NETWORKING |
1. Valuable Detours: Least-Cost Anypath Routing |
|
|
|
|
2. Self-Reconfigurable Wireless Mesh Networks |
|
|
|
|
3. Reliability in Layered Networks with Random Link Failures |
|
|
|
|
4. NABS:Novel Approaches for Biometric Systems |
|
|
|
|
5. Live Streaming with Receiver-based Peer-division Multiplexing |
|
|
|
|
More Projects>> |
IMAGE PROCESSING - MULTIMEDIA |
1. Virtualized Screen: A Third Element for CloudMobile Convergence |
|
|
|
|
2. Steganographic Embedding in JPEG Images with Visual Criterion |
|
|
|
|
3. On the Typical Statistic Features for Image Blind Steganalysis |
|
|
|
|
4. A Novel Video Steganography based on Non-uniform Rectangular Partition |
|
|
|
|
PARALLEL AND DISTRIBUTED SYSTEMS |
1. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks |
|
|
|
|
2. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems |
|
|
|
|
3. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud |
|
|
|
|
4. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing |
|
|
|
|
5. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks |
|
|
|
|
SERVICE COMPUTING |
1. Vulnerability Analysis in SOA-Based Business Processes |
|
|
|
|
2. Service-Oriented Architecture for High-Dimensional Private Data Mashup |
|
|
|
|
3. Service-Centric Framework for a Digital Government Application |
|
|
|
|
4. Server-Side Streaming Processing of WS-Security |
|
|
|
|
5. OWLPath: An OWL Ontology-Guided Query Editor |
|
|
|
|
More Projects>> |
SECURE COMPUTING |
1. The Geometric Efficient Matching Algorithm for Firewalls |
|
|
|
|
2. Secure Service-Oriented Architecture for Mobile Transactions |
|
|
|
|
3. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking |
|
|
|
|
4. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables |
|
|
|
|
5. Privacy-Preserving Updates to Anonymous and Confidential Databases |
|
|
|
|
More Projects>> |
MOBILE COMPUTING - WIRELESS COMMUNICATION |
1. Throughput Optimization in High Speed Downlink Packet Access (HSDPA |
|
|
|
|
2. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure |
|
|
|
|
3. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems |
|
|
|
|
4. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems |
|
|
|
|
5. Data Delivery Properties of Human Contact Networks |
|
|
|
|
More Projects>> |
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) |
1. USHER: Improving Data Quality with Dynamic Forms |
|
|
|
|
2. The World in a Nutshell: Concise Range Queries |
|
|
|
|
3. Selecting Attributes for Sentiment Classification Using Feature Relation Networks |
|
|
|
|
4. Scalable Scheduling of Updates in Streaming Data Warehouses |
|
|
|
|
5. Scalable Learning of Collective Behavior |
|
|
|
|
More Projects>> |
CLOUD COMPUTING |
1. Towards Secure and Dependable Storage Services in Cloud Computing |
|
|
|
|
2. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data |
|
|
|
|
3. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds |
|
|
|
|
4. Data Integrity Proofs in Cloud Storage |
|
|
|
|
5. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing |
|
|
|
|
More Projects>> |
INTERNATIONAL CONFERENCE |
1. Feature-level Sentiment Analysis for Chinese Product Reviews |
|
|
|
|
2. Equal-sized Cells Mean Equal-sized Packets in Tor? |
|
|
|
|
3. Customer Relationship Management Based on Data Mining Technique |
|
|
|
|
4. Authentication Schemes for Session Passwords using Color and Images |
|
|
|
|
5. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service |
|
|
|
|
|
|
Android Application Demo |
|
|
|
Professional Referrance |
|
- Enterprise IT Training
- Interview Questions
- Technical Reference
- Placement Papers
- Inplant Training
|
 |
|
IEEE 2014 Latest Projects |
|
- IEEE 2013 Projects
- IEEE 2012 Projects
- Software Application Projects
|
|
Online Projects Support |
|
 |
 |
|
|