Thursday 22 November 2012

IEEE PROJECTS 2012 - 100% Output , Coding Explaination , Documentation , Ppt , Algorithm


CONTACT :
MICANS INFOTECH , +91 90036 28940
PONDICHERRY
WWW.MICANSINFOTECH.COM
INFO@MICANSINFOTECH.COM


IEEE 2012 – JAVA Projects

SNo Project Domain
1 A Secure Erasure Code -Based Cloud Storage System with Secure Data Forwarding CLOUD COMPUTING
2 Cloud Computing Security:From Single to Multi- Clouds CLOUD COMPUTING
3 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage CLOUD COMPUTING
4 HASBE:A Hierarchical Attribute-Based Solution for Flexible and Scalable Access control in Cloud
CLOUD COMPUTING
Computing
5 Outsourced Similarity Search on Metric Data Assets CLOUD COMPUTING
6 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based
CLOUD COMPUTING
Encryption
7 Toward Secure and Dependable Storage Service in Cloud Computing CLOUD COMPUTING
8 Clustring with Multi-viewpoint-based Similarity Measure DATA MINING
9 Efficient Extented Boolean Retrival DATA MINING
10 Ranking Model Adaptation for Domain-Specific Search DATA MINING
11 Slicing: A New Approach for Privacy Preserving Data Publising DATA MINING
12 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING
13 Improving Various Reversible Data Hiding Scheme Via Optimal Codes for Binary Covers IMAGE PROCESSING
14 Scalable Coding of Encrypted Images IMAGE PROCESSING
15 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networ MOBILE COMPUTING
16 Fast Data Collection in Tree-Based Wireless Sensor Networks MOBILE COMPUTING
17 Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper MOBILE COMPUTING
18 Learn to Personalized Image Search from the Photo Sharing Websites MULTIMEDIA
19 Adaptive Oppertunistic Routing for Wireless Ad Hoc Networks NETWORKING
20 Design,Implementation,and Performance of a Load Balancer for SIP Server Clusters NETWORKING
21 Independent Directed Acyclic Graphs for Resilient Multipath Routing NETWORKING
22 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring NETWORKING
23 Opportunistic Flow-level Latency Estimation using NetFlow NETWORKING
24 Privacy- and Integrity-Preserving Range Queries in Sensor Networks NETWORKING
25 RIHT: A Novel Hybrid IP Traceback Scheme NETWORKING
26 Router Support for Fine-Grained Latency Measurements NETWORKING
27 BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data
PARALLEL & DIS SYSTEMS
in Wireless Sensor Networks
28 BloomCast: Eficient and Effective Full-Text Retrival in Unstructured P2P Networks PARALLEL & DIS SYSTEMS
29 Capacity of Data Collection in Arbitrary Wireless Sensor Networks PARALLEL & DIS SYSTEMS
30 Cut Detection in Wireless Sensor Networks PARALLEL & DIS SYSTEMS
31 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks PARALLEL & DIS SYSTEMS
32 Payments for Outsourced Computations PARALLEL & DIS SYSTEMS
33 A Stochastic Model of Multi-virus Dynamics SECURE COMPUTING
34 Design and Implementation of TARF: A Trust-Aware Routing Framework For WSNs SECURE COMPUTING
35 Detecting and Resolving Firewall Policy Anomalies SECURE COMPUTING
36 Detecting Spam Zombies by Monitoring Outgoing Messages SECURE COMPUTING
37 On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh
SECURE COMPUTING
Networks
38 Online Modeling of Proactive Moderation System for Acution Fraud Detection SECURE COMPUTING
39 Packet-Hiding Methods for Preventing Selective Jamming Attacks SECURE COMPUTING
40 Risk-Aware Mitigation for MANET Routing Attacks SECURE COMPUTING

41 Sensor Networks Using Sequential Hypothesis Testing SECURE COMPUTING
42 ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless SECURE COMPUTING
43 Bootstrapping Ontologies for Web Services SECURE COMPUTING


IEEE 2012 – dotNET Projects


1 A Secure Eraser Code-Based Cloud Storage System with Secure Data Forwarding CLOUD COMPUTING
2 Cloud Computing Security From Single to Multi-Clouds CLOUD COMPUTING
3 Enhanced Data Security Model For Cloud Computing CLOUD COMPUTING
4 Ensuring Distributed Accountability for Data Sharing in Cloud CLOUD COMPUTING
5 HASBE: A Hierarchical Attribute-Based Sloution for flexible and Scalable Access Control in the
CLOUD COMPUTING
Cloud Computing
6 Out Sourced Similarity search on Metric Data Assets CLOUD COMPUTING
7 Privacy-PreservingPublic Auditing for Secure Cloud Storage CLOUD COMPUTING
8 Scalable and Secure Sharing of Personal Health Records in Cloud computing using Attribute Based
CLOUD COMPUTING
Encryption
9 Toward Secure and dependable storage services in colud computing CLOUD COMPUTING
10 A Query Formulation Language for the Data Web DATA MINING
11 Creating Evolving User Behavior Profiles Automatically DATA MINING
12 D-Cache: Universal Distance Cache for Metric Access Methods DATA MINING
13 DDD: A New Ensemble Approach for Dealing With Concept Drift DATA MINING
14 Efficient computation Range Aggregates against Uncertain Location-Based Queries DATA MINING
15 Efficient Fuzzy Type-Ahead Search in XML Data DATA MINING
16 Efficient Multidimensional Fuzzy Search for Personal Information Management Systems DATA MINING
17 Horizontal Aggregations in SQL to Prepare Data sets for Data Mining Analysis DATA MINING
18 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques DATA MINING
19 Measuring The Sky: On Computing Data Cubes Via Skylining the Measures DATA MINING
20 Mining Web Graphs for Recommendations DATA MINING
21 Organizing User search Histories DATA MINING
22 Publishing Search Logs-A Comparative Study of Privacy Gurantees DATA MINING
23 Query Planning For continuous Aggragation Queries over a Network of Data Aggregators DATA MINING
24 ROAD: A New Spatial ObjectSearch Framework for Road Networks DATA MINING
25 Sclable Learning of collective Behavior DATA MINING
26 Slicing: A New Approach for Privacy Preserving Data Publishing DATA MINING
27 Tree-Based Mining for Discovering Patterns of Human Interactions in Meetings DATA MINING
28 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING
29 A Probabilistic Model of Visual Cryptography Scheme With Dynamic group IMAGE PROCESSING
30 Active Visual segmentation IMAGE PROCESSING
31 Image Segmentation Based on the Poincare Map Method IMAGE PROCESSING
32 K-N SECRET SHARING VISUAL CRYTOGRAPHY SCHME FOR COLOR IMAGE USING
IMAGE PROCESSING
RANDOM NUMBER
33 A Discriminative Model of Motion and Cross Ratio for View-Invariant Action recognition IMAGE PROCESSING
34 A Novel Anti Phishing framework based on Visual cryptography IMAGE PROCESSING
35 Controllable Secure Watermarking Technique for Tradeoff between Robustness and Security IMAGE PROCESSING


36 Low Complexity Compression Method for Hyperspectral Images Based on Distributed Source
IMAGE PROCESSING
Coding
37 Multiple Exposure Fusion For High Dynamic Range Image Acquisition IMAGE PROCESSING
38 Robustness of Offline Signature Verification Based on Gray Level Features IMAGE PROCESSING
39 Semi-supervised Biased Maximum Margin Analysisfor Interactive Image Retrieval IMAGE PROCESSING
40 Smile Detection by Boosting Pixel Differences IMAGE PROCESSING
41 View-invariant action recognition based on Artificial Neural Networks IMAGE PROCESSING
42 Cooperative Download in Vehicular Environments MOBILE COMPUTING
43 Distributed Throughput Maximization in Wireless Network via Random Power Allocation MOBILE COMPUTING
44 Network Assited Mobilr Computing with Optimal UplinkQuery Processing MOBILE COMPUTING
45 Protecting Location privacy in Sensor Network Against a Global Eavesdropper MOBILE COMPUTING
46 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Network MOBILE COMPUTING
47 Robust Face-Name graph Matching for Movie character Identification MULTIMEDIA
48 A New Cell-Counting-Based Attack Against Tor NETWORKING
49 A Secure Intrusion Dedection System against DDOS Attack in Wireless Mobile Ad-hoc NetWork NETWORKING
50 AMPLE: An Adaptive Traffic Engineering Syatem Based on Virtual Routing Topologies NETWORKING
51 Optimal Source-Based Filtering of Malicious Traffic NETWORKING
52 Topology Control In Mobile AD-HOC Networks with Cooperative Communications NETWORKING
53 Balancing the Trade-Offs between Query Delay and Data Availability MANETs PARALLEL & DIS SYSTEMS
54 Bounding the Impact of Unbounded Attacks in Stabilization PARALLEL & DIS SYSTEMS
55 Catching Packet Droppers and Modifiers in Wireless Sensor Networks PARALLEL & DIS SYSTEMS
56 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL & DIS SYSTEMS
57 Design and Implementation of TRAF: A Trust-Aware Routing FrameWork for WSNs SECURE COMPUTING
58 ES-MPICH2: A Massage Passing Interface with Enhanced Security SECURE COMPUTING
59 On The Security the Efficiency of Content Distribution via Network Coding SECURE COMPUTING
60 Revisiting Defenses against Large-Scale Online Password Guessing Attacks SECURE COMPUTING
61 SPOC: A Secure and Privacy Preserving Oppertunistic Computing FrameWork For Mobile
SECURE COMPUTING
Healthcare Emergency

IEEE 2012 – ANDROID Projects


1 Efficient Audit Service Outsourcing for Data Integrity in Clouds CLOUD COMPUTING
2 A Query Formulation Language For the Data Web DATAMINING
3 OutSourced Similarity Search on Metric Data Assets DATAMINING
4 PMSE A Personalized Mobile Search Engine DATAMINING
5 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators DATAMINING
6 Ranking Model Adaptation for Domain-Specific Search DATAMINING
7 Learn to Personalized Image search from the Photo Sharing Websites IMAGE PROCESSING
8 Designing Mobile Language Learning Application Using Multimedia:Implication From a Small-scale
MOBILE COMPUTING

9 EduPad-A tablet Based Educational System for improving Adult literacy in Rural India MOBILE COMPUTING
10 Network Assisted Mobile Computing with Optimal Uplink Query Processing MOBILE COMPUTING
11 Safe Driving Using Mobile Phones MOBILE COMPUTING
12 Tram location and route navigation system using SmartPhone MOBILE COMPUTING
13 Design and Implementaion of Improved Authentication System for Android Smart Phone Users NETWORKING
14 Payments for Outsourced Computations PARALLEL & DIST
SYSTEMS
15 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute- PARALLEL & DIST
based Encryption SYSTEMS
16 SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare PARALLEL & DIST
Emergency SYSTEMS
17 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL & DIST
SYSTEMS
18 Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points SECURE COMPUTING
19 Ensuring Distributed Accountability for Data Sharing in the Cloud SECURE COMPUTING
20 Research and Design of Chatting Room System based on Android Bluetooh WIRELESS NETWORKS


IEEE 2012 – MATLAB Projects

SNo Project Domain
1 A Block Based Pass-Parallel SPIHT Algorithm IMAGE PROCESSING
2 A Complete Processing Chain for Shadow Detection and Reconstruction in VHR Images IMAGE PROCESSING
3 A Generalized Logarithmic Image Processing Model Based on the Gigavision Sensor Model IMAGE PROCESSING
4 A Novel Data Embedding Method Using Adaptive Pixel pair Matching IMAGE PROCESSING
5 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING
6 A Secret-Sharing-Based Method for Authentication of Grayscale document Images Via the use of
IMAGE PROCESSING
the PNG Image With a Data Repair Capability
7 A Semisupervised Segmentation Model for Collections of Images IMAGE PROCESSING
8 Active Visual Segmentation IMAGE PROCESSING
9 An Energy-Based Model for the Image Edge-Histogram Specification Problem IMAGE PROCESSING
10 An Extended Visual Cryptography Algorithm for General Access Structures IMAGE PROCESSING
11 Automated Multiscale Morphometry of Muscle Disease From Second Harmonic Generation
IMAGE PROCESSING
Microscopy Using Tensor-Based Image Processing
12 Blind Adaptive Sampling of Images IMAGE PROCESSING
13 Classification of Dielectric Barrier Discharges Using Digital Image Processing Technology IMAGE PROCESSING
14 Enhanced Patterns of Oriented Edge Magnitudes for Face Recognition an Image Matching IMAGE PROCESSING
15 Fast Wavelet-Based Image Charcterization for highly Adaptive Image Retrieval IMAGE PROCESSING
16 Hyperconnections and Hierarchical Representations for Grayscale and Multiband Image Processing IMAGE PROCESSING
17 Image Reduction Using Means on Discrete Product Lattices IMAGE PROCESSING
18 Image Segmentation Based on the Poincare Map Method IMAGE PROCESSING
19 Improved Image Recovery From Compressed Data Contaminated With Impulsive Noise IMAGE PROCESSING
20 ISP An Optimal Out-Of-Core Image-Set Processing Streaming Architecture for Parallel
IMAGE PROCESSING

21 Low Distortion Transform for Reversible Watermarking IMAGE PROCESSING
22 Low-Complexity Image Processing for Real-Time Detection of Neonatal Clonic Seizures IMAGE PROCESSING
23 Outdoor Scene Image Segmentation based on Background Recognition and Perceptual
IMAGE PROCESSING
Organization
24 Performance Analysis of a Block-Neighbourhood-Based Self-Recovery Fragile Watermarking
IMAGE PROCESSING
Scheme
25 Preconditioning for Edge-Preserving Image Super Resolution IMAGE PROCESSING
26 Principal Visual Word Discovery for Automatic License Plate Detection IMAGE PROCESSING
27 Riverbed: A Novel User-Streered Image Segmentation Method Based on Optimum Boundry
IMAGE PROCESSING
Tracking
28 Robust Watermarking of Compressed and Encrypted JPEG 2000 images IMAGE PROCESSING
29 Segmentation of Stochastic Images with a Stochastic Random Walker method IMAGE PROCESSING
30 Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval IMAGE PROCESSING
31 Sparse Color Interest Points for Image Retrieval and Object Categorization IMAGE PROCESSING
32 Spatially Adaptive Block-Based Super-Resolution IMAGE PROCESSING
33 Toward a Unified Color Space for Perception-Based Image Processing IMAGE PROCESSING
34 Reducing DRAM Image Data Access Energy Consumption in Video Processing MULTIMEDIA
35 An Energy Efficient Algorithm Based on LEACH Protocol NETWORKING
36 View-invariant action recognition based on Artificial Neural Networks NEURAL NETWORKS


IEEE 2012 – NS2 Projects


1 A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access MOBILE COMPUTING
2 A Trigger Identification Service for Defending Reactive Jammers in WSN MOBILE COMPUTING
3 Capacity Scaling of Wireless Ad Hoc Networks Shannon Meets Maxwell MOBILE COMPUTING
4 Connectivity of Multiple Cooperative Cognitive Radio Ad Hoc Networks MOBILE COMPUTING
5 CORMAN A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks MOBILE COMPUTING
6 DSDMAC Dual Sensing Directional MAC Protocol for Ad Hoc Networks with Directional Antennas MOBILE COMPUTING
7 FESCIM Fair Efficient and Secure Cooperation Incentive Mechanism for Multihop Cellular MOBILE COMPUTING
Networks
8 Handling Selfishness in Replica Allocation over a Mobile Adhoc Network MOBILE COMPUTING
9 Improving QoS in High-Speed Mobility Using Bandwidth Maps MOBILE COMPUTING
10 Local Broadcast Algorithms in Wireless Ad Hoc Networks Reducing the Number of Transmissions MOBILE COMPUTING
11 Maximal Scheduling in Wireless Adhoc Networks with Hypergraph Interference Models MOBILE COMPUTING
12 TAM A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks MOBILE COMPUTING
13 Throughput and Energy Efficiency in Wireless Adhoc Networks with Gaussian Channels NETWORKING
14 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL & DIS SYSTEMS


CONTACT :
MICANS INFOTECH , +91 90036 28940
PONDICHERRY
WWW.MICANSINFOTECH.COM
INFO@MICANSINFOTECH.COM




IEEE 2011 PROJECTS (JAVA, DOTNET)

CONTACT :

MICANS INFOTECH , +91 90036 28940
PONDICHERRY
WWW.MICANSINFOTECH.COM
INFO@MICANSINFOTECH.COM

1 A NEW APPROACH FOR FEC DECODING BASED ON THE BP ALGORITHM IN LTE AND JAVA
WIMAX SYSTEMS
2 A PRIVACY-PRESERVING LOCATION MONITORING SYSTEM FOR WIRELESS SENSOR JAVA
NETWORKS
3 A UNIFIED APPROACH TO OPTIMIZING PERFORMANCE IN NETWORKS SERVING JAVA
HETEROGENEOUS FLOWS
4 ANALYSIS ON CREDIT CARD FRAUD DETECTION METHODS JAVA
5 ARCHITECTING A SECURE ENTERPRISE DATA SHARING JAVA
6 BUFFER SIZING FOR 802.11 BASED NETWORKS JAVA
7 CACHING STRATEGIES BASED ON INFORMATION DENSITY ESTIMATION IN WIRELESS JAVA
AD HOC NETWORKS
8 CLOUD COMPUTING FOR AGENT-BASED URBAN TRANSPORTATION SYSTEMS JAVA
9 CLUSTERING WITH MULTI-VIEWPOINT BASED SIMILARITY MEASURE JAVA
10 COMPUTATIONAL PERCEPTUAL FEATURES FOR TEXTURE REPRESENTATION AND JAVA
RETRIEVAL
11 DATA INTEGRITY PROOFS IN CLOUD STORAGE JAVA
12 DENIAL OF SERVICE ATTACKS IN WIRELESS NETWORKS THE CASE OF JAMMERS JAVA
13 DYNAMICS OF MALWARE SPREAD IN DECENTRALIZED PEER-TO-PEER NETWORKS JAVA
14 EFFECTIVE NAVIGATION OF QUERY RESULTS BASED ON CONCEPT HIERARCHIES JAVA
15 EMBEDDED EXTENDED VISUAL CRYPTOGRAPHY SCHEMES JAVA
16 ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN JAVA
CLOUD COMPUTING
17 EXTENDED XML TREE PATTERN MATCHING THEORIES AND ALGORITHMS JAVA
18 MINIMIZING ADDITIVE DISTORTION IN STEGANOGRAPHY USING SYNDROME-TRELLIS JAVA
CODES
19 MODELING AND DETECTION OF CAMOUFLAGING WORM JAVA
20 NYMBLE BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS JAVA
21 ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM JAVA
MODELING
22 ONTOLOGY-BASED BUSINESS PROCESS CUSTOMIZATION FOR COMPOSITE WEB JAVA
SERVICES
23 OPTIMAL BANDWIDTH ASSIGNMENT FOR MULTIPLE-DESCRIPTION-CODED VIDEO JAVA
24 RANKING SPATIAL DATA BY QUALITY PREFERENCES JAVA
25 ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING JAVA
26 SAT A SECURITY ARCHITECTURE ACHIEVING ANONYMITY AND TRACEABILITY IN JAVA
WIRELESS MESH NETWORKS
27 SECURE AND PRACTICAL OUTSOURCING OF LINEAR PROGRAMMING IN CLOUD JAVA
COMPUTING
28 SEEKING QUALITY OF WEB SERVICE COMPOSITION IN A SEMANTIC DIMENSION JAVA
29 SKETCH4MATCH – CONTENT-BASED IMAGE RETRIEVAL JAVA
30 SUPPORTING EFFICIENT AND SCALABLE MULTICASTING JAVA
31 TEMPORAL DATA CLUSTERING VIA WEIGHTED CLUSTERING ENSEMBLE WITH JAVA

32 TEXT CLUSTERING WITH SEEDS AFFINITY PROPAGATION JAVA
33 A DISTRIBUTED AND SCALABLE TIME SLOT ALLOCATION PROTOCOL FOR WIRELESS .NET
SENSOR NETWORKS
34 A MORE SECURE STEGANOGRAPHY METHOD IN SPATIAL DOMAIN .NET
35 A NEW COLOR FILTER ARRAY WITH OPTIMAL PROPERTIES FOR NOISELESS AND NOISY .NET
COLOR IMAGE ACQUISITION
36 A USER-ORIENTED IMAGE RETRIEVAL SYSTEM BASED ON INTERACTIVE GENETIC .NET
ALGORITHM
37 A WEB SEARCH ENGINE-BASED APPROACH TO MEASURE SEMANTIC SIMILARITY .NET
BETWEEN WORDS
38 ADAPTIVE FAULT TOLERANT QOS CONTROL ALGORITHMS FOR MAXIMIZING SYSTEM .NET
LIFETIME OF QUERY-BASED WIRELESS SENSOR NETWORKS
39 BLIND IMAGE WATERMARKING USING A SAMPLE PROJECTION APPROACH .NET
40 DATA INTEGRITY PROOFS IN CLOUD STORAGE .NET
41 DATA LEAKAGE DETECTION .NET
42 DETECTING KERNEL-LEVEL ROOTKITS USING DATA STRUCTURE INVARIANTS .NET
43 EFFICIENT COMPUTATION OF RANGE AGGREGATES AGAINST UNCERTAIN LOCATION .NET
BASED QUERIES
44 ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE .NET
45 EXPLOITING DYNAMIC RESOURCE ALLOCATION FOR EFFICIENT PARALLEL DATA .NET
PROCESSING IN THE CLOUD
46 EXPLORING APPLICATION-LEVEL SEMANTICS FOR DATA COMPRESSION .NET
47 HORIZONTAL AGGREGATION .NET
48 HUMAN MOTION TRACKING BY TEMPORAL-SPATIAL LOCAL GAUSSIAN PROCESS .NET
EXPERTS
49 IMPROVING AGGREGATE RECOMMENDATION DIVERSITY USING RANKING-BASED .NET
TECHNIQUES
50 IMPROVING OFFLINE HANDWRITTEN TEXT RECOGNITION .NET
51 INTEGRATION OF SOUND SIGNATURE IN GRAPHICAL PASSWORD AUTHENTICATION .NET
SYSTEM
52 JAMMING-AWARE TRAFFIC ALLOCATION FOR MULTIPLE-PATH ROUTING USING .NET
PORTFOLIO SELECTION
53 NABS NOVEL APPROACHES FOR BIOMETRIC SYSTEMS .NET
54 NETWORK CODING BASED PRIVACY PRESERVATION AGAINST TRAFFIC ANALYSIS IN .NET
MULTI-HOP WIRELESS NETWORKS
55 OPTIMAL SERVICE PRICING FOR A CLOUD CACHE .NET
56 PERSONALIZED ONTOLOGY MODEL FOR WEB INFORMATION GATHERING .NET
57 PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD .NET
DATA
58 SCALABLE LEARNING OF COLLECTIVE BEHAVIOUR .NET
59 THE AWARENESS NETWORK, TO WHOM SHOULD I DISPLAY MY ACTIONS .NET
60 THE GEOMETRIC EFFICIENT MATCHING ALGORITHM FOR FIREWALLS .NET
61 THE WORLD IN A NUTSHELL CONCISE RANGE QUERIES .NET
62 Robust Correlation of Encrypted Attack Traffic THROUGH STEPPING STONES BY FLOW .NET
WATERMARKING



Java Networking
Rates in WDM Mesh Networks
5 Secure Data Objects Replication in Data Grid
Java Network Security
6 Layered Approach Using Conditional Random Fields for Intrusion
Java Network Security
Detection
7 Maximizing Rewards in Wireless Networks with Energy and Timing
dotNET Mobile Computing
Constraints for Periodic Data Streams
8 Edge Adaptive Image Steganography Based on LSB Matching
dotNET Network Security
9 Toward Optimal Network Fault Correction in Externally Managed Overlay
dotNET Parallel & Dis
Networks Systems
10 Secure Client-Side ST-DM Watermark Embedding
dotNET Network Security
11 Secure Distance-Based Localization in the Presence of Cheating Beacon
dotNET Networking
Nodes
12 A Distributed CSMA Algorithm for Throughput and Utility Maximization in
dotNET Networking
Wireless Networks
13 Deriving Concept-Based User Profiles from Search Engine Logs
dotNET Data Mining
14 Agent Based Efficient Anomaly Intrusion Detection System in
Java Network Security
Ad-hoc Networks
15 Anonymous Query Processing in Road Networks
dotNET Data Mining
16 Fast Algorithms for Resource Allocation in Cellular Networks
dotNET Networking
17 Multicast Multi-path Power Efficient Routing in Mobile ADHOC Networks
dotNET Network Security
18 Privacy-Conscious Location-Based Queries in Mobile Environments
JAVA Parallel & Dis
Systems
19 IRM Integrated File Replication and Consistency Maintenance in P2P
JAVA Parallel & Dis
Systems Systems
20 Artificial intelligence network load balancing using Ant Colony Optimisation
dotNET
21 Distributed heuristic algorithm to Optimize the Throughput of Data Driven
JAVA