Java & dotnet


Published on

We are Offering the projects in quality and low price with free projects class and demonstration classes. Further Details visit our website TEMASOLUTION.COM

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Java & dotnet

  1. 1. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : S.NO. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. JAVA & DOTNET SOFTWARE 2013-2014 TITLES TITLES CLOUD COMPUTING ANTELOPE:A Semantic -aware Data Cube Scheme for Cloud Data Center Networks Cost Optimization of Elasticity Cloud Resource Subscription Policy Scalable and Accurate Prediction of Availability of Atomic Web Services Towards Efficient Virtual Appliance Delivery with Minimal Manageable Virtual Appliances AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds Security and Privacy-Enhancing Multi cloud Architectures Toward Secure Multi keyword Top-k Retrieval over Encrypted Cloud Data IMAGE PROCESSING Automatic License Plate Recognition(ALPR): A State-of-the-Art Review Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain Learning-based, automatic 2D-to-3D image and video conversion Pose-Robust Recognition of Low-Resolution Face Images Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting Robust Face Recognition for Uncontrolled Pose and Illumination Changes Strip Features for Fast Object Detection The Use of Automotive Radars in Video-Based Overtaking Assistance Applications What Are We Tracking: A Unified Approach of Tracking and Recognition CODE JD1 JD2 JD3 JD4 JD5 JD6 JD7 JD8 JD9 JD10 JD11 JD12 JD13 JD14 JD15 JD16 Knowledge and Data Engineering 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. Active Learning of Constraints for Semi-Supervised Clustering EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval Identity-Based Secure Distributed Data Storage Schemes Mining Interaction Patterns among Brain Regions by Clustering On-demand Snapshot: An Efficient Versioning File System for Phase-Change Memory A User-Friendly Patent Search Paradigm Finding Probabilistic Prevalent Colocations in Spatially Uncertain Data Sets FoCUS: Learning to Crawl Web Forums JD17 JD18 JD19 JD20 JD21 PMSE: A Personalized Mobile Search Engine JD22 JD23 JD24 JD25 DATAMINING Comparable Entity Mining from Comparative Questions Change Detection in Streaming Multivariate Data Using Likelihood Detectors JD26 JD27 Further more details visit: send your request to :
  2. 2. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. Cutting Plane Training for Linear Support Vector Machines Errata Corrige on “Modeling and Computing Ternary Projective Relations between Regions” Finding Probabilistic Prevalent Colocations in Spatially Uncertain Data Sets Fuzzy Web Data Tables Integration Guided by an Ontological and Terminological Resource Lineage Encoding: An Efficient Wireless XML Streaming Supporting Twig Pattern Queries Mining Order-Preserving Sub matrices from Data with Repeated Measurements Radio Database Compression for Accurate Energy-Efficient Localization in Fingerprinting Systems Range-Based Skyline Queries in Mobile Environments Successive Group Selection for Micro aggregation Supporting Pattern-Preserving Anonymization for Time-Series Data Transfer across Completely Different Feature Spaces via Spectral Embedding TW-k-Means: Automated Two-Level Variable Weighting Clustering Algorithm for Multiview Data A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs A Survival Modeling Approach to Biomedical Search Result Diversification Using Wikipedia Coping with Events in Temporal Relational Databases Efficient All Top-k Computation—A Unified Solution for All Top-k, Reverse Top-k and Top-m Influential Queries Efficient Service Skyline Computation for Composite Service Selection Failure-Aware Cascaded Suppression in Wireless Sensor Networks Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy Optimal Route Queries with Arbitrary Order Constraints Skyline Processing on Distributed Vertical Decompositions Spatial Query Integrity with Voronoi Neighbors SVStream: A Support Vector-Based Algorithm for Clustering Data Streams Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development U-Skyline: A New Skyline Query for Uncertain Databases Answering general time-sensitive queries Creating evolving user profiles automatically Outsourced similarity search on metric data assets Slicing: a new approach for privacy preserving data publishing Tree-based mining for discovering patterns of human interaction in meetings Efficient deduplication techniques for modern backup operation Spark med: A Framework For Dynamic Integration Of Multimedia Medical Further more details visit: send your request to : JD28 JD29 JD30 JD31 JD32 JD33 JD34 JD35 JD36 JD37 JD38 JD39 JD40 JD41 JD42 JD43 JD44 JD45 JD46 JD47 JD48 JD49 JD50 JD51 JD52 JD53 JD54 JD55 JD56 JD57 JD58 JD59
  3. 3. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : 60. 61. 62. Data Into Distributed M-Health Systems Business-Owl (Bowl)—A Hierarchical Task Network Ontology For Dynamic JD60 Business Process Decomposition And Formulation Autonomic placement of mixed batch and transactional workloads JD61 Enabling public audit ability and data dynamics for storage security in cloud JD62 computing DEPENDABLE AND SECURE COMPUTING 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. Securing Class Initialization in Java-like Languages SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems Unprivileged Black-Box Detection of User-Space Key loggers The Foundational Work of Harrison Ruzzo-Ullman Revisited To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks Non-Cooperative Location Privacy On Inference-Proof View Processing of XML Documents Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing Malware Clearance for Secure Commitment of OS-Level Virtual Machines Warning Bird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream A System for Timely and Controlled Information Sharing in Emergency Situations On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections Riht: a novel hybrid ip trace back scheme On the security and efficiency of content distribution via network coding Risk-aware mitigation for manet routing attacks A new secure route discovery protocol JD63 JD64 JD65 JD66 JD67 JD68 JD69 JD70 JD71 JD72 JD73 JD74 JD75 JD76 JD77 JD78 JD79 PARALLEL AND DISTRIBUTED SYSTEMS 80. 81. 82. 83. 84. 85. 86. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing Finite-Difference Wave Propagation Modeling on Special-Purpose Dataflow Machines Heterogeneous Resource Allocation under Degree Constraints Hypo comb: Bounded-Degree Localized Geometric Planar Graphs for Wireless Ad Hoc Networks Lightweight Location Verification Algorithms for Wireless Sensor Networks Link Scheduling for Exploiting Spatial Reuse in Multi hop MIMO Networks Lower and Upper Bounds for Multicasting under Distance Dependent Further more details visit: send your request to : JD80 JD81 JD82 JD83 JD84 JD85 JD86
  4. 4. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. Forwarding Cost Functions PASQUAL: Parallel Techniques for Next Generation Genome Sequence Assembly Retrieving Smith-Waterman Alignments with Optimizations for Mega base Biological Sequences Using GPU Scalable and Accurate Graph Clustering and Community Structure Detection Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks Survey of Energy-Cognizant Scheduling Techniques A Fast RPC System for Virtual Machines A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization Attached-RTS: Eliminating an Exposed Terminal Problem in Wireless Networks Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks Efficient Resource Mapping Framework over Networked Clouds via Iterated Local Search-Based Request Partitioning Electricity Cost Saving Strategy in Data Centers by Using Energy Storage ESWC: Efficient Scheduling for the Mobile Sink in Wireless Sensor Networks with Delay Constraint Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Optimal Multi server Configuration for Profit Maximization in Cloud Computing Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior Runtime Contention and Bandwidth-Aware Adaptive Routing Selection Strategies for Networks-on-Chip Scaling Laws of Cognitive Ad Hoc Networks over General Primary Network Models Sensor Network Navigation without Locations SyRaFa: Synchronous Rate and Frequency Adjustment for Utilization Control in Distributed Real-Time Embedded Systems A Privacy Leakage Upper Bound Constraint-Based Approach for CostEffective Privacy Preserving of Intermediate Data Sets in Cloud A Truthful Dynamic Workflow Scheduling Mechanism for Commercial Multi cloud Environments Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Error-Tolerant Resource Allocation and Payment Minimization for Cloud Further more details visit: send your request to : JD87 JD88 JD89 JD90 JD91 JD92 JD93 JD94 JD95 JD96 JD97 JD98 JD99 JD100 JD101 JD102 JD103 JD104 JD105 JD106 JD107 JD108 JD109 JD110
  5. 5. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : 111. 112. 113. 114. 115. 116. 117. 118. 119. 120. 121. 122. 123. 124. 125. 126. 127. 128. 129. 130. 131. 132. 133. 134. 135. System Improving Data Center Network Utilization Using Near-Optimal Traffic Engineering Managing Overloaded Hosts for Dynamic Consolidation of Virtual Machines in Cloud Data Centers under Quality of Service Constraints Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud A New Disk I/O Model of Virtualized Cloud Environment Per-Flow Queue Management with Succinct Priority Indexing Structures for High Speed Packet Scheduling Performance Enhancement for Network I/O Virtualization with Efficient Interrupt Coalescing and Virtual Receive-Side Scaling POVA: Traffic Light Sensing with Probe Vehicles Self-Adaptation-Based Dynamic Coalition Formation in a Distributed Agent Network: A Mechanism and a Brief Survey Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems MOBILE COMPUTING A MAC Sensing Protocol Design for Data Transmission with More Protection to Primary Users A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks Analytical Framework for WLAN-Cellular Voice Handover Evaluation Bounded-Hop Energy-Efficient Liveness of Flocking Swarms Content Sharing over Smartphone-Based Delay-Tolerant Networks Contention-Based Estimation of Neighbor Cardinality Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space Modeling and Restraining Mobile Virus Propagation On Random Access Scheduling for Multimedia Traffic in Multi hop Wireless Networks with Fading Channels On Using Interference-Aware Spectrum Sensing for Dynamic Spectrum Access in Cognitive Radio Networks Passive Measurement of Interference in Wi-Fi Networks with Application in Misbehavior Detection Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks Robust Distributed Power Control in Cognitive Radio Networks Video On-Demand Streaming in Cognitive Wireless Mesh Networks Further more details visit: send your request to : JD111 JD112 JD113 JD114 JD115 JD116 JD117 JD118 JD119 JD120 JD121 JD122 JD123 JD124 JD125 JD126 JD127 JD128 JD129 JD130 JD131 JD132 JD133 JD134 JD135
  6. 6. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : 136. 137. 138. 139. 140. 141. 142. 143. 144. 145. 146. 147. 148. 149. 150. 151. 152. 153. 154. 155. 156. 157. 158. 159. 160. 161. Cross-Layer Minimum-Delay Scheduling and Maximum-Throughput Resource Allocation for Multiuser Cognitive Networks DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Distributed Cooperation and Diversity for Hybrid Wireless Networks Effective Carrier Sensing in CSMA Networks under Cumulative Interference Estimation of Task Persistence Parameters from Pervasive Medical Systems with Censored Data Geometry-Assisted Localization Algorithms for Wireless Networks Joint Physical-Layer and System-Level Power Management for DelaySensitive Wireless Communications Novel Design and Analysis of Aggregated ARQ Protocols for IEEE 802.11n Networks Probability-Based Prediction and Sleep Scheduling for Energy-Efficient Target Tracking in Sensor Networks Spatial Distribution and Channel Quality Adaptive Protocol for Multi hop Wireless Broadcast Routing in VANET TCP CRAHN: A Transport Control Protocol for Cognitive Radio Ad Hoc Networks Tula: Balancing Energy for Sensing and Communication in a Perpetual Mobile System UACAP: A Unified Auxiliary Channel Authentication Protocol Uplink Power Control via Adaptive Hidden-Markov-Model-Based Path loss Estimation Distributed Cooperative Caching in Social Wireless Networks Network-Assisted Mobile Computing with Optimal Uplink Query Processing DSS: Distributed SINR-Based Scheduling Algorithm for Multi hop Wireless Networks Toward Accurate Mobile Sensor Network Localization in Noisy Environments On the Forwarding Performance under Heterogeneous Contact Dynamics in Mobile Opportunistic Networks Path Selection under Budget Constraints in Multi hop Cognitive Radio Networks Predicting Human Movement Based on Telecom’s Handoff in Mobile Networks Deployment of a Connected Reinforced Backbone Network with a Limited Number of Backbone Nodes Measurement-Based Design of Roadside Content Delivery Systems Understanding the Information Propagation Speed in Multi hop Cognitive Radio Networks Underwater Localization with Time-Synchronization and Propagation Speed Uncertainties A Spectrum Switching Delay-Aware Scheduling Algorithm for Centralized Further more details visit: send your request to : JD136 JD137 JD138 JD139 JD140 JD141 JD142 JD143 JD144 JD145 JD146 JD147 JD148 JD149 JD150 JD151 JD152 JD153 JD154 JD155 JD156 JD157 JD158 JD159 JD160 JD161
  7. 7. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-8680802110 Web : email : 162. 163. 164. 165. 166. 167. 168. 169. 170. 171. 172. 173. 174. 175. Cognitive Radio Networks Adaptive Duty Cycle Control with Queue Management in Wireless Sensor Networks Maximizing Rendezvous Diversity in Rendezvous Protocols for Decentralized Cognitive Radio Networks Predictable Mobile Routing for Spacecraft Networks Proteus: Multi flow Diversity Routing for Wireless Networks with Cooperative Transmissions A Progressive Approach to Reducing Data Collection Latency in Wireless Sensor Networks with Mobile Elements Nuzzer: A Large-Scale Device-Free Passive Localization System for Wireless Environments A Traffic-Aware Channel and Rate Reassignment Algorithm for Wireless Mesh Networks Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective A Robust Indoor Pedestrian Tracking System with Sparse Infrastructure Support Scheduling Partition for Order Optimal Capacity in Large-Scale Wireless Networks Low-Complexity Class-Based Scheduling Algorithm for Scheduled Automatic Power-Save Delivery for Wireless LANs United We Stand: Intrusion Resilience in Mobile Unattended WSNs Studying Smartphone Usage: Lessons from a Four-Month Field Study On Power and Throughput Tradeoffs of Wi-Fi and Bluetooth in Smartphone’s Further more details visit: send your request to : JD162 JD163 JD164 JD165 JD166 JD167 JD168 JD169 JD170 JD171 JD172 JD173 JD174 JD175