90 2011 ieee project titles
TRANSCRIPT
-
8/3/2019 90 2011 IEEE Project Titles
1/16
S.N 2011 IEEE Project Titles
1 Forward Correction and Fountain Codes in Delay Tolerant Networks
2 A Personalized Ontology Model For Web Information Gathering
3 Continuous Neighbor Discovery in Asynchronous Sensor Networks
4 Adaptive Provisioning Of Human Expertise In Service-Oriented Systems
5Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual
Server Ports
6 Bridging Socially-Enhanced Virtual Communities
7Fast Simulation of Service Availability in Mesh Networks With Dynamic Path
Restoration
8 Data Integrity Proofs In Cloud Storage
9 ROC: Resilient Online Coverage for Surveillance Applications
10Efficient Computation Of Range Aggregates Against Uncertain Location Based
Queries
11Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing
In The Cloud
12 Live Streaming With Receiver-Based Peer-Division Multiplexing
13 Exploring Application-Level Semantics For Data Compression
14 Optimal Service Pricing For A Cloud Cache
15A New Approach for FEC Decoding Based on the BP Algorithm in LTE and
WiMAX Systems
16 Digital Image hiding using curve let transform
17A Foundation for Stochastic Bandwidth Estimation of Networks with Random
Service
18Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc
Networks
19 Publishing Search Logs A Comparative Study Of Privacy Guarantees
20 MANET Routing Protocols vs Mobility Models: A Performance Evaluation
21
The Awareness Network, To Whom Should I Display My Actions And, Whose
Actions
22 Effective Navigation of Query Results Based on Concept Hierarchies
23Efficient Multi-dimensional Fuzzy Search for Personal Information Management
Systems
24Improving Aggregate Recommendation Diversity Using Ranking-Based
Techniques
25 Integration Of Sound Signature In Graphical Password Authentication System
-
8/3/2019 90 2011 IEEE Project Titles
2/16
26 Modeling And Detection Of Camouflaging Worm
27 Monitoring Service Systems From A Language-Action Perspective
28One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For
Web Databases
29 Nymble Blocking Misbehaving Users in Anonymizing Networks
30 Data Integrity Proofs In Cloud Storage
31 The World In A Nutshell: Concise Range Queries
32 A Generic Multilevel Architecture For Time Series Prediction
33 Intrusion detection: An Energy efficient approach in heterogeneous WSN
34 NABS Novel Approaches for Biometric Systems
35A Machine Learning Approach For Identifying Disease-Treatment Relations In
Short Texts36 A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm
37 A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
A Link Analysis Extension Of Correspondence
Analysis For Mining Relational Databases
39 A Dual Framework And Algorithms For Targeted Online Data Delivery
40 Adaptive Cluster Distance Bounding For High-Dimensional Indexing
41Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast
Service
42 Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
43 Clustering with Multi- View Point Based Similarity Measure
44Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc
Networks
45Going Back and Forth Efficient Multi deployment and Multi snap shutting on
Clouds
46 Secure and Practical Outsourcing of Linear Programming in Cloud Computing
47 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
48A Unified Approach to Optimizing Performance in Networks Serving
Heterogeneous Flows
49Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless
Networks
50A Privacy-Preserving Location Monitoring
System for Wireless Sensor Networks
38
-
8/3/2019 90 2011 IEEE Project Titles
3/16
51Extended XML Tree Pattern Matching: Theories
and Algorithms
52 Buffer Sizing for 802.11 Based Networks
53Delay Analysis and Optimality of Scheduling Policies for
Multi-Hop Wireless Networks
54 Discovering Conditional Functional Dependencies
55Effective Navigation of Query Results
Based on Concept Hierarchies
56 Load Shedding in Mobile Systems with MobiQual
57Nymble: Blocking Misbehaving Users in
Anonymizing Networks
58 Ranking Spatial Data by Quality Preferences
59
SAT: A Security Architecture Achieving
Anonymity and Traceability in Wireless
Mesh Networks
60 Secure and Practical Outsourcing of LinearProgramming in Cloud Computing
61 Selfish Overlay Network Creation and Maintenance
62 SPAF: Stateless FSA-based Packet Filters
63Horizontal Aggregations in SQL to Prepare Data
Sets for Data Mining Analysis
64A Query Formulation Language for the
Data Web
65Automated Certification for Compliant Cloud-based
Business Processes
66 Distributed Adaptation of Quantized Feedback forDownlink Network MIMO Systems
67The Geometric Efficient Matching Algorithm for
Firewalls
68Robust Correlation of Encrypted Attack Traffic
through Stepping Stones by Flow Watermarking
69Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer
Design
70 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
71 Throughput Optimization in High Speed Downlink Packet Access
-
8/3/2019 90 2011 IEEE Project Titles
4/16
Year
2011/platformDomain
JAVA Networking
.NET Data Mining
JAVA Networking
.NET Data Mining
JAVA Networking
.NET Networking
JAVA Networking
.NET Cloud Computing
JAVA Networking
.NET Data Mining
.NET Data mining
JAVA Networking
.NET Data mining
.NET Data Mining
JAVA Network Security
.NET Secure Computing
JAVA Network
JAVA Network
.NET Data Mining
JAVA Network
.NET Data Mining
JAVA Data Mining
.NET Data Mining
.NET Data mining
.NET Data Mining
-
8/3/2019 90 2011 IEEE Project Titles
5/16
JAVA Secure Computing
.NET Service Computing
.NET Data mining
JAVA Network
.NET Software Engineering
.NET Data mining
JAVA Data mining
.NET Network Security
.NET Secure Computing
JAVA Data mining
.NET Data mining
.NET Data mining
JAVA
JAVA
JAVA Data mining
JAVA Data mining
JAVA Network
JAVA Network Security
JAVA Data mining
JAVA Network
JAVA Cloud Computing
JAVA Cloud Computing
JAVA Network
JAVA Network
.NET Network
JAVA MOBILE COMPUTING
Data mining
-
8/3/2019 90 2011 IEEE Project Titles
6/16
JAVAKNOWLEDGE AND
DATA ENGINEERING
JAVA NETWORKING
JAVA NETWORKING
JAVAKNOWLEDGE AND
DATA ENGINEERINGJAVA
KNOWLEDGE AND
DATA ENGINEERING
JAVAKNOWLEDGE AND
DATA ENGINEERING
JAVA SECURE COMPUTING
JAVAKNOWLEDGE AND
DATA ENGINEERING
JAVA SECURE COMPUTING
JAVA CLOUD COMPUTING
JAVA NETWORKING
JAVA NETWORKING
.NET Data Mining
.NET
.NET Cloud Computing
.NET WIRELESSCOMMUNICATIONS
.NET SECURE COMPUTING
.NET SECURE COMPUTING
.NET Network
JAVA Network
JAVA Network
-
8/3/2019 90 2011 IEEE Project Titles
7/16
S.N 2011 IEEE Project Titles Year
1 Forward Correction and Fountain Codes in Delay Tolerant Networks 2011/ Java
2 A Personalized Ontology Model For Web Information Gathering 2011/ .Net
3 Continuous Neighbor Discovery in Asynchronous Sensor Networks 2011/ Java
4 Adaptive Provisioning Of Human Expertise In Service-Oriented Systems 2011/ .Net
5Scalable and Cost-Effective Interconnection of Data-Center Servers
Using Dual Server Ports2011/ Java
6 Bridging Socially-Enhanced Virtual Communities 2011/ .Net
7Fast Simulation of Service Availability in Mesh Networks With Dynamic
Path Restoration2011/ Java
8 Data Integrity Proofs In Cloud Storage 2011/ .Net
9 ROC: Resilient Online Coverage for Surveillance Applications 2011/ Java
10Efficient Computation Of Range Aggregates Against Uncertain Location
Based Queries2011/ .Net
11Exploiting Dynamic Resource Allocation For Efficient Parallel Data
Processing In The Cloud2011/ .Net
12 Live Streaming With Receiver-Based Peer-Division Multiplexing 2011/ Java
13 Exploring Application-Level Semantics For Data Compression 2011/ .Net
14 Optimal Service Pricing For A Cloud Cache 2011/ .Net
15A New Approach for FEC Decoding Based on the BP Algorithm in LTE
and WiMAX Systems2011/ Java
16 Digital Image hiding using curve let transform 2011/ .Net
17A Foundation for Stochastic Bandwidth Estimation of Networks with
Random Service2011/ Java
18 Caching Strategies Based on Information Density Estimation in WirelessAd Hoc Networks
2011/ Java
19 Publishing Search Logs A Comparative Study Of Privacy Guarantees 2011/ .Net
20MANET Routing Protocols vs Mobility Models: A Performance
Evaluation2011/ Java
21The Awareness Network, To Whom Should I Display My Actions And,
Whose Actions2011/ .Net
-
8/3/2019 90 2011 IEEE Project Titles
8/16
22 Effective Navigation of Query Results Based on Concept Hierarchies 2011/J2EE
23Efficient Multi-dimensional Fuzzy Search for Personal Information
Management Systems2011/ .Net
24Improving Aggregate Recommendation Diversity Using Ranking-Based
Techniques2011/ .Net
25 Integration Of Sound Signature In Graphical Password AuthenticationSystem
2011/ .Net
26 Modeling And Detection Of Camouflaging Worm 2011/ Java
27 Monitoring Service Systems From A Language-Action Perspective 2011/ .Net
28One Size Does Not Fit All: Towards User- And Query-Dependent
Ranking For Web Databases2011/ .Net
29 Nymble Blocking Misbehaving Users in Anonymizing Networks 2011/ Java
30 Data Integrity Proofs In Cloud Storage 2011/ .Net
31 The World In A Nutshell: Concise Range Queries 2011/ .Net
32 A Generic Multilevel Architecture For Time Series Prediction 2011/ Java
33Intrusion detection: An Energy efficient approach in heterogeneous
WSN2011/ .Net
34 NABS Novel Approaches for Biometric Systems 2011/ .Net
35 A Machine Learning Approach For Identifying Disease-TreatmentRelations In Short Texts
2011/ Java
36 A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm 2011/ .Net
37A Fuzzy Self-Constructing Feature Clustering Algorithm For Text
Classification2011/ .Net
A Link Analysis Extension Of Correspondence
Analysis For Mining Relational Databases
39 A Dual Framework And Algorithms For Targeted Online Data Delivery 2011/ Java
40 Adaptive Cluster Distance Bounding For High-Dimensional Indexing 2011/ Java
41Dynamic Channel Allocation for Wireless Zone-Based Multicast and
Broadcast Service2011/ Java
42 Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks 2011/ Java
38 2011/ Java
-
8/3/2019 90 2011 IEEE Project Titles
9/16
43 Clustering with Multi- View Point Based Similarity Measure 2011/ Java
44Caching Strategies Based on Information Density Estimation in Wireless
Ad Hoc Networks
45Going Back and Forth Efficient Multi deployment and Multi snap
shutting on Clouds2011/ Java
46 Secure and Practical Outsourcing of Linear Programming in CloudComputing
2011/ Java
47A Privacy-Preserving Location Monitoring System for Wireless Sensor
Networks2011/ Java
48A Unified Approach to Optimizing Performance in Networks Serving
Heterogeneous Flows2011/ Java
49Delay Analysis and Optimality of Scheduling Policies for Multi-Hop
Wireless Networks2011/ .Net
50Improving the Performance of Wireless Ad Hoc Networks Through MAC
Layer Design2011/ .Net
51 Supporting Efficient and Scalable Multicasting over Mobile Ad HocNetworks
2011/ Java
52 Throughput Optimization in High Speed Downlink Packet Access 2011/ .Net
53 Sketch4Match-Content Based Image Retrival System Using Sketches 2011/ Java
54 Embedded Extended Visual Cryptography Schemes 2011/ Java
55 A Competitive Study of Cryptography Techniques over Block Cipher 2011/ Java
56 Roboust Video Data Hiding Using Forbidden Zone Data Hiding andSelective Embedding
2011/ Java
57Online Intrusion Alert Aggregation with Generative Data Stream
Modeling2011/ Java
58 A More Secure Steganography Method in Spatial Domain 2011/ Java
59A User-oriented Image Retrieval System Based on Interactive Genetic
Algorithm2011/ .Net
60A Web Search Engine Based Approach to Measure Semantic Similarity
Between Words2011/ .Net
61 Weighted Energy Detection for Noncoherent Ultra-Wideband ReceiverDesign
2011/ .Net
62 Problems and Solutions of Web Search Engines 2011/ .Net
63 Adaptive Cluster Distance Bounding for High Dimensional Indexing 2011/ Java
64Distributed Adaptation of Quantized Feedback for Downlink Network
MIMO Systems2011/ .Net
-
8/3/2019 90 2011 IEEE Project Titles
10/16
65 Live Streaming with Receiver-based Peer-division Multiplex in 2011/ .Net
66Jamming-Aware Traffic Allocation for Multiple-Path Routing Using
Portfolio Selection2011/ .Net
67 Secure High-Throughput Multicast Routing in Wireless Mesh Networks 2011/ Java
68 Optimal Stochastic Location Updates in Mobile Ad Hoc Network 2011/ Java
69 Throughput Optimization in Mobile Backbone Networks 2011/ Java
70 RITAS: Services for Randomized Intrusion Tolerance 2011/ Java
71 Selfish Overlay Network Creation and Maintenance 2011/ Java
72 Comparative Evaluation of Spoofing Defenses 2011/ Java
73 SAT: A Security Architecture Achieving Anonymity and Traceability inWireless Mesh Networks
2011/ Java
74Topological Transformation Approaches to TCAM-Based Packet
Classification2011/ Java
75 Ranking Spatial Data by Quality Preferences 2011/ Java
76A Privacy-Preserving Location Monitoring
System for Wireless Sensor Networks2011/JAVA
77Extended XML Tree Pattern Matching: Theories
and Algorithms2011/JAVA
78 Buffer Sizing for 802.11 Based Networks 2011/JAVA
79 Discovering Conditional Functional Dependencies 2011/JAVA
80Effective Navigation of Query Results
Based on Concept Hierarchies2011/JAVA
81 Load Shedding in Mobile Systems with MobiQual 2011/JAVA
82 SPAF: Stateless FSA-based Packet Filters 2011/JAVA
83 Horizontal Aggregations in SQL to Prepare DataSets for Data Mining Analysis
2011/.NET
84A Query Formulation Language for the
Data Web2011/.NET
85Automated Certification for Compliant Cloud-based
Business Processes2011/.NET
86Distributed Adaptation of Quantized Feedback for
Downlink Network MIMO Systems2011/.NET
-
8/3/2019 90 2011 IEEE Project Titles
11/16
87The Geometric Efficient Matching Algorithm for
Firewalls2011/.NET
88Robust Correlation of Encrypted Attack Traffic
through Stepping Stones by Flow Watermarking2011/.NET
89 Cloud Computing for Agent-Based Urban Transportation Systems 2011/JAVA
90 ProgME: Towards Programmable Network Measurement 2011/JAVA
-
8/3/2019 90 2011 IEEE Project Titles
12/16
Domain
Networking
Data Mining
Networking
Data Mining
Networking
Networking
Networking
Cloud Computing
Networking
Data Mining
Data mining
Networking
Data mining
Data Mining
Network Security
Secure Computing
Network
Network
Data Mining
Network
Data Mining
-
8/3/2019 90 2011 IEEE Project Titles
13/16
Data Mining
Data Mining
Data mining
Data Mining
Secure Computing
Service Computing
Data mining
Network
Software Engineering
Data mining
Data mining
Network Security
Secure Computing
Data mining
Data mining
Data mining
Data mining
Data mining
Network
Network Security
Data mining
-
8/3/2019 90 2011 IEEE Project Titles
14/16
Data mining
Network
Cloud Computing
Cloud Computing
Network
Network
Network
Network
Network
Network
Image Processing
Secure Computing
Secure Computing
Multimedia
Network Security
Secure Computing
Image Processing
Data Mining
Network
Web Mining
Data Mining
Network
-
8/3/2019 90 2011 IEEE Project Titles
15/16
Network
Network
Mobile Computing
Mobile Computing
Mobile Computing
Network Security
Network
Network Security
Network Security
Network
Data Mining
MOBILE COMPUTING
KNOWLEDGE AND DATA
ENGINEERING
NETWORKING
KNOWLEDGE AND DATA
ENGINEERING
KNOWLEDGE AND DATA
ENGINEERING
KNOWLEDGE AND DATA
ENGINEERING
NETWORKING
Data Mining
Cloud Computing
WIRELESS COMMUNICATIONS
-
8/3/2019 90 2011 IEEE Project Titles
16/16
SECURE COMPUTING
SECURE COMPUTING
INTELLIGENT SYSTEMS
NETWORKING