Sei sulla pagina 1di 11

JAVA

TECHNOLOGY: JAVA

DOMAIN: IEEE: TRANSACTIONS ON NETWORKING

1) Lightweight Online Performance Monitoring And Tuning With Embedded Gossip.

2) Eventual Clustered: A Modular Approach To Designing Protocols In MANETs.

3) On the Fly Estimation Of The Processes That Are Alive In An Asynchronous Message Passing
System.

4) A Case For Continuous Data Protection At Block Level In Disk Array Storages.

5) Using Data Accessibility For Resource Selection In Large Scale Distributed System.

6) Multipath Dissemination In Regular Mesh Topologies.

7) Privacy-Aware Collaborative Spam Filtering.

8) Dynamic Search Algorithm In Unstructured Peer-To-Peer Networks.

9) A Decentralized Method For Scaling Up Genome Similarity Search Services.

10) An Efficient Adaptive Transmission Control Scheme For Large-Scale Distributed Simulation
Systems.

11) Plexus: A Scalable Peer-To-Peer Protocol Enabling Efficient Subset Search.

12) Detecting Malicious Packet Losses.

13) Cooperative Secondary Authorization Recycling.

14) Robust Rate Control For Heterogeneous Network Access In Multihomed Environments.

15) Optimizing The Throughput Of Data-Driven Peer-To-Peer Streaming.

16) Quiver: Consistent Object Sharing For Edge Services.

17) A Model-Based Approach To Evaluation Of The Efficacy Of FEC Coding In Combating


Network Packet Losses.

18) Performance Of A Speculative Transmission Scheme For Scheduling-Latency Reduction.

19) Two Techniques For Fast Computation Of Constrained Shortest Paths.


20) Designing Less-Structured P2P System For The Expected High Churn.

TECHNOLOGY: JAVA

DOMAIN: IEEE:TRANSACTIONS ON DATA MINING

1) Interactive Correction And Recommendation For Computer Language Learning And Training.

2) Monitoring Online Tests Through Data Visualization.

3) Effective Collaboration With Information Sharing In Virtual Universities.

4) GLIP: A Concurrency Control Protocol For Clipping Indexing.

5) Catching The Trend: A Framework For Clustering Concept-Drifting Categorical Data.

6) IMine: Index Support For Item Set Mining.

7) Progressive Parametric Query Optimization.

8) Efficient Processing Of Metric Skyline Queries.

9) Comparing Scores Intended For Ranking.

10) CDNs Content Outsourcing Via Generalized Communities.

11) Truth Discovery With Multiple Conflicting Information Providers On The Web.

12) Online Index Recommendation For High-Dimensional Database Using Query Workload.

13) C-TREND: Temporal Cluster Graphs For Identifying And Visualizing Trends In Multiattribute
Transactional Data.

14) A Signature-Based Indexing Method For Efficient Content-Based Retrieval Of Relative


Data’s.

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON NETWORK SECURITY

1) SAT-Solving Approaches To Context-Aware Enterprise Network Security Management.

2) Mitigating Denial-Of-Service Attacks On The Chord Overlay Network: A Location Hiding


Approach.

3) A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme For


Heterogeneous Sensor Networks.
4) Efficient Node Admission And Certificate Less Secure Communication In Short-Lived
MANETs.

5) Dynamic Routing With Security Considerations.

6) A Precise Termination Condition Of The Probabilistic Packet Marking Algorithm.

7) Efficient And Secure Content Processing And Distribution By Cooperative Intermediaries.

8) Security In Large Networks Using Mediator Protocols.

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING

1) Maturing Software Engineering Knowledge Through Classifications: A Case Study On Unit


Testing Techniques.

2) Carving And Raplaying Differential Unit Test Cases From System Test Cases.

3) Atomicity Analysis Of Service Composition Across Organizations.

4) Engineering Privacy.

5) Optimized Resource Allocation For Software Release Planning.

6) Using The Conceptual Cohesion Of Classes For Fault Prediction In Object-Oriented Systems.

7) Call-Stack Coverage For GUI Test Suite Reduction.

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON IMAGE PROCESSING

1) PCA-Based Spatially Adaptive Denoising Of CFA Images For Single-Sensor Digital Cameras.

2) A No-Reference Objectives Images Sharpness Metric Based On The Notion Of Just Noticeable
Blur (JNB)

3) Bayesian Image Recovery For Dendritic Structures Under Low Signal-To-Noise Conditions.

4) Empirical Capacity Of A Recognition Channel For Single-And Multipose Object Recognition


Under The Constraint Of PCA Encoding.

5) High-Fidelity DTA Embedding For Image Annotation.

6) Image Restoration Using Space Variant Gaussiin Scale Mixtures In Over Complete Pyraminds.
7) Incremental Learning Of Chunk Data For Online Pattern Classification Systems.

8) Nonnegative Matrix Actorization In Polynomial Feature Space.

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS MOBILE COMPUTING

1) Message Authentication In Computationally Constrained Environments.

2) Wardrop Routing In Wireless Networks.

3) A Tabu Search Algorithm For Cluster Building In Wireless Sensor Networks.

4) Efficient Broadcasting Mobile Ad Hoc Networks.

5) Headlight Prefetching And Dynamic Chaining For Cooperative Media Atreaming In Mobile
Environments.

6) Location-Based Spatial Query Processing In Wireless Broadcast Environment.

7) Mitigating Performance Degradation In Congested Sensor Network.

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON GRID COMPUTING

1) Bi-Criteria Scheduling Of Scientific Grid Workflows.

2) Eight Times Acceleration Of Geospatial Data Archiving And Distribution Grids And
Distribution On The Grids.

3) TCP Performance In Flow-Based Mix Networks: Modeling And Analysis.

4) Cooperative Secondary Authorization Recycling.

5) Adaptive Task Check Pointing And Replication Toward Efficient Fault-Tolerant Grids.

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON MULTIMEDIA

1) Segmentation-Driven Image Fusion Based On Alpha-Stable Modeling Of Wavelet


Coefficients.

2) Structured Networks Coding And Cooperative Wireless Ad-Hoc Peer-To-Peer Repair For
WWAN Video Broadcast.
3) Unseen Visible Watermarking: A Novel Methodology For Auxiliary Information Delivery Via
Visual Contents.

4) Investigating The Scheduling Sensitivity Of P2P Video Streaming: An Experimental Study.

5) Using Visual Context And Region Semantics For High-Level Concept Detection.

TECHNOLOGY: JAVA

DOMAIN: NON-IEEE BASED PROJECTS.

1) On-Line Java Complier With Security Editor.

2) Client Server Communication Using Multi-Tasking-Socket.

3) Bit-Plane Complexity Segmentation Steganography In Internet.

4) Self-Interested Routing In Online Environments.

5) Data Transmission Using Implicit And Explicit Quantum Cryptography.

6) Video Streaming In Multiple System.

7) Data Transmit Ion Using RMI

8) Data Management System Using Proxies.

9) Efficient Data Transferring Using TCP/IP.

10) Data Security Using Cryptography And Steganography.

TECHNOLOGY: J2EE

DOMAIN: IEEE TRANSACTIONS

1) Clustering And Sequential Pattern Mining Of Online Collaborative Learning Data.

2) Effect Of Contact Information On The Credibility Of Online Health Information.

3) Enterprise Ontologies For Planning And Integration Of Business: A Pragmatic Approach.

4) A Semantically Enriched Clinical Guideline Model Enabling Deployment In Heterogeneous


Healthcare Environment.

5) Improving Personalization Solutions Through Optimal Segmentation Of Customer Bases.

6) RFID-Enabled Discovery Of Supply Networks.


7) An Efficient And Effective Personalized Recommender System Of TV Programs.

8) Guest Editors’ Introduction: Knowledge And DTA Engineering For E-Learning.

9) The Strategic Implications Of Web Technologies: A Process Model Of How Web Technologies
Enhances Organizational Performance.

10) Wada Service: An Extension Of DICOM WADO Service.

TECHNOLOGY: J2EE

DOMAIN: NON- IEEE BASESD PROJECTS

1) Examination Result Management System.

2) Global Web Rating

3) Online Employment Scheme

4) Online Application Test For Agent.

5) Online Share Trading.

6) Online Examination For Recruitment Process.

7) Online Insurance Management System.

8) Computer Purchase Expert.

9) Online Auction And Time Bid Watching.

10) Attraction Of Customers Using Customer Relationship Management.

TECHNOLOGY: DOTNET

DOMAIN: IEEE TRANSACTIONS ON NETWORKING

1) Sharing Memory Between Byzantine Processes Using Policy-Enforced Tuple Space.

2) Histogram-Based Global Load Balancing In Structured Peer-To-Peer Systems.

3) A Trace-Driven Approach To Evaluate The Sclability Of P2p-Based Video-On-Demand Service.

4) Heuristic Discovery Of Role-Based Trust Chains In Peer-To-Peer Networks.

5) Reputation-Based Resource Allocation In P2P System Of Rational Users.


6) Effect Of Network Quality On Player Departure Behavior In Online Games.

7) A Parameterized Approach To Spam-Resilient Link Analysis Of The Web

8) On The Time Synchronization Of Distributed Log Files In Network With Local Broadcast
Media.

9) Measuring Capacity Bandwidth Of Targeted Path Segments.

10) A Distributed Algorithm For Finding All Best Swap Edges Spanning Tree.

11) Effective Collaboration With Information Sharing In Virtual Universities.

12) Node-Capability-Aware Replica Management For Peer-To-Peer Grids.

13) The Globus Replica Location Service: Deign And Experience

14) Enhancing Downlink Performance In Wireless Networks By Simultaneous Multiple Packet


Transmission

15) Network-Coding-Based Signal Recovery For Efficient Scheduling In Wireless Networks.

16) Probabilistic Packet Marking For Large-Scale IP Trace Back.

17) Efficient Broadcasting Using Store-Mix-Forward Method.

18) Incentive-Based Scheduling For Market-Like Computational Grids.

19) Rateless Forward Error Correction For Topology-Transparent Scheduling.

20) Minimizing File Download Time In Stochastic Peer-To-Peer Networks.

21) Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data.

TECHNOLOGY: DONET

DOMAIN: IEEE TRANSACTIONS ON DATA MINING

1) Optimal Lot Sizing Policies For Sequential Online Auctions.

2) Monitoring Online Tests Through Data Visualization

3) Distributional Features For Text Categorization

4) Communities And Emerging Semantics In Semantic Link Network: Discovery And Learning.

5) Storing And Indexing Spatial Data In P2P System.


6) Detecting: Assessing And Monitoring Relevant Topics In Virtual Information Environments.

7) Mood Recognition During Online Self-Assessment Tests.

8) Predicting Missing Items In Shopping Carts.

9) Rough Cluster Quality Index Based On Decision Theory.

10) Ranking And Suggesting Popular Items.

11) A Cost-Based Approach To Adaptive Resource Management In Data Stream System.

12) Watermarking Relational Database Using Optimization-Based Techniques.

13) Rough Sets-Based Search Engine For Grid Service Discovery.

14) Analyzing And Managing Role-Based Access Control Policies.

15) Hardware-Enhanced Association Rule Mining With Hashing And Pipelining.

TECHNOLOGY: DONET

DOMAIN: IEEE TRANSACTIONS ON NETWORK SECURITY

1) Enhanced Security For Online Exams Using Group Cryptography.

2) The Effectiveness Of Checksums For Embedded Control Networks.

3) Internet And Online Information Privacy: An Exploratory Study Of Preteens And Early Teens.

4) A Large- Scale Hidden Semi-Markov Model For Anomaly Detection On User Browsing
Behaviors.

5) A Secure Mobile Healthcare System Using Trust-Based Multicast Scheme.

6) Credit Card Fraud Detection Using Hidden Markov Model.

7) An Efficient Time-Bound Hierarchical Key Management Scheme For Secure Broadcasting.

8) SSL Backend Forwarding Scheme In Cluster-Based Web Servers.

9) Efficient Approximate Query Processing In Peer-To-Peer Networks.


TECHNOLOGY: DONET

DOMAIN: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING

1) Variability And Reproducibility In Software Engineering: A Study Of Ofur Compaines That


Developed The Same System.

2) What Types Of Defects Are Really Discovered In Code Reviews?

3) An Investigation Into The Functional Form Of The Size-Defect Relationship Software


Modules.

4) Predicting Project Velocity In Xp Using A Learning Dynamic Bayesian Network Model.

5) Development Of A Software Engineering Ontology For Multisite Software Development.

6) Semantics-Based Design For Secure Web Services.

7) The Effect Of Pairs In Program Design Tasks.

8) A Realistic Empirical Evaluation Of The Costs And Benefits Of UML In Software Maintenance.

9) Effective Software Merging In The Presence Of Object-Oriented Refractoriness.

TECHNOLOGY: DONET

DOMAIN: IEEE TRANSACTIONS ON IMAGE PROCESSING

1) Gradient Estimation Using Wide Support Operators.

2) Sharpening Dermatological Color Images In The Wavelet Domain.

3) Interpolation Artifacts In Sub-Pixel Image Registration.

4) Continuous Glass Pattern For Painterly Rendering.

5) Active Learning Methods For Interactive Image Retrieval.

6) Detection And Removal Of Cracks And In Digitized Paintings.

TECHNOLOGY: DONET

DOMAIN: IEEE TRANSACTIONS MOBILE COMPUTING.

1) Overlapped Carrier-Sense Multiple Access (OCSMA) In Wireless Ad Hoc Networks.

2) Information Density Estimation For Content Retrieval In MANETs.


3) Two-Factor User Authentication In Wireless Sensor Networks.

4) Consistency Management Strategies For Data Replication In Mobile Ad Hoc Networks.

5) Signaling For Multimedia Conferencing In Stand-Alone Mobile Ad Hoc Networks.

6) Benefit Based Data Caching In Ad Hoc Networks.

TECHNOLOGY: DONET

DOMAIN: IEEE TRANSACTIONS ON GIRD COMPUTING

1) Shortest Path Tree Computation In Dynamic Graphs.

2) An Ant Colony Optimization Approach To A Grid Workflow Scheduling Problem With Various
QoS Requirements.

3) Mirador: A Simple Fast Search Interface For Global Remote Sensing Data Sets.

4) Fusion Of Multispectral And Panchromatic Images Using A Restoration- Based Method.

5) Data Flow And Workflow Organization The Data Management For The Terra SAR-X Payload
Ground Segment.

TECHNOLOGY: DONET

DOMAIN: IEEE TRANSACTIONS ON MULTIMEDIA

1) Performance Analysis For Overlay Multimedia Multicast On R-Ary Tree And M-D Mesh
Topologies.

2) Incentive Cooperation Strategies For Peer-To-Peer Live Multimedia Streaming Social


Networks.

3) WMA: A Marking-Based Synchronized Multimedia Tutoring System For English Composition


Studies.

4) Automated Bidding For Media Services At The Edge For A Content Delivery Network.

5) Content-Based Attention Ranking Using Visual And Contextual Attention Model For Baseball
Videos.

6) Orthogonal Data Embedding For Binary Images In Morphological Transform Domain-A High
Capacity Approach.

7) A Novel Framework For Semantic Annotation And Personalized Retrieval Of Sports Video.
8) Video Annotation Based On Kernel Linear Neighborhood Propagation.

9) High Resolution Animated Scenes From Stills.

TECHNOLOGY: DONET

DOMAIN: NON- IEEE BASED PROJECTS

1) A Secure Communication Network Protocol.

2) Distributed Flow Monitoring Tool.

3) The Rapeutic Management System.

4) Insurance Design And Development Of Unemployment Insurance.

5) E-Book Supervision And Management.

6) Development Of A Campaign Information System.

7) Contemporary Approach For Group Discussion In Intranet.

8) Hierarchical Promotion Judgment System.

9) Patron Complaints Maintaining Scheme.

10) Computerized Banking Sector.

11) Web Census System.

12) Share Marketing Review.

13) Virtual Knowledge Sharing.

14) Dispensary Of Hope From Electronic Communication.

15) Intelligent Transport System.

16) A Scheme Of Vendor Capital Fund And Indian Economy.

17) Essential Business Sever Administration.

18) Economic And Financial Forecast Model.

19) Modern Architecture For Exam Results.

20) System Observer And Organizer In A Connected Network.

Potrebbero piacerti anche