ieee project titles 2010 - 2011
DESCRIPTION
Contact : Mr. SakthivelMobile : 09894604623Phone:0422-4377414Mail : [email protected] : www.brainrichtech.comPlace : CoimbatoreTRANSCRIPT
IEEE / SOFTWARE PROJECTS
In various Domains
JAVA * J2EE * J2MELatest Projects, 2008, 2009,
2010
Our Service Address
6/1, Selvanaayaki Complex1st Floor, Gokulae Street,
Ramnagar, Coimbatore- 641009.
Mobile: 9894604623 Phone: 0422-4377414Mai : [email protected] Web : www.brainrichtech.com
We are offering IEEE & Non IEEE Projects
In various Domains including
IEEE Projects on Image ProcessingIEEE Projects on Knowledge and Data MiningIEEE Projects on NetworkingIEEE Projects on Artificial IntelligenceIEEE Projects on Audio and Video ProcessingIEEE Projects on Pattern Analysis & Machine IntelligenceIEEE Projects on MultimediaIEEE Projects on Parallel and Distributed SystemsIEEE Projects on Mobile ComputingIEEE Projects on Software Engineering
IEEE Projects on Information Forensics and SecurityIEEE Projects on Dependable and Secure ComputingIEEE Projects on Systems, Man & CyberneticsIEEE Projects on ComputersIEEE Projects on Learning Technologies
PROJECT SUPPORTS & DELIVERABLES
Project Abstract IEEE Paper PPT / Review Details Project Report Working Procedure/Screen Shots
Materials & Books in CD Project Certification
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE DIGITAL IMAGE PROCESSING
S.NO CODE PROJECT TITLE YEAR01 IP 01 Fast Image Recovery Using Variable
Splittingand Constrained Optimization
2010
02 IP 02 Sliding-Window Raptor Codes for Efficient Scalable Wireless Video Broadcasting with Unequal Loss Protection
2010
03 IP 03 Generic Lossless Visible Watermarking—A New Approach
2010
04 IP 04 Biased Discriminant Euclidean Embedding for Content-Based Image
2010
Retrieval05 IP 05 Data Embedding in JPEG Bit stream
by Code Mapping2010
06 IP 06 Video Segmentation Based on Motion Coherence of Particles in a Video Sequence
2010
07 IP 07 Adaptive Non separable Wavelet Transform via Lifting and its Application to Content-Based Image Retrieval
2010
08 IP 08 Multiplicative Noise Removal Using Variable Splitting and Constrained Optimization
2010
09 IP 09 Watermarking of Free-view Video 201010 IP 10 Ultrasound De speckling for Contrast
Enhancement2010
11 IP 11 A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding
2010
12 IP 12 Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment
2010
13 IP 13 Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks
2010
14 IP 14 A completed modeling of local binary pattern operator for texture classification
2010
15 IP 15 Soft Edge Smoothness Prior for Color Image Super-Resolution
2009
16 IP 16 A Shearlet Approach to Edge Analysis and Detection
2009
17 IP 17 Complex Wavelet Structural Similarity: A New Image Similarity Index
2009
18 IP 18 A Histogram Modification Framework 2009
and Its Application for Image Contrast Enhancement
19 IP 19 Personal Authentication Using Hand Vein Triangulation and Knuckle Shape
2009
20 IP 20 Huber Fractal Image Compression 200921 IP 21 Active Mask Segmentation of
FluorescenceMicroscope Images
2009
22 IP 22 Color Texture Segmentation Based on the Modal Energy of Deformable Surfaces
2009
23 IP 23 Entropy Interpretation of the LogarithmicImage Processing Model With Application toContrast Enhancement
2009
24 IP 24 A New Look to Multichannel BlindImage Deconvolution
2009
25 IP 25 Improved Resolution Scalability forBilevel Image Data in JPEG2000
2009
26 IP 26 An Adaptable Image Retrieval System With Relevance Feedback Using Kernel Machines and Selective Sampling
2009
27 IP 27 A High-Capacity Steganography Scheme for JPEG2000 Baseline System
2009
28 IP 28 Independent Component Analysis-Based Background Subtraction for Indoor Surveillance
2008
29 IP29 Sparse Representation for Color Image Restoration
2008
30 IP30 High-Fidelity Data Embedding for Image Annotation
2008
31 IP31 A New Look to Multi channel Blind Image De-convolution
2008
32 IP32 Image Segmentation Using Information Bottleneck Method
2008
33 IP33 A Fast Optimization Transfer Algorithm for Image In painting in Wavelet Domains
2008
34 IP34 Enhancement of Color Images by Scaling the DCT Coefficients
2008
35 IP35 Improved Resolution Scalability for Bilevel Image Data in JPEG2000
2008
36 IP36 A Unified Relevance Feedback Framework for Web Image Retrieval
2008
37 IP37 Optimal Spread Spectrum Watermark Embedding via a Multi step Feasibility Formulation
2008
38 IP38 Watermarking of Co lour Images in the DCT Domain Using Y Channel
2008
39 IP39 A Robust Image Encryption Scheme using State-Feedback Control
2008
40 IP40 Color Image Retrieval Using M-Band Wavelet Transform Based Color-Texture Feature
2008
41 IP 41 A Histogram Modification Framework and Its Application for Image Contrast Enhancement
2008
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE KNOWLEDGE AND DATA MINING
S.NO CODE PROJECT TITLE YEAR01 KD
01MILD: Multiple-Instance Learning via Disambiguation
2010
02 KD 02
LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs
2010
03 KD 03
An Up Down Directed Acyclic Graph Approachfor Sequential Pattern Mining
2010
04 KD 04
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
2010
05 KD 05
Efficient Algorithm for Localized Support Vector Machine
2010
06 KD 06
Deriving Concept-Based User Profiles from Search Engine Logs
2010
07 KD 07
An Efficient Concept-Based Mining Model for Enhancing Text Clustering
2010
08 KD 08
Adaptive Subspace Symbolization for Content-Based Video Detection
2010
09 KD 09 Non-Negative Matrix
Factorization for Semisupervised Heterogeneous Data Coclustering
2010
10 KD 10
Efficient Relevance Feedback for Content-based Image Retrieval by Mining User Navigation Patterns
2010
11 KD 11
Adaptive Subspace Symbolization for Content-Based Video Detection
2010
12 KD 12
Record Matching over Query Resultsfrom Multiple Web Databases
2010
13 KD 13 Modeling Image Data for Effective
Indexing and Retrieval in Large
2009
General Image Databases14 KD
14Towards Suspicious Behavior Discovery in Video Surveillance System
2009
15 KD 15
A Relation-Based Page Rank Algorithm for Semantic Web Search Engines
2009
16 KD 16
Learning Image-Text Associations 2009
17 KD 17
A Framework for ClusteringConcept-Drifting Categorical Data
2009
18 KD 18
Communication Perspective on AutomaticText Categorization
2009
19 KD 19
Predicting Missing Items in Shopping Carts
2009
20 KD 20
Exact Knowledge Hiding through Database Extension
2009
21 KD 21
Fast Query Point Movement Techniques for Large CBIR Systems
2009
22 KD 22
Evaluating the Effectiveness of Personalized Web Search
2009
23 KD 23
Similarity-Profiled Temporal Association Mining
2009
24 KD 24
Batch Mode Active Learning with Applications to Text Categorization and Image Retrieval
2009
25 KD 25
Enhancing Learning Objects with an Ontology-Based Memory
2009
26 KD 26
Using Association Rule Mining to Improve Semantic Web Services Composition Performance
2008
27 KD 27
Biometric Authentication for Border Control Applications
2008
28 KD Desktop search in the intranet with 2008
28 integrated desktop search engines29 KD
29A Least Grade Page Replacement Algorithm for Web Cache Optimization
2008
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE NETWORKING
S.NO CODE PROJECT TITLE YEAR01 NS
01Authenticated Group Key Transfer Protocol Based on Secret Sharing
2010
02 NS 02
S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks
2010
03 NS 03
Rate Control with Pair wise Intersession Network Coding
2010
04 NS 04
Equilibrium of Heterogeneous Congestion Control: Optimality and Stability
2010
05 NS 05
Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis
2010
06 NS 06
Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility
2010
07 NS 07
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks
2010
08 NS 08
A Distributed CSMA Algorithm for 2010
Throughput and Utility Maximization in Wireless Networks
09 NS 09
Upgrading Mice to Elephants: Effects and End-Point Solutions
2010
10 NS 10
Distributed Algorithms for Minimum Cost Multicast With Network Coding
2010
11 NS 11
Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference Constraints
2010
12 NS 12
Constrained Relay Node Placement in Wireless Sensor Networks: Formulation and Approximations
2010
13 NS 13
Efficient and Dynamic Routing Topology Inference From End-to-End Measurements
2010
14 NS 14
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications
2010
15 NS 15
Packet delay modeling of truncated multi-process arq protocols for parallelCommunications
2010
16 NS 16
Spatio-Temporal Network Anomaly Detection byAssessing Deviations of Empirical Measures
2009
17 NS 17
Monitoring the Application-Layer DDoS Attacks for Popular Websites
2009
18 NS 18
Multiple Routing Configurations for FastIP Network Recovery
2009
19 NS 19
Improving Locality of Bit Torrent with ISP Cooperation
2009
20 NS 20
PRIME: Peer-to-Peer Receiver-Driven Mesh-Based Streaming
2009
21 NS 21
A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection
2009
22 NS 22
Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search
2009
23 NS 23
Capturing Router Congestion and Delay
2009
24 NS 24
Node Isolation Model and Age-Based NeighborSelection in Unstructured P2P Networks
2009
25 NS 25
Residual-Based Estimation of Peer and LinkLifetimes in P2P Networks
2009
26 NS 26
A Peer-to-Peer Resources Search Algorithm Based on Small-World Model
2009
27 NS 27
Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks
2009
28 NS 28
Multicast Capacity of Wireless Ad Hoc Networks
2009
29 NS 29
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
2009
30 NS 30
Novel Approach for Computation –Efficient
2009
Rekeying for Multicast Key Distribution31 NS
31SIMPS: Using Sociology for Personal Mobility
2009
32 NS 32
DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks
2009
33 NS 33
Credit Card Fraud Detection Using Hidden Markov Model
2008
34 NS34 Encryption Techniques for the Security of Satellite Images
2008
35 NS35Modeling Node Capture Attacks in Wireless Sensor Networks
2008
36 NS36 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
2008
37 NS37 The Design Trade-Offs of Bit Torrent-Like File Sharing Protocols
2008
38 NS38 Honey pot Scheme for Distributed Denial-of-Service Attack
2008
39 NS39 Vulnerability of Network Traffic under Node Capture Attacks using Circuit Theoretic Analysis
2008
40 NS40 P2P File Sharing Software in IPv4/IPv6 Network
2008
41 NS41 Design and Implementation of a SIP-based Centralized Multimedia Conferencing System
2008
42 NS42 Design and Implementation of Distributed Firewall System for IPv6
2008
43 NS43 A Hypothesis Testing Approach to Semi-fragile Watermark Based Authentication
2008
44 NS44 A New RMI Framework for Outdoor 2008
Objects Recognition45 NS45 Contributory group key exchange in
the presence of malicious participants2008
46 NS46 Schemes for Evaluating Signal Processing Properties of Audio Watermarking
2008
47 NS47 Double compression in JPEG images 200848 NS48 The Evaluation Report of SHA-256
Crypt Analysis Hash Function2008
49 NS49 Jig DFS: A Secure Distributed File System
2008
50 NS50 General access structures in audio cryptography
2008
51 NS51 Improving Locality of Bit Torrent with ISP Cooperation
2008
52 NS52 Minimizing File Download Time in StochasticPeer-to-Peer Networks
2008
53 NS53 Triple DES Algorithm Based Image Watermarking
2008
54 NS 54
Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
2008
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE MULTIMEDIA
S.NO CODE PROJECT TITLE YEAR01 M 01 A Stochastic Approach to Image
Retrieval Using Relevance Feedback and Particle Swarm Optimization
2010
02 M 02 An Efficient and Robust Algorithm for Shape Indexing and Retrieval
2010
03 M 03 An Adaptive Computational Model for Salient Object Detection
2010
04 M 04An Image-Based Approach to Video Copy Detection With Spatio-Temporal Post-Filtering
2010
05 M 05 A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm
2010
06 M 06 Image Annotation by Graph-Based Inference With Integrated Multiple/Single Instance Representations
2010
07 M 07 Network Awareness of P2P Live Streaming Applications: A Measurement Study
2010
08 M 08 Fine-Granularity Transmission Distortion Modeling for Video Packet Scheduling Over Mesh Networks
2010
09 M 09 Investigating the Scheduling 2009
Sensitivity of P2P Video Streaming10 M 10 Coherent Phrase Model for Efficient
Image Near Duplicate Retrieval2009
11 M 11 Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor
2009
12 M 12 LayerP2P: Using Layered Video Chunks in P2P Live Streaming
2009
13 M 13Content-Based Image Retrieval Using Multi resolution Color and Texture Features
2008
14 M 14 Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques
2008
15 M 15 Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing
2008
16 M 16 Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver
2008
17 M 17 Locality-Awareness in BitTorrent-Like P2P Applications
2008
18 M 18 Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization
2008
19 M 19 Analyzing Voice Quality in Popular VoIP Applications
2008
20 M 20 Image Retrieval With Relevance Feedback Based on Graph-Theoretic Region Correspondence Estimation
2008
21 M 21 Robust Audio Data Hiding Using Correlated Quantization With Histogram-Based Detector
2008
22 M 22 Collision Attacks With Budget 2008
Constraints on Key Management Schemes for Secure Multimedia Multicast
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE AUDIO,SPEECH & VIDEO PROCESSING
S.NO CODE PROJECT TITLE YEAR01 AV 01 Robust Multiplicative Patchwork
Method for Audio Watermarking2009
02 AV 02 Scalable Audio Compression at Low Bitrates
2008
03 AV03 Multiparty Voice over IP (M VoIP) Peer-Based System for Large-Scale Conference Support
2008
04 AV 04 Extracting Question/Answer Pairs In Multi-Party Meeting
2008
05 AV 05 Hybrid Signal-and-Link-Parametric Speech Quality Measurement for VoIP Communications
2008
06 AV 06 Rate-Distortion Optimal Video Transport Over IP Allowing Packets With Bit Errors
2008
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE ARTIFICAL INTELLIGENCE
S.NO CODE PROJECT TITLE YEAR01 AI 01 Vehicle Number Plate Recognition
Using Mathematical Morphology and Neural Networks
2008
02 AI 02 Vision-Based Eye Blink Monitoring System for Human-Computer Interfacing
2008
03 AI 03 Multi-modal Interfaces for Interaction Communication between Hearing and Visually Impaired Individuals: Problems & Issues
2008
04 AI 04 Embedded Vehicle Control System Based on Voice Processing Technologies
2008
05 AI 05 A Test bed for Voice-Based Robot Control
2008
06 AI 06 Human Voice Based Wheel Chair Control
2008
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE MOBILE COMPUTING
S.NO CODE PROJECT TITLE YEAR01 MC01 Optimal Jamming Attack
Strategies and Network Defense Policies in Wireless Sensor Networks
2010
02 MC02 MABS: Multicast Authentication Based on Batch signature
2010
03 MC03 Handling Mobility in Wireless Sensor and Actor Networks
2010
04 MC04 Clustering and cluster-based routing protocol for delay-
2010
tolerant mobile networks05 MC
05Efficient Load-Aware Routing Scheme for Wireless Mesh Networks
2010
06 MC 06
Distributed Multilevel Hierarchic Strategy for Broadcast Collaborative Mobile Networks
2010
07 MC 07
A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation: Vulnerability Analysis and Cooperation Enforcement
2010
08 MC 08
Vebek: virtual energy-based encryption and keying for wireless sensorNetworks
2010
09 MC 09
Energy-Efficient Communication Scheme forMobile Ad Hoc Networks
2009
10 MC 10
A Novel Scheduled Power Saving Mechanism for 802.11 Wireless LANs
2009
11 MC 11
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
2009
12 MC 12
Mitigation of Control Channel Jamming under Node Capture Attacks
2009
13 MC 13
Tabu Search Algorithm for Cluster Buildingin Wireless Sensor Networks
2009
14 MC 14
An Energy Efficient Communication Scheme for Mobile AD HOC Networks
2009
15 MC 15
Hybrid routing in clustered DTNs with message ferrying
2007
16 MC 16
Transmission Power Control in Wireless Ad Hoc Networks
2007
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE INFORMATION AND FORENSICS SECURITY
S.NO CODE PROJECT TITLE YEAR01 IF 01
Edge Adaptive Image Steganography Based on LSB Matching Revisited
2010
02 IF 02Blind Authentication: A Secure Crypto-Biometric Verification Protocol
2010
03 IF 03Predictive Network Anomaly Detection and Visualization
2010
04 IF 04Lossless Data Embedding in Electronic Inks
2010
05 IF 05SVD-Based Universal Spatial Domain Image Steganalysis
2010
06 IF 06Reversible Image Watermarking Using Interpolation Technique
2010
07 IF 07MPSteg-Color: Data Hiding Through Redundant Basis Decomposition
2009
08 IF 08 Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis
2009
09 IF 09 Halftone Visual Cryptography Via Error Diffusion
2009
10 IF 10 A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication
2009
11 IF 11 Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents
2009
12 IF 12 Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms
2009
13 IF 13 Spread-Spectrum Watermarking Security
2008
14 IF 14Robust Blind Watermarking of Point-Sampled Geometry
2009
15 IF 15 Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
2008
16 IF 16 Multipurpose Watermarking Based on Multiscale Curvelet Transform
2008
17 IF 17 Cryptographic Secrecy of Steganographic Matrix Embedding
2008
18 IF 18 Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase
2008
19 IF 19 A Novel Difference Expansion Transform for Reversible Data Embedding
2008
20 IF 20 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
2008
21 IF 21Color Image Watermarking Using Multidimensional Fourier Transforms
2008
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE Pattern Analysis & Machine Intelligence
S.NO CODE PROJECT TITLE YEAR01 PA 01 Using Language to Learn Structured
Appearance Models for Image Annotation
2010
02 PA 02 A Boosting Framework for Visuality-Preserving Distance Metric Learning and Its Application to Medical Image Retrieval
2010
03 PA 03 Accurate Image Search Using the Contextual Dissimilarity Measure
2010
04 PA 04 Faster and Better: A Machine LearningApproach to Corner Detection
2010
05 PA 05 In the Eye of the Beholder: A Survey of Models for Eyes and Gaze
2010
06 PA 06 Polynomial Time Algorithms for Ratio Regions and a Variant of Normalized Cut
2010
07 PA 07 Single-Image Super-Resolution Using Sparse Regression and Natural Image Prior
2010
08 PA 08 Self-Similarity and Points of Interest 201009 PA 09 Iris Recognition: On the Segmentation
of Degraded Images Acquired in the Visible Wavelength
2010
10 PA 10 Image Segmentation with a Unified Graphical Model
2010
11 PA 11Auto-Context And Its Application To High-Level Vision Tasks And 3d Brain Image Segmentation
2010
12 PA 12Robust 3d Face Recognition By Local Shape Difference Boosting
2010
13 PA 13Rotation Invariant Texture Classification using LBP Variance (LBPV) with Global Matching
2010
14 PA 14 A Perceptually Inspired Variation Framework for Color Enhancement
2009
15 PA 15 Image Transformations and Blurring 200916 PA 16 Robust Wavelet-Based Super-
Resolution Reconstruction: Theory and Algorithm
2009
17 PA 17 IRGS: Image Segmentation Using Edge Penalties and Region Growing
2009
18 PA 18 Real World Image Annotation and Retrieval
2008
19 PA 19 Visual Rank: Applying Page Rank to Large-Scale Image Search
2008
20 PA 20 Localized Content-Based Image Retrieval
2008
21 PA 21 Annotating Images by Mining Image Search Results
2008
22 PA 22 A Discriminative Kernel-Based Approach to Rank Images from Text Queries
2008
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE Internet Computing
S.NO CODE PROJECT TITLE YEAR01 I 01 Learning-Based Approaches for 2010
Matching Web Data Entities02 I 02
Peer-to-Peer 3D Streaming2010
03 I 03Incentive Mechanisms in P2P Media Streaming Systems
2010
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE Parallel And Distributed Systems
S.NO CODE PROJECT TITLE YEAR01 PD 01 An Efficient and Adaptive
Decentralized File Replication Algorithm in P2P File Sharing Systems
2010
02 PD 02 An Analytical Approach to Optimizing Parallel Image Registration/Retrieval
2010
03 PD 03 Improving Reliability for Application-Layer Multicast Overlays
2010
04 PD 04 Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
2010
05 PD 05 Snoogle: A Search Engine for Pervasive Environments
2010
06 PD 06 A Cross-Layer Approach-Based Gnutella for Collaborative Virtual Environments over Mobile Ad Hoc Networks
2010
07 PD 07 Correlation-Based Traffic Analysis Attacks on Anonymity Networks
2010
08 PD 08 A Hypergraph Approach to Linear Network Coding in Multicast Networks
2010
09 PD 09 On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
2010
10 PD 10 SocioNet: A Social-Based Multimedia Access System for Unstructured P2P Networks
2010
11 PD 11 Privacy in VoIP Networks: Flow Analysis Attacks and Defens
2010
12 PD 12 Toward Systematical Data Scheduling for Layered Streaming in Peer-to-Peer Networks: Can We Go Farther?
2010
13 PD 13 mTreebone: A Collaborative Tree-Mesh Overlay Network for Multicast Video Streaming
2010
14 PD 14 Efficient Broadcasting Using Network Coding and Directional Antennas in MANETs
2010
15 PD 15 A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
2010
16 PD 16 Efficient Multicast Algorithms for Multichannel Wireless Mesh Networks
2010
17 PD 17 A Dynamic Performance-Based Flow Control Method for High-Speed Data Transfer
2010
18 PD 18 Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows
2009
19 PD 19 PEACE: A Novel Privacy-Enhanced YetAccountable Security Framework forMetropolitan Wireless Mesh Networks
2010
20 PD 20 Delay Asymptotics and Scalability for Peer-to-Peer Live Streaming
2009
21 PD 21 Enforcing Minimum-Cost Multicast Routingagainst Selfish Information Flows
2009
22 PD 22 Scalable Routing in Cyclic Mobile Networks
2009
23 PD 23 Dynamic Search Algorithm in 2009
UnstructuredPeer-to-Peer Networks
24 PD 24 Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
2009
25 PD 25 A Faithful Distributed Mechanism for Sharingthe Cost of Multicast Transmissions
2009
26 PD 26 Multipath Dissemination in Regular Mesh Topologies
2009
27 PD 27 Detecting Malicious Packet Losses 200928 PD 28 Diverse Firewall Design 200829 PD 29 Free-Riding on BitTorrent-Like Peer-
to-Peer File Sharing Systems: Modeling Analysis and Improvement
2008
30 PD 30 Computation-Efficient Multicast Key Distribution
2008
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE Dependable and Secure Computing
S.NO CODE PROJECT TITLE YEAR01 DSC
01Layered Approach Using Conditional Random Fields for Intrusion Detection
2010
02 DSC 02
In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm
2010
03 DSC 03
An Advanced Hybrid Peer-to-Peer Botnet
2010
04 DSC 04
Error Detection and Fault Tolerance in ECSM Using Input Randomization
2009
05 DSC Security Analysis of the SASI 2009
05 Protocol06 DSC
06Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
2009
07 DSC 07
The Effectiveness of Checksums for Embedded Control Networks
2009
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE Software Engineering
S.NO CODE PROJECT TITLE YEAR01 SW 01 On Event-Based Middleware For Location-
Aware Mobile Applications2010
02 SW 02 Enhanced Modeling and Solution of Layered Queuing Networks
2009
03 SW 03 COMOM: Efficient Class Oriented Evaluation of Multiclass Performance Models
2009
04 SW 04 An Investigation Into the Functional Form of the Size-Defect Relationship For Software Modules
2009
05 SW 05 Optimized Resource Allocation for Software Release Planning
2009
06 SW 06 Automatic Extraction of Heap 2009
ReferenceProperties in Object-Oriented Programs
07 SW 07 CHARMY: A Framework for Designing andVerifying Architectural Specifications
2009
08 SW 08 Synthesis of Partial Behavior Models from Properties and Scenarios
2009
09 SW 09 Identification of Move Method Refactoring Opportunities
2009
10 SW 10 A Hierarchical Model for Object-Oriented Design Quality Assessment
2009
11 SW 11 Variability and Reproducibility in Software Engineering: A Study of Four Companies that Developed the same System
2009