0% found this document useful (0 votes)
87 views

Iee 2011 Java

Uploaded by

Hussain Khusro
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views

Iee 2011 Java

Uploaded by

Hussain Khusro
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

IEEE 2011 Java Projects IEEE INTELLIGENT SYSTEMS 1. Cloud Computing for Agent-Based Urban Transportation Systems.

View : Abstract Basepaper IEEE INTELLIGENT SYSTEMS

Mobile Computing 2. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks. View : Abstract Basepaper IEEE Transactions on Mobile Computing 3. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks. View : Abstract Basepaper IEEE Transactions on Mobile Computing 4. Throughput Optimization in Mobile Backbone Networks. View : Abstract Basepaper IEEE Transactions on Mobile Computing 5. Wireless Sensor Network Security model using Zero Knowledge Protocol. View : Abstract Basepaper IEEE Transactions on Mobile Computing 6. Secure High-Throughput Multicast Routing in Wireless Mesh Networks. View : Abstract Basepaper IEEE Transactions on Mobile Computing WIRELESS COMMUNICATIONS 7. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks. View : Abstract Basepaper IEEE Transactions on Wirel ess Communications 8. Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Desig n. View : Abstract Basepaper ss Communications Networking 9. Buffer Sizing for 802.11 Based Networks. IEEE Transactions on Wirele

View : Abstract Basepaper IEEE Transactions on Networ king 10. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks View : Abstract Basepaper IEEE Transactions on Networ king 11. Selfish Overlay Network Creation and Maintenance. View : Abstract Basepaper rking 12. SPAF: Stateless FSA-based Packet Filters. IEEE Transactions on Netwo

View : Abstract Basepaper IEEE Transactions on Networ king 13. ProgME: Towards Programmable Network Measurement . View : Abstract Basepaper IEEE Transactions on Networ king 14. Topological Transformation Approaches to TCAM-Based Packet Classification.

View : Abstract Basepaper IEEE Transactions on Networ king 15. Monitoring Service Systems from a Language-Action Perspective. View : Abstract Basepaper IEEE Transactions on Networ king Secure Computing 16. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireles sMesh Networks. View : Abstract Basepaper IEEE Transactions on Dependable and Sec ure Computing 17. Modeling and Detection of Camouflaging Worm . View : Abstract Basepaper IEEE Transactions on Dependable and Secu re Computing 18. Nymble: Blocking Misbehaving Users in Anonymizing Networks. View : Abstract Basepaper IEEE Transactions on Dependable and Secu re Computing 19. RITAS: Services for Randomized Intrusion Tolerance . View : Abstract Basepaper IEEE Transactions on Dependable and Secu re Computing 20. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum-Diamete r Spanning Tree. View : Abstract Basepaper IEEE Transactions on Dependable and Sec ure Computing 21. Comparative Evaluation of Spoofing Defenses . View : Abstract Basepaper IEEE Transactions on Dependable and Secu re Computing 22. Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET . View : Abstract Basepaper IEEE Transactions on Dependable and Sec ure Computing NetWork and Service MANAGEMENT 23. Locating Equivalent Servants over P2P Networks . View : Abstract Basepaper IEEE Transactions on Network and Serv ice Management KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) 24. Decision Trees for Uncertain Data . View : Abstract Basepaper Engineering 25. Data Leakage Detection . View :Abstract Basepaper IEEE Transactions on Knowledge and Da ta Engineering 26. Ranking Spatial Data by Quality Preferences . View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 27. Load Shedding in Mobile Systems with MobiQual . View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 28. Adaptive Cluster Distance Bounding for High Dimensional Indexing . IEEE Transactions on Knowledge and Data

View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 29. Effective Navigation of Query Results Based on Concept Hierarchies . View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 30. Discovering Conditional Functional Dependencies. View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 31. The CoQUOS Approach to Continuous Queries in Unstructured Overlays . View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 32. Extended XML Tree Pattern Matching: Theories and Algorithms . View : Abstract Basepaper Engineering 33. Group Enclosing Queries . IEEE Transactions on Knowledge and Data

View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 34. Making AggregationWork in Uncertain and Probabilistic Databases . View : Abstract Basepaper IEEE Transactions on Knowledge and Data Engineering 35. Learning Semi-Riemannian Metrics for Semisupervised Feature Extraction . View : Abstract Basepaper Engineering Software Engineering IEEE Transactions on Knowledge and Data

36. Semi-Proving: An Integrated Method for Program Proving, Testing, and Debuggi ng . View : Abstract Basepaper re Engineering Cloud Computing - (DATA MINING) 37. Improving Utilization of Infrastructure Clouds. View : Abstract Basepaper IEEE Transactions on Cloud Computing IEEE Transactions on Softwa

38. Secure and Practical Outsourcing of Linear Programming in Cloud Computing. View : Abstract Basepaper IEEE Transactions on Cloud Computing

39. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clo uds.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy