Your SlideShare is downloading. ×
  • Like
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES

  • 451 views
Published

Dear All, Future-tec technologies Pvt Ltd, …

Dear All, Future-tec technologies Pvt Ltd,
Offers IEEE & Non IEEE projects on all Platforms and Domains. We also support with your own titles.

Regards,
ASHA DAS.P.K
Mob:9566216611
www.future-tec.co.in
Old 52,New 62,Floor 3,Espee Complex
Brindavan Street,West Mambalam,Chennai 33

Published in Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
451
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
4
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. FUTURE-TEC TECHNOLOGIES 1. A Machine Learning Approach to TCP Throughput Prediction 2. Feedback-Based Scheduling for Load-Balanced Two- Stage Switches 3. Trust management in mobile ad hoc networks using a scalable maturity-based Model Networking 1. Online social networks 2. Sharing location in online social networks Network 1. Fuzzy Data Standardization Fuzzy 1. On the Quality of Service of Crash-Recovery Failure Detectors 2. Cluster-Based Key Pre-distribution Using Deployment Knowledge Dependable and Security 1. Integrated High-Fidelity Geosciences Simulations for Enhanced Terrain-Related Target Detection 2. Accelerating Biomedical Research in Designing Diagnostic Assays, Drugs, and Vaccines Computer Science 1. Spatial Navigation for Context-Aware Video Surveillance 2. Guest Editors' Introduction: Multimedia Analytics 3. Multimedia Analysis + Visual Analytics = Multimedia Analytics 4. AniViz: A Template-Based Animation Tool for Volume Visualization 5. iFeel_IM!: Augmenting Emotions during Online Communication 6. MediaTable: Interactive Categorization of Multimedia Collections Computer Science and Graphics
  • 2. 1. Classification of Protein-Protein Interaction Full- Text Documents Using Text and Citation Network Features 2. Exploring Species-Based Strategies for Gene Normalization Computational Biology and Bioinformatics 1. Automatic Generation of Game Level Solutions as Storyboards 2. Game Bot Detection via Avatar Trajectory Analysis 3. The Parametrized Probabilistic Finite-State Transducer Probe Game Player Fingerprint Model Computational Intelligence and AI in Games 1. Full-Reference Video Quality Metric for Fully Scalable and Mobile SVC Content Broadcasting 1. Understanding Wi-Fi 2.0: from the economical perspective of wireless service providers [Dynamic Spectrum Management] 2. Efficient routing for international mobile call setup [Accepted from Open Call] 3. IEEE 802.11E QoS and power saving features overview and analysis of combined performance [Accepted from Open Call] 4. Achieving Secret Communication for Fast Rayleigh Fading Channels Wireless Communications 1. Using a web-based tool to define and implement software process improvement initiatives in a small industrial setting 2. Including both static and dynamic typing in the same programming language 3. Design principles of web-based distance education system and sample application in Afyon Kocatepe University 4. Component co-evolution and component dependency: speculations and verifications Software
  • 3. 5. Technologies and Tools for Distributed Teams 1. End-to-End Service Support for Mashups Service Computing 1. Privacy-Preserving Sharing of Sensitive Information 2. Preserving Privacy Based on Semantic Policy Tools 3. The Phish-Market Protocol: Secure Sharing Between Competitors 4. Can Public-Cloud Security Meet Its Unique Challenges? 5. Internet Filtering Issues and Challenges 6. Encrypting Keys Securely Security and privacy 1. Joint synchronization and localization using TOAs: A linearization based WLS solution Communications 1. Auto-Context and Its Application to High-Level Vision Tasks and 3D Brain Image Segmentation 2. Cost-Sensitive Face Recognition 3. Motion Segmentation in the Presence of Outlying, Incomplete, or Corrupted Trajectories 4. P&D 5. FS2You: Peer-Assisted Semipersistent Online Hosting at a Large Scale Pattern Analysis and Machine Intelligence 1. Improved Speech Presence Probabilities Using HMM-Based Inference, With Applications to Speech Enhancement and ASR Signal 1. Affective Visualization and Retrieval for Music Video 2. Speech Emotion Analysis: Exploring the Role of Context 3. Feature Analysis and Evaluation for Automatic Emotion Identification in Speech Multimedia
  • 4. 4. Emotion Recognition in Text for 3-D Facial Expression Rendering 5. A 3-D Audio-Visual Corpus of Affective Communication 6. Accelerating the Media Business with MPEG Extensible Middleware 1. Classroom Wiki: A Collaborative Wiki for Instructional Use with Multiagent Group Formation 2. An Interactive Table for Supporting Participation Balance in Face-to-Face Collaborative Learning 3. Automatic Detection of Off-Task Behaviors in Intelligent Tutoring Systems with Machine Learning Techniques 4. Improving Teaching and Learning through Automated Short-Answer Marking Learning Technologies 1. Efficient Lazy Evaluation of Rule-Based Programs 2. A Novel Combination of Answer Set Programming with Description Logics for the Semantic Web 3. Unsupervised Semantic Similarity Computation between Terms Using Web Documents KDD 1. Web-Application Security: From Reactive to Proactive 2. Introduction: Cyber security IT 1. Trust and Reputation Management 2. Trusted Cloud Computing with Secure Resources and Data Coloring 3. Advanced Feedback Management for Internet Auction Reputation Systems 4. A Survey of First-Person Shooter Gaming Traffic on the Internet INTERNET COMPUTING
  • 5. 5. Incentive Mechanisms in P2P Media Streaming Systems 6. Cloud Computing: The New Frontier of Internet Computing 7. Secure/Multipurpose Internet Mail Extensions 8. Trust and the Internet 1. Intrusion Detection for Grid and Cloud Computing 2. A Framework for RFID Deployment in Supply Chains IT PROFESSIONAL 1. Special Section on Distributed Camera Networks: Sensing, Processing, Communication, and Implementation 2. 3-D Target-Based Distributed Smart Camera Network Localization 3. Activity Based Matching in Distributed Camera Networks Image Processing 1. A managerial community of Web Services for management of communities of Web Services 2. Automatic Composition of Semantic Web Services An Enhanced State Space Search Approach 3. Knowledge-first web services an E-Government example 4. Using the iPhone and iPod Touch for remote sensor control and data acquisition WEB SERVICES 1. The Applied Research of Cloud Computing Platform Architecture in the E-Learning Area. 2. Cloud Computing System Based on Trusted Computing Platform. 3. IT Auditing to Assure a Secure Cloud Computing. 4. Performance Evaluation of Cloud Computing Offerings 5. Providing Privacy Preserving in cloud computing Cloud Computing
  • 6. 6. Toward a Unified Ontology of Cloud Computing. Bayesian classifier programmed in SQL Secured Data Collection Gene ontology with word computing with SOM MILD Edge Adaptive image stenography by MSB Multibody Structure-and-Motion Segmentation by Branch- and-Bound Model Selection Satellite Image Contrast Enhancement Using Discrete Wavelet Transform and Singular Value Decomposition Skew Estimation of Document Images Using Bagging Fast-Mesh: A Low-Delay High-Bandwidth Mesh for Peer- to-Peer Live Streaming A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization A Virtual Cloud Computing LAB Predictive Network Anomaly detection and visualization Active Re-ranking for Web Image Search Facial detection and recognition in mimetic algorithm Accurate image search using contextual dissimilarity measures Light:A query efficient yet low maintenance indexing scheme over dth's
  • 7. Anonymous query processing in road networks The applied research of cloud computing arch in area of e- learning Routing Understanding online interruption based advertising impact Aging Bloom Filter with Two Active Buffers for Dynamic Sets Layered Approach Using Conditional Random Fields for Intrusion Detection For details: ASHADAS.P.K / SARANYA Mob: 9566216611 / 33 asha@future-tec.co.in / sharanya@future-tec.co.in www.future-tec.co.in Old 52,New 62,Floor 3,Espee Complex Brindavan Street,West Mambalam,Chennai 33