Download Project List |
Sno
|
Projects List
|
Remarks
|
Abstract
|
Cloud Computing
|
1. |
A Price- and-Time-Slot-Negotiation Mechanism for Cloud
Service Reservations |
IEEE |
|
2. |
Going Back and Forth Efficient Multideployment and
Multisnapshotting on Clouds |
IEEE |
Download |
3. |
Optimal service pricing for a cloud cache |
IEEE |
Download |
4. |
Improving Utilization of Infrastructure Clouds |
IEEE |
Download |
5. |
Collaborative Writing Support tools on the cloud |
IEEE |
Download |
6. |
Social Cloud Computing |
IEEE |
Download |
7. |
A Visual Backchannel for Large-Scale Events |
IEEE |
Download |
8. |
SparkClouds Visualizing Trends in Tag Clouds |
IEEE |
Download |
9. |
Evaluation of user behavior trust in cloud computing |
IEEE |
Download |
10. |
The district medical data center based on cloud computing |
IEEE |
Download |
11. |
The Security of Cloud Computing System enabled by
Trusted Computing |
IEEE |
Download |
12. |
Privacy-Preserving Public Auditing for Secure Cloud Storage |
IEEE |
Download |
13. |
IPAS Implicit Password Authentication System |
IEEE |
Download |
14. |
Secure and Practical Outsourcing of Linear Programming |
IEEE |
Download |
15. |
SaaAS |
IEEE |
Download |
16. |
A Price- and-Time-Slot-Negotiation Mechanism for Cloud
Service Reservations |
IEEE |
|
Mobile Computing
|
1. |
Understanding Node Localizability of Wireless Ad Hoc and
Sensor Networks |
IEEE |
Download |
2. |
R&D Sensors to achive Temporal Coverage of Objects |
IEEE |
Download |
3. |
Supporting Efficient and Scalable Multicasting |
IEEE |
Download |
4. |
Throughput Optimization in Mobile Backbone Networks |
IEEE |
Download |
5. |
Secure Cooperative Sensing in IEEE 802.22 WRANs Using
Shadow Fading Correlation |
IEEE |
Download |
6. |
Design and Performance Analysis of Mobility Management |
IEEE |
Download |
7. |
Dynamic Conflict-Free Transmission Scheduling for Sensor
Network Queries |
IEEE |
Download |
8. |
A Policy Enforcing Mechanism for Trusted Ad Hoc Network |
IEEE |
Download |
9. |
Measuring Capacity Bandwidth of Targeted |
IEEE |
Download |
10. |
Throughput Optimization |
IEEE |
|
11. |
Towards Reliable Data Delivary for Highly Dynamic Mobile
Ad Hoc network |
IEEE |
Download |
12. |
Stateless Multicasting in Mobile Ad Hoc Network |
IEEE |
Download |
Data Mining
|
1. |
A Unified Probabilistic Framework for Name Disambiguation
in Digital Library |
IEEE |
Download |
2. |
Ranking Spatial Data by Quality Preferences |
IEEE |
Download |
3. |
Decision Trees for Uncertain Data |
IEEE |
Download |
4. |
Distributional Features for Text Categorization |
IEEE |
Download |
5. |
GLIP |
IEEE |
Download |
6. |
Mining Web Graphs for Recommendations |
IEEE |
Download |
7. |
Discovering Conditional Functional Dependencies |
IEEE |
|
8. |
Prograssive Parametric Query Optimization |
IEEE |
Download |
9. |
Detecting Malicious Packet Losses |
IEEE |
Download |
10. |
Flexible Rollback Recovery in Dynamic |
IEEE |
Download |
Networking
|
1. |
Comparative Evaluation of Spoofing Defenses |
IEEE |
Download |
2. |
Nymble |
IEEE |
Download |
3. |
Robust Correlation of Encrypted Attack Traffic Through
Stepping Stones by Flow WaterMarking |
IEEE |
Download |
4. |
Dynamics of malware spread in decentralized peer to peer
networks |
IEEE |
Download |
5. |
Modaling and Detection of Camouflaging Worm |
IEEE |
Download |
6. |
Layered Approach Using Conditional Random Fieldsfor
Intruction Detection |
IEEE |
Download |
7. |
On the Impact of Security Protocols on the Performance
of SNMP |
IEEE |
Download |
8. |
Wireless Sensor Network Security model using Zero
Knowledge Protocol |
IEEE |
Download |
9. |
Detection of Selfish Nodes in Networks Using |
IEEE |
Download |
10. |
Intrusion Alerts Correalation Based Assessment of
NetWork Security |
IEEE |
Download |
11. |
Lord of the Links: A Framework for Discovering Missing
Links in the Internet Topology |
IEEE |
Download |
12. |
voice transmission over LAN using Bluetooth |
IEEE |
Download |
13. |
Locating Equivalent Servants over P2P Networks |
IEEE |
Download |
14. |
Dirichlet-Based Trust Management for Effective
Collaborative Intrusion Detection Networks |
IEEE |
Download |
15. |
Image Transmission with Securityy Enhancement Based on
Region and path Diversity in WSN/w |
IEEE |
|
16. |
Selfish Overlay Network Creation and Maintenance |
IEEE |
Download |
17. |
An Authentication Code Against Pollution Attacks in
Network Coding |
IEEE |
|
18. |
Adaptive Opportunistic Routing for Wireless Ad Hoc
Networks |
IEEE |
|
19. |
Energy-Efficient Strategies for Cooperative Multi-Channel
MAC Protocols |
IEEE |
Download |
20. |
XLP: A Cross-Layer Protocol for Efficient Communication in
Wireless Sensor Networks |
IEEE |
Download |
21. |
Radio Sleep Mode Optimization in Wireless Sensor NetWork |
IEEE |
Download |
22. |
On the Benefits of Cooperative Proxy Caching for
Peer-to-peer Traffic |
IEEE |
Download |
23. |
The Design and Evaluation of a Self-Organizing Superpeer
Network |
IEEE |
Download |
24. |
Evenly Distributing Combinatorial Tasks in a Peer-to-Peer
System |
IEEE |
Download |
25. |
A New Kind of Cluster-based Key Management Protocol in
Wireless Sensor Network |
IEEE |
Download |
Web Application
|
1. |
Enhancing e-learning |
IEEE |
Download |
2. |
Addressing Mental Health Epidemic Among University
Student via Web-based,self-Screenig |
IEEE |
Download |
3. |
Service Centric Framework For Digital Government
Application |
IEEE |
Download |
4. |
Developing dynamic web application: Exam Scheduler |
IEEE |
Download |
5. |
E-science and web |
IEEE |
Download |
6. |
A Chat Application in Lift servlets |
Non-IEEE |
Download |
7. |
Research on construction E-commerce site |
Non-IEEE |
Download |
8. |
E-School:a WEB-SERVICE Oriented Resource Based
E-learning System |
Non-IEEE |
Download |
9. |
Managing Health Care Through Social Networks |
Non-IEEE |
Download |
10. |
Museum gallery Review |
Non-IEEE |
Download |
11. |
Social connect services |
Non-IEEE |
Download |
12. |
Result Analysis |
Non-IEEE |
Download |
13. |
TechNetworking Chaining the Cerebration of Student,
Industry and Research |
Non-IEEE |
Download |
14. |
Student Management Information System |
Non-IEEE |
Download |
15. |
key pass Management |
Non-IEEE |
Download |
16. |
Mental health |
Non-IEEE |
Download |
Software Engineering
|
1. |
Semi-Proving: An Integrated Method for Program Proving,
Testing, and Debugging |
IEEE |
Download |
2. |
Automatic Detection of Unsafe Dynamic
Component Loadings |
IEEE |
|
3. |
QoS Assurance for Dynamic Reconfiguration of
Component-Based Software |
IEEE |
|