SlideShare a Scribd company logo
1 of 16
IEEE 2014 PROJECTS
CLOUD COMPUTING
CODE TITLES
GC001 A combinatorial auction-based mechanism for dynamic vm provisioning and
allocation in clouds
GC002 A Hyper-Heuristic Scheduling Algorithm for Cloud
GC003 Adaptive Algorithm for Minimizing Cloud Task Length with Prediction Errors
GC004 Analysis, Modeling and Simulation of Workload Patterns in a Large-Scale Utility
Cloud
GC005 Cloud migration research: a systematic review
GC006 Compatibility-aware Cloud Service Composition Under Fuzzy Preferences of Users
GC007 Deadline based Resource Provisioning and Scheduling Algorithm for Scientific
Workflows on Clouds
GC008 Decreasing Impact of SLA Violations A Proactive Resource Allocation Approach
for Cloud Computing Environments
GC009 Dynamic cloud pricing for revenue maximization
GC010 Hybrid attribute and re-encryption based key management for secure and scalable
mobile applications in clouds
GC011 Integrity for join queries in the cloud
GC012 Is the same instance type created equal? Exploiting heterogeneity of public clouds
GC013 Multi objective Game Theory-based Schedule Optimization for Bags-of-Tasks on
Hybrid Clouds
GC014 Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
GC015 Performance and cost evaluation of an adaptive encryption architecture for cloud
database services
GC016 Probabilistic consolidation of virtual machines in self-organizing cloud data centers
GC017 QoS-Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud
Environment
GC018 Scalable Analytics for IaaS Cloud Availability
GC019 Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data
Centers
GC020 Transformation-based Monetary Cost Optimizations for Workflows in the Cloud
GC021 Virtualization Technology for TCPIP Offload Engine
GC022 Workload-Aware Credit Scheduler for Improving Network IO Performance in
Virtualization Environment
DATA MINING
CODE TITLES
GD001 A two-level topic model towards knowledge discovery from citation networks
GD002 Accuracy-constrained privacy-preserving access control mechanism for relational
data
GD003 Active learning without knowing individual instance labels: a pair wise label
homogeneity query approach
GD004 An automated framework for incorporating news into stock trading strategies
GD005 Classifier ensembles with the extended space forest
GD006 Core: a context-aware relation extraction method for relation completion
GD007 Data mining with big data
GD008 Effectively indexing the multidimensional uncertain objects
GD009 Efficient ranking on entity graphs with personalized relationships
GD010 Extended sub tree: a new similarity function for tree structured data
GD011 Fast nearest neighbor search with keywords
GD012 Identity protection in sequential releases of dynamic networks
GD013 Improving activity recognition by segmental pattern mining
GD014 Local Thresholding in general network graphs
GD015 Multi comm.: finding community structure in multi-dimensional networks
GD016 Online feature selection and its applications
GD017 Robust perceptual image hashing based on ring partition and nmf
GD018 Searching dimension incomplete databases
DISTRIBUTED SYSTEM
CODE TITLES
GDS01 A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices
GDS02 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment
in Delay-Tolerant Networks
GDS03 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
GDS04 A Survey of Performance Modeling and Simulation Techniques for Accelerator-
based Computing
GDS05 Achieving Asymmetric Sensing Coverage for Duty Cycled Wireless Sensor
Networks
GDS06 An Iterative Method for Calculating Robust Rating Scores
GDS07 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
GDS08 Bit Torrent Locality and Transit Traffic Reduction When, Why, and at What Cost
GDS09 BURSE A Bursty and Self-similar Workload Generator for Cloud Computing
GDS10 Cooperative Positioning and Tracking in Disruption Tolerant Networks
GDS11 D2P Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
GDS12 Data Gathering with Compressive Sensing in Wireless Sensor Networks A Random
Walk Based Approach
GDS13 Distributed Sensing for High-Quality Structural Health Monitoring using WSNs
GDS14 Distributed Smart-home Decision-making in a Hierarchical Interactive Smart Grid
Architecture
GDS15 Dynamic Trust Management for Delay Tolerant Networks and Its Application to
Secure Routing
GDS16 Efficient Range-Based Storage Management for Scalable Data stores
GDS17 Efficient Virtual Backbone Construction without a Common Control Channel in
Cognitive Radio Networks
GDS18 Enhancing Internet-scale Video Service Deployment Using Microblog-based
Prediction
GDS19 Free Market of Crowd sourcing Incentive Mechanism Design for Mobile Sensing
GDS20 Impact of Brooks-Iyengar Distributed Sensing Algorithm on Real Time Systems
GDS21 Improving Update-Intensive Workloads on Flash Disks Through Exploiting Multi-
Chip Parallelism
GDS22 KASR A Keyword-Aware Service Recommendation Method on Map Reduce for
Big Data Application
GDS23 Maximizing the Throughput of Hash Tables in Network Devices with Combined
SRAMDRAM Memory
GDS24 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
GDS25 Omni directional Coverage for Device-free Passive Human Detection
GDS26 Order-Optimal Information Dissemination in MANETs via Network Coding
GDS27 OTrack Towards Order Tracking for Tags in Mobile RFID System
GDS28 Parallel Simulation of Complex Evacuation Scenarios with Adaptive Agent Models
GDS29 Performance-Oriented Partitioning for Task Scheduling of Parallel Reconfigurable
Architectures
GDS30 Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph
GDS31 Signature Searching in a Networked Collection of Files
GDS32 Social-Aware Replication in Geo-Diverse Online Systems
GDS33 SPOC A Secure and Privacy-Preserving Opportunistic Computing Framework for
Mobile-Healthcare Emergency
GDS34 TAMES A Truthful Double Auction for Multi-Demand Heterogeneous Spectrums
GDS35 Time Synchronization Based on Slow-Flooding in Wireless Sensor Networks
GDS36 TMC Exploiting Trajectories for Multicast in Sparse Vehicular Networks
GDS37 Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and
Allocation in Clouds
GDS38 Web Service Recommendation via Exploiting Location and QoS Information
MOBILE COMPUTING
CODE TITLES
GM001 A Two-Phase Dispatch Heuristic to Schedule the Movement of Multi-Attribute
Mobile Sensors in a Hybrid Wireless Sensor Network
GM002 An Automatic, Robust, and Efficient Multi-User Breadcrumb System for Emergency
Response Applications
GM003 Calibrating Indoor Positioning Systems
GM004 Capacitive Touch Communication A Technique to Input Data through Devices'
Touch Screen
GM005 Data Retrieval Scheduling for Multi-Item Requests in Multi-Channel Wireless
Broadcast Environments
GM006 DOTS A Propagation Delay-Aware Opportunistic MAC Protocol for Mobile
Underwater Networks
GM007 Efficient Authentication for Mobile and Pervasive Computing
GM008 Efficient Rekeying Framework for Secure
GM009 Evaluating Service Disciplines for On-Demand Mobile Data Collection in Sensor
Networks
GM010 Face-to-Face Proximity Estimation Using Bluetooth on Smart phones
GM011 Investigating the Privacy versus Forwarding Accuracy Tradeoff in Opportunistic
Interest-Casting
GM012 Minimum Latency Multiple Data MULE Trajectory Planning in Wireless Sensor
Networks
GM013 Opportunistic Channel Sharing in Cognitive Radio Networks
GM014 Optimizing Spatial and Temporal Reuse in Wireless Networks by Decentralized
Partially Observable Markov Decision Processes
GM015 Profiling aquatic diffusion process using robotic sensor networks
GM016 Radio Resource Allocation and Green Operation for Mobile Access Networks Based
on Radio-over-Fiber
GM017 RF-Sensing of Activities from Non-Cooperative Subjects in Device-Free
Recognition Systems Using Ambient and Local Signals
GM018 Security Analysis of Handover Key Management in 4G LTESAE Networks
GM019 Two-Tier Het Nets with Cognitive Femto cells Downlink Performance Modeling
and Analysis in a Multichannel Environment
GM020 White Rate A Context-Aware Approach to Wireless Rate Adaptation
NETWORK SECURITY
CODE TITLES
GNS01 A Computational Dynamic Trust Model for User Authorization
GNS02 A Large-Scale Study of the Time Required to Compromise a Computer System
GNS03 A Note On Orchestrating an Ensemble of Map Reduce Jobs for Minimizing Their
Make span
GNS04 A Random Decision Tree Framework for Privacy-preserving Data Mining
GNS05 Analysis of field data on web security vulnerabilities
GNS06 Cipher SXRay Exposing Cryptographic Operations and Transient Secrets from
Monitored Binary Execution
GNS07 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without
Secure Channel
GNS08 Continuous and Transparent User Identity Verification for Secure Internet Services
GNS09 Control Flow-based Malware Variant Detection
GNS10 Effective Risk Communication for Android Apps
GNS11 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
GNS12 Efficient Tagging of Remote Peers During Child Pornography Investigations
GNS13 Enforcing Obligations within Relational Database Management Systems
GNS14 Evaluation of Web Security Mechanisms using Vulnerability and Attack Injection
GNS15 Extending the Agile Development Approach to Develop Acceptably Secure
Software
GNS16 Fault-Tolerant Network Interfaces for Networks-on-Chip
GNS17 Generating Summary Risk Scores for Mobile Applications
GNS18 HBFT Speculative Byzantine Fault Tolerance With Minimum Cost
GNS19 Hiding in the Mobile Crowd Location Privacy through Collaboration
GNS20 Human Effects of Enhanced Privacy Management Models
GNS21 Hyper Check A Hardware-Assisted Integrity Monitor
GNS22 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
GNS23 k-Zero Day Safety A Network Security Metric for Measuring the Risk of Unknown
Vulnerabilities
GNS24 Meeting Cardinality Constraints in Role Mining
GNS25 MFTS A Multi-level Fault-tolerant Archiving Storage with Optimized Maintenance
Bandwidth
GNS26 MINT A Reliability Modeling Framework for Energy-Efficient Parallel Disk
Systems
GNS27 MOSES Supporting and Enforcing Security Profiles on Smart phones
GNS28 On the Hardness of Adding Non masking Fault Tolerance
GNS29 PPTP Privacy-Preserving Traffic Padding in Web-Based Applications
GNS30 PRGA Privacy-preserving Recording & Gateway-assisted Authentication of Power
Usage Information for Smart Grid
GNS31 Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data
Classification in Cloud
GNS32 Private Searching on Streaming Data Based on Keyword Frequency
GNS33 Pushing Java Type Obfuscation to the Limit
GNS34 Secure Ordered Bucketization
GNS35 Security Analysis and Related Usability of Motion-based CAPTCHAs Decoding
Code words in Motion
GNS36 SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design
GNS37 Software-Level Approaches to Implementing Fault-Tolerant Systems on Coarse-
Grained Reconfigurable Architecture
GNS38 STARS A Statistical Traffic Pattern Discovery System for MANETs
NETWORKING
CODE TITLES
GN001 A Study on the Performance of a Three-Stage Load-Balancing Switch
GN002 Algorithms for Enhanced Inter-Cell Interference Coordination (eICIC) in LTE
HetNets
GN003 An Urn Occupancy Approach for Modeling the Energy Consumption of
Distributed Beaconing
GN004 AP Association for Proportional Fairness in Multi rate WLANs
GN005 Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
GN006 Fast Regular Expression Matching Using Small TCAM
GN007 Graceful Convergence in Link-State IP Networks A Lightweight Algorithm
Ensuring Minimal Operational Impact
GN008 Green Networking With Packet Processing Engines Modeling and Optimization
GN009 ISP-Friendly Live P2P Streaming
GN010 Joint Routing and Medium Access Control in Fixed Random Access Wireless
Multi hop Networks
GN011 Learning-Based Uplink Interference Management in 4G LTE Cellular Systems
GN012 Max-Weight Scheduling in Queuing Networks with Heavy-Tailed Traffic
GN013 Multipath Wireless Network Coding An Augmented Potential Game Perspective
GN014 On Sample-Path Optimal Dynamic Scheduling for Sum-Queue Minimization in
Forests
GN015 On the Multiple Uncast Capacity of 3-Source, 3-Terminal Directed Acyclic
Networks
GN016 Optimal Wave banding in WDM Ring Networks
GN017 Optimally Adaptive Power-Saving Protocols for Ad Hoc Networks Using the
Hyper Quorum System
GN018 Optimization Decomposition for Scheduling and System Configuration in
Wireless Networks
GN019 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System
GN020 Reliable and Timely Event Notification for Publish Subscribe Services Over the
Internet
GN021 Retransmission Delays with Bounded Packets Power-Law Body and Exponential
Tail
GN022 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
GN023 Temporal Traffic Dynamics Improve the Connectivity of Ad Hoc Cognitive
Radio Networks
GN024 The Wide-Area Virtual Service Migration Problem A Competitive Analysis
Approach
SOFTWARE ENGNEERING
CODE TITLES
GS001 A Model-Driven Methodology for Developing Secure Data-Management
Applications
GS002 A Study of Variability Models and Languages in the Systems Software Domain
GS003 An Observe-Model-Exercise Paradigm to Test Event-Driven Systems with
Undetermined Input Spaces
GS004 Analyzing Critical Decision-Based Processes
GS005 Automated Fixing of Programs With Contracts
GS006 Automatic Summarization of Bug Reports
GS007 Conservation of Information Software's Hidden Clockwork
GS008 Dealing with traceability in the MDD of model transformations
GS009 Effects of developer experience on learning and applying Unit Test-Driven
Development
GS010 Formulating Cost-Effective Monitoring Strategies for Service-based Systems
GS011 Governing Software Process Improvementsin Globally Distributed Product
Development
GS012 Identifying Code of Individual Features in Client-Side Web Applications
GS013
iTree- Efficiently Discovering High-Coverage Configurations Using Interaction
Trees
GS014 Methodbook- Recommending Move Method Refactorings via Relational Topic
Models
GS015 Modular Software Model Checking for Distributed Systems
GS016 On the Asymptotic Behavior of Adaptive Testing Strategy for Software
Reliability Assessment
GS017 REPENT Analyzing the Nature of Identifier Renamings
GS018 Specification and Verification of Normative Texts using C-O Diagrams
GS019 Supporting Domain Analysis through Mining and Recommending Features from
Online Product Listings
GS020 Supporting the Combined Selection of Model-based Testing Techniques
GS021 Symbolic Crosschecking of Data-Parallel Floating-Point Code
GS022 Synthesizing Multithreaded Code from Real-Time Object-Oriented Models via
Schedulability-Aware Thread Derivation
GS023 Task Environment Complexity, Global Team Dispersion, Process Capabilities,
and Coordination in Software Development
GS024 Usability through Software Design
GS025 Variability in Software Systems—A Systematic Literature Review
GS026 Verifying Protocol Conformance Using Software Model Checking for the Model-
Driven Development of Embedded Systems
GS027 You Are the Only Possible Oracle- Effective Test Selection for End Users of
Interactive Machine Learning Systems

More Related Content

What's hot

2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computingmanjunath205
 
Java non ieee project titles 2014-2015
Java non ieee project titles 2014-2015Java non ieee project titles 2014-2015
Java non ieee project titles 2014-2015Nandha Kumar
 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project listVision Solutions
 
2014 and 2015 ieee final list
2014 and 2015 ieee  final list2014 and 2015 ieee  final list
2014 and 2015 ieee final listManju Nath
 
BULK IEEE PROJECTS IN VLSI ,BULK IEEE PROJECTS, IEEE 2015-16 VLSI PROJECTS IN...
BULK IEEE PROJECTS IN VLSI ,BULK IEEE PROJECTS, IEEE 2015-16 VLSI PROJECTS IN...BULK IEEE PROJECTS IN VLSI ,BULK IEEE PROJECTS, IEEE 2015-16 VLSI PROJECTS IN...
BULK IEEE PROJECTS IN VLSI ,BULK IEEE PROJECTS, IEEE 2015-16 VLSI PROJECTS IN...Nexgen Technology
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects listtmksmanju1
 
2017 18 ieee java titles,IEEE 2017-18 BULK PROJECTS TITLES,IEEE JAVA PROJE...
2017 18 ieee java  titles,IEEE 2017-18  BULK PROJECTS TITLES,IEEE JAVA  PROJE...2017 18 ieee java  titles,IEEE 2017-18  BULK PROJECTS TITLES,IEEE JAVA  PROJE...
2017 18 ieee java titles,IEEE 2017-18 BULK PROJECTS TITLES,IEEE JAVA PROJE...Nexgen Technology
 
2015 application projects
2015 application projects2015 application projects
2015 application projectsHari Krishnan
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017LeMeniz Infotech
 
Ieee cse software 2018 project list
Ieee cse software 2018 project listIeee cse software 2018 project list
Ieee cse software 2018 project listVision Solutions
 
2017 and 2018 academic ieee projects list
2017 and 2018 academic ieee projects list2017 and 2018 academic ieee projects list
2017 and 2018 academic ieee projects listManju Nath
 

What's hot (15)

MS.NET IEEE 2015
MS.NET IEEE 2015MS.NET IEEE 2015
MS.NET IEEE 2015
 
2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing
 
Java non ieee project titles 2014-2015
Java non ieee project titles 2014-2015Java non ieee project titles 2014-2015
Java non ieee project titles 2014-2015
 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project list
 
Hb services java ieee 2015 - 16
Hb services java ieee 2015 - 16Hb services java ieee 2015 - 16
Hb services java ieee 2015 - 16
 
2014 and 2015 ieee final list
2014 and 2015 ieee  final list2014 and 2015 ieee  final list
2014 and 2015 ieee final list
 
Shakas project titles 2014 2015
Shakas project titles 2014 2015Shakas project titles 2014 2015
Shakas project titles 2014 2015
 
BULK IEEE PROJECTS IN VLSI ,BULK IEEE PROJECTS, IEEE 2015-16 VLSI PROJECTS IN...
BULK IEEE PROJECTS IN VLSI ,BULK IEEE PROJECTS, IEEE 2015-16 VLSI PROJECTS IN...BULK IEEE PROJECTS IN VLSI ,BULK IEEE PROJECTS, IEEE 2015-16 VLSI PROJECTS IN...
BULK IEEE PROJECTS IN VLSI ,BULK IEEE PROJECTS, IEEE 2015-16 VLSI PROJECTS IN...
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list
 
2017 18 ieee java titles,IEEE 2017-18 BULK PROJECTS TITLES,IEEE JAVA PROJE...
2017 18 ieee java  titles,IEEE 2017-18  BULK PROJECTS TITLES,IEEE JAVA  PROJE...2017 18 ieee java  titles,IEEE 2017-18  BULK PROJECTS TITLES,IEEE JAVA  PROJE...
2017 18 ieee java titles,IEEE 2017-18 BULK PROJECTS TITLES,IEEE JAVA PROJE...
 
2015 application projects
2015 application projects2015 application projects
2015 application projects
 
Java ieee titles2016 student
Java ieee titles2016  studentJava ieee titles2016  student
Java ieee titles2016 student
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
 
Ieee cse software 2018 project list
Ieee cse software 2018 project listIeee cse software 2018 project list
Ieee cse software 2018 project list
 
2017 and 2018 academic ieee projects list
2017 and 2018 academic ieee projects list2017 and 2018 academic ieee projects list
2017 and 2018 academic ieee projects list
 

Viewers also liked

Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Seminar report on solar tree (by Vikas)
Seminar report on solar tree (by Vikas)Seminar report on solar tree (by Vikas)
Seminar report on solar tree (by Vikas)dreamervikas
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsArun Kumar
 

Viewers also liked (8)

Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
Kettle – Etl Tool
Kettle – Etl ToolKettle – Etl Tool
Kettle – Etl Tool
 
Topics
TopicsTopics
Topics
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Seminar report on solar tree (by Vikas)
Seminar report on solar tree (by Vikas)Seminar report on solar tree (by Vikas)
Seminar report on solar tree (by Vikas)
 
Solar tree ppt
Solar tree pptSolar tree ppt
Solar tree ppt
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 

Similar to IEEE 2014 Title's list for CSC

Mobileapplicationprojectsformcaingagnerchennai
MobileapplicationprojectsformcaingagnerchennaiMobileapplicationprojectsformcaingagnerchennai
Mobileapplicationprojectsformcaingagnerchennairathikamca
 
Ieee 2013 projects titles
Ieee 2013 projects titlesIeee 2013 projects titles
Ieee 2013 projects titlesPraba Karan
 
Final Year IEEE 2014 CSE projects Tite's list
Final Year IEEE 2014 CSE projects Tite's listFinal Year IEEE 2014 CSE projects Tite's list
Final Year IEEE 2014 CSE projects Tite's listexcellertechnoly
 
3i techso project title
3i techso project title3i techso project title
3i techso project title3itechso
 
Latest mca projects 2013
Latest mca projects 2013Latest mca projects 2013
Latest mca projects 2013rathikamca
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESMusthafa Tema
 
IEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's listIEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's listgagnertechnologies
 
2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application ProjectsHari Krishnan
 
Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14projectsepark
 
2013 and 2014 ieee projects list
2013 and 2014 ieee projects list2013 and 2014 ieee projects list
2013 and 2014 ieee projects listManju Nath
 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project listMSR PROJECTS
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects listVenkat Projects
 
Dotnet 2014 15
Dotnet 2014 15Dotnet 2014 15
Dotnet 2014 15shahu2212
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015kishu0005
 
Java projects 2013 14
Java projects 2013 14Java projects 2013 14
Java projects 2013 14MSR PROJECTS
 

Similar to IEEE 2014 Title's list for CSC (20)

Mobileapplicationprojectsformcaingagnerchennai
MobileapplicationprojectsformcaingagnerchennaiMobileapplicationprojectsformcaingagnerchennai
Mobileapplicationprojectsformcaingagnerchennai
 
Ieee 2013 projects titles
Ieee 2013 projects titlesIeee 2013 projects titles
Ieee 2013 projects titles
 
Final Year IEEE 2014 CSE projects Tite's list
Final Year IEEE 2014 CSE projects Tite's listFinal Year IEEE 2014 CSE projects Tite's list
Final Year IEEE 2014 CSE projects Tite's list
 
3i techso project title
3i techso project title3i techso project title
3i techso project title
 
Latest mca projects 2013
Latest mca projects 2013Latest mca projects 2013
Latest mca projects 2013
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
 
IEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's listIEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's list
 
2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects
 
Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14
 
2013 and 2014 ieee projects list
2013 and 2014 ieee projects list2013 and 2014 ieee projects list
2013 and 2014 ieee projects list
 
Java 2015
Java 2015Java 2015
Java 2015
 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project list
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects list
 
Dotnet 2014 15
Dotnet 2014 15Dotnet 2014 15
Dotnet 2014 15
 
2014 list
2014 list2014 list
2014 list
 
JAVA IEEE -2015
JAVA IEEE -2015JAVA IEEE -2015
JAVA IEEE -2015
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015
 
Dotnet ieee 2014, completed list(gy)
Dotnet ieee 2014, completed list(gy)Dotnet ieee 2014, completed list(gy)
Dotnet ieee 2014, completed list(gy)
 
Java projects 2013 14
Java projects 2013 14Java projects 2013 14
Java projects 2013 14
 
Java titles 2017 2018
Java titles 2017 2018Java titles 2017 2018
Java titles 2017 2018
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

IEEE 2014 Title's list for CSC

  • 1. IEEE 2014 PROJECTS CLOUD COMPUTING CODE TITLES GC001 A combinatorial auction-based mechanism for dynamic vm provisioning and allocation in clouds GC002 A Hyper-Heuristic Scheduling Algorithm for Cloud GC003 Adaptive Algorithm for Minimizing Cloud Task Length with Prediction Errors GC004 Analysis, Modeling and Simulation of Workload Patterns in a Large-Scale Utility Cloud GC005 Cloud migration research: a systematic review GC006 Compatibility-aware Cloud Service Composition Under Fuzzy Preferences of Users GC007 Deadline based Resource Provisioning and Scheduling Algorithm for Scientific Workflows on Clouds GC008 Decreasing Impact of SLA Violations A Proactive Resource Allocation Approach for Cloud Computing Environments GC009 Dynamic cloud pricing for revenue maximization GC010 Hybrid attribute and re-encryption based key management for secure and scalable mobile applications in clouds
  • 2. GC011 Integrity for join queries in the cloud GC012 Is the same instance type created equal? Exploiting heterogeneity of public clouds GC013 Multi objective Game Theory-based Schedule Optimization for Bags-of-Tasks on Hybrid Clouds GC014 Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud GC015 Performance and cost evaluation of an adaptive encryption architecture for cloud database services GC016 Probabilistic consolidation of virtual machines in self-organizing cloud data centers GC017 QoS-Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment GC018 Scalable Analytics for IaaS Cloud Availability GC019 Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers GC020 Transformation-based Monetary Cost Optimizations for Workflows in the Cloud GC021 Virtualization Technology for TCPIP Offload Engine GC022 Workload-Aware Credit Scheduler for Improving Network IO Performance in Virtualization Environment
  • 3. DATA MINING CODE TITLES GD001 A two-level topic model towards knowledge discovery from citation networks GD002 Accuracy-constrained privacy-preserving access control mechanism for relational data GD003 Active learning without knowing individual instance labels: a pair wise label homogeneity query approach GD004 An automated framework for incorporating news into stock trading strategies GD005 Classifier ensembles with the extended space forest GD006 Core: a context-aware relation extraction method for relation completion GD007 Data mining with big data GD008 Effectively indexing the multidimensional uncertain objects GD009 Efficient ranking on entity graphs with personalized relationships GD010 Extended sub tree: a new similarity function for tree structured data GD011 Fast nearest neighbor search with keywords GD012 Identity protection in sequential releases of dynamic networks GD013 Improving activity recognition by segmental pattern mining
  • 4. GD014 Local Thresholding in general network graphs GD015 Multi comm.: finding community structure in multi-dimensional networks GD016 Online feature selection and its applications GD017 Robust perceptual image hashing based on ring partition and nmf GD018 Searching dimension incomplete databases DISTRIBUTED SYSTEM CODE TITLES GDS01 A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices GDS02 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks GDS03 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems GDS04 A Survey of Performance Modeling and Simulation Techniques for Accelerator- based Computing GDS05 Achieving Asymmetric Sensing Coverage for Duty Cycled Wireless Sensor Networks GDS06 An Iterative Method for Calculating Robust Rating Scores
  • 5. GDS07 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions GDS08 Bit Torrent Locality and Transit Traffic Reduction When, Why, and at What Cost GDS09 BURSE A Bursty and Self-similar Workload Generator for Cloud Computing GDS10 Cooperative Positioning and Tracking in Disruption Tolerant Networks GDS11 D2P Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management GDS12 Data Gathering with Compressive Sensing in Wireless Sensor Networks A Random Walk Based Approach GDS13 Distributed Sensing for High-Quality Structural Health Monitoring using WSNs GDS14 Distributed Smart-home Decision-making in a Hierarchical Interactive Smart Grid Architecture GDS15 Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing GDS16 Efficient Range-Based Storage Management for Scalable Data stores GDS17 Efficient Virtual Backbone Construction without a Common Control Channel in Cognitive Radio Networks GDS18 Enhancing Internet-scale Video Service Deployment Using Microblog-based Prediction GDS19 Free Market of Crowd sourcing Incentive Mechanism Design for Mobile Sensing GDS20 Impact of Brooks-Iyengar Distributed Sensing Algorithm on Real Time Systems
  • 6. GDS21 Improving Update-Intensive Workloads on Flash Disks Through Exploiting Multi- Chip Parallelism GDS22 KASR A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Application GDS23 Maximizing the Throughput of Hash Tables in Network Devices with Combined SRAMDRAM Memory GDS24 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce GDS25 Omni directional Coverage for Device-free Passive Human Detection GDS26 Order-Optimal Information Dissemination in MANETs via Network Coding GDS27 OTrack Towards Order Tracking for Tags in Mobile RFID System GDS28 Parallel Simulation of Complex Evacuation Scenarios with Adaptive Agent Models GDS29 Performance-Oriented Partitioning for Task Scheduling of Parallel Reconfigurable Architectures GDS30 Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph GDS31 Signature Searching in a Networked Collection of Files GDS32 Social-Aware Replication in Geo-Diverse Online Systems GDS33 SPOC A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency GDS34 TAMES A Truthful Double Auction for Multi-Demand Heterogeneous Spectrums
  • 7. GDS35 Time Synchronization Based on Slow-Flooding in Wireless Sensor Networks GDS36 TMC Exploiting Trajectories for Multicast in Sparse Vehicular Networks GDS37 Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds GDS38 Web Service Recommendation via Exploiting Location and QoS Information MOBILE COMPUTING CODE TITLES GM001 A Two-Phase Dispatch Heuristic to Schedule the Movement of Multi-Attribute Mobile Sensors in a Hybrid Wireless Sensor Network GM002 An Automatic, Robust, and Efficient Multi-User Breadcrumb System for Emergency Response Applications GM003 Calibrating Indoor Positioning Systems GM004 Capacitive Touch Communication A Technique to Input Data through Devices' Touch Screen GM005 Data Retrieval Scheduling for Multi-Item Requests in Multi-Channel Wireless Broadcast Environments GM006 DOTS A Propagation Delay-Aware Opportunistic MAC Protocol for Mobile Underwater Networks
  • 8. GM007 Efficient Authentication for Mobile and Pervasive Computing GM008 Efficient Rekeying Framework for Secure GM009 Evaluating Service Disciplines for On-Demand Mobile Data Collection in Sensor Networks GM010 Face-to-Face Proximity Estimation Using Bluetooth on Smart phones GM011 Investigating the Privacy versus Forwarding Accuracy Tradeoff in Opportunistic Interest-Casting GM012 Minimum Latency Multiple Data MULE Trajectory Planning in Wireless Sensor Networks GM013 Opportunistic Channel Sharing in Cognitive Radio Networks GM014 Optimizing Spatial and Temporal Reuse in Wireless Networks by Decentralized Partially Observable Markov Decision Processes GM015 Profiling aquatic diffusion process using robotic sensor networks GM016 Radio Resource Allocation and Green Operation for Mobile Access Networks Based on Radio-over-Fiber GM017 RF-Sensing of Activities from Non-Cooperative Subjects in Device-Free Recognition Systems Using Ambient and Local Signals GM018 Security Analysis of Handover Key Management in 4G LTESAE Networks GM019 Two-Tier Het Nets with Cognitive Femto cells Downlink Performance Modeling and Analysis in a Multichannel Environment
  • 9. GM020 White Rate A Context-Aware Approach to Wireless Rate Adaptation NETWORK SECURITY CODE TITLES GNS01 A Computational Dynamic Trust Model for User Authorization GNS02 A Large-Scale Study of the Time Required to Compromise a Computer System GNS03 A Note On Orchestrating an Ensemble of Map Reduce Jobs for Minimizing Their Make span GNS04 A Random Decision Tree Framework for Privacy-preserving Data Mining GNS05 Analysis of field data on web security vulnerabilities GNS06 Cipher SXRay Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution GNS07 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel GNS08 Continuous and Transparent User Identity Verification for Secure Internet Services GNS09 Control Flow-based Malware Variant Detection GNS10 Effective Risk Communication for Android Apps GNS11 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
  • 10. GNS12 Efficient Tagging of Remote Peers During Child Pornography Investigations GNS13 Enforcing Obligations within Relational Database Management Systems GNS14 Evaluation of Web Security Mechanisms using Vulnerability and Attack Injection GNS15 Extending the Agile Development Approach to Develop Acceptably Secure Software GNS16 Fault-Tolerant Network Interfaces for Networks-on-Chip GNS17 Generating Summary Risk Scores for Mobile Applications GNS18 HBFT Speculative Byzantine Fault Tolerance With Minimum Cost GNS19 Hiding in the Mobile Crowd Location Privacy through Collaboration GNS20 Human Effects of Enhanced Privacy Management Models GNS21 Hyper Check A Hardware-Assisted Integrity Monitor GNS22 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System GNS23 k-Zero Day Safety A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities GNS24 Meeting Cardinality Constraints in Role Mining GNS25 MFTS A Multi-level Fault-tolerant Archiving Storage with Optimized Maintenance Bandwidth
  • 11. GNS26 MINT A Reliability Modeling Framework for Energy-Efficient Parallel Disk Systems GNS27 MOSES Supporting and Enforcing Security Profiles on Smart phones GNS28 On the Hardness of Adding Non masking Fault Tolerance GNS29 PPTP Privacy-Preserving Traffic Padding in Web-Based Applications GNS30 PRGA Privacy-preserving Recording & Gateway-assisted Authentication of Power Usage Information for Smart Grid GNS31 Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud GNS32 Private Searching on Streaming Data Based on Keyword Frequency GNS33 Pushing Java Type Obfuscation to the Limit GNS34 Secure Ordered Bucketization GNS35 Security Analysis and Related Usability of Motion-based CAPTCHAs Decoding Code words in Motion GNS36 SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design GNS37 Software-Level Approaches to Implementing Fault-Tolerant Systems on Coarse- Grained Reconfigurable Architecture GNS38 STARS A Statistical Traffic Pattern Discovery System for MANETs
  • 12. NETWORKING CODE TITLES GN001 A Study on the Performance of a Three-Stage Load-Balancing Switch GN002 Algorithms for Enhanced Inter-Cell Interference Coordination (eICIC) in LTE HetNets GN003 An Urn Occupancy Approach for Modeling the Energy Consumption of Distributed Beaconing GN004 AP Association for Proportional Fairness in Multi rate WLANs GN005 Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks GN006 Fast Regular Expression Matching Using Small TCAM GN007 Graceful Convergence in Link-State IP Networks A Lightweight Algorithm Ensuring Minimal Operational Impact GN008 Green Networking With Packet Processing Engines Modeling and Optimization GN009 ISP-Friendly Live P2P Streaming GN010 Joint Routing and Medium Access Control in Fixed Random Access Wireless Multi hop Networks GN011 Learning-Based Uplink Interference Management in 4G LTE Cellular Systems GN012 Max-Weight Scheduling in Queuing Networks with Heavy-Tailed Traffic
  • 13. GN013 Multipath Wireless Network Coding An Augmented Potential Game Perspective GN014 On Sample-Path Optimal Dynamic Scheduling for Sum-Queue Minimization in Forests GN015 On the Multiple Uncast Capacity of 3-Source, 3-Terminal Directed Acyclic Networks GN016 Optimal Wave banding in WDM Ring Networks GN017 Optimally Adaptive Power-Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System GN018 Optimization Decomposition for Scheduling and System Configuration in Wireless Networks GN019 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System GN020 Reliable and Timely Event Notification for Publish Subscribe Services Over the Internet GN021 Retransmission Delays with Bounded Packets Power-Law Body and Exponential Tail GN022 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks GN023 Temporal Traffic Dynamics Improve the Connectivity of Ad Hoc Cognitive Radio Networks GN024 The Wide-Area Virtual Service Migration Problem A Competitive Analysis Approach
  • 14. SOFTWARE ENGNEERING CODE TITLES GS001 A Model-Driven Methodology for Developing Secure Data-Management Applications GS002 A Study of Variability Models and Languages in the Systems Software Domain GS003 An Observe-Model-Exercise Paradigm to Test Event-Driven Systems with Undetermined Input Spaces GS004 Analyzing Critical Decision-Based Processes GS005 Automated Fixing of Programs With Contracts GS006 Automatic Summarization of Bug Reports GS007 Conservation of Information Software's Hidden Clockwork GS008 Dealing with traceability in the MDD of model transformations GS009 Effects of developer experience on learning and applying Unit Test-Driven Development GS010 Formulating Cost-Effective Monitoring Strategies for Service-based Systems GS011 Governing Software Process Improvementsin Globally Distributed Product Development GS012 Identifying Code of Individual Features in Client-Side Web Applications GS013 iTree- Efficiently Discovering High-Coverage Configurations Using Interaction Trees
  • 15. GS014 Methodbook- Recommending Move Method Refactorings via Relational Topic Models GS015 Modular Software Model Checking for Distributed Systems GS016 On the Asymptotic Behavior of Adaptive Testing Strategy for Software Reliability Assessment GS017 REPENT Analyzing the Nature of Identifier Renamings GS018 Specification and Verification of Normative Texts using C-O Diagrams GS019 Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings GS020 Supporting the Combined Selection of Model-based Testing Techniques GS021 Symbolic Crosschecking of Data-Parallel Floating-Point Code GS022 Synthesizing Multithreaded Code from Real-Time Object-Oriented Models via Schedulability-Aware Thread Derivation GS023 Task Environment Complexity, Global Team Dispersion, Process Capabilities, and Coordination in Software Development GS024 Usability through Software Design GS025 Variability in Software Systems—A Systematic Literature Review GS026 Verifying Protocol Conformance Using Software Model Checking for the Model- Driven Development of Embedded Systems
  • 16. GS027 You Are the Only Possible Oracle- Effective Test Selection for End Users of Interactive Machine Learning Systems