Follow us on Facebook

Header Ads

Java IEEE Projects 2011

2011- 2012 IEEE Java Project Titles

Online Intrusion Alert Aggregation with Generative Data Stream Modeling.

Embedded Extended Visual Cryptography Schemes

Architecting a Secure Enterprise Data Sharing Environment to the Edge

Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding

A Competitive Study of Cryptography Techniques over Block Cipher.

Analysis on Credit Card Fraud Detection Methods.

Text Clustering with Seeds Affinity Propagation

Clustering with Multi-Viewpoint based Similarity Measure.

On Demand Check Pointing for Grid Application Reliability using Communicating Process Model

Computational Perceptual Features for Texture Representation and Retrieval

Subspace-Based Striping Noise Reduction in Hyper-spectral Images

Ontology Based Business Process Customization for Composite Web Services

Design of p-Cycles for full node protection in WDM Mesh Networks

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

Intrusion detection: An Energy efficient approach in Heterogeneous WSN

Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service

A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service

Analysis of Quality of Object Oriented Systems using Object Oriented Metrics

A new approach for FEC decoding based on the BP algorithm in LTE and Wi-MAX systems

Simplified algorithm on network shortest path problem

Voronoi-based continuous query processing for mobile users

Geographical Routing With Location Service in Intermittently Connected MANETs

Resource Management Using Dynamical Load Prediction and Multiprocessor Cooperation

Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes

Multiple exposure fusion for high dynamic range image acquisition

On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents

Selective Data Stream Blocking Mechanism for Networks

Mobile Sampling of Sensor Field Data Using Controlled Broadcast

Denial of Service Attacks in Wireless Networks: The Case of Jammers

Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks

Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization

A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows

Load Shedding in Mobile Systems with MobiQual

Optimal Bandwidth Assignment for Multiple-Description-Coded Video

Coding for Cryptographic Security Enhancement Using Stopping Sets

Caching Strategies Based on Information Density

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Effective Navigation of Query Results Based on Concept Hierarchies

Nymble- Blocking Misbehaving Users in Anonymizing Networks

Modeling and Detection of Camouflaging Worm

Buffer Sizing for 802.11 Based Networks

SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

Discovering Conditional Functional Dependencies

Ranking Spatial Data by Quality Preferences

Extended XML Tree Pattern Matching: Theories and Algorithms

Cloud Computing for Agent-Based Urban Transportation Systems

Secure and Practical Outsourcing of Linear Programming in Cloud Computing

Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks

ProgME: Towards Programmable Network Measurement

Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks

A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks

Data Leakage Detection

Selfish Overlay Network Creation and Maintenance

A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts

Decision Trees for Uncertain Data

Secret-Fragment-Visible Mosaic Image–A New Computer Art and Its Application to Information Hiding

Locating Equivalent Servants over P2P Networks

Parametric Methods for Anomaly Detection in Aggregate Traffic