- Reverse Nearest Neighbors Search in Ad-hoc Subspaces
- A Web Usage Mining Framework for Mining Evolving User Profiles
- Truth Discovery with Multiple Conflicting Information Providers on the Web
- Encouraging Persons with Hearing Problem to Learn Sign Language by Internet Websites
- Hiding Sensitive Association Rules with Limited Side Effects
- Integrating Data Warehouses with Web Data: A Survey
- Detecting Word Substitutions in Text
- Beyond single-page web search results
- Automatic Website Summarization by Image Content: A Case Study with Logo and Trademark Images
- Distributional Features for Text Categorization
- Gossip Trust for Fast Reputation Aggregation in Peer-to-Peer Networks
- Lazy Approach to Associative Classification
- On Modularity Clustering
- Learning a Maximum Margin Subspace for Image Retrieval
- Incremental Maintenance of Online Summaries Over Multiple Streams
- A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems
- Algorithms for Storytelling
- Improving Bayesian Network Structure Learning with mutual information
- Computing Iceberg Cubes by Top-Down and Bottom-Up Integration
- Improved word-aligned binary compression for text indexing
- Markov Random Field Model-Based Edge-Directed Image Interpolation
- Texture Analysis and Classification with Linear Regression Model Based on Wavelet Transform
- A New Watermarking Scheme for Color Images Captured By Mobile Phone Cameras
- Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice
- Semantic Texton forests for image categorization and segmentation
- Image Classification using Random Forests and Ferns
- Blood Vessel Segmentation from Color Retinal Images using Unsupervised Texture Classification
- Vision Processing for Real time 3-D Data Acquisition Based on Coded Structured Light
- Sub sampling Image Compression using Al-Alaoui Back propagation Algorithm
- Semi-supervised SVM batch mode active learning for image retrieval
- Feature based wavelet shrinking algorithm for image denoising
- Restoration of DWI Data Using a Rician LMMSE Estimator
- Efficient Nonlocal Means for Denoising of Textural Patterns
- Indexing of Satellite Images with Different Resolutions by Wavelet Features
- Discriminative Analysis of Lip Motion Features for Speaker Identification and Speech-Reading
- Texture Analysis and Segmentation Using Modulation Features, Generative Models, and Weighted Curve Evolution
- Reversible Integer Color Transform
- Expansion Embedding Techniques for Reversible Watermarking
- The Mathematical Theory of Dynamic Load Balancing in Cellular Networks
- A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice
- IEEE Transactions on Mobile Computing Project Title: Minimizing recovery state in geographic ad hoc routing Abstract: Geographic ad hoc networks use position information for routing. They often utilize stateless greedy forwarding and require the use o
- Contention-Aware performance analysis of Mobility-Assisted Routing
- Contention-Aware performance analysis of Mobility-Assisted Routing
- IEEE Transactions on Mobile Computing Project Title: Minimizing recovery state in geographic ad hoc routing Abstract: Geographic ad hoc networks use position information for routing. They often utilize stateless greedy forwarding and require the use o
- Random Cast: An energy efficient communication scheme for Mobile Ad-hoc Networks
- Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
- LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
- Benefit-Based Data Caching in Ad Hoc Networks
- Active Queue Management for Fair Resource Allocation in Wireless Networks
- Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks
- An acknowledgement based approach for the detection of routing in misbehavior Manets
- Toward broadcast reliability in mobile ad hoc networks with double coverage
- A location based routing method for mobile ad-hoc networks
- A fault-tolerant distributed channel allocation scheme for cellular networks
- Solving Systems of Linear Equations on the CELL Processor Using Cholesky Factorization
- Scalable live streaming service based on interoverlay optimization
- A new Task graph model for Qos Support in clusters
- Software-Based Failure Detection and Recovery in Programmable Network Interface
- Congestion Adaptive Routing in Mobile Ad Hoc Networks
- Randomized Channel Selection in Multi channel Access Point Networks
- On Maximizing the Lifetime of Distributed Information in AdHoc Networks with Individual Constraints
- On the Computational Complexity and Effectiveness of N-hub Shortest-Path routing
- Two techniques for fast computation of constrained shortest paths
- On the Performance Benefits of Multihoming Route Control
- Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
- Dynamic search algorithm in unstructured peer-to-peer networks
- The server reassignment problem for load balancing in structured p2p systems
- Node isolation model and age-based neighbor selection in unstructured P2P networks
- Entropy based adaptive flow aggregation Abstract:
- Optimal Backpressure routing for wireless networks with Multi-Receiver diversity
- Energy-Robustness trade off in cellular network power control
- Minimizing the file download time in stochastic peer-to-peer networks
- Building heterogeneous peer-to-peer networks: protocol and Analysis
- A geometric approach to improving active packet loss measurement
- Efficient Approximate Query Processing in Peer-to-Peer Network
- fusion: A P2P Architecture for Internet-Scale Content-Based Search And Retrieval
- Smartening the environment using wireless sensor networks in a developing country
- Lord of the Links: A Framework for Discovering Missing Links in the Internet Topology
- A Waiting-Time Dependent Back off Algorithm for QoS Enhancement of Voice over WLAN
- Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks
- A Multiobjective Optimization-Based Evolutionary Algorithm for Constrained Optimization
- Public-key based security scheme for Wireless Sensor Network
- Faster Algorithms for Construction of Recovery Trees Enhancing QoP and QoS
- Securing User-controlled Routing Infrastructures
- Controlling IP Spoofing through Inter-Domain Packet filters
- A Practical Password-Based Two-Server Authentication and Key Exchange System
- A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
- A Novel approach for computation efficient rekeying for multicast key distribution
- A new Reliable Broadcasting in Mobile Ad-Hoc Networks
- A Hybrid Reliable Routing Technique (HRR) for Wireless Sensor Networks
- Anonymity in Wireless Broadcast NetworksEnhanced communal Global, Local Memory Management for effective performance of cluster computing
- Elliptic curve cryptography based threshold cryptography implementation for MANETs
- Polynomial Time Approximation Algorithms for Multi-Constrained QoS Routing
Labels:
IEEE project topics in network,
IEEE projects in network,
Innovative project topics in networks,
networks IEEE projects,
project topics based on security,
project topics for CSE
Tuesday, 9 October 2012
{ 0 comments... read them below or add one }
Post a Comment
Enter your comments here