D N M Projects List: Ieee Dotnet
D N M Projects List: Ieee Dotnet
IEEE DOTNET
1. A COST-BASED APPROACH 2. ANALYZING AND MANAGING TITLE TO ADAPTIVE RESOURCE MANAGEMENT IN DATA STREAM SYSTEMS ROLE-BASED ACCESS CONTROL POLICIES
VISHA INFOTECH
3. HARDWARE ENHANCED ASSOCIATION RULE MINING WITH HASHING AND PIPELINING 4. ROUGH SETS-BASED SEARCH ENGINE FOR GRID SERVICE DISCOVERY 5. WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES 6. TRUSTWORTHY COMPUTING
UNDER
RESOURCE CONSTRAINTS
WITH THE
DOWN POLICY
7. SECURING USER-CONTROLLED ROUTING INFRASTRUCTURES 8. CREDIT CARD FRAUD DETECTION USING HIDDEN MARKOV MODEL
9. AN EFFICIENT TIME-BOUND HIERARCHICAL KEY MANAGEMENT SCHEME 10. PROBABILISTIC PACKET MARKING FOR LARGE-SCALE IP TRACE BACK
FOR
SECURE BROADCASTING
11. RATE ALLOCATION AND NETWORK LIFETIME PROBLEMS FOR WIRELESS SENSOR NETWORKS 12. HBA DISTRIBUTED METADATA MANAGEMENT FOR LARGE CLUSTER-BASED STORAGE SYSTEMS
13. MINIMIZING FILE DOWNLOAD TIME IN STOCHASTIC PEER-TO-PEER NETWORKS 14. STATISTICAL TECHNIQUES FOR DETECTING TRAFFIC ANOMALIES THROUGH PACKET HEADER DATA 15. A GEOMETRIC APPROACH TO IMPROVING ACTIVE PACKET LOSS MEASUREMENT 16. SEMANTICS-BASED DESIGN 17. THE EFFECT 18. ESTIMATION PAIRS SECURE WEB SERVICES
FOR
OF
IN
PROGRAM DESIGN TASKS DEFECT DECAY MODEL: ED3M COSTS AND BENEFITS UML SOFTWARE MAINTENANCE
OF
DEFECTS BASED
ON
OF THE
OF
IN
IN THE
PRESENCE
OF
OBJECT-ORIENTED REFACTORINGS
A.
VISHA INFOTECH
21. COMPACTION OF SCHEDULES AND A TWO-STAGE APPROACH FOR DUPLICATION-BASED DAG SCHEDULING 22. ENFORCING MINIMUM-COST MULTICAST ROUTING AGAINST SHELFISH INFORMATION FLOWS 23. MOVEMENT-ASSISTED CONNECTIVITY RESTORATION IN WIRELESS SENSOR AND ACTOR NETWORKS 24. A GEN2-BASED RFID AUTHENTICATION PROTOCOL FOR SECURITY AND PRIVACY 25. A TABU SEARCHING ALGORITHM FOR CLUSTER BUILDING IN WIRELESS SENSOR NETWORKS 26. BIASED RANDOM WALKS IN UNIFORM WIRELESS NETWORKS 27. CELL BREATHING TECHNIQUES FOR LOAD BALANCING IN WIRELESS LANS 28. ENERGY MAPS FOR MOBILE WIRELESS NETWORKS COHERENCE TIME VERSUS SPREADING PERIOD. 29. GREEDY ROUTING WITH ANTI-VOID TRAVERSAL FOR WIRLESS SENSOR NETWORKS. 30. INFORMATION CONTENT-BASED SENSOR SELECTION AND TRANSMISSION POWER ADJUSTMENT FOR COLLABORATIVE TARGET TRACKING 31. LOCAL CONSTRUCTION OF NEAR-OPTIMAL POWER SPANNERS FOR WIRELESS AD HOC NETWORKS. 32. ON THE PLANNING OF WIRELESS SENSOR NETWORKS ENERGY-EFFICIENT CLUSTERING UNDER THE JOINT ROUTER 33. RANDOM CAST AN ENERGY EFFICIENT COMMUNICATION SCHEME FOR MOBILE AD HOC NETWORKS 34. ROUTE STABILITY IN MANETS UNDER THE RANDOM DIRECTION MOBILITY MODEL. 35. ANALYSIS OF SHORTEST PATH ROUTING FOR LARGE MULTI-HOP WIRELESS NETWORKS. 36. DELAY ANALYSIS FOR MAXIMAL SCHEDULING WITH FLOW CONTROL IN WIRELESS NETWORKS WITH BURSTY TRAFFIC 37. EXPLICIT LOAD BALANCING TECHNIQUE FOR NGEO SATELLITE IP NETWORKS WITH ON-BOARD PROCESSING CAPABILITIES 38. PRESTO FEEDBACK-DRIVEN DATA MANAGEMENT IN SENSOR NETWORKS. 39. RESEQUENCING ANALYSIS OF STOP-AND-WAIT ARQ FOR PARALLEL MULTICHANNEL COMMUNICATIONS. 40. RESOURCE ALLOCATION IN OFDMA WIRELESS COMMUNICATIONS SYSTEMS SUPPORTING MULTIMEDIA SERVICES. 41. SECURE AND POLICY-COMPLAINT SOURCE ROUTING. 42. SINGLE-LINK FAILURE DETECTION IN ALL-OPTICAL NETWORKS USING. MONITORING CYCLES AND PATHS 43. TWO BLOCKING ALGORITHM ON ADAPTIVE BINARY SPLITTING SINGLE AND PAIR RESOLUTIONS FOR RFID TAG IDENTIFICATION. 44. VIRUS SPREAD IN NETWORKS 45. PERFORMANCE OF ORTHOGONAL FINGERPRINTING CODES UNDER WORST-CASE NOISE 46. SPREAD-SPECTRUM WATERMARKING SECURITY 47. THE EFFECTIVENESS OF CHECKSUMS FOR EMBEDDED CONTROL NETWORKS. 48. A HEURISTIC-BASED APPROACH FOR DETECTING SQL-INJECTION VULNERABILITIES IN WEB APPLICATIONS 49. ACHIEVING SECURE, SCALABLE, AND FINE-GRAINED DATA ACCESS CONTROL IN CLOUD COMPUTING 50. ADAPTIVE JOIN OPERATORS FOR RESULT RATE OPTIMIZATION ON STREAMING INPUTS 51. AI AND OPINION MINING 52. AN ABUSE FREE FAIR CONTRACT SIGNING PROTOCOL BASED ON THE RSA SIGNATURE 53. AN ECONOMIC APPROACH FOR SCALABLE AND HIGHLY-AVAILABLE DISTRIBUTED APPLICATIONS 54. ANALYSIS OF P2P FILE SHARING NETWORK-S CREDIT SYSTEM FOR FAIRNESS MANAGEMENT 55. ANONYMOUS_QUERY_PROCESSING_IN_ROAD_NETWORKS 56. CLOSING THE LOOP IN WEBPAGE UNDERSTANDING 57. CONDITIONAL SHORTEST PATH ROUTING IN DELAY TOLERANT NETWORKS 58. DYNAMIC AUTHENTICATION FOR CROSS-REALM SOA-BASED BUSINESS PROCESSES 59. EQUILIBRIUM OF HETEROGENEOUS CONGESTION CONTROL OPTIMALITY AND STABILITY 60. FUZZY KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING
VISHA INFOTECH
61. MULTICAST MULTI-PATH POWER EFFICIENT ROUTING IN MOBILE ADHOC NETWORKS 62. PRICING UNDER CONSTRAINTS IN ACCESS NETWORKS REVENUE MAXIMIZATION AND CONGESTION MANAGEMENT 63. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING 64. SIGFREE A SIGNATURE-FREE BUFFER OVERFLOW ATTACK BLOCKER 65. SLOW ADAPTIVE OFDMA SYSTEMS THROUGH CHANCE CONSTRAINED PROGRAMMING 66. ADAPTIVE PROVISIONING OF HUMAN EXPERTISE IN SERVICE-ORIENTED SYSTEMS 67. DATA INTEGRITY PROOFS IN CLOUD STORAGE 68. EFFICIENT COMPUTATION OF RANGE AGGREGATES AGAINST UNCERTAIN LOCATION BASED QUERIES 69. EXPLOITING DYNAMIC RESOURCE ALLOCATION FOR EFFICIENT PARALLEL DATA PROCESSING IN THE CLOUD 70. INTEGRATION OF SOUND SIGNATURE IN GRAPHICAL PASSWORD AUTHENTICATION SYSTEM 71. A POLICY ENFORCING MECHANISM FOR TRUSTED AD HOC NETWORKS 72. A QUERY FORMULATION LANGUAGE FOR THE DATA WEB 73. A SPATIOTEMPORAL APPROACH FOR SECURE RANGE QUERIES IN TIERED SENSOR NETWORKS 74. ADAPTIVE FAULT TOLERANT QOS CONTROL ALGORITHMS FOR MAXIMIZING SYSTEM LIFETIME 75. CONTINUOUS NEIGHBOR DISCOVERY IN ASYNCHRONOUS SENSOR NETWORKS 76. DISTRIBUTED ADAPTATION OF QUANTIZED FEEDBACK FOR DOWNLINK NETWORK MIMO SYSTEMS 77. EXPLORING APPLICATION-LEVEL SEMANTICS FOR DATA COMPRESSION 78. HORIZONTAL AGGREGATIONS IN SQL TO PREPARE DATA SETS FOR DATA MINING ANALYSIS 79. IMPROVING AGGREGATE RECOMMENDATION DIVERSITY USING RANKING-BASED TECHNIQUES 80. JAMMING-AWARE TRAFFIC ALLOCATION FOR MULTIPLE-PATH ROUTING USING PORTFOLIO SELECTION 81. KNOWLEDGE-BASED INTERACTIVE POSTMINING OF ASSOCIATION RULES USING ONTOLOGIES 82. LIVE STREAMING WITH RECEIVER-BASED PEER-DIVISION MULTIPLEXING 83. MONITORING SERVICE SYSTEMS FROM A LANGUAGE-ACTION PERSPECTIVE 84. NETWORK CODING BASED PRIVACY PRESERVATION AGAINST TRAFFIC ANALYSIS IN MULTI-HOP WIRELESS NETWORKS 85. ONE SIZE DOES NOT FIT ALL TOWARDS USER- AND QUERY-DEPENDENT RANKING FOR WEB DATABASES 86. OPTIMAL SERVICE PRICING FOR A CLOUD CACHE 87. PERSONALIZED ONTOLOGY MODEL FOR WEB INFORMATION GATHERING 88. PUBLISHING SEARCH LOGS - A COMPARATIVE STUDY OF PRIVACY GUARANTEES 89. QUERY PLANNING FOR CONTINUOUS AGGREGATION QUERIES OVER A NETWORK OF DATA AGGREGATORS 90. SCALABLE LEARNING OF COLLECTIVE BEHAVIOR 91. THE AWARENESS NETWORK, TO WHOM SHOULD I DISPLAY MY ACTIONS AND, WHOSE ACTIONS SHOULD I MONITOR 92. THE GEOMETRIC EFFICIENT MATCHING ALGORITHM FOR FIREWALLS 93. THROUGHPUT OPTIMIZATION IN HIGH SPEED DOWNLINK PACKET ACCESS (HSDPA) 94. ROBUST CORRELATION OF ENCRYPTED ATTACK TRAFFIC THROUGH STEPPING STONES BY FLOW WATERMARKING 95. SERVICE-CENTRIC FRAMEWORK FOR A DIGITAL GOVERNMENT APPLICATION 96. VULNERABILITY ANALYSIS IN SOA-BASED BUSINESS PROCESSES 97. AUTOMATED CERTIFICATION FOR COMPLIANT CLOUD-BASED BUSINESS PROCESSES 98. ONTOLOGY-BASED BUSINESS PROCESS CUSTOMIZATION FOR COMPOSITE WEB SERVICES 99. THE WORLD IN A NUTSHELL CONCISE RANGE QUERIES