Você está na página 1de 4

IEEE 2012 PROJECTS

S.NO. LSJ120 1 LSJ120 2 LSJ120 3 LSJ120 4 LSJ120 5 LSJ120 6 LSJ120 7 LSJ120 8 LSJ120 9 LSJ121 0 LSJ121 1 LSJ121 2 LSJ121 3 LSJ121 4 LSJ121 5 LSJ121 6 LSJ121 7 LSJ121 8 LSJ121 9 LSJ122 0 Project Title A Network Coding Equivalent Content Distribution Scheme For Efficient Peer To Peer Interactive Vod Streaming An Optimizing Overlay Topologies For Search In Unstructed Peer To Peer Networks Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences Cloud Data Production for Masses Clustering With Multi View Point Based Similarity Measure Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage Distributed Packet Buffers For High Band Width Switches & Routers Efficient Fuzzy Type A Head Search In Xml Data Fast Data Collection in Tree-Based Wireless Sensor Networks. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks Game-Theoretic Pricing for Video Streaming in Mobile Networks Hand Written Chinese Text Recognition By Integrating Multiple Contexts In Tags We Trust: Trust modeling in social tagging of multimedia content Learn to Personalized Image Search from the Photo Sharing Websites
MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS

DOMINE Parallel & Distributed Systems Parallel & Distributed Systems Knowledge & Data Engineering Cloud Computing Knowledge & Data Engineering Parallel & Distributed Systems Parallel & Distributed Systems Knowledge & Data Engineering Mobile Computing Parallel & Distributed Systems Mobile Computing Pattern Analysis & Machine Intelligence Signal Processing Multimedia Knowledge & Data Engineering Secure Computing Knowledge & Data Engineering Networking Secure Computing Knowledge & Data Engineering

TEC H JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA

Online Modeling of Proactive Moderation System for Auction Fraud Detection Organizing User Search Histories Packet Loss Control Using Tokens at the Network Edge Packet-Hiding Methods for Preventing Selective Jamming Attacks Ranking Model Adaptation for Domain-Specific Search

IEEE 2012 PROJECTS


LSJ122 1 LSJ122 2 LSJ122 3 LSJ122 4 LSJ122 5 LSJ122 6 LSJ122 7 LSJ122 8 LSJ122 9 Risk-Aware Mitigation for MANET Routing Attacks Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks Slicing: A New Approach to Privacy Preserving Data Publishing Ensuring Distributed Accountability For Data Sharing In The Cloud. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks Catching Packet Droppers and Modifiers in Wireless Sensor Networks Energy-Efficient Cooperative Distribution with Statistical QoS Provisions Video Over Wireless Networks CCD A Distributed Publish Subscribe Framework for Rich Content Format Secure Computing Mobile Computing Knowledge & Data Engineering Secure Computing Networking Networking Parallel & Distributed Systems Networks Parallel & Distributed Systems JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA

IEEE 2012 PROJECTS


S.No. LSD120 1 LSD120 2 LSD120 3 LSD120 4 LSD120 5 LSD120 6 LSD120 7 LSD120 8 LSD120 9 LSD121 0 LSD121 1 LSD121 2 LSD121 3 LSD121 4 LSD121 5 LSD121 6 LSD121 7 Project Title A New Cell Counting Based Attack Against Tor. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks. Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points. Design and Implementation of TARF: A TrustAware Routing Framework for WSNs. Query Planning for Continuous Aggregation Queries Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms. Robust Face-Name Graph Matching for Movie Character Identify. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attributebased Encryption Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for MobileHealthcare Emergency Topology control in mobile ad hoc networks with cooperative communications Secure And Efficient Handover Authentication Based On Bilinear Pairing Functions Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs Latency Equalization as a New Network Service Primitive Fair Torrent A Deficit Based Distributed Algorithm to Ensure Fairness in peer to peer Systems DOMINE Networking Wireless Communications Image Processing Image processing Secure Computing Data Mining Networking Image Processing Cloud computing International Conference Image processing Parallel & Distributed Systems Mobile Computing Secure Computing Parallel & Distributed Systems Networking Networking TEC H .NET .NET .NET .NET .NET .NET .NET .NET .NET .NET .NET .NET .NET .NET .NET .NET .NET

IEEE 2012 PROJECTS

Você também pode gostar