Monday 8 September 2014

IEEE 2012 DotNET projects list


IEEE DOTNET PROJECTS TITLES
YEAR--2012
PROJECT TITLE
DOMAIN


1.       
A New Cell-Counting-Based Attack Against Tor
Networking

2.       
Defenses Against Large Scale Online Password Guessing Attacks By Using
Persuasive Click Points
Data Mining

3.       
A Novel Anti Phishing Framework Based On Visual Cryptography
Distributed And Parallel Systems

4.       
A Probabilistic Model Of Visual Cryptography Scheme With Dynamic Group
Information Forensics And Security

5.       
A Query Formulation Language For The Data Web
Data Mining

6.       
A Secure Erasure Code-Based Cloud Storage System With Secure Data Forwarding
Parallel And Distributed Systems

7.       
Ample: An Adaptive Traffic Engineering System Based On Virtual Routing Topologies
Networking

8.       
Automatic Reconfiguration For Large-Scale Reliable Storage Systems
Dependable And Secure Computing

9.       
Automatic Reconfiguration For Large-Scale Reliable Storage Systems
Dependable And Secure Computing

10.   
Catching Packet Droppers And Modifiers In Wireless Sensor Networks
Parallel And Distributed Systems

11.   
Cloud Computing Security: From Single To Multi-Clouds
System Sciences

12.   
Cooperative Download In Vehicular Environments
Mobile Computing

13.   
Design And Implementation Of Tarf: A Trust-Aware Routing Framework For Wsns
Dependable And Secure Computing

14.   
Distributed Throughput Maximization In Wireless Networks Via Random Power Allocation
Mobile Computing

15.   
Efficient Audit Service Outsourcing For Data Integrity In Clouds
Cloud Computing

16.   
Enhanced Data Security Model For Cloud Computing
Cloud And Mobile Computing

17.   
Ensuring Distributed Accountability For Data Sharing In The Cloud
Dependable And Secure Computing

18.   
Es-Mpich2: A Message Passing Interface With Enhanced Security
Dependable And Secure Computing

19.   
Efficient Multidimensional Fuzzy Search For Personal Information Management Systems
Data Mining

20.   
Fairtorrent: A Deficit-Based Distributed Algorithm To Ensure Fairness In Peer-To-Peer Systems
Networking

21.   
Grouping-Enhanced Resilient Probabilistic En-Route Filtering Of Injected
False Data In Wsns
Parallel And Distributed Systems,

22.   
Hasbe: A Hierarchical Attribute-Based Solution For Flexible And Scalable Access Control In Cloud Computing
Information Forensics And Security

23.   
Horizontal Aggregations In Sql To Prepare Data Sets For Data Mining Analysis
Data Mining

24.   
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
Data Mining

25.   
Mining Web Graphs For Recommendations
Data Mining

26.   
Multiple Exposure Fusion For High Dynamic Range Image Acquisition
Image Processing

27.   
On The Security And Efficiency Of Content Distribution Via Network Coding
Dependable And Secure Computing

28.   
Optimal Power Allocation In Multi-Relay Mimo Cooperative Networks: Theory And Algorithms
Selected Areas In Communications

29.   
Optimal Source-Based Filtering Of Malicious Traffic
Networking

30.   
Organizing User Search Histories
Data Mining

31.   
Outsourced Similarity Search On Metric Data Assets
Data Mining

32.   
Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper
Mobile Computing,

33.   
Query Planning For Continuous Aggregation Queries Over A Network Of Data Aggregators
Data Mining

34.   
Revisiting Defenses Against Large-Scale Online Password Guessing Attacks
Dependable And Secure Computing

35.   
Scalable Learning Of Collective Behavior
Data Mining

36.   
Secure And Efficient Handover Authentication Based On Bilinear Pairing Functions
Wireless Communications

37.   
Semi Supervised Biased Maximum Margin Analysis For Interactive Image Retrieval
Image Processing,

38.   
Smile Detection By Boosting Pixel Differences
Image Processing

39.   
Spoc: A Secure And Privacy-Preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency
Parallel And Distributed Systems

40.   
The Three-Tier Security Scheme In Wireless Sensor Networks With Mobile Sinks
Parallel And Distributed Systems

41.   
Topology Control In Mobile Ad Hoc Networks With Cooperative Communications
Wireless Networking

42.   
Toward Reliable Data Delivery For Highly Dynamic Mobile Ad Hoc Networks
Mobile Computing

43.   
Towards Secure And Dependable Storage Services In Cloud Computing
Cloud Computing

44.   
Tree-Based Mining For Discovering Patterns Of Human Interaction In Meetings
Data Mining

45.   
Becan: A Bandwidth-Efficient Cooperative Authentication Scheme For Filtering Injected False Data In Wireless Sensor Networks
Parallel And Distributed Systems

46.   
Compressed-Sensing-Enabled Video Streaming For Wireless Multimedia Sensor Networks
Multimedia

47.   
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute-Based Encryption
Cloud Computing

48.   
Robust Face-Name Graph Matching For Movie Character Identification
Multimedia

49.   
Securing Node Capture Attacks For Hierarchical Data Aggregation In Wireless Sensor Networks
Wireless Networking





No comments:

Post a Comment