12-09-2009, 10:48 PM
hey jango_saroj
please post in http://www.seminarprojectsForum-Computer-Science-Project-Ideas
and read some more seminar topic
a) Id-based encryption schemes
b) Computing the digits of the mathematical Pi
c) E-Commerce and Digital Signatures
d) SONET/SDH Communication
e) Particle Swarm Optimization
f) Multi Protocol Level Switching Virtual Private Network
g) Voice over IP
h) Quantum mechanical algorithms for hidden subgroups and related problems
i) Persistent Data Structures
j) Software Watermarking
k) The challenges of software reliability & modeling
l) Web Security
m) Identity-based encryption
n) Compiler Optimization:
o) Some Recent Trends
p) Web Service Standards for Data Mining
q) Natural Language Generation
r) 07CS6007 Geometry in Sensor Networks
s) Geometry in Sensor Networks
t) Trustworthy Computing
u) Software Metrics
v) Infinite Games
w) Automata over Infinite Words
x) Dual Core Processor : Architectural Features
y) Digital Video Encoding Formats
z) Delay Tolerant Routing
aa) Quorum Systems
bb) Information Extraction
cc) Named Entity Recognition
dd) XML Query Languages
ee) Geometry in Sensor Networks
ff) Linear Time encoding/decoding of ordinary tree and hypertree
gg) Semantic Web
hh) Multicore Processors and their Architectures
ii) IPv6
jj) Electronic Money:
kk) Underlying Mathematical Techniques
ll) RTOS for Mobile Devices
mm) Virtual Reality
nn) Cache Coherence Problem
oo) Parameterized Complexity
pp) Mathematical Programming
qq) Some topics in Digital Geometry
rr) Core Sets in Computational Geometry
ss) Some variants of mathematical programming
tt) Code Transformation
uu) Noisy text processing using machine learning methods
vv) Mobile electronic payments
ww) Secure data communication based on quantum effects
xx) Infinite Automata and Formal Verification
yy) Side Channel Attacks and its' counter measure for Block Cipher
zz) Primes are of two kinds: probable and provable
aaa) Are Mersenne primes only an obsession?
bbb) Time Contract Algorithms
ccc) Data communication in current and future wireless networks
ddd) Parametric searching “ what it is and how to make it practical
eee) Geometric applications in Sensor networks
fff) Packing and covering
ggg) Cache efficient algorithms
hhh) Facility location and clustering
iii) Some variants of mathematical programming
jjj) Model Checking
kkk) Decision diagrams in VLSI CAD
lll) Mobile Agents
mmm) Distributed File Systems
nnn) Emotional Agents: Computing Models of Emotions
ooo) Real Time Operating Systems Recent Trends
ppp) Information Extraction
qqq) Named Entity Recognition
rrr) XML Query Languages
sss) Stochastic Scheduling
ttt) Intrusion detection in wireless networks
uuu) Image steganography
vvv) Ultra Wideband Networking
www) Routing protocols in wireless sensor networks
xxx) Clustering techniques in complex network
yyy) Object Type System
zzz) Code Transformation
aa) Noisy text processing using machine learning methods
bb) Low Level Object Oriented Languages
cc) Stochastic Scheduling
dd) Intrusion detection in wireless networks
ee) Image steganography
ff) Ultra Wideband Networking
gg) Routing protocols in wireless sensor networks
hh) Clustering techniques in complex network
iiii) Object Type System
jj) Grammar Induction
kk) Localization in Sensor Networks
ll) Reversible logic ciruits: design and test issues
mm) Digital Watermarking
nn) Program Verification
oo) Quantum Cryptography
pp) Quantum Cryptanalysis
qq) Simulation of entanglement with communication for distributed
rr) Problem solving.
ss) Dual Core Processor : Architectural Features
tt) Digital Video Encoding Formats
uu) Delay Tolerant Routing
vv) Quorum Systems
ww) Mobile electronic payments
xx) Secure data communication based on quantum effects
yy) Algorithms for networking
zz) Infinite Automata and Formal Verification
aaa) Side Channel Attacks and its' counter measure for Block Cipher
bbb) Salient aspects of the architecture of the Itanium CPU
ccc) Using the combination lemma: Proving upper bounds on the
ddd) Combinatorial complexity of unions.
eee) Proving lower bounds using Holevo's result.
fff) Recommender System
ggg) Towards Object Oriented Design using Verilog HDL
hhh) Real Time Operating Systems
iiiii) Web services
jjj) The spyware nightmare: The problems and possible solutions 2005
kkk) Platform Architecture
lll) 3G Cellular Telephone network
mmm) Epsilon nets and transversal of hypergraphs
nnn) Geometric Discrepancy
ooo) LP-Based Approximation Algorithms
ppp) Game theoretic issues in algorithms
please post in http://www.seminarprojectsForum-Computer-Science-Project-Ideas
and read some more seminar topic
a) Id-based encryption schemes
b) Computing the digits of the mathematical Pi
c) E-Commerce and Digital Signatures
d) SONET/SDH Communication
e) Particle Swarm Optimization
f) Multi Protocol Level Switching Virtual Private Network
g) Voice over IP
h) Quantum mechanical algorithms for hidden subgroups and related problems
i) Persistent Data Structures
j) Software Watermarking
k) The challenges of software reliability & modeling
l) Web Security
m) Identity-based encryption
n) Compiler Optimization:
o) Some Recent Trends
p) Web Service Standards for Data Mining
q) Natural Language Generation
r) 07CS6007 Geometry in Sensor Networks
s) Geometry in Sensor Networks
t) Trustworthy Computing
u) Software Metrics
v) Infinite Games
w) Automata over Infinite Words
x) Dual Core Processor : Architectural Features
y) Digital Video Encoding Formats
z) Delay Tolerant Routing
aa) Quorum Systems
bb) Information Extraction
cc) Named Entity Recognition
dd) XML Query Languages
ee) Geometry in Sensor Networks
ff) Linear Time encoding/decoding of ordinary tree and hypertree
gg) Semantic Web
hh) Multicore Processors and their Architectures
ii) IPv6
jj) Electronic Money:
kk) Underlying Mathematical Techniques
ll) RTOS for Mobile Devices
mm) Virtual Reality
nn) Cache Coherence Problem
oo) Parameterized Complexity
pp) Mathematical Programming
qq) Some topics in Digital Geometry
rr) Core Sets in Computational Geometry
ss) Some variants of mathematical programming
tt) Code Transformation
uu) Noisy text processing using machine learning methods
vv) Mobile electronic payments
ww) Secure data communication based on quantum effects
xx) Infinite Automata and Formal Verification
yy) Side Channel Attacks and its' counter measure for Block Cipher
zz) Primes are of two kinds: probable and provable
aaa) Are Mersenne primes only an obsession?
bbb) Time Contract Algorithms
ccc) Data communication in current and future wireless networks
ddd) Parametric searching “ what it is and how to make it practical
eee) Geometric applications in Sensor networks
fff) Packing and covering
ggg) Cache efficient algorithms
hhh) Facility location and clustering
iii) Some variants of mathematical programming
jjj) Model Checking
kkk) Decision diagrams in VLSI CAD
lll) Mobile Agents
mmm) Distributed File Systems
nnn) Emotional Agents: Computing Models of Emotions
ooo) Real Time Operating Systems Recent Trends
ppp) Information Extraction
qqq) Named Entity Recognition
rrr) XML Query Languages
sss) Stochastic Scheduling
ttt) Intrusion detection in wireless networks
uuu) Image steganography
vvv) Ultra Wideband Networking
www) Routing protocols in wireless sensor networks
xxx) Clustering techniques in complex network
yyy) Object Type System
zzz) Code Transformation
aa) Noisy text processing using machine learning methods
bb) Low Level Object Oriented Languages
cc) Stochastic Scheduling
dd) Intrusion detection in wireless networks
ee) Image steganography
ff) Ultra Wideband Networking
gg) Routing protocols in wireless sensor networks
hh) Clustering techniques in complex network
iiii) Object Type System
jj) Grammar Induction
kk) Localization in Sensor Networks
ll) Reversible logic ciruits: design and test issues
mm) Digital Watermarking
nn) Program Verification
oo) Quantum Cryptography
pp) Quantum Cryptanalysis
qq) Simulation of entanglement with communication for distributed
rr) Problem solving.
ss) Dual Core Processor : Architectural Features
tt) Digital Video Encoding Formats
uu) Delay Tolerant Routing
vv) Quorum Systems
ww) Mobile electronic payments
xx) Secure data communication based on quantum effects
yy) Algorithms for networking
zz) Infinite Automata and Formal Verification
aaa) Side Channel Attacks and its' counter measure for Block Cipher
bbb) Salient aspects of the architecture of the Itanium CPU
ccc) Using the combination lemma: Proving upper bounds on the
ddd) Combinatorial complexity of unions.
eee) Proving lower bounds using Holevo's result.
fff) Recommender System
ggg) Towards Object Oriented Design using Verilog HDL
hhh) Real Time Operating Systems
iiiii) Web services
jjj) The spyware nightmare: The problems and possible solutions 2005
kkk) Platform Architecture
lll) 3G Cellular Telephone network
mmm) Epsilon nets and transversal of hypergraphs
nnn) Geometric Discrepancy
ooo) LP-Based Approximation Algorithms
ppp) Game theoretic issues in algorithms