JAVA PROJECT TITILES |
1 |
Rate Adaptation in Congested Wireless Networks through Real-Time Measurements (Parallel & Distributed)
|
2 |
Secure Data Objects Replication in Data Grid (Network Security)
|
3 |
On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network (Parallel & Distributed)
|
4 |
Layered Approach Using Conditional Random Fields for Intrusion Detection (Network)
|
5 |
IRM Integrated File Replication and Consistency Maintenance in P2P Systems (Parallel & Distributed)
|
6 |
Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks (Parallel & Distributed)
|
7 |
Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation (Wireless Network)
|
8 |
Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks (Network Security)
|
9 |
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming (Parallel & Distributed)
|
10 |
A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization (Image Processing)
|
11 |
Conditional Shortest Path Routing in Delay Tolerant Networks (Wireless Network)
|
12 |
Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast (Wireless)
|
13 |
Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks (Mobile Computing)
|
14 |
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks (Wireless Network)
|
15 |
MABS: Multicast Authentication Based on Batch Signature (Network Security)
|
16 |
TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Networks (Mobile Computing)
|
17 |
Deriving Concept-Based User Profiles from Search Engine Logs (Data Mining)
|
18 |
Inside the Permutation-Scanning Worms Propagation Modeling and Analysis (Network Security)
|
19 |
Privacy-Conscious Location-Based Queries in Mobile Environments (Parallel Computing)
|
20 |
Achieving Guaranteed Anonymity in GPS Traces via Uncertainty Aware Path Cloaking (Mobile Computing)
|
|
|
21 |
A Competitive Study of Cryptography Techniques over Block Cipher |
22 |
A Dual Framework and Algorithms for Targeted Online Data Delivery |
23 |
A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service |
24 |
A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
|
25 |
A Link-Analysis Extension Of Correspondence Analysis For Mining Relational Databases
|
26 |
A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
|
27 |
A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
|
28 |
Analysis on Credit Card Fraud Detection Methods |
29 |
Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
|
30 |
Clustering with Multi-Viewpoint based Similarity Measure |
31 |
Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
|
32 |
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks |
33 |
Effective Navigation of Query Results Based on Concept Hierarchies |
34 |
Embedded Extended Visual Cryptography Schemes |
35 |
Fast Simulation of services avalibility in mesh network with dynamic path restoration
|
36 |
Going Back and Forth Efficient Multi deployment and Multi snapshotting on Clouds
|
37 |
Intrusion detection An Energy efficient approach in Heterogeneous WSN |
38 |
Live Streaming With Receiver-Based Peer-Division Multiplexing |
39 |
Modeling and Detection of Camouflaging Worm |
40 |
More Secure Steganography Method in Spatial Domain |
41 |
Nymble Blocking Misbehaving Users in Anonymizing Networks |
42 |
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
|
43 |
Optimal Bandwidth Assignment for Multiple Description Coded Video |
44 |
Optimal Stochastic Location Updatees in Mobile Ad Hoc Network |
45 |
Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding
|
46 |
SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
|
47 |
Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
|
48 |
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
|
49 |
Secure High-Throughput Multicast Routing in Wireless Mesh Networks |
50 |
Sketch4Match – Content-based Image Retrieval System Using Sketches |