Tuesday, August 25, 2009

NETWORK SECURITY PROJECTS

1. A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution - 2009

2. A New Reliable Broadcasting in Mobile Ad Hoc Networks - 2009

3. A Hybrid Reliable Routing Technique (HRR) for Wireless Sensor Network - 2009

4. Anonymity in Wireless Broadcast Networks - 2009

5. Efficient Key Management in Mission-Critical Wireless Ad Hoc Networks - 2009

6. Identifying Malevolent Packet loss while Congestion Occured - 2009

7. Enhanced Communal Global, Local Memory Management for Effective Performance of Cluster Computing - 2008

8. Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs – 2007

MOBILE COMPUTING PROJECTS

9. A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice – 2009

10. Contention-Aware Performance Analysis of Mobility-Assisted Routing- 2009

11. Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks – 2009

12. Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks A Game-Theoretic Modeling Approach - 2009

13. Minimizing Recovery State in Geographic Ad Hoc Routing - 2009

14. RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks - 2009

15. Evaluating Context Information Predictability for Autonomic Communication - 2009

16. Mobility Increases the Capacity of Ad Hoc Wireless Networks - 2009

17. Design of mobile electronic commerce system based on J2ME - 2009

18. Multicasting with Localized Control in Wireless Ad Hoc Networks - 2009

19. A Cross-Layer Framework for Association Control in Wireless Mesh Networks - 2009

20. Cell Breathing Techniques for Load Balancing in Wireless LANs - 2009

21. Wardrop Routing in Wireless Networks - 2009

22. A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks - 2009

23. Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks - 2008

24. Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks - 2008

25. Bandwidth Estimation for IEEE 802.11 Based Ad Hoc Networks - 2008

26. An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs – 2007

27. A Location-Based Routing Method for Mobile Ad Hoc Networks – 2005

28. Distributed Cache Updating for the Dynamic Source Routing Protocol – 2005

29. Mobile Objects and Mobile Agents: The Future of Distributed Computing – 2004

ADHOC NETWORKS PROJECTS

30. A Framework for the Capacity Evaluation of Multihop Wireless Networks - 2009

31. Consistency Management Strategies for Data Replication in Mobile Ad Hoc Networks - 2009

32. A Self Repairing Tree Topology Enabling Content based Routing in Mobile Ad Hoc Networks - 2007

33. Benefit based Data Caching in Ad Hoc Networks – 2005

34. A Novel Secure Communication Protocol for Ad Hoc Networks [SCP] – 2004

35. Scalable Wireless Adapt Network Simulator Using XTC - 2004

36. Location-Aided Routing (LAR) in Mobile Ad Hoc Networks – 2000

PARALLEL & DISTRIBUTED COMPUTING PROJECTS

37. Dynamic Routing with Security considerations - 2009

38. An Architectural Framework for Accurate Characterization of Network Traffic - 2009

39. Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks - 2009

40. Multipath Dissemination in Regular Mesh Topologies - 2009

41. A Tree-Based Peer-to-Peer Network with Quality Guarantees – 2008

42. Computation Efficient Multicast Key Distribution – 2008

43. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries – 2008

44. The Server Reassignment Problem for Load Balancing in Structured P2P Systems - 2008

45. Quiver Consistent Object Sharing for Edge Services – 2008

46. Retrieving Files using Content based Searching & Displaying them in a Carousel View - 2007

47. A New Operational Transformation Framework for Real-Time Group Editors – 2007

48. A Fully Distributed Proactively Secure Threshold-Multisignature Scheme - 2007

49. ODAM: An Optimized Distributed Association Rule Mining Algorithm – 2004

50. Unified Network Monitoring For Web Technology – 2003

NETWORKING PROJECTS

51. Node isolation model and age-based neighbor selection in unstructured P2P networks – 2009

52. A Multilayer Fault Localization Framework for IP over All-Optical Multilayer Networks - 2009

53. Energy–Robustness Tradeoff in Cellular Network Power Control - 2009

54. Entropy Based Adaptive Flow Aggregation - 2009

55. Node Isolation Model and Age-Based Neighbor Selection in Unstructured P2P Networks - 2009

56. Optimal Backpressure Routing for Wireless Networks with Multi-Receiver Diversity - 2009

57. Long Time Neighbor Selection and Avoiding Node Separation from P2P Network - 2009

58. Homogeneous and Heterogeneous Load balancing

59. Distributed Subset Match in peer to Peer Network - 2009

60. A Traffic Engineering Approach for Placement and Selection of Network Services - 2009

61. A Secure Routing against Byzantine Attacks for MANETs in Adversarial Environments - 2009

62. Monitoring the application-layer DDOS attacks for popular websites - 2009

63. NetQuest: A Flexible Framework for large-Scale Network Measurement - 2009

64. Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search - 2009

65. A Hybrid Network Architecture for File Transfers - 2009

66. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion - 2008

67. Minimizing File Download Time in Stochastic Peer-to-Peer Networks - 2008

68. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing - 2008

69. A Geometric Approach to Improving Active Packet Loss Measurement - 2008

70. Two Techniques for Fast Computation of Constrained Shortest Paths - 2008

71. Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction - 2008

72. BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks - 2008

73. Securing User-Controlled Routing Infrastructures - 2008

74. A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm – 2006

75. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks - 2004

76. Authenticating Network Attached Storage – 2003

77. Modeling Peer-Peer File Sharing Systems – 2003

78. ITP: An Image Transport Protocol for the Internet – 2002

79. AI NET - A network that integrates ATM and IP - 2002

80. Network Border Patrol For Congestion Collapse Preventing

81. Dynamic Parallel Access to Replicated Content in the Internet - 2002

IMAGE PROCESSING PROJECTS

82. Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos - 2009

83. Depth based 2D-3D combined scene images for 3D Multiview Displays - 2009

84. Hierarchical Bayesian sparse image reconstruction with application to MRFM - 2009

85. Image Enhancement for Fluid Lens Camera Based on Color Correlation - 2009

86. Facial Recognition using Multisensor Images based on Localized Kernel Eigen Spaces - 2009

87. Semi-Automatically Driven Color Demosaicking - 2009

88. High-Dimensional Statistical Measure for Region-of-Interest Tracking - 2009

89. Efficient Implementation for Spherical Flux Computation and its Application to Vascular Segmentation - 2009

90. Structure & Texture Filling-In of Missing Image Blocks in Wireless Transmission & Compress – 2003

SOFTWARE ENGINEERING PROJECTS

91. CHARMY: A Framework for Designing and Verifying Architectural Specifications - 2009

92. Identification of Move Method Refactoring Opportunities - 2009

93. Publishing and Discovering Atomicity - Equivalent Services - 2009

94. A Hierarchical Model for Object-Oriented Design Quality Assessment - 2009

95. Automatic Extraction of Heap Reference Properties in Object-Oriented Programs - 2009

96. Variability and Reproducibility in Software Engineering: A Study of Four Companies that Developed the same System - 2009

97. Automated Trace Analysis of Discrete-Event System Models

98. Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies – 2008

99. Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems – 2008

KNOWLEDGE & DATA ENGINEERING PROJECTS

100. A Relation-Based Page Rank Algorithm for Semantic Web Search Engines - 2009

101. Clustering and Sequential Pattern Mining of Online Collaborative Learning Data - 2009

102. Online Scheduling Sequential Objects with Periodicity for Dynamic Information Dissemination - 2009

103. Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems - 2009

104. Exact Border-Based Approach for Hiding Sensitive Information - 2009

105. Hierarchically Distributed Peer-To-Peer (HP2PC) Architecture and Clustering Algorithm - 2009

106. A Relation-Based Page Rank Algorithm for Semantic Web Search Engines - 2009

107. An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis – 2008

108. Distributed Suffix Tree Overlay for Peer-to-Peer Search – 2008

109. Probabilistic Group Nearest Neighbor Queries in Uncertain Databases – 2008

110. A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns - 2008

111. Truth Discovery with Multiple Conflicting Information Providers on Web - 2008

COMMUNICATION ENGINEERING

112. Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks – 2009

113. Increasing packet delivery in ad hoc on-demand distance vector (AODV) routing protocol – 2008

CRYPTOGRAPHY

114. Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems – 2009 -

115. Differential Power Analysis Attacks to Precharged Busses: A General Analysis for Symmetric-Key Cryptographic Algorithms – 2009

SECURE COMPUTING

116. Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing – 2009 -

117. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers – 2009

118. On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme – 2009

119. Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions – 2009 - NEURAL NETWORKS

120. Computation of Performance Bounds for Real-Time Systems using Time Petri Nets – 2009 - INDUSTRIAL INFORMATICS

121. Continuous Flow Wireless Data Broadcasting for High Speed Environments – 2009 – BROADCASTING

122. A Reference Architecture for Scientific Workflow Management Systems and the VIEW SOA Solution – 2009 – SERVICE COMPUTING

123. A Distributed System for Consuming Web Services and Caching their Responses in MANETs – 2009 – SERVICE COMPUTING

124. E-Secure Transactions - Secure Electronic Data Interchange over Internet – 2005 – INTERNET COMPUTING

125. Noise Reduction by Fuzzy Image Filtering – 2003 - FUZZY SYSTEMS

126. Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos – 2009 - MULTIMEDIA

127. Segmentation-Driven Image Fusion based on Alpha-Stable modeling of Wavelet Coefficients – 2009 - MULTIMEDIA

WIRELESS COMMUNICATIONS PROJECTS

128. Efficient Multi-Party Digital Signature using Adaptive Secret Sharing for Low-Power Devices in Wireless Networks - 2009

129. High Performance Cooperative Transmission Protocols Based on Multiuser Detection and Network Coding - 2009

130. Multi-Service Load Sharing for Resource Management in the Cellular WLAN Integrated Network - 2009

131. Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks - 2009

132. Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks - 2009

133. SIR Analysis and Interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing Offsets - 2009

134. Study of Rough Set and Clustering Algorithm in Network Security Management - 2009

135. A Statistical Model for Indoor office Wireless Sensor Channels - 2009

136. Robust Cooperative Routing Protocol in Mobile Wireless Sensor Networks - 2009

NEURAL NETWORKS PROJECTS

137. Permitted and Forbidden Sets in Discrete-Time Linear Threshold Recurrent Neural Networks - 2009

138. A New Projection-Based Neural Network for Constrained variational Inequalities - 2009

139. Analysis of Survival Data having time-Dependent Covariates - 2009

140. A Multitask Learning Model for Online Pattern Recognition - 2009

141. A Self-Organized, Distributed and Adaptive Rule-Based Induction System - 2009

DATAMING PROJECTS

142. Agent Mining: The Synergy of Agents and Data Mining - 2009

143. Analysis Methods of Workflow Execution Data Based on Data Mining - 2009

144. Data Mining in Hospital Information System for Hospital Management - 2009

145. Application of Genetic Algorithm in Data Mining - 2009

146. Subontology based Resource Management for Web based e-Learning - 2009

147. Mining Electronic Medical Records for Patient Care Patterns - 2009

148. Ranking and Suggesting Popular Items - 2009

149. Predicting Missing Items in Shopping Carts - 2009

150. Open Smart Classroom: Extensible and Scalable Learning System in Smart Space using Web Service Technology - 2009

151. Approximate Distributed K-Means Clustering Over a Peer-to-Peer Network - 2009

152. An Efficient Association Rule Mining Algorithm In Distributed Databases – 2008

153. Distributed Data Mining in Credit Card Fraud Detection


SIGNAL PROCESSING PROJECTS

154. A Novel Subspace Approach for Cooperative Localization in Wireless Sensor Networks Using Range Measurements - 2009

155. Efficient Design of Cosine-Modulated Filter Banks via Convex Optimization - 2009

156. Frequency-Selective KYP Lemma, IIR Filter, and Filter Bank Design - 2009

157. Optimized Analog Filter Designs with Flat Responses by Semidefinite Programming - 2009

DEPENDABLE & SECURE COMPUTING

158. Mimicry Attacks on Host-Based Intrusion Detection Systems

159. Attacking DDOS at the Source - 2009

160. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm - 2008

161. Controlling IP Spoofing Through Inter Domain Packet Filters - 2008

162. Modeling & Automated Containment of Worms - 2008

163. An Adaptive Programming Model for Fault Tolerant Distributed Computing – 2007

164. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes – 2007

GRID COMPUTING PROJECTS

165. Cooperative Secondary Authorization Recycling - 2009

166. Dynamic Load Balancing and Job Replication in a Global-Scale Grid Environment - A Comparison - 2009

167. Enhancing privacy and Authorization Control Scalability in the Grid through Ontologies - 2009

168. Efficient Software-Based Encoding and Decoding of BCH Codes - 2009

169. Grid Computing Platform for Secure Multi-Job operation - 2009

170. On the Design of fault-Tolerent Scheduling Strategies using Primary-backup Approach for Computational Grids with Low Replication Costs - 2009

171. PEACE: A Sophisticated Privacy-Enhanced yet Accountable Security Framework for Wireless Mesh Networks – 2009

WIRELESS SENSOR NETWORKS PROJECTS

172. Model-Based Techniques for Data Reliability in Wireless Sensor Networks – 2009

173. Modeling Detection Latency with Collaborative Mobile Sensing Architecture – 2009

174. Effects of Deniel-of-Sleep Attacks on Wireless Sensor Network MAC Protocols - 2009

175. EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks – 2009

PATTERN ANALYSIS & MACHINE INTELLIGENCE PROJECTS

176. Offline Loop Investigation for Handwriting Analysis - 2009

177. Semisupervised Learning of Hidden Markov Models via a Homotopy Method - 2009

178. Framework for Performance Evaluation of Face, Text & Vehicle Detection and Tracking in Video: Data, Metrics & Protocol - 2009

179. Face Recognition using Laplacian Faces – 2005

180. Online Handwritten Script Recognition – 2004

INFORMATION FORENSICS AND SECURITY PROJECT

181. Network Topology against Distributed Denial of Service Attacks DDOS – 2006

182. On the Implementation of the Discrete Fourier Transform in the Encrypted Domain - 2009

183. SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks – 2009

WEB APPLICATION PROJECTS

184. Fast Algorithms for Mining Association Rules - 2009

185. Modeling and using imperfect Context Information - 2009

186. Two Factor Authentication using Mobile Phones - 2009

IEEE TRANSACTIONS ON COMPUTERS

187. Collusive piracy prevention in P2P content delivery network – 2009

188. Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network - 2009

189. SOBIEA Novel Super-node P2P Overlay Based on Information Exchange - 2009

190. Development and Design of a new Logistics Information Management System - 2009

191. An Authenticated Paradigm for Mobile Agent System in Online Examination – 2009

192. A Concatenated Model for Video Frame Interpolation - 2009

193. An Adaptive Extension of Combined 2D and 1D-Directional Filter Banks - 2009

194. An Efficient Authentication Scheme for Digital Credentials - 2009

195. An XML-Based ADL Framework for Automatic Generation of Multithreaded Computer Architecture Simulators - 2009

196. Clone Detection and Removal for ErlangOTP within a Refactoring Environment - 2009

197. Combined Image Plus Depth Seam Carving for Multiview 3D Images - 2009

198. Cross-layer Based Anomaly Detection in Wireless Mesh Networks - 2009

199. Data Pruning-Based Compression using High Order Edge-Directed Interpolation - 2009

200. Efficient Scheduling Algorithm for QOS Support in High Speed Downlink Packet Access Networks - 2009

201. Enhancing the Scalability of IMS-based Presence Service for LBS Applications – 2009

202. Guaranteed delivery for Geographical any Casting in wireless Multi-sink sensor and Sensor-Actor Networks - 2009

203. Improving Partial Cover of Random Walks in Large-Scale Wireless Sensor Networks - 2009

204. Introduction of First Passage Time (FPT) Analysis for Software Reliability and Network Security - 2009

205. Method and Architecture Design for Motion Compensated Frame Interpolation in High-Definition Video Processing - 2009

206. Model-Free Interval-Based Localization in Manets - 2009

207. NNexus: An Automatic Linker for Collaborative Web-Based Corpora - 2009

208. Node Presence Detection with Reduced Overhead - 2009

209. Polyphase Interpretation of Empirical Image Interpolation - 2009

210. Rate-Distortion Optimized Bitstream Extractor for Motion Scalability in Scalable Video Coding - 2009

211. Resilient Multi-core Systems A Hierarchical Formal Model for N-variant Executions - 2009

212. Stochastic Analysis of Spatial and Opportunistic Aloha - 2009

213. The Digital Wallet Opportunities and Prototype - 2009

214. Tree-on-DAG for Data Aggregation in Sensor Networks - 2009

215. Differentiated Bandwidth Allocation with TCP Protection in Core Routers - 2009

216. A Survey of Learning-Based Techniques of Email Spam Filtering - 2008

217. BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection - 2008

218. High Multiplicity Scheduling of File Transfers with Divisible Sizes of Multiple Classes of Paths – 2008

219. Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments - 2008

220. Packet caches on Routers the Implications of Universal Redundant Traffic Elimination – 2008

221. Peertalk a Peer-to-Peer Multi-Party Voice-Over-IP System – 2008

222. Protection of Database Security via Collaborative Inference Detection - 2008

223. Active Queue Management for Fair Resource Allocation in Wireless Networks - 2008

224. COACS: Co - Operative and adaptive caching system for MANETs - 2008

225. Designing Less - Structured P2p Systems for the Expected High Churn - 2008

226. Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization - 2008

227. Online Index Recommendations for High-Dimensional Databases Using Query Workloads - 2008

228. Scalable & Efficient End-To-End Network Topology Inference – 2008

229. A Software Defect Report and Tracking System in an Intranet

230. Security in Large Networks Using Mediator Protocols - 2008

231. An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net - 2007

232. Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm - 2007

233. Benefit Based Data Caching In Ad Hoc Networks - 2006

234. Image Transformation using Grid – 2006

235. Building Intelligent Shopping Assistants Using Individual Consumer Models – 2005

236. Application of BPCS Steganography to Wavelet Compressed Video – 2004

237. Slow Start Algorithm Improvement of TCP Performance – 2004

238. Towards Multimodal Interfaces for Intrusion Detection

239. Incremental deployment service of Hop by hop multicast routing protocol – 2004

240. Packet caches on Routers the Implications of Universal Redundant Traffic Elimination – 2008

241. Peertalk a Peer-to-Peer Multi-Party Voice-Over-IP System – 2008

242. Protection of Database Security via Collaborative Inference Detection - 2008

243. Active Queue Management for Fair Resource Allocation in Wireless Networks - 2008

244. COACS: Co - Operative and adaptive caching system for MANETs - 2008

245. Designing Less - Structured P2p Systems for the Expected High Churn - 2008

246. Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization - 2008

247. Online Index Recommendations for High-Dimensional Databases Using Query Workloads - 2008

248. Scalable & Efficient End-To-End Network Topology Inference – 2008

249. A Software Defect Report and Tracking System in an Intranet

250. Security in Large Networks Using Mediator Protocols - 2008

251. An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net - 2007

252. Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm - 2007

253. Benefit Based Data Caching In Ad Hoc Networks - 2006

254. Image Transformation using Grid – 2006

255. Building Intelligent Shopping Assistants Using Individual Consumer Models – 2005

256. Application of BPCS Steganography to Wavelet Compressed Video – 2004

257. Slow Start Algorithm Improvement of TCP Performance – 2004

258. Towards Multimodal Interfaces for Intrusion Detection

259. Incremental deployment service of Hop by hop multicast routing protocol – 2004

260. A wireless distributed intrusion detection system and a new attack model – 2006

261. Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups

No comments:

Post a Comment