Sie sind auf Seite 1von 4

JAVA POJECT TITLES & ABSTRACTS

SL.No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 13 15 16 17 17 18 19 20 21 22 23 24 25 Title A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks A Fully Distributed Proactively Secure Threshold-Multisignature Scheme A Geometric Approach to Improving Active Packet Loss Measurement A New Operational Transformation Framework for Real-Time Group Editors A Precise Termination Condition of the Probabilistic Packet Marking Algorithm A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns A wireless distributed intrusion detection system and a new attack model Active Source Routing Protocol For Mobile Networks An Efficient Association Rule Mining Algorithm In Distributed Databases An efficient fault-tolerant distributed channel allocation algorithm for cellular networks Authentication of People by their typing patterns Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Benefit Based Data Caching In Ad Hoc Networks BRA: A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks Capturing Router Congestion and Delay Congestion Control Using NETWORK BASED PROTOCOL Controlling IP Spoofing Through Inter Domain Packet Filters C-TREND: Temporal Cluster Graphs for Identifying and Visualizing Trends in Multiattribute Transactional Data Data Hiding in Binary Text Documents DCMP: A Distributed Cycle Minimization Protocol for Peer-to-Peer Networks Detecting Malicious Packet Losses Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks Distributed Cache Updating for the Dynamic Source Routing Protocol Distributed Cache Updating for the Dynamic Source Routing Protocol Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion Dynamic Load Balancing in Distributed Systems in the Presence of Delays:A Regeneration-Theory Approach

26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53

Dynamic Routing with Security Considerations Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries Efficient Approximate Query Processing in Peer-to-Peer Networks Ecient Key Agreement for Large and Dynamic Multicast Groups Efficient Key Management for Threshold-Multi Signature in Distributed System Efficient Range Query Processing in Peer-to-Peer Systems Efficient Resource Allocation for Wireless Multicast Energy-Efficient SINR-Based Routing for Multihop Wireless EnergyMaps For Mobile Wireless networks coherence Time Versues Spreading Period Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontologies Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis FACE RECOGNITION FOR SMART INTERACTIONS Face Recognition Using Laplacianfaces Flexible Rollback Recovery In Dynamic Heterogeneous Grid Computing Histogram Based Global Load Balancing in Structured Peer-to-Peer Systems INCREASING EFFICIENCY IN WIRELESS NETWORK Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks Location Based Routing For Mobile Ad-Hoc Networks Location-Based Spatial Query Processing in Wireless Broadcast Environments Minimizing File Download Time in Stochastic Peer-to-Peer Networks Mitigating Performance Degradation in Congested Sensor Networks Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use Recommendations Modeling and Automated Containment of Worms Multiple Routing Congurations for Fast IP Network Recovery Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Internet NODE ISOLATION MODEL AND AGE-BASED NEIGHBOR SELECTION IN UNSTRUCTURED P2P NETWORKS OCGRR: A New Scheduling Algorithm for Differentiated Services Networks Online Index Recommendations for High-Dimensional Databases Using Query

Workloads 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 Optimal Bandwidth Assignment for Multiple Descriptions Coding in Media Streaming Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction Personal Authentication Using 3-D Finger Geometry Probabilistic Packet Marking for Large-Scale IP Traceback Protection of Database Security via Collaborative Inference Detection Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols Quiver: Consistent Object Sharing for Edge Services Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing SAT- Solving Approaches to Context-Aware Enterprise Network Security Management Securing User-Controlled Routing Infrastructures Security in large Mediator Protocols SIMPS: Using Sociology for Personal Mobility SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures TCP-LP: Low-Priority Service via End-Point Congestion Control Truth Discovery with Multiple Conflicting Information Providers on the Web Two Techniques for Fast Computation of Constrained Shortest Paths Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems Hiding Sensitive Association Rules A Model-Based Approach to Evaluation of the Efcacy of FEC Coding in Combating Network Packet Losses File sharing in Hybrid model based P2P Systems For the Expected High Churn Incremental Service Deployment Using the Hop-By-Hop Multicast Routing Protocol An Adaptive Programming Model for Fault-Tolerant Distributed Computing Effective key generation for multimedia and web application- IEEE Secured Distributed Key Management for Threshold-Multisignature using Cryptography

81 82 83 84 85 86 87 88 89

NDT: A Model-Driven Approach For Web Requirements Security Requirements Engineering: A Framework for Representation and Analysis Problem Oriented Software EngineeringSolving the Package Router Control Problem Virtual-Force-Based Geometric Routing Protocol in MANETs ANGEL: Enhancing the Utility of Generalization for Privacy Preserving Publication Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure-Based Systems Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Internet Hybrid Intrusion Detection System Over Abnormal Internet Sequence COUPLING-BASED STRUCTURAL METRICS FOR MEASURING THE QUALITY OF A SOFTWARE

Das könnte Ihnen auch gefallen