEEE 2009 
* Using the Conceptual Cohesion of Classes for Fault Prediction in Object oriented Systems, Software Engineering - IEEE 2008 
* Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies, Software Engineering - IEEE 2008  
* An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, Information Forensics and Security - IEEE 2010 
* SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks, Information Forensics and Security - IEEE 2009 
* Network Topology against Distributed Denial of Service Attacks DDOS, Information Forensics and Security - IEEE 2006  
* Personal Authentication Using 3-D Finger Geometry, Information Forensics and Security - IEEE 2006 
* Effects of Denial of sleep attacks on wireless sensor networks MAC protocols - Vehicular Technology, IEEE 2010
* Face Recognition using Laplacian Faces - Pattern Analysis and Machine Intelligence, IEEE 2005
* Online Handwritten Script Recognition - Pattern Analysis and Machine Intelligence, IEEE 2004
* Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions - Neural Networks, IEEE 2009
* A Survey of Learning-Based Techniques of Email Spam Filtering - Neural Networks, IEEE 2008
* DAIOS - Efficient Dynamic Web Service Invocation - Internet Computing, IEEE 2009
* E-Secure Transactions - Secure Electronic Data Interchange over Internet - Internet Computing, IEEE 2005
* Agent Mining: The Synergy of Agents and Data Mining - Intelligent Systems, IEEE 2009
* Protection of Database Security via Collaborative Inference Detection - Intelligence and Security Informatics, IEEE 2008
* EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks - Industrial Informatics, IEEE 2009
* Face Recognition for Smart Recognitions - Gesture Recognition, IEEE 2008
* Analysis of Computational Time of Simple Estimation of Distribution Algorithms - Evolutionary Computation, IEEE 2010
* Data Mining Techniques For Dynamically Classifying And Analyzing Library Database - Datamining, IEEE 2010
* High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths  - Consumer Electronics, IEEE 2008
* Upper Bounds for Dynamic Memory Allocation - Computers, IEEE 2009
* Collusive piracy prevention in P2P content delivery network - Computers, IEEE 2009
* Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs - Computer Science & Network Security, IEEE 2007
* Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol - Computer and Communication Engineering, IEEE 2008
* Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies - Biomedicine, IEEE 2009

**************************************************************


PROJECT SUPPORTS & DELIVERABLES @ NCCT
# PROJECT ABSTRACT
# PROJECT IEEE BASE PAPER/REFERENCE PAPER
# PROJECT PRESENTATION IN PPT FORMAT
# PROJECT REVIEW ASSISTANCE FOR VIVA
# PROJECT DIAGRAMS
# PROJECT SOURCE CODE
# PROJECT REPORT
# PROJECT SCREEN SHOTS
# PROJECT DEMO
# PROJECT EXPLANATION
# PROJECT ACCEPTANCE LETTER
# PROJECT COMPLETION CERTIFICATE
# OTHER REQUIRED LETTERS

No comments:

Post a Comment