Sie sind auf Seite 1von 26

IEEE / SOFTWARE PROJECTS

In various Domains

JAVA * J2EE * J2ME


Latest Projects, 2008, 2009, 2010

Our Service Address

6/1, Selvanaayaki Complex1st Floor, Gokulae Street,


Ramnagar, Coimbatore- 641009.

Mobile: 9894604623 Phone: 0422-4377414


Mai : info@brainrichtech.com Web : www.brainrichtech.com
We are offering IEEE & Non IEEE Projects
In various Domains including

IEEE Projects on Image Processing


IEEE Projects on Knowledge and Data Mining
IEEE Projects on Networking
IEEE Projects on Artificial Intelligence
IEEE Projects on Audio and Video Processing
IEEE Projects on Pattern Analysis & Machine Intelligence
IEEE Projects on Multimedia
IEEE Projects on Parallel and Distributed Systems
IEEE Projects on Mobile Computing
IEEE Projects on Software Engineering
IEEE Projects on Information Forensics and Security
IEEE Projects on Dependable and Secure Computing
IEEE Projects on Systems, Man & Cybernetics
IEEE Projects on Computers
IEEE Projects on Learning Technologies
PROJECT SUPPORTS & DELIVERABLES

 Project Abstract
 IEEE Paper
 PPT / Review Details
 Project Report
 Working Procedure/Screen Shots
 Materials & Books in CD
 Project Certification
TECHNOLOGY : JAVA
DOMAIN : IEEE DIGITAL IMAGE PROCESSING

S.NO CODE PROJECT TITLE YEAR


01 IP 01 Multi-body Structure-and-Motion Segmentation 2010
by Branch-and-Bound Model Selection
02 IP 02 Sliding-Window Raptor Codes for Efficient 2010
Scalable Wireless Video Broadcasting with
Unequal Loss Protection
03 IP 03 Generic Lossless Visible Watermarking—A New 2010
Approach
04 IP 04 Fusing Local Patterns of Gabor Magnitude and 2010
Phase for Face Recognition
05 IP 05 Data Embedding in JPEG Bit stream by Code 2010
Mapping
06 IP 06 Video Segmentation Based on Motion Coherence 2010
of Particles in a Video Sequence
07 IP 07 Adaptive Non separable Wavelet Transform via 2010
Lifting and its Application to Content-Based
Image Retrieval
08 IP 08 Multiplicative Noise Removal Using Variable 2010
Splitting and Constrained Optimization

09 IP 09 Watermarking of Free-view Video 2010


10 IP 10 Ultrasound De speckling for Contrast 2010
Enhancement
11 IP 11 A Logarithmic Quantization Index Modulation 2010
for Perceptually Better Data Hiding
12 IP 12 Contourlet-Based Image Watermarking Using 2010
Optimum Detector in a Noisy Environment
13 IP 13 Cooperation Stimulation Strategies for Peer-to- 2010
Peer Wireless Live Video-Sharing Social
Networks
14 IP 14 Soft Edge Smoothness Prior for Color Image 2009
Super-Resolution
15 IP 15 A Shearlet Approach to Edge Analysis and 2009
Detection
16 IP 16 Complex Wavelet Structural Similarity: A New 2009
Image Similarity Index
17 IP 17 A Histogram Modification Framework and Its 2009
Application for Image Contrast Enhancement
18 IP 18 Personal Authentication Using Hand Vein 2009
Triangulation and Knuckle Shape
19 IP 19 Huber Fractal Image Compression 2009
20 IP 20 Active Mask Segmentation of Fluorescence 2009
Microscope Images
21 IP 21 Color Texture Segmentation Based on the Modal 2009
Energy of Deformable Surfaces
22 IP 22 Entropy Interpretation of the Logarithmic 2009
Image Processing Model With Application to
Contrast Enhancement
23 IP 23 A New Look to Multichannel Blind 2009
Image Deconvolution
24 IP 24 Improved Resolution Scalability for 2009
Bilevel Image Data in JPEG2000
25 IP 25 An Adaptable Image Retrieval System With 2009
Relevance Feedback Using Kernel Machines and
Selective Sampling
26 IP 26 A High-Capacity Steganography Scheme for 2009
JPEG2000 Baseline System
27 IP 27 Independent Component Analysis-Based 2008
Background Subtraction for Indoor Surveillance
28 IP 28 Sparse Representation for Color Image 2008
Restoration
29 IP29 High-Fidelity Data Embedding for Image 2008
Annotation
30 IP30 A New Look to Multi channel Blind Image De- 2008
convolution
31 IP31 Image Segmentation Using Information 2008
Bottleneck Method
32 IP32 A Fast Optimization Transfer Algorithm for 2008
Image In painting in Wavelet Domains
33 IP33 Enhancement of Color Images by Scaling the 2008
DCT Coefficients
34 IP34 Improved Resolution Scalability for Bilevel Image 2008
Data in JPEG2000
35 IP35 A Unified Relevance Feedback Framework for 2008
Web Image Retrieval
36 IP36 Optimal Spread Spectrum Watermark 2008
Embedding via a Multi step Feasibility
Formulation
37 IP37 Watermarking of Co lour Images in the DCT 2008
Domain Using Y Channel
38 IP38 A Robust Image Encryption Scheme using State- 2008
Feedback Control
39 IP39 Color Image Retrieval Using M-Band Wavelet 2008
Transform Based Color-Texture Feature
40 IP40 A Histogram Modification Framework and Its 2008
Application for Image Contrast Enhancement
TECHNOLOGY : JAVA
DOMAIN : IEEE KNOWLEDGE AND DATA MINING

S.NO CODE PROJECT TITLE YEAR


01 KD 01 MILD: Multiple-Instance Learning via 2010
Disambiguation
02 KD 02 LIGHT: A Query-Efficient Yet Low-Maintenance 2010
Indexing Scheme over DHTs
03 KD 03 Density Conscious Subspace Clustering for High- 2010
Dimensional Data
04 KD 04 Dynamic Dissimilarity Measure for Support- 2010
Based Clustering
05 KD 05 Efficient Algorithm for Localized Support Vector 2010
Machine
06 KD 06 PAM: An Efficient and Privacy-Aware 2010
Monitoring Framework for Continuously Moving
Objects
07 KD 07 ViDE: A Vision-Based Approach for Deep Web 2010
Data Extraction
08 KD 08 FiVaTech: Page-Level Web Data Extraction from 2010
Template Pages
09 KD 09 Automatic Ontology Matching via Upper 2010
Ontologies: A Systematic Evaluation
10 KD 10 Knowledge-Based Interactive Postmining of 2010
Association Rules Using Ontologies
11 KD 11 Modeling Image Data for Effective Indexing and 2009
Retrieval in Large General Image Databases
12 KD 12 Olex: Effective Rule Learning for Text 2009
Categorization
13 KD 13 Towards Suspicious Behavior Discovery in Video 2009
Surveillance System
14 KD 14 A Relation-Based Page Rank Algorithm for 2009
Semantic Web Search Engines
15 KD 15 Learning Image-Text Associations 2009
16 KD 16 A Framework for Clustering 2009
Concept-Drifting Categorical Data
17 KD 17 Communication Perspective on Automatic 2009
Text Categorization
18 KD 18 Predicting Missing Items in Shopping Carts 2009
19 KD 19 Exact Knowledge Hiding through Database 2009
Extension
20 KD 20 Fast Query Point Movement Techniques for 2009
Large CBIR Systems
21 KD 21 Evaluating the Effectiveness of Personalized Web 2009
Search
22 KD 22 Similarity-Profiled Temporal Association Mining 2009
23 KD 23 Batch Mode Active Learning with Applications to 2009
Text Categorization and Image Retrieval
24 KD 24 Enhancing Learning Objects with an Ontology- 2009
Based Memory
25 KD 25 Using Association Rule Mining to Improve 2008
Semantic Web Services Composition
Performance
26 KD 26 Biometric Authentication for Border Control 2008
Applications
27 KD 27 Desktop search in the intranet with integrated 2008
desktop search engines
28 KD 28 A Least Grade Page Replacement Algorithm for 2008
Web Cache Optimization
TECHNOLOGY : JAVA
DOMAIN : IEEE NETWORKING

S.NO CODE PROJECT TITLE YEAR


01 NS 01 Broadcasting Video Streams Encoded With 2010
Arbitrary Bit Rates in Energy-Constrained Mobile
TV Networks
02 NS 02 S4: Small State and Small Stretch Compact 2010
Routing Protocol for Large Static Wireless
Networks
03 NS 03 Rate Control with Pair wise Intersession Network 2010
Coding
04 NS 04 Equilibrium of Heterogeneous Congestion 2010
Control: Optimality and Stability
05 NS 05 Inside the Permutation-Scanning Worms: 2010
Propagation Modeling and Analysis
06 NS 06 Joint Sink Mobility and Routing to Maximize the 2010
Lifetime of Wireless Sensor Networks: The Case of
Constrained Mobility
07 NS 07 SybilLimit: A Near-Optimal Social Network 2010
Defense Against Sybil Attacks
08 NS 08 2010
A Distributed CSMA Algorithm for Throughput
and Utility Maximization in Wireless Networks
09 NS 09 Upgrading Mice to Elephants: Effects and End- 2010
Point Solutions
10 NS 10 Distributed Algorithms for Minimum Cost 2010
Multicast With Network Coding
11 NS 11 Delay Analysis for Wireless Networks With Single 2010
Hop Traffic and General Interference Constraints
12 NS 12 Constrained Relay Node Placement in Wireless 2010
Sensor Networks: Formulation and
Approximations
13 NS 13 Efficient and Dynamic Routing Topology 2010
Inference From End-to-End Measurements
14 NS 14 Provably Secure Nested One-Time Secret 2010
Mechanisms for Fast Mutual Authentication and
Key Exchange in Mobile Communications
15 NS 15 Spatio-Temporal Network Anomaly Detection by 2009
Assessing Deviations of Empirical Measures
16 NS 16 Monitoring the Application-Layer DDoS Attacks 2009
for Popular Websites
17 NS 17 Multiple Routing Configurations for Fast 2009
IP Network Recovery
18 NS 18 Improving Locality of Bit Torrent with ISP 2009
Cooperation
19 NS 19 PRIME: Peer-to-Peer Receiver-Driven Mesh- 2009
Based Streaming
20 NS 20 A Simple and Efficient Hidden Markov Model 2009
Scheme for Host-Based Anomaly Intrusion
Detection
21 NS 21 Plexus: A Scalable Peer-to-Peer Protocol Enabling 2009
Efficient Subset Search
22 NS 22 Capturing Router Congestion and Delay 2009
23 NS 23 Node Isolation Model and Age-Based Neighbor 2009
Selection in Unstructured P2P Networks
24 NS 24 Residual-Based Estimation of Peer and Link 2009
Lifetimes in P2P Networks
25 NS 25 A Peer-to-Peer Resources Search Algorithm Based 2009
on Small-World Model
26 NS 26 Analysis of Shortest Path Routing for Large Multi- 2009
Hop Wireless Networks
27 NS 27 Multicast Capacity of Wireless Ad Hoc Networks 2009
28 NS 28 Evaluating the Vulnerability of Network Traffic 2009
Using Joint Security and Routing Analysis
29 NS 29 Novel Approach for Computation –Efficient 2009
Rekeying for Multicast Key Distribution
30 NS 30 SIMPS: Using Sociology for Personal Mobility 2009
31 NS 31 DDoS-Shield: DDoS-Resilient Scheduling to 2009
Counter Application Layer Attacks
32 NS 32 Credit Card Fraud Detection Using Hidden 2008
Markov Model
33 NS 33 Encryption Techniques for the Security of Satellite 2008
Images
34 NS34 Modeling Node Capture Attacks in Wireless 2008
Sensor Networks
35 NS35 Adaptive Data Hiding in Edge Areas of Images 2008
With Spatial LSB Domain Systems
36 NS36 The Design Trade-Offs of Bit Torrent-Like File 2008
Sharing Protocols
37 NS37 Honey pot Scheme for Distributed Denial-of- 2008
Service Attack
38 NS38 Vulnerability of Network Traffic under Node 2008
Capture Attacks using Circuit Theoretic Analysis
39 NS39 P2P File Sharing Software in IPv4/IPv6 Network 2008
40 NS40 Design and Implementation of a SIP-based 2008
Centralized Multimedia Conferencing System
41 NS41 Design and Implementation of Distributed 2008
Firewall System for IPv6
42 NS42 A Hypothesis Testing Approach to Semi-fragile 2008
Watermark Based Authentication
43 NS43 A New RMI Framework for Outdoor Objects 2008
Recognition
44 NS44 Contributory group key exchange in the presence 2008
of malicious participants
45 NS45 Schemes for Evaluating Signal Processing 2008
Properties of Audio Watermarking
46 NS46 Double compression in JPEG images 2008
47 NS47 The Evaluation Report of SHA-256 Crypt Analysis 2008
Hash Function
48 NS48 Jig DFS: A Secure Distributed File System 2008
49 NS49 General access structures in audio cryptography 2008
50 NS50 Improving Locality of Bit Torrent with ISP 2008
Cooperation
51 NS51 Minimizing File Download Time in Stochastic 2008
Peer-to-Peer Networks
52 NS52 Triple DES Algorithm Based Image Watermarking 2008
53 NS53 Bidirectional Routing Abstraction for 2008
Asymmetric Mobile Ad Hoc Networks
TECHNOLOGY : JAVA
DOMAIN : IEEE MULTIMEDIA

S.NO CODE PROJECT TITLE YEAR


01 M 01 A Stochastic Approach to Image Retrieval Using 2010
Relevance Feedback and Particle Swarm
Optimization
02 M 02 Constructing Concept Lexica With Small 2010
Semantic Gaps
03 M 03 An Adaptive Computational Model for Salient 2010
Object Detection
04 M 04 An Adaptive Strategy for Mobile Ad Hoc Media 2010
Streaming
05 M 05 Video Annotation Through Search and Graph 2010
Reinforcement Mining
06 M 06 Image Annotation by Graph-Based Inference 2010
With Integrated Multiple/Single Instance
Representations
07 M 07 Network Awareness of P2P Live Streaming 2010
Applications: A Measurement Study
08 M 08 Fine-Granularity Transmission Distortion 2010
Modeling for Video Packet Scheduling Over Mesh
Networks
09 M 09 Investigating the Scheduling Sensitivity of P2P 2009
Video Streaming
10 M 10 Coherent Phrase Model for Efficient Image Near 2009
Duplicate Retrieval
11 M 11 Robust Scaling-Based Image Watermarking Using 2009
Maximum-Likelihood Decoder With Optimum
Strength Factor
12 M 12 LayerP2P: Using Layered Video Chunks in P2P 2009
Live Streaming
13 M 13 Content-Based Image Retrieval Using Multi 2008
resolution Color and Texture Features
14 M 14 Digital-Invisible-Ink Data Hiding Based on 2008
Spread-Spectrum and Quantization Techniques
15 M 15 Dynamic Resource Allocation for Robust 2008
Distributed Multi-Point Video Conferencing
16 M 16 Improving Robustness of Quantization-Based 2008
Image Watermarking via Adaptive Receiver
17 M 17 Locality-Awareness in BitTorrent-Like P2P 2008
Applications
18 M 18 Watermarking Method Based on Significant 2008
Difference of Wavelet Coefficient Quantization
19 M 19 Analyzing Voice Quality in Popular VoIP 2008
Applications
20 M 20 Image Retrieval With Relevance Feedback Based 2008
on Graph-Theoretic Region Correspondence
Estimation
21 M 21 Robust Audio Data Hiding Using Correlated 2008
Quantization With Histogram-Based Detector
22 M 22 Collision Attacks With Budget Constraints on 2008
Key Management Schemes for Secure Multimedia
Multicast
TECHNOLOGY : JAVA

DOMAIN : IEEE AUDIO,SPEECH & VIDEO PROCESSING

S.NO CODE PROJECT TITLE YEAR


01 AV 01 Robust Multiplicative Patchwork Method for 2009
Audio Watermarking
02 AV 02 Scalable Audio Compression at Low Bitrates 2008
03 AV03 Multiparty Voice over IP (M VoIP) Peer-Based 2008
System for Large-Scale Conference Support
04 AV 04 Extracting Question/Answer Pairs In Multi-Party 2008
Meeting
05 AV 05 Hybrid Signal-and-Link-Parametric Speech 2008
Quality Measurement for VoIP Communications
06 AV 06 Rate-Distortion Optimal Video Transport Over 2008
IP Allowing Packets With Bit Errors
TECHNOLOGY : JAVA

DOMAIN : IEEE ARTIFICAL INTELLIGENCE

S.NO CODE PROJECT TITLE YEAR


01 AI 01 Vehicle Number Plate Recognition Using 2008
Mathematical Morphology and Neural Networks
02 AI 02 Vision-Based Eye Blink Monitoring System for 2008
Human-Computer Interfacing
03 AI 03 Multi-modal Interfaces for Interaction 2008
Communication between Hearing and Visually
Impaired Individuals: Problems & Issues
04 AI 04 Embedded Vehicle Control System Based on 2008
Voice Processing Technologies
05 AI 05 A Test bed for Voice-Based Robot Control 2008
06 AI 06 Human Voice Based Wheel Chair Control 2008
TECHNOLOGY : JAVA
DOMAIN : IEEE MOBILE COMPUTING

S.NO CODE PROJECT TITLE YEAR


01 MC 01 Energy-Efficient Communication Scheme for 2009
Mobile Ad Hoc Networks
02 MC 02 A Novel Scheduled Power Saving Mechanism for 2009
802.11 Wireless LANs
03 MC 03 MDPF: Minimum Distance Packet Forwarding 2009
for Search Applications in Mobile Ad Hoc
Networks
04 MC 04 Mitigation of Control Channel Jamming under 2009
Node Capture Attacks
05 MC 05 Tabu Search Algorithm for Cluster Building 2009
in Wireless Sensor Networks
06 MC 06 An Energy Efficient Communication Scheme for 2009
Mobile AD HOC Networks
07 MC 07 Hybrid routing in clustered DTNs with message 2007
ferrying
08 MC 08 Transmission Power Control in Wireless Ad Hoc 2007
Networks
TECHNOLOGY : JAVA

DOMAIN : IEEE INFORMATION AND FORENSICS SECURITY

S.NO CODE PROJECT TITLE YEAR

01 IF 01 Edge Adaptive Image Steganography Based on 2010


LSB Matching Revisited
02 IF 02 Blind Authentication: A Secure Crypto-Biometric 2010
Verification Protocol
03 IF 03 Predictive Network Anomaly Detection and 2010
Visualization
04 IF 04 Lossless Data Embedding in Electronic Inks 2010
05 IF 05 SVD-Based Universal Spatial Domain Image 2010
Steganalysis
06 IF 06 Reversible Image Watermarking Using Interpolation 2010
Technique
07 IF 07 MPSteg-Color: Data Hiding Through Redundant 2009
Basis Decomposition
08 IF 08 Temporal Derivative-Based Spectrum and Mel- 2009
Cepstrum Audio Steganalysis
09 IF 09 Halftone Visual Cryptography Via Error 2009
Diffusion
10 IF 10 A Hypothesis Testing Approach to Semifragile 2009
Watermark-Based Authentication
11 IF 11 Unseen Visible Watermarking: A Novel 2009
Methodology for Auxiliary Information Delivery
via Visual Contents
12 IF 12 Watermarking Robustness Evaluation Based on 2009
Perceptual Quality via Genetic Algorithms
13 IF 13 Spread-Spectrum Watermarking Security 2008
14 IF 14 Robust Blind Watermarking of Point-Sampled 2009
Geometry
15 IF 15 Security of Lattice-Based Data Hiding Against the 2008
Watermarked-Only Attack
16 IF 16 Multipurpose Watermarking Based on Multiscale 2008
Curvelet Transform
17 IF 17 Cryptographic Secrecy of Steganographic Matrix 2008
Embedding
18 IF 18 Digital Video Watermarking in P-Frames With 2008
Controlled Video Bit-Rate Increase
19 IF 19 A Novel Difference Expansion Transform for 2008
Reversible Data Embedding
20 IF 20 Adaptive Data Hiding in Edge Areas of Images 2008
With Spatial LSB Domain Systems
21 IF 21 Color Image Watermarking Using 2008
Multidimensional Fourier Transforms
TECHNOLOGY : JAVA

DOMAIN : IEEE Pattern Analysis & Machine Intelligence

S.NO CODE PROJECT TITLE YEAR


01 PA 01 Using Language to Learn Structured Appearance 2010
Models for Image Annotation
02 PA 02 A Boosting Framework for Visuality-Preserving 2010
Distance Metric Learning and Its Application to
Medical Image Retrieval
03 PA 03 Accurate Image Search Using the Contextual 2010
Dissimilarity Measure
04 PA 04 A Nonlinear Derivative Scheme Applied to Edge 2010
Detection
05 PA 05 In the Eye of the Beholder: A Survey of Models for 2010
Eyes and Gaze
06 PA 06 Polynomial Time Algorithms for Ratio Regions 2010
and a Variant of Normalized Cut
07 PA 07 Single-Image Super-Resolution Using Sparse 2010
Regression and Natural Image Prior
08 PA 08 Self-Similarity and Points of Interest 2010
09 PA 09 Iris Recognition: On the Segmentation of 2010
Degraded Images Acquired in the Visible
Wavelength
10 PA 10 Image Segmentation with a Unified Graphical 2010
Model
11 PA 11 A Perceptually Inspired Variation Framework for 2009
Color Enhancement
12 PA 12 Image Transformations and Blurring 2009
13 PA 13 Robust Wavelet-Based Super-Resolution 2009
Reconstruction: Theory and Algorithm
14 PA 14 IRGS: Image Segmentation Using Edge Penalties 2009
and Region Growing
15 PA 15 Real World Image Annotation and Retrieval 2008
16 PA 16 Visual Rank: Applying Page Rank to Large-Scale 2008
Image Search
17 PA 17 Localized Content-Based Image Retrieval 2008
18 PA 18 Annotating Images by Mining Image Search 2008
Results
19 PA 19 A Discriminative Kernel-Based Approach to Rank 2008
Images from Text Queries
TECHNOLOGY : JAVA
DOMAIN : IEEE Parallel And Distributed Systems

S.NO CODE PROJECT TITLE YEAR

01 PD 01 Secure Synchronization of Periodic Updates in Ad 2010


Hoc Networks
02 PD 02 An Analytical Approach to Optimizing Parallel 2010
Image Registration/Retrieval
03 PD 03 Improving Reliability for Application-Layer 2010
Multicast Overlays
04 PD 04 Impact of Feature Reduction on the Efficiency of 2010
Wireless Intrusion Detection Systems
05 PD 05 Snoogle: A Search Engine for Pervasive 2010
Environments
06 PD 06 A Cross-Layer Approach-Based Gnutella for 2010
Collaborative Virtual Environments over Mobile
Ad Hoc Networks
07 PD 07 Correlation-Based Traffic Analysis Attacks on 2010
Anonymity Networks
08 PD 08 A Hypergraph Approach to Linear Network 2010
Coding in Multicast Networks
09 PD 09 On the Benefits of Cooperative Proxy Caching for 2010
Peer-to-Peer Traffic
10 PD 10 SocioNet: A Social-Based Multimedia Access 2010
System for Unstructured P2P Networks
11 PD 11 An Efficient Superpeer Overlay Construction and 2010
Broadcasting Scheme Based on Perfect Difference
Graph
12 PD 12 Toward Systematical Data Scheduling for Layered 2010
Streaming in Peer-to-Peer Networks: Can We Go
Farther?
13 PD 13 mTreebone: A Collaborative Tree-Mesh Overlay 2010
Network for Multicast Video Streaming
14 PD 14 Efficient Broadcasting Using Network Coding and 2010
Directional Antennas in MANETs
15 PD 15 A Distributed Protocol to Serve Dynamic Groups for 2010
Peer-to-Peer Streaming
16 PD 16 Efficient Multicast Algorithms for Multichannel 2010
Wireless Mesh Networks
17 PD 17 A Dynamic Performance-Based Flow Control 2010
Method for High-Speed Data Transfer
18 PD 18 Enforcing Minimum-Cost Multicast Routing 2009
against Selfish Information Flows
19 PD 19 Delay Asymptotics and Scalability for Peer-to- 2009
Peer Live Streaming
20 PD 20 Enforcing Minimum-Cost Multicast Routing 2009
against Selfish Information Flows
21 PD 21 Scalable Routing in Cyclic Mobile Networks 2009
22 PD 22 Dynamic Search Algorithm in Unstructured 2009
Peer-to-Peer Networks
23 PD 23 Movement-Assisted Connectivity Restoration in 2009
Wireless Sensor and Actor Networks
24 PD 24 A Faithful Distributed Mechanism for Sharing 2009
the Cost of Multicast Transmissions
25 PD 25 Multipath Dissemination in Regular Mesh Topologies 2009
26 PD 26 Detecting Malicious Packet Losses 2009
27 PD 27 Diverse Firewall Design 2008
28 PD 28 Free-Riding on BitTorrent-Like Peer-to-Peer File 2008
Sharing Systems: Modeling Analysis and
Improvement
29 PD 29 Computation-Efficient Multicast Key 2008
Distribution
TECHNOLOGY : JAVA

DOMAIN : IEEE Dependable and Secure Computing

S.NO CODE PROJECT TITLE YEAR

01 DSC 01 Layered Approach Using Conditional Random 2010


Fields for Intrusion Detection
02 DSC 02 In-Depth Packet Inspection Using a 2010
Hierarchical Pattern Matching Algorithm
03 DSC 03 An Advanced Hybrid Peer-to-Peer Botnet 2010
04 DSC 04 Error Detection and Fault Tolerance in ECSM 2009
Using Input Randomization
05 DSC 05 Security Analysis of the SASI Protocol 2009
06 DSC 06 Flexible Rollback Recovery in Dynamic 2009
Heterogeneous Grid Computing
07 DSC 07 The Effectiveness of Checksums for Embedded 2009
Control Networks
TECHNOLOGY : JAVA

DOMAIN : IEEE Software Engineering

S.NO CODE PROJECT TITLE YEAR

01 SW 01 Enhanced Modeling and Solution of Layered 2009


Queuing Networks
02 SW 02 COMOM: Efficient Class Oriented Evaluation 2009
of Multiclass Performance Models
03 SW 03 An Investigation Into the Functional Form of 2009
the Size-Defect Relationship For Software
Modules
04 SW 04 Optimized Resource Allocation for Software 2009
Release Planning
05 SW 05 Automatic Extraction of Heap 2009
ReferenceProperties in Object-Oriented
Programs
06 SW 06 CHARMY: A Framework for Designing 2009
andVerifying Architectural Specifications
07 SW 07 Synthesis of Partial Behavior Models from 2009
Properties and Scenarios
08 SW 08 Identification of Move Method Refactoring 2009
Opportunities
09 SW 09 A Hierarchical Model for Object-Oriented 2009
Design Quality Assessment
10 SW 10 Variability and Reproducibility in Software 2009
Engineering: A Study of Four Companies that
Developed the same System

Das könnte Ihnen auch gefallen