The following projects comes under the domain like IEEE Intelligent Systems, Mobile Computing, Wireless Communications, Networking and Service Management, Data Mining, Software Engineering and Cloud Computing.

bumpedappleMobile - Wireless

Nov 21, 2013 (3 years and 11 months ago)

83 views

The following projects comes under the domain like IEEE Intelligent Systems, Mobile
Computing, Wireless Communications, Networking and Service Management, Data
Mining, Software Engineering and Cloud Computing.

1.

A Distributed Algorithm for Finding All Best
Swap Edges of a Minimum
-
Diameter
Spanning Tree

2.

A Policy Enforcing Mechanism for Trusted Ad Hoc Networks

3.

A Privacy
-
Preserving Location Monitoring System for Wireless Sensor Networks

4.

Adaptive Cluster Distance Bounding for High Dimensional Indexing

5.

Buffer Siz
ing for 802.11 Based Networks

6.

Cloud Computing for Agent
-
Based Urban Transportation Systems

7.

Comparative Evaluation of Spoofing Defenses

8.

Continuous Neighbor Discovery in Asynchronous Sensor Networks

9.

Data Leakage Detection

10.

Decision Trees for Uncertain Data

11.

De
lay Analysis and Optimality of Scheduling Policies for Multi
-
Hop Wireless
Networks

12.

Discovering Conditional Functional Dependencies

13.

Effective Navigation of Query Results Based on Concept Hierarchies

14.

Extended XML Tree Pattern Matching: Theories and Algorithm
s

15.

Going Back and Forth: Efficient Multideployment and Multisnapshotting on
Clouds

16.

Group Enclosing Queries

17.

Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer
Design

18.

Improving Utilization of Infrastructure Clouds

19.

IR
-
Tree: An Efficient In
dex for Geographic Document

20.

Java Image Processing : Color Extended Visual Cryptography Using Error

21.

Learning Semi
-
Riemannian Metrics for Semi
-
supervisedeature Extraction

22.

Load Shedding in Mobile Systems with MobiQual

23.

Locating Equivalent Servants over P2P Net
works

24.

Making Aggregation Work in Uncertain and Probabilistic Databases

25.

Mechanism Design
-
Based Secure Leader Election Model for Intrusion Detection
in MANET

26.

Modeling and Detection of Camouflaging Worm

27.

Monitoring Service Systems from a Language
-
Action
Perspective

28.

Nymble: Blocking Misbehaving Users in Anonymizing Networks

29.

ProgME: Towards Programmable Network Measurement

30.

Ranking Spatial Data by Quality Preferences

31.

RITAS: Services for Randomized Intrusion Tolerance

32.

SAT: A Security Architecture Achieving An
onymity and Traceability in
WirelessMesh Networks

33.

Secure and Practical Outsourcing of Linear Programming in Cloud Computing

34.

Secure High
-
Throughput Multicast Routing in Wireless Mesh Networks

35.

Selfish Overlay Network Creation and Maintenance

36.

Semi
-
Proving: An

Integrated Method for Program Proving, Testing, and
Debugging

37.

SPAF: Stateless FSA
-
based Packet Filters

38.

Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks

39.

The CoQUOS Approach to Continuous Queries in Unstructured Overlays

40.

Throughput

Optimization in Mobile Backbone Networks

41.

Topological Transformation Approaches to TCAM
-
Based Packet Classification

42.

Utility
-
Optimal Multi
-
Pattern Reuse in Multi
-
Cell Networks

43.

Wireless Sensor Network Security model using Zero Knowledge Protocol