Ieee 2012 titles for java & .net

6
Further more details visit : http://www.temasolution.com/downloads.html send your request to : [email protected] 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected] S.NO PROJECT TITLE CODE YEAR CLOUD COMPUTING 1. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing JD001 2012 2. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding JD002 2012 3. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data JD003 2012 4. A service oriented livestock management system using occasionally connected mobile-cloud architecture JD004 2012 5. Privacy Preserving Access Control with Authentication for Securing Data in Clouds JD005 2012 6. Data Outsourcing Simplified: Generating Data Connectors from Confidentiality and Access Policies JD006 2012 7. Towards bringing real-time online applications on Clouds JD007 2012 8. An analysis of requirements to supporting mobility in Body Area Networks JD008 2012 KNOWLEDGE AND DATA ENGINEERING 9. Answering General Time-Sensitive Queries JD009 2012 10. Creating Evolving User Behaviour Profiles Automatically JD010 2012 11. Effective Pattern Discovery for Text Mining JD011 2012 12. Extending Attribute Information for Small Data Set Classification JD012 2012 13. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis JD013 2012 14. Organizing User Search Histories JD014 2012 15. Outsourced Similarity Search on Metric Data Assets JD015 2012 16. Practical Efficient String Mining JD016 2012 17. Ranking Model Adaptation for Domain-Specific Search JD017 2012 18. Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings JD018 2012 19. Slicing: A New Approach for Privacy Preserving Data Publishing JD019 2012 20. SPIRE: Efficient Data Inference and Compression over RFID Streams JD020 2012 21. ROAD: A New Spatial Object Search Framework for Road Networks JD021 2012

Transcript of Ieee 2012 titles for java & .net

Further more details visit : http://www.temasolution.com/downloads.html

send your request to : [email protected]

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]

S.NO PROJECT TITLE

CODE YEAR

CLOUD COMPUTING

1. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable

Access Control in Cloud Computing

JD001 2012

2. A Secure Erasure Code-Based Cloud Storage System with Secure Data

Forwarding

JD002 2012

3. Enabling Secure and Efficient Ranked Keyword Search over Outsourced

Cloud Data

JD003 2012

4. A service oriented livestock management system using occasionally

connected mobile-cloud architecture

JD004 2012

5. Privacy Preserving Access Control with Authentication for Securing Data in

Clouds

JD005 2012

6. Data Outsourcing Simplified: Generating Data Connectors from

Confidentiality and Access Policies

JD006 2012

7. Towards bringing real-time online applications on Clouds

JD007 2012

8. An analysis of requirements to supporting mobility in Body Area Networks

JD008 2012

KNOWLEDGE AND DATA ENGINEERING

9. Answering General Time-Sensitive Queries

JD009 2012

10. Creating Evolving User Behaviour Profiles Automatically

JD010 2012

11. Effective Pattern Discovery for Text Mining

JD011 2012

12. Extending Attribute Information for Small Data Set Classification

JD012 2012

13. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining

Analysis

JD013 2012

14. Organizing User Search Histories

JD014 2012

15. Outsourced Similarity Search on Metric Data Assets

JD015 2012

16. Practical Efficient String Mining

JD016 2012

17. Ranking Model Adaptation for Domain-Specific Search

JD017 2012

18. Tree-Based Mining for Discovering Patterns of Human Interaction in

Meetings

JD018 2012

19. Slicing: A New Approach for Privacy Preserving Data Publishing

JD019 2012

20. SPIRE: Efficient Data Inference and Compression over RFID Streams

JD020 2012

21. ROAD: A New Spatial Object Search Framework for Road Networks

JD021 2012

Further more details visit : http://www.temasolution.com/downloads.html

send your request to : [email protected]

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]

22. Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data

Systems

JD022 2012

23. Segmentation and Sampling of Moving Object Trajectories Based on

Representativeness

JD023 2012

MOBILE COMPUTING

24. Approximation Algorithms for Data Broadcast in Wireless Networks

JD024 2012

25. Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring

via Virtual Trip Lines

JD025 2012

26. Energy-Efficient Cooperative Video Distribution with Statistical QoS

Provisions over Wireless Networks

JD026 2012

27. Mobile Data Offloading through Opportunistic Communications and Social

Participation

JD027 2012

28. A New Mobile Spatial Information Service Grid Computing Model Based on

Mobile Agent

JD028 2012

29. Mobile Computing Systems Programming: A Graduate Distributed

Computing Course

JD029 2012

30. Mobile cloud computing service based on heterogeneous wireless and

mobile P2P networks

JD030 2012

31. Mobile computing scheduling mechanism based on self ranking algorithm JD031 2012

32. Reducing location management costs in hierarchical-based model of mobile

and wireless computing systems

JD032 2012

33. A proposal of a memory management architecture for mobile computing

environments

JD033 2012

34. Real-time transaction management in mobile computing systems

JD034 2012

35. A Distributed Cache Management Architecture for Mobile Computing

Environments

JD035 2012

36. Trusted Management for Mobile Computing Entities Enabled by Fuzzy

Logic Approach

JD036 2012

37. Monitoring and detecting abnormal behaviour in mobile cloud infrastructure

JD037 2012

NETWORK SECURITY

38. Scalable Video Multicast with Adaptive Modulation and Coding in

Broadband Wireless Data Systems

JD038 2012

39. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks

JD039 2012

40. Exploiting Data Fusion to Improve the Coverage of Wireless Sensor

Networks

JD040 2012

41. Distributed Resource Allocation Based on Queue Balancing in Multihop

Cognitive Radio Networks

JD041 2012

42. Insights on Media Streaming Progress Using BitTorrent-Like Protocols for

On-Demand Streaming

JD042 2012

43. Bit Rate Reduction Video Transcoding with Distributed Computing JD043 2012

44. Distributed S-Net: Cluster and Grid Computing without the Hassle JD044 2012

Further more details visit : http://www.temasolution.com/downloads.html

send your request to : [email protected]

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]

NETWORK ROUTING

45. Multi-rate combination of opportunistic routing and network coding: An

optimization perspective

JD045 2012

46. LRNC: Lifetime-aware routing using network coding in wireless sensor

network

JD046 2012

47. A Multipath Layered Cluster Based Routing for Ad Hoc Networks JD047 2012

48. Comparison of routing and network coding in undirected network group

communications

JD048 2012

49. Measurement-Aware Monitor Placement and Routing: A Joint Optimization

Approach for Network-Wide Measurements

JD049 2012

50. On dynamics of field based anycast routing in wireless mesh networks JD050 2012

51. Multipath routing backbones for load balancing in Mobile Ad hoc Networks JD051 2012

NETWORK ATTACK AND INDRUTION DETECION

52. Knowledge-independent traffic monitoring: Unsupervised detection of

network attacks

JD052 2012

53. An efficient sequential watermark detection model for tracing network attack

flows

JD053 2012

54. FireCol: A Collaborative Protection Network for the Detection of Flooding

DDoS Attacks

JD054 2012

55. Detection and prevention of SIP flooding attacks in voice over IP networks JD055 2012

56. The Model — Dynamic and Flexible Intrusion Detection Protocol for high

error rate Wireless Sensor Networks based on data flow

JD056 2012

57. Alert over the attacks of data packet and detect the intruders JD057 2012

58. Privacy-preserving anomaly detection across multi-domain networks JD058 2012

59. Classification and Experimental Analysis for Clone Detection Approaches in

Wireless Sensor Networks

JD059 2012

60. Port-based traffic verification as a paradigm for anomaly detection JD060 2012

61. On detecting malicious behaviors in interactive networks: Algorithms and

analysis

JD061 2012

62. Genetic algorithm and artificial immune systems: A combinational approach

for network intrusion detection

JD062 2012

NETWORK TRAFFIC

63. Network traffic anomaly detection using machine learning approaches JD063 2012

64. Analysis and provisioning of network traffic in cloud environment using

Markov model

JD064 2012

65. Traffic clustering and online traffic prediction in vehicle networks: A social

influence perspective

JD065 2012

Further more details visit : http://www.temasolution.com/downloads.html

send your request to : [email protected]

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]

66. Detecting anomalies in network traffic using Entropy and Mahalanobis

distance

JD066 2012

67. Traffic Engineering for Multicast Connections in Multiservice Cellular

Networks

JD067 2012

DATA MINING LATTICE BASED

68. Data Mining method based on Lattice JD068 2012

69. Application of data mining in educational databases for predicting academic

trends and patterns

JD069 2012

70. Data mining based network intrusion detection system: A database centric

approach

JD070 2012

71. Fuzzy Modeling Built Through a Data Mining Process JD071 2012

72. Visual data mining over a video wall JD072 2012

73. Relevance Matters: Capitalizing on Less (Top-k Matching in

Publish/Subscribe)

JD073 2012

74. Multidimensional Analysis of Atypical Events in Cyber-Physical Data JD074 2012

75. The eICU Research Institute - A Collaboration Between Industry, Health-

Care Providers, and Academia

JD075 2012

76. Deciphering human language [information extraction] JD076 2012

77. Architecture for the management and presentation of communication

network performance data

JD077 2012

78. Smart shopper: an agent-based web-mining approach to Internet shopping JD078 2012

MULTIMEDIA

79. Interactive Video Indexing With Statistical Active Learning

JD079 2012

80. Sparse Ensemble Learning for Concept Detection

JD080 2012

81. A Matrix-Based Approach to Unsupervised Human Action Categorization

JD081 2012

82. Robust Image Coding Based Upon Compressive Sensing

JD082 2012

83. Web Video Geolocation by Geotagged Social Resources

JD083 2012

BIOMEDICAL

84. Video Distribution Techniques over WiMAX Networks for m-Health

Applications

JD084 2012

85. Secure Management of Biomedical Data With Cryptographic Hardware

JD085 2012

86. Mobile Medical Visual Information Retrieval

JD086 2012

IMAGE PROCESSING

Further more details visit : http://www.temasolution.com/downloads.html

send your request to : [email protected]

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]

87. Scene-Oriented Hierarchical Classification of Blurry and Noisy Images

JD087 2012

88. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for

Binary Covers

JD088 2012

89. Game-Theoretic Pricing for Video Streaming in Mobile Networks

JD089 2012

IMAGE SEGMENTATION

90. Multiple kernel fuzzy C-means algorithm with ALS method for satellite and

medical image segmentation

JD090 2012

91. Leap segmentation for recovering image surface layout

JD091 2012

92. A Scale-Synthesis Method for High Spatial Resolution Remote Sensing

Image Segmentation

JD093 2012

93. Multistage Image Clustering and Segmentation with Normalised Cuts

JD093 2012

PARALLEL AND DISTRIBUTED SYSTEMS

94. Autonomic Placement of Mixed Batch and Transactional Workloads JD094 2012

95. An Online Data Access Prediction and Optimization Approach for

Distributed Systems

JD095 2012

96. Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths

JD096 2012

SOFTWARE ENGINEERING

97. QoS Assurance for Dynamic Reconfiguration of Component-Based Software

Systems

JD097 2012

98. StakeRare: Using Social Networks and Collaborative Filtering for Large-

Scale Requirements Elicitation

JD098 2012

99. Comparing Semi-Automated Clustering Methods for Personal Development

JD099 2012

100. Invariant-Based Automatic Testing of Modern Web Applications

JD100 2012

101. Automatically Generating Test Cases for Specification Mining

JD101 2012

102. Aspectizing Java Access Control

JD102 2012

DEPENDABLE AND SECURE COMPUTING

103. Automatic Reconfiguration for Large-Scale Reliable Storage Systems JD103 2012

104. Detecting and Resolving Firewall Policy Anomalies JD104 2012

105. DoubleGuard: Detecting Intrusions in Multitier Web Applications JD105 2012

106. JS-Reduce: Defending Your Data from Sequential Background Knowledge

Attacks

JD106 2012

107. Incentive Compatible Privacy-Preserving Distributed Classification JD107 2012

Further more details visit : http://www.temasolution.com/downloads.html

send your request to : [email protected]

28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]

WEB MINING

108. Web 2.0 content extraction JD108 2012

109. Automated Security Test Generation with Formal Threat Models JD109 2012

110. Improving the Automation of Security Information Management: A

Collaborative Approach

JD110 2012

111. Optimal Aviation Security Screening Strategies With Dynamic Passenger

Risk Updates

JD111 2012

TOPOLOGY

112. Routing characterization in volatile connectivity environments JD112 2012

113. A Distributed Reliable and Energy-Efficient Topology Control Algorithm in

Wireless Sensor Network

JD113 2012

114. A method of tree network topology inference based on hierarchical host table JD114 2012

115. Topology management for mission critical networks: Applying supply and

demand to manage public safety networks

JD115 2012

116. SNMP-based network topology discovery algorithm and implementation JD116 2012

117. Overlaid Mesh Topology Design and Deadlock Free Routing in Wireless

Network-on-Chip

JD117 2012

118. Topology Enhancements in Wireless Multihop Networks: A Top-Down

Approach

JD118 2012

119. A dynamic detective method against ROP attack on ARM platform JD119 2012

120. Countering entropy measure attacks on packed software detection

JD120 2012

121. Performance Modeling and Analysis of Network Firewalls JD121 2012

122. Research on Malicious Code Detection Based on Least-squares Estimation JD122 2012

123. Stochastic analysis of horizontal IP scanning

JD123 2012