23-06-2012, 02:02 AM
All these projects are available with us...
Contact us on 9970186685
ocularsystems.in
IEEE 2011 JAVA DATA MINING
1. IR-Tree: An Efficient Index for Geographic Document Search
2. A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification
3. Anonymous Publication of Sensitive Transactional Data
4. Cosdes: A Collaborative Spam Detection System with a Novel
5. Efficient Relevance Feedback for Content-Based Image Retrieval by Mining User
Navigation Patterns
6. A Personalized Ontology Model for Web Information Gathering
7. A Unified Probabilistic Framework for Name Disambiguation in Digital Library
8. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
9. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web
Databases
10. Effective Navigation of Query Results Based on Concept Hierarchies
11. Data Leakage Detection
12. Bridging Domains Using World Wide Knowledge for Transfer Learning
13. TEXT: Automatic Template Extraction from Heterogeneous Web Pages
14. Mining Web Graphs for Recommendations
15. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
16. Document Clustering in Correlations Similarity Measure Space
17. Scalable Learning of Collective Behavior
18. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
19. A Query Formulation Language for the Data Web
20. Scalable Scheduling of Updates in Streaming Data Warehouses
21. Publishing Search Logs - A Comparative Study of Privacy Guarantees
22. Optimal Service Pricing for a Cloud Cache
23. On the Complexity of View Update Analysis and its Application to Annotation Propagation
24. Exploring Application-Level Semantics for Data Compression .
25. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
26. Exploring Application-Level Semantics for Data Compression
27. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
28. Document Clustering in Correlations Similarity Measure Space
29. Scalable Learning of Collective Behavior
30. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
31. A Query Formulation Language for the Scalable Scheduling of Updates in Streaming Data Warehouses
32. Publishing Search Logs - A Comparative Study of Privacy Guarantees
33. Optimal Service Pricing for a Cloud Cache
34. On the Complexity of View Update Analysis and its Application to Annotation Propagation
35. Exploring Application-Level Semantics for Data Compression .
36. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
37. Exploring Application-Level Semantics for Data Compression
IEEE 2011 JAVA NETWORKING
1. A Simple Model for Chunk-Scheduling Strategies in P2P Streaming
2. Optimal Anycast Technique for Delay-Sensitive
3. Energy-Constrained Asynchronous Sensor Networks
4. Energy-Efficient Protocol for Cooperative Networks
5. Jamming-Aware Traffic Allocation for Multiple-Path
6. Routing Using Portfolio Selection
7. Load Balance with Imperfect Information in Structured Peer-to-Peer Systems
8. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks
9. Site-Based Partitioning and Repartitioning
10. Techniques for Parallel PageRank Computation
11. Exploiting Dynamic Resource Allocation for Efficient
12. Parallel Data Processing in the Cloud
13. Data integrity proofs in cloud storage
14. Live Streaming with Receiver-based Peer-division Multiplexing
15. Continuous Neighbor Discovery in Asynchronous Sensor Networks
16. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
IEEE 2011 JAVA WIRELESS COMMUNICATION
1. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
2. Throughput Optimization in High Speed Downlink Packet Access (HSDPA)
3. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
4. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
IEEE 2011 JAVA DEPENDABLE AND SECURE COMPUTING
1. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
2. A Tamper-Resistant Programming Language System
3. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of
Query-Based Wireless Sensor Networks
4. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
5. Nymble: Blocking Misbehaving Users in Anonymizing Networks
6. Privacy-Preserving Updates to Anonymous and Confidential Databases
7. Dynamics of Malware Spread in Decentralized Peerto- Peer Networks Improved Division by Invariant Integers
IEEE 2011 JAVA NETWORK SECURITY
IEEE 2011 JAVA SERVICE
COMPUTING
Vulnerability Analysis in SOA-Based Business Processes
IEEE 2011 JAVA MOBILE
COMPUTING
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
IEEE 2011 JAVA PARALLEL AND
DISTRIBUTED SYSTEMS
Rumor Riding: Anonymizing Unstructured Peer-to- Peer Systems
IEEE 2011 JAVA IMAGE
PROCESSING
1. Color Extended Visual Cryptography Using Error Diffusion processing
2. Computational Perceptual Features for Texture Representation and Retrieval
3. Lossy Compression and Iterative Reconstruction for Encrypted Image
4. Road extraction using K-Means Clustering and morphological operations
5. Embedded extended visual cryptographic schemes
DOT NET PROJECT TOPICS
IEEE 2011 DOTNET DATA MINING
1. IR-Tree: An Efficient Index for Geographic Document Search
2. A Fuzzy Self-Constructing Feature Clustering
3. Algorithm for Text Classification
4. Anonymous Publication of Sensitive Transactional
5. Cosdes: A Collaborative Spam Detection System with a Novel Efficient Relevance Feedback for Content-Based Image Retrieval by Mining User Navigation Patterns
6. A Personalized Ontology Model for Web Information Gathering
7. A Unified Probabilistic Framework for Name Disambiguation in Digital Library
8. Improving Aggregate Recommendation Diversity
9. Using Ranking-Based Techniques
10. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
11. Effective Navigation of Query Results Based on Concept Hierarchies
12. Data Leakage Detection
13. Bridging Domains Using World Wide Knowledge for Transfer Learning
14. TEXT: Automatic Template Extraction from Heterogeneous Web Pages
15. Mining Web Graphs for Recommendations
16. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
17. Document Clustering in Correlations Similarity Measure Space
18. Scalable Learning of Collective Behavior
19. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
20. A Query Formulation Language for the Data Web
21. Scalable Scheduling of Updates in Streaming Data Warehouses
22. Publishing Search Logs - A Comparative Study of Privacy Guarantees
23. Optimal Service Pricing for a Cloud Cache
24. On the Complexity of View Update Analysis and its
25. Application to Annotation Propagation
26. Exploring Application-Level Semantics for Data Compression .
27. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
28. Exploring Application-Level Semantics for Data Compression
29. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
30. Document Clustering in Correlations Similarity Measure Space
31. Scalable Learning of Collective Behavior
32. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
33. A Query Formulation Language for the Data Web
34. Scalable Scheduling of Updates in Streaming Data Warehouses
35. Publishing Search Logs - A Comparative Study of Privacy Guarantees
36. Optimal Service Pricing for a Cloud Cache
37. On the Complexity of View Update Analysis and its Application to Annotation
Propagation
38. Exploring Application-Level Semantics for Data Compression .
39. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
40. Exploring Application-Level Semantics for Data Compression
IEEE DOT NET PROJECTS LIST, OCULAR SYSTEMS, BARAMATI, PUNE…..
IEEE 2011 DOTNET NETWORKING
1. A Simple Model for Chunk-Scheduling Strategies in P2P Streaming
2. Optimal Anycast Technique for Delay-Sensitive
3. Energy-Constrained Asynchronous Sensor Networks
4. Energy-Efficient Protocol for Cooperative Networks
5. Jamming-Aware Traffic Allocation for Multiple-Path
6. Routing Using Portfolio Selection
7. Load Balance with Imperfect Information in
8. Structured Peer-to-Peer Systems
9. FDAC: Toward Fine-Grained Distributed Data Access
10. Control in Wireless Sensor Networks
11. Site-Based Partitioning and Repartitioning
12. Techniques for Parallel PageRank Computation
13. Exploiting Dynamic Resource Allocation for Efficient
14. Parallel Data Processing in the Cloud
15. Data integrity proofs in cloud storage
16. Live Streaming with Receiver-based Peer-division Multiplexin
17. Continuous Neighbor Discovery in Asynchronous
18. Sensor Networks
19. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
IEEE 2011 DOTNET WIRELESS COMMUNICATION
1. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
2. Throughput Optimization in High Speed Downlink Packet Access (HSDPA)
3. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
4. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
IEEE 2011 DOTNET DEPENDABLE AND SECURE COMPUTING
1. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
2. A Tamper-Resistant Programming Language System
3. Adaptive Fault Tolerant QoS Control Algorithms for
4. Maximizing System Lifetime of Query-Based Wireless Sensor Networks
5. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
6. Nymble: Blocking Misbehaving Users in Anonymizing Networks
7. Privacy-Preserving Updates to Anonymous and Confidential Databases
8. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
IEEE DOT NET PROJECTS LIST, OCULAR SYSTEMS, BARAMATI, PUNE…..
IEEE 2011 DOTNET NETWORK SECURITY
Improved Division by Invariant Integers
IEEE 2011 DOTNET SERVICE COMPUTING
Vulnerability Analysis in SOA-Based Business Processes
IEEE 2011 DOTNET MOBILE
COMPUTING
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
IEEE 2011 DOTNET PARALLEL AND DISTRIBUTED SYSTEMS
Rumor Riding: Anonymizing Unstructured Peer-to- Peer Systems
IEEE 2011 DOTNET IMAGE PROCESSING
1. Color Extended Visual Cryptography Using Error Diffusion
2. Computational Perceptual Features for Texture Representation and Retrieval
3. Lossy Compression and Iterative Reconstruction for Encrypted Image