IEEE 2012 Java Projects for CSE


Parallel & Distributed Systems 

  • A Network Coding Equivalent Content Distribution Scheme For Efficient Peer To Peer Interactive Vod Streaming 
  • An Optimizing Overlay Topologies For Search In Unstructed Peer To Peer Networks 
  • Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage 
  • Distributed Packet Buffers For High Band Width Switches & Routers 
  • Foot Print Detecting Sybil Attacks In Urban Vehicular Networks 
  • Catching Packet Droppers and Modifiers in Wireless Sensor Networks 
  • CCD A Distributed Publish Subscribe Framework for Rich Content Format 
  • An Efficient Caching Scheme and Consistency 
  • Maintenance in Hybrid P2P System 
  • Cut detection in wireless sensor networks 

Knowledge & Data Engineering

  • Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences 
  • Clustering With Multi View Point – Based Similarity Measure 
  • Efficient Fuzzy Type – A Head Search In Xml Data 
  • multiparty access control for online social networks: model and mechanisms 
  • Organizing User Search Histories 
  • Ranking Model Adaptation for Domain-Specific Search 
  • Slicing: A New Approach to Privacy Preserving Data Publishing 

Cloud computing

  • Cloud Data Production for Masses 

Mobile Computing

  • Fast Data Collection in Tree-Based Wireless Sensor Networks. 
  • Game-Theoretic Pricing for Video Streaming in Mobile Networks 
  • Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks 
  • Pattern Analysis & Machine Intelligence 
  • Hand Written Chinese Text Recognition By Integrating Multiple Contexts 

Signal Processing

  • In Tags We Trust: Trust modeling in social tagging of multimedia content 

Multimedia

  • Learn to Personalized Image Search from the Photo Sharing Websites 

Secure Computing

  • Online Modeling of Proactive Moderation System for Auction Fraud Detection 
  • Packet-Hiding Methods for Preventing Selective Jamming Attacks 
  • Risk-Aware Mitigation for MANET Routing Attacks 
  • Ensuring Distributed Accountability For Data Sharing In The Cloud. 
  • Confucius: A Tool Supporting Collaborative Scientific Workflow Composition 

Networking

  • Packet Loss Control Using Tokens at the Network Edge 
  • Adaptive Opportunistic Routing for Wireless Ad Hoc Networks 
  • Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks 
  • Energy-Efficient Cooperative Distribution with Statistical QoS Provisions Video Over Wireless Networks

Leave a Reply

Your email address will not be published. Required fields are marked *