Wednesday, December 8, 2010

IEEE 2010 PROJECTS

1.Layered Approach Using Conditional Random Fields for Intrusion Detection.
View : Abstract Basepaper
Ieee Defendable And Secure Computing
2.Host-to-Host Congestion Control for TCP.
View : Abstract Basepaper
Ieee Networking
3 .Adaptive Join Operators for Result Rate Optimization on Streaming Inputs.
View : Abstract Basepaper
Ieee Knowledge And Data Engineering
4.A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming.
View : Abstract Basepaper
Ieee Parallel and Distributed Systems
5 .Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
View : Abstract Basepaper
Ieee Cloud Computing
6 .AI AND OPINION MINING.
View : Abstract Basepaper
Ieee Data Knowledge And Data Engineering
7 .Bandwidth Recycling in IEEE 802.16 Networks.
View : Abstract Basepaper
Ieee Mobile Computing
8 .Distributed Explicit Rate Schemes in Multi -Input–Multi-Output Network Systems.
View : Abstract Basepaper
Ieee Networking
9 .Correlation-Based Traffic Analysis Attacks on Anonymity Networks.
View : Abstract Basepaper
Ieee Parallel and Distributed Systems
10 .A Review of the Applications of Agent Technology In Traffic and Transportation Systems.
View : Abstract Basepaper
Ieee Networking Systems
11 .On Modeling, Analysis, and Optimization of Packet Aggregation Systems.
View : Abstract Basepaper
Ieee Networking
12 .Label-Based DV-Hop Localization AgainstWormhole Attacks in Wireless Sensor Networks.
View : Abstract Basepaper
Ieee Transactions Wireless Communications
13 .Conditional Shortest Path Routing in Delay Tolerant Networks.
View : Abstract Basepaper
Ieee Networking
14.Slow Adaptive OFDMA Systems Through Chance Constrained Programming.
View : Abstract Basepaper
Ieee Networking
15.Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems.
View : Abstract Basepaper
Ieee Network Security
16.POPI A User-level Tool for Inferring Router Packet Forwarding Priority.
View : Abstract Basepaper
Ieee Parallel and Distributed Systems
17.Staying Connected in a Mobile Healthcare System: Experiences from the MediNet Project
View : Abstract Basepaper
Ieee Transactions Wireless Communications
18 .Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks.
View : Abstract Basepaper
Ieee Wireless Communications
19.An AbuseFree Fair Contract Signing Protocol Based on the RSA Signature.
View : Abstract Basepaper
Ieee Network Security
20.Pricing under Constraints in Access Networks Revenue Maximization and Congestion Management.
View : Abstract Basepaper
Ieee Networking
21.SigFree A Signature-free Buffer Overflow Attack Blocker.
View : Abstract Basepaper
Ieee Defendable And Secure Computing
22.Data Leakage Detection .
View : Abstract Basepaper
Ieee Data Knowledge And Data Engineering
23.Mesh Based Multicast Routing in MANET Stable Link Based Approach.
View : Abstract Basepaper
Ieee Transactions Wireless Communications
24.Random Access Transport Capacity.
View : Abstract Basepaper
Ieee Transactions Wireless Communications
25.KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services.
View : Abstract Basepaper
Ieee Defendable And Secure Computing
26.Cooperative Caching in Wireless P2P Networks Design, Implementation, and Evaluation.
View : Abstract Basepaper
Ieee Parallel and Distributed Systems
27.Ensuring Data Storage Security in Cloud Computing.
View : Abstract Basepaper
Ieee Cloud Computing
28.Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes.
View : Abstract Basepaper
Ieee Mobile Computing
29.on Multihop Distances in Wireless Sensor Networks with Random Node Locations.
View : Abstract Basepaper
Ieee Mobile Computing
30.Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
View : Abstract Basepaper
Ieee Cloud Computing
31.Client-side Load Balancer using Cloud.
View : Abstract Basepaper
Ieee Cloud Computing
32.Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks.
View : Abstract Basepaper
Ieee Mobile Computing
33.Always Acyclic Distributed Path Computation.
View : Abstract Basepaper
Ieee Transactions On Networking
34.Dynamic Authentication for Cross-Realm SOA-Based Business Processes.
View : Abstract Basepaper
Ieee Service Computing
35.Achieving Network Level Privacy in Wireless Sensor Networks.
View : Abstract Basepaper
Sensor Networking
36.Modified DSR (Preemptive) to reduce link breakage and routing overhead for MANET using Proactive Route Maintenance (PRM).
View : Abstract Basepaper
Ieee Journal Of Networking
37.Secure Data Objects Replication in Data Grid.
View : Abstract Basepaper
Ieee Dependable and Secure Computing
38.Toward Optimal Network Fault Correction in Externally Managed Overlay Networks.
View : Abstract Basepaper
Ieee Parallel and Distributed Systems
39.TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks.
View : Abstract Basepaper
Ieee Parallel and Distributed Systems
40.IRM Integrated File Replication and Consistency Maintenance in P2P Systems.
View : Abstract Basepaper
Ieee Parallel and Distributed Systems
41.Anonymous Query Processing in Road Networks.
View : Abstract Basepaper
Ieee Knowledge And Data Engineering
42.Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks.
View : Abstract Basepaper
Ieee Mobile Computing
43.Castor Scalable Secure Routing for Ad Hoc Networks.
View : Abstract Basepaper
Ieee Transactions On Networking
44.Equilibrium of Heterogeneous Congestion Control Optimality and Stability.
View : Abstract Basepaper
Ieee Transactions On Networking
45.Replication routing in DTNs: a resource allocation approach.
View : Abstract Basepaper
Ieee Transactions On Networking
46.MABS Multicast Authentication Based on Batch Signature.
View : Abstract Basepaper
Ieee Mobile Computing
47.Inside the Permutation-Scanning WormsPropagation Modeling and Analysis.
View : Abstract Basepaper
Ieee Transactions On Networking
48.Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks.
View : Abstract Basepaper
International Journal of Engineering
49 .Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks.
View : Abstract Basepaper
International Journal of Engineering
50.Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation.
View : Abstract Basepaper
International Journal of Engineering
51.Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.
View : Abstract Basepaper
Ieee Cloud Computing
52.A Cooperative Diversity-based Robust MAC Protocol in Wireless Ad Hoc Networks.
View : Abstract Basepaper
Ieee Cloud Computing
53.A General Framework for Service Availability for Bandwidth-Efficient Connection-Oriented Networks.
View : Abstract Basepaper
Ieee Cloud Computing
54.A Novel Cross Layer Intrusion Detection System in MANET.
View : Abstract Basepaper
Ieee Cloud Computing
55.Network-Based Traitor-Tracing Technique Using Traffic Pattern.
View : Abstract Basepaper
Ieee Cloud Computing
56 .Multicast Scaling Laws with Hierarchical Cooperation.
View : Abstract Basepaper
Ieee Transaction On Mobile Computing
57.Supporting Pattern Matching Queries over Trajectories on Road Networks.
View : Abstract Basepaper
Ieee Knowledge And Data Engineering
58.Reputation Estimation and Query in Peer-to-Peer Networks.
View : Abstract Basepaper
Ieee Communications
59.Achieving Guaranteed Anonymity in GPSTraces via Uncertainty-Aware Path Cloaking.
View : Abstract Basepaper
Ieee Transaction On Mobile Computing
60.Handling Mobility in Wireless Sensor and Actor Networks.
View : Abstract Basepaper
Ieee Transaction On Mobile Computing
61 .Clustering and Cluster-Based Routing Protocol for Delay-Tolerant Mobile Networks.
View : Abstract Basepaper
Ieee Transactions On Wireless Communications
62 .Dynamic Multichannel Access With Imperfect Channel State Detection.
View : Abstract Basepaper
Ieee Transactions On Signal Processing
63 .Practical Algorithm For Minimum Delay Peer-to-Peer Media Streaming.
View : Abstract Basepaper
Ieee School of Computer Engineering
64.Engineering Wireless Mesh Networks:Joint Scheduling, Routing, Power Control,and Rate Adaptation.
View : Abstract Basepaper
Ieee Transactions On Networking
65 .Adaptive Directional Wavelet Transform Based on Directional Prefiltering.
View : Abstract Basepaper
Ieee Image Processing
66 .Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
View : Abstract Basepaper
Ieee Transactions Wireless Communications
67 .Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks.
View : Abstract Basepaper
Ieee Transactions Wireless Communications
68 .Analysing GOP Structure and Packet Loss Effects on Error Propagation in MPEG–4 Video Streams.
View : Abstract Basepaper
Ieee Transactions On Signal Processing
69 .Privacy-Conscious Location-Based Queries in Mobile Environments.
View : Abstract Basepaper
International Journal of Engineering
70 .LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs.
View : Abstract Basepaper
International Journal of Engineering
71 .Reduced-Complexity Near-Capacity Downlink Iteratively Decoded Generalized Multi-Layer Space-Time Coding Using Irregular Convolutional Codes.
View : Abstract Basepaper
Ieee Transactions Wireless Communications
72 .Layered Steered Space–Time-Spreading-Aided Generalized MC DS-CDMA.
View : Abstract Basepaper
Ieee Transactions On Vehicular Technology
73 .Supporting Pattern Matching Queries over Trajectories on Road Networks.
View : Abstract Basepaper
Ieee Knowledge And Data Engineering
74 .Weighted Spectral Distribution for Internet Topology Analysis: Theory and Applications.
View : Abstract Basepaper
Ieee Transactions On Networking
75 .Chunk distribution in Mesh-Based Large Scale P2P Streaming Systems: A fluid approach.
View : Abstract Basepaper
Ieee Parallel And Ditributed Systems
76 .Cross-Layer Design in Multihop Wireless Networks.
View : Abstract Basepaper
Ieee Wireless Communications
77 .Interference-Limited Opportunistic Relaying with Reactive Sensing.
View : Abstract Basepaper
Ieee Transactions Wireless Communications
78 .On the Performance of Content Delivery under Competition in a Stochastic Unstructured
Peer-to-Peer Network.

View : Abstract Basepaper
Ieee Parallel And Ditributed Systems
79 .Super-Diffusive Behavior of Mobile Nodes and its Impact on Routing Protocol Performance.
View : Abstract Basepaper
Ieee Transaction On Mobile Computing
80 .A Lock-Free, Cache-Efficient Multi-Core Synchronization Mechanism for Line-Rate
Network Traffic Monitoring.

View : Abstract Basepaper
Ieee Parallel And Ditributed Systems
81 .Toward Optimal Network Fault Correction in Externally Managed Overlay Networks.
View : Abstract Basepaper
Ieee Parallel And Ditributed Systems
82 .Preamble-Based Channel Estimation for CP-OFDM and OFDM/OQAM Systems: A Comparative Study.
View : Abstract Basepaper
Ieee Transactions On Signal Processing
83.Layered Steered Space–Time-Spreading-Aided Generalized MC DS-CDMA.
View : Abstract Basepaper
Ieee Vehicular Technology
84 .Fast Maximum-Likelihood Decoding of the Golden Code.
View : Abstract Basepaper
Ieee Wireless Communications
85 .Rate-Distortion Optimized Bitstream Extractor for Motion Scalability in Wavelet-Based Scalable Video Coding.
View : Abstract Basepaper
Ieee Image Processing
86 .Selective Data Pruning-Based Compression Using High-Order Edge-Directed Interpolation .
View : Abstract Basepaper
Ieee Image Processing
87 .Efficient Stereoscopic Ranging via Stochastic Sampling of Match Quality.
View : Abstract Basepaper
Ieee Image Processing
88 .Unequal Power Allocation for JPEG Transmission Over MIMO Systems.
View : Abstract Basepaper
Ieee Image Processing
89 .Motion Tuned Spatio-temporal Quality Assessment of Natural Videos.
View : Abstract Basepaper
Ieee Image Processing
90 .Improving Shape Retrieval by Spectral Matching and Meta Similarity.
View : Abstract Basepaper
Ieee Image Processing
91 .Image Super-Resolution via Sparse Representation.
View : Abstract Basepaper
Ieee Image Processing
92 .Learning With l1-Graph for Image Analysis.
View : Abstract Basepaper
Ieee Image Processing