| JAVA PROJECT TITILES |
| 1 |
Rate Adaptation in Congested Wireless Networks through Real-Time Measurements (Parallel & Distributed)
|
| 2 |
Secure Data Objects Replication in Data Grid (Network Security)
|
| 3 |
On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network (Parallel & Distributed)
|
| 4 |
Layered Approach Using Conditional Random Fields for Intrusion Detection (Network)
|
| 5 |
IRM Integrated File Replication and Consistency Maintenance in P2P Systems (Parallel & Distributed)
|
| 6 |
Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks (Parallel & Distributed)
|
| 7 |
Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation (Wireless Network)
|
| 8 |
Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks (Network Security)
|
| 9 |
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming (Parallel & Distributed)
|
| 10 |
A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization (Image Processing)
|
| 11 |
Conditional Shortest Path Routing in Delay Tolerant Networks (Wireless Network)
|
| 12 |
Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast (Wireless)
|
| 13 |
Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks (Mobile Computing)
|
| 14 |
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks (Wireless Network)
|
| 15 |
MABS: Multicast Authentication Based on Batch Signature (Network Security)
|
| 16 |
TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Networks (Mobile Computing)
|
| 17 |
Deriving Concept-Based User Profiles from Search Engine Logs (Data Mining)
|
| 18 |
Inside the Permutation-Scanning Worms Propagation Modeling and Analysis (Network Security)
|
| 19 |
Privacy-Conscious Location-Based Queries in Mobile Environments (Parallel Computing)
|
| 20 |
Achieving Guaranteed Anonymity in GPS Traces via Uncertainty Aware Path Cloaking (Mobile Computing)
|
| |
|
| 21 |
A Competitive Study of Cryptography Techniques over Block Cipher |
| 22 |
A Dual Framework and Algorithms for Targeted Online Data Delivery |
| 23 |
A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service |
| 24 |
A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
|
| 25 |
A Link-Analysis Extension Of Correspondence Analysis For Mining Relational Databases
|
| 26 |
A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
|
| 27 |
A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
|
| 28 |
Analysis on Credit Card Fraud Detection Methods |
| 29 |
Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
|
| 30 |
Clustering with Multi-Viewpoint based Similarity Measure |
| 31 |
Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
|
| 32 |
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks |
| 33 |
Effective Navigation of Query Results Based on Concept Hierarchies |
| 34 |
Embedded Extended Visual Cryptography Schemes |
| 35 |
Fast Simulation of services avalibility in mesh network with dynamic path restoration
|
| 36 |
Going Back and Forth Efficient Multi deployment and Multi snapshotting on Clouds
|
| 37 |
Intrusion detection An Energy efficient approach in Heterogeneous WSN |
| 38 |
Live Streaming With Receiver-Based Peer-Division Multiplexing |
| 39 |
Modeling and Detection of Camouflaging Worm |
| 40 |
More Secure Steganography Method in Spatial Domain |
| 41 |
Nymble Blocking Misbehaving Users in Anonymizing Networks |
| 42 |
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
|
| 43 |
Optimal Bandwidth Assignment for Multiple Description Coded Video |
| 44 |
Optimal Stochastic Location Updatees in Mobile Ad Hoc Network |
| 45 |
Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding
|
| 46 |
SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
|
| 47 |
Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
|
| 48 |
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
|
| 49 |
Secure High-Throughput Multicast Routing in Wireless Mesh Networks |
| 50 |
Sketch4Match – Content-based Image Retrieval System Using Sketches |