Your SlideShare is downloading. ×

Bulk ieee projects

836
views

Published on

2011 ieee bulk projects, 2011 ieee domain wise titles, 2011 ieee titles

2011 ieee bulk projects, 2011 ieee domain wise titles, 2011 ieee titles

Published in: Education, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
836
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ************************************************************* CLOUD COMPUTING1. Cloud Computing for Agent-Based Urban Transportation Systems2. Secure and Practical Outsourcing of Linear Programming in Cloud Computing3. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
  • 2. ************************************************************* MOBILE COMPUTING1. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks NETWORKING1. ProgME: Towards Programmable Network Measurement2. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks3. Buffer Sizing for 802.11 Based Networks4. Caching Strategies Based on Information Density5. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
  • 3. *************************************************************6. A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows7. Denial of Service Attacks in Wireless Networks: The Case of Jammers SECURE COMPUTING1. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks2. Nymble- Blocking Misbehaving Users in Anonymizing Networks3. Modeling and Detection of Camouflaging Worm.4. Online Intrusion Alert Aggregation with Generative Data Stream Modeling.5. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks.6. Towards Situational Awareness of Large-Scale Botnet Probing Events7. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING8. Competitive Study of Cryptography Techniques over Block Cipher.9. Analysis on Credit Card Fraud Detection Methods.
  • 4. ************************************************************* IMAGE PROCESSING1. Additive Distortion in Steganography Using Syndrome-Trellis Codes2. Subspace-Based Striping Noise Reduction in Hyperspectral Images.3. Sketch4Match – Content-based Image Retrieval System Using Sketches.4. Embedded Extended Visual Cryptography Schemes KNOWLEDGE AND DATA ENGINEERING1. Extended XML Tree Pattern Matching: Theories and Algorithms.2. Ranking Spatial Data by Quality Preferences3. Discovering Conditional Functional Dependencies
  • 5. *************************************************************4. Effective Navigation of Query Results Based on Concept Hierarchies.5. Clustering with Multi-Viewpoint based Similarity Measure. WEB SERIVCE1. Ontology Based Business Process Customization for Composite Web Services
  • 6. ************************************************************* CLOUD COMPUTING1. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data.2. Data integrity proofs in cloud storage.3. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud.4. Optimal service pricing for a cloud cache.
  • 7. ************************************************************* NETWORKING1. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks2. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems3. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks4. Continuous Neighbor Discovery in Asynchronous Sensor Networks5. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection6. On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop Wireless Networks7. A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks
  • 8. ************************************************************* SECURE COMPUTING1. Integration of Sound Signature in Graphical Password Authentication System2. The Geometric Efficient Matching Algorithm for Firewalls3. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking.4. NABS Novel Approaches for Biometric Systems5. Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models
  • 9. ************************************************************* IMAGE PROCESSING1. Minimizing Additive Distortion in Steganography Using Syndrome- Trellis Codes2. A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm3. Blind Image Watermarking Using a Sample Projection Approach4. Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts5. Adaptive Spectral Transform for Wavelet-Based Color Image Compression6. Facial Expression Recognition Using Facial Movement Features7. Histogram Specification: A fast and flexible Method to process digital images
  • 10. ************************************************************* KNOWLEDGE AND DATA ENGINEERING1. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis.2. Bridging Socially-Enhanced Virtual Communities.3. DATA LEAGAGE DETECTION.4. Personalized Ontology Model for Web Information Gathering.5. Efficient Computation of Range Aggregates against uncertain location based queries.6. Scalable Learning of Collective Behavior.7. The World in a Nutshell Concise Range Queries.8. The Awareness Network, To Whom Should I Display My Actions And, Whose Actions.9. Publishing Search Logs – A Comparative Study of Privacy Guarantees.10. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases.11. Monitoring Service Systems from a Language-Action Perspective.
  • 11. *************************************************************12. Improving Aggregate Recommendation Diversity Using Ranking- Based Techniques.13. Exploring Application-Level Semantics for Data Compression.14. A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. WEB SERIVCE1. Adaptive Provisioning of Human Expertise in Service-oriented Systems.2. Vulnerability Analysis in SOA-based Business Processes.3. Detecting Kernel-Level Root kits Using Data Structure Invariants