IEEE 2010 Project Titles
S.N. |
IEEE 2010 Project Titles |
Domain |
Lang/Year |
1. |
Toward Optimal Network Fault Correction in Externally Managed
Overlay Networks |
Parallel & Distributed |
2010/ .Net |
2. |
Slow Adaptive OFDMA Systems Through Chance Constrained
Programming |
Network |
2010/ .Net |
3. |
Privacy-Conscious Location-Based Queries in Mobile
Environments |
Parallel & Distributed |
2010/Java |
4. |
On the Performance of Content Delivery under Competition in a
Stochastic Unstructured Peer-to-Peer Network |
Parallel & Distributed |
2010/Java |
5. |
Multicast Multi-path Power Efficient Routing in Mobile ADHOC
Networks |
Network Security |
2010/ .Net |
6. |
Layered Approach Using Conditional Random Fields for Intrusion
Detection |
Secure Computing |
2010/ Java |
7. |
IRM Integrated File Replication and Consistency Maintenance in
P2P Systems |
Parallel & Distributed |
2010/Java |
8. |
Fault-tolerant Mobile Agent-based Monitoring Mechanism for
Highly Dynamic Distributed Networks |
Network |
2010/Java |
9. |
Engineering Wireless Mesh Networks Joint Scheduling, Routing,
Power Control,and Rate Adaptation |
Network |
2010/Java |
10. |
Congestion Control of Transmission Control Protocol Based on
Bandwidth Estimation |
Network |
2010/Java |
11. |
Anonymous Query Processing in Road Networks |
Data Engineering |
2010/Java |
12. |
Agent Based Efficient Anomaly Intrusion Detection System in
Adhoc networks |
Secure Computing |
2010/Java |
13. |
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer
Streaming |
Parallel & Distributed |
2010/Java |
14. |
Rate Control With Pair wise Intersession Network Coding |
Network |
2010/Java |
15. |
Equilibrium of Heterogeneous Congestion Control: Optimality and
Stability |
Network |
2010/Java |
16. |
Optimal Jamming Attack Strategies and Network Defense Policies in
Wireless Sensor Networks |
Mobile Computing |
2010/Java |
17. |
Providing Witness Anonymity Under Peer-to-Peer Settings |
Network Security |
2010/Java |
18. |
On the Performance Bounds of Practical Wireless Network Coding |
Mobile Computing |
2010/Java |
19. |
Inside the Permutation-Scanning Worms: Propagation Modeling and
Analysis |
Network |
2010/Java |
20. |
VEBEK: Virtual
Energy-Based Encryption and Keying for Wireless Sensor Networks |
Mobile Computing |
2010/Java |
21. |
Joint Sink Mobility and Routing to Maximize the Lifetime of
Wireless Sensor Networks: The Case of Constrained Mobility |
Network |
2010/Java |
22. |
A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame
Theory |
Network Security |
2010/Java |
23. |
MABS: Multicast Authentication Based on Batch signature |
Mobile Computing |
2010/Java |
24. |
SigFree: A Signature-Free
Buffer Overflow Attack Blocker |
Network Security |
2010/Java |
25. |
SSUM: Smart Server Update
Mechanism for Maintaining Cache Consistency in Mobile Environments |
Mobile Computing |
2010/Java |
26. |
Layered Approach Using Conditional Random Fields for Intrusion
Detection |
Network Security |
2010/Java |
27. |
Modeling Power Saving Protocols for Multicast Services in 802.11
Wireless LANs |
Mobile Computing |
2010/Java |
28. |
A General Framework for Service Availability for Bandwidth- Efficient Connection-Oriented Networks |
Network |
2010/Java |
29. |
Secure Data Objects Replication in Data Grid |
Network Security |
2010/Java |
30. |
DCAR: Distributed Coding-Aware Routing in Wireless Networks |
Mobile Computing |
2010/Java |
31. |
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual
Authentication and Key Exchange in Mobile Communications |
Network |
2010/Java |
32. |
Shifting Inference Control to User Side: Architecture and Protocol |
Network Security |
2010/Java |
33. |
Optimal Relay Station Placement in Broadband Wireless Access
Networks |
Mobile Computing |
2010/Java |
34. |
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats |
Network Security |
2010/Java |
35. |
A Parallel Self-Routing Rearrangeable Non-blocking Multi-Photonic
Switching Network |
Network |
2010/Java |
36. |
Energy-Aware Tag Anti-collision Protocols for RFID Systems |
Mobile Computing |
2010/Java |
37. |
An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature |
Network Security |
2010/Java |
38. |
A Dynamic En-route Filtering Scheme for Data Reporting in Wireless
Sensor Networks |
Network |
2010/Java |
39. |
Channel Assignment for Multi-hop Cellular Networks: Minimum Delay |
Mobile Computing |
2010/Java |
40. |
Provisioning of Deadline-Driven Requests With Flexible
Transmission Rates in WDM Mesh Networks |
Network |
2010/Java |
41. |
Secure Client-Side ST-DM Watermark Embedding |
Network Security |
2010/Java |
42. |
Maximizing Rewards in Wireless Networks with Energy and Timing
Constraints for Periodic Data Streams |
Mobile Computing |
2010/ .Net |
43. |
Toward Practical Opportunistic Routing With Intra-Session Network
Coding for Mesh Networks |
Network |
2010/Java |
44. |
TCAM Razor: A Systematic Approach Towards Minimizing Packet
Classifiers in TCAMs |
Network |
2010/Java |
45. |
Edge Adaptive Image Steganography Based on LSB Matching Revisited |
Network Security |
2010/ .Net |
46. |
Secure Distance-Based Localization in the Presence of Cheating
Beacon Nodes |
Mobile Computing |
2010/ .Net |
47. |
Predictive Network Anomaly Detection and Visualization |
Network Security |
2010/ .Net |
48. |
Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh
Networks |
Mobile Computing |
2010/ .Net |
49. |
SVD-Based Universal Spatial
Domain Image Steganalysis |
Network Security |
2010/ .Net |
50. |
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area
Networks |
Network Security |
2010/ .Net |
51. |
Power Control and Channel
Allocation in Cognitive Radio Networks with Primary Users’ Cooperation |
Mobile Computing |
2010/ .Net |
52. |
A Survey on the Encryption of Converge cast Traffic with
In-Network Processing |
Network Security |
2010/ .Net |
53. |
Cost Analysis of Short Message Retransmissions |
Mobile Computing |
2010/ .Net |
54. |
In-Depth Packet Inspection Using a Hierarchical Pattern Matching
Algorithm |
Network Security |
2010/ .Net |
55. |
Always Acyclic Distributed Path Computation |
Network |
2010/Java |
56. |
Multiple RFID Tags Access Algorithm |
Mobile Computing |
2010/ .Net |
57. |
Step Construction of Visual Cryptography Schemes |
Network Security |
2010/ .Net |
58. |
Quantifying Impact of Mobility on Data Availability in Mobile Ad
Hoc Networks |
Mobile Computing |
2010/ .Net |
59. |
Reversible Image Watermarking Using Interpolation Technique |
Network Security |
2010/ .Net |
60. |
High-Rate Uncorrelated Bit Extraction for Shared Secret Key
Generation from Channel Measurements |
Mobile Computing |
2010/ .Net |
61. |
Beacon-Assisted Spectrum Access with Cooperative Cognitive
Transmitter and Receiver |
Mobile Computing |
2010/ .Net |
62. |
Integration of False Data Detection With Data Aggregation and
Confidential Transmission in Wireless Sensor Networks |
Network |
2010/ .Net |
63. |
S4: Small State and Small Stretch Compact Routing Protocol for
Large Static Wireless Networks |
Network |
2010/ .Net |
64. |
SybilLimit: A Near-Optimal Social Network Defense Against Sybil
Attacks |
Network |
2010/ .Net |
65. |
Fast Algorithms for Resource Allocation in Wireless Cellular
Networks |
Network |
2010/ .Net |
66. |
Distributed Algorithms for Minimum Cost Multicast With Network
Coding |
Network |
2010/ .Net |
67. |
Minimizing Delay and Maximizing Lifetime for Wireless Sensor
Networks With Any cast |
Network |
2010/ .Net |
68. |
Replication Routing in DTNs: A Resource Allocation Approach |
Network |
2010/ .Net |
69. |
A Fitting Report Position Scheme for the Gated IPACT Dynamic
Bandwidth Algorithm in EPONs |
Network |
2010/ .Net |
70. |
POPI: A User-Level Tool for Inferring Router Packet Forwarding
Priority |
Network |
2010/ .Net |
S.N. |
IEEE 2009 Project Titles |
Domain |
Lang/Year |
1. |
A Gen2-based RFID Authentication Protocol for Security and Privacy |
Mobile Computing |
2009/.Net |
2. |
A Tabu Searching Algorithm For Cluster Building in Wireless
Sensor Networks |
Mobile Computing |
2009/.Net |
3. |
Analysis of Shortest Path Routing for Large Multi-Hop Wireless
Networks |
Network Computing |
2009/.Net |
4. |
Biased Random Walks in Uniform Wireless Networks |
Mobile Computing |
2009/.Net |
5. |
Cell Breathing Techniques for Load Balancing in Wireless LANs |
Mobile Computing |
2009/.Net |
6. |
Compaction of Schedules and a Two-Stage Approach for
Duplication-Based DAG Scheduling |
Distribute Computing |
2009/.Net |
7. |
Delay Analysis for Maximal Scheduling With Flow Control in
Wireless Networks With Bursty Traffic |
Network Computing |
2009/.Net |
8. |
Energy Maps For Mobile Wireless Networks |
Mobile Computing |
2009/.Net |
9. |
Enforcing Minimum-Cost Multicast Routing against Shelfish
Information Flows |
Distribute Computing |
2009/.Net |
10. |
Explicit Load Balancing Technique for NGEO Satellite Ip Networks
With On-Board Processing Capabilities |
Network Computing |
2009/.Net |
11. |
Greedy Routing with Anti-Void Traversal for Wirless Sensor
Networks |
Mobile Computing |
2009/.Net |
12. |
Information Content-Based Sensor Selection and Transmission Power
Adjustment for Collaborative Target Tracking |
Mobile Computing |
2009/.Net |
13. |
Local Construction of Near-Optimal Power Spanners for Wireless
Ad Hoc Networks |
Mobile Computing |
2009/.Net |
14. |
Movement-Assisted Connectivity Restoration in Wireless Sensor
and |
Distribute Computing |
2009/.Net |
15. |
On the Planning of Wireless Sensor Networks Energy-Efficient
Clustering under the Joint Rout |
Mobile Computing |
2009/.Net |
16. |
Performance of Orthogonal Fingerprinting Codes under Worst-Case
Noise |
Secure Computing |
2009/.Net |
17. |
PRESTO Feedback-Driven Data Management in Sensor Networks |
Network Computing |
2009/.Net |
18. |
Random Cast An Energy Efficient Communication Scheme for
Mobile Ad Hoc Networks |
Mobile Computing |
2009/.Net |
19. |
Resequencing Analysis of Stop-and-Wait ARQ for Parallel
Multichannel Communications |
Network Computing |
2009/.Net |
20. |
Resource Allocation in OFDMA Wireless Communications Systems
Supporting Multimedia Services |
Network Computing |
2009/.Net |
21. |
Route Stability in MANETs under the Random Direction Mobility
Model |
Mobile Computing |
2009/.Net |
22. |
Secure and Policy-Complaint Source Routing |
Network Computing |
2009/.Net |
23. |
Single-Link Failure Detection in All-Optical Networks Using |
Network Computing |
2009/.Net |
24. |
Spread-Spectrum Watermarking Security |
Secure Computing |
2009/.Net |
25. |
The Effectiveness of Checksums for Embedded Control Networks |
Secure Computing |
2009/.Net |
26. |
Two Blocking Algorithm on Adaptive Binary Splitting Single and
Pair Resolutions for RFID Tag Identification |
Network Computing |
2009/.Net |
27. |
Virus Spread in Networks |
Network Computing |
2009/.Net |
28. |
Capturing Router Congestion and Delay |
Network Computing |
2009/Java |
29. |
Continuous Monitoring of Spatial Queries in Wireless Broadcast |
Mobile Computing |
2009/Java |
30. |
Energy Maps For Mobile Wireless networks coherence Time
Versues Spreding Period |
Mobile Computing |
2009/Java |
31. |
Energy-Efficient SINR-Based Routing for Multihop Wireless |
Mobile Computing |
2009/Java |
32. |
Evaluating the Vulnerability of Network Traffic Using Joint |
Network Computing |
2009/Java |
33. |
Large Connectivity for Dynamic Random Geometric Graphs |
Mobile Computing |
2009/Java |
34. |
Measuring Capacity Bandwidth of Targeted Path Segments |
Network Computing |
2009/Java |
35. |
Mitigation of Control Channel Jamming Under Node Capture
Attacks |
Mobile Computing |
2009/Java |
36. |
Mobility Management Approaches for Mobile IP Networks |
Mobile Computing |
2009/Java |
37. |
Multiple Routing Configurations for Fast IP Network Recovery |
Network Computing |
2009/Java |
38. |
Residual-Based Estimation of Peer and Link Lifetimes in P2P
Networks |
Network Computing |
2009/Java |
39. |
SIMPS Using Sociology for Personal Mobility |
Mobile Computing |
2009/Java |
40. |
Spatio-Temporal Network Anomaly Detection by Assessing
Deviations of Empirical Measures |
Network Computing |
2009/Java |
41. |
Flexible Rollback Recovery in Dynamic Heterogeneous Grid
Computing |
Secure Computing |
2009/Java |
42. |
Dynamic Routing with Security Considerations |
Secure Computing |
2009/Java |
43. |
Adaptive Fuzzy Filtering for Artifact Reduction in Compressed
Images and Videos |
Image Processing |
2009/Java |
44. |
Detecting Malicious Packet Losses |
Distribute Computing |
2009/Java |
45. |
On the Security of Route Discovery in MANETs |
Secure Computing |
2009/.Net |
46. |
A Distributed Stream Query Optimization Framework through
Integrated Planning and Deployment |
Distribute Computing |
2009/Java |
47. |
Facial Recognition using multisensor images based on localized
kernel eigen spaces |
Image Processing |
2009/Java |
S.N. |
IEEE 2008 Project Titles |
Domain |
Lang/Year |
1. |
A Geometric Approach to
Improving Active Packet Loss Measurement |
Network Computing |
2008/Java |
2. |
Intrusion Detection in
Homogeneous and Heterogeneous Wireless Sensor Networks |
Mobile Computing |
2008/Java |
3. |
Bandwidth Estimation
for IEEE 802.11-Based Ad Hoc Networks |
Mobile Computing |
2008/Java |
4. |
Location Based Spatial Query
Processing In Wireless Broadcast Environments |
Mobile Computing |
2008/Java |
5. |
Modeling &
Automated Containment of Worms |
Secure Computing |
2008/Java |
6. |
Benefit Based Data
Caching In Ad Hoc Networks |
Network Computing |
2008/Java |
7. |
Minimizing File
Download Time in Stochastic Peer-to-Peer Networks |
Network Computing |
2008/Java |
8. |
Rate & Delay
Guarantees Provided By Close Packet Switches with Load Balancing |
Network Computing |
2008/Java |
9. |
Performance of a Speculative
Transmission Scheme for Scheduling-Latency Reduction |
Network Computing |
2008/Java |
10. |
QUIVER Consistent
Object Sharing For Edge Services |
Distribute Computing |
2008/Java |
11. |
Truth Discovery with multiple
Conflicting Information Providers on web |
Data Mining |
2008/J2EE |
12. |
Estimation of Defects
Based On Defect Decay Model ED3M |
Software Engineering |
2008/.Net |
13. |
HBA Distributed Metadata
Management for Large Cluster-Based Storage Systems |
Distribute Computing |
2008/.Net |
14. |
Rate Allocation &
Network Lifetime Problem for Wireless Sensor Networks |
Network Computing |
2008/.Net |
15. |
Dual-Link Failure Resiliency
through Backup Link Mutual Exclusion |
Network Computing |
2008/Java |
16. |
Orthogonal Data
Embedding for Binary Images in Morphological Transform Domain-A High-Capacity
Approach |
Multimedia Computing |
2008/.Net |
17. |
Trustworthy Computing
Under Resource Constraints With The Down Policy |
Secure Computing |
2008/.Net |
18. |
Localized Sensor Area
Coverage With Low Communication Overhead |
Mobile Computing |
2008/.Net |
19. |
Active Learning Methods
for Interactive Image Retrieval |
Image Processing |
2008/.Net |
20. |
Vision Based Processing
For Real-Time 3-D Data Acquisition Based On Coded Structured Light |
Image Processing |
2008/.Net |
21. |
Hardware enhanced association
rule mining with Hashing and Pipelining |
Data Mining |
2008/.Net |
22. |
Efficient Resource
Allocation For Wireless Multicast |
Mobile Computing |
2008/.Net |
23. |
A Novel Framework for Semantic
Annotation and Personalized Retrieval of Sports Video |
Multimedia |
2008/.Net |
24. |
A Distributed And
Scalable Routing Table Manager For The Next Generation Of IP Routers |
Network |
2008/.Net |
25. |
A New Model For Dissemination
Of XML Content |
Secure Computing |
2008/.Net |
26. |
Efficient 2-D Grayscale
Morphological Transformations With Arbitraly Flat Structuring Elements |
Image Processing |
2008/.Net |
27. |
Efficient Routing In Intermittently
Connected Mobile Networks The Multiple Copy Case |
Networking |
2008/.Net |
28. |
Watermarking Relational
Databases Using Optimization Based Techniques |
Data Mining |
2008/.Net |
29. |
Bandwidth Efficient
Video Multicasting in Multiradio Muilticellular Wireless |
Mobile Computing |
2008/Java |
30. |
Fuzzy Control Model
Optimization for Behavior-Constent Traffic Routing Under Information
Provision |
Transportation System |
2008/.Net |
31. |
An Efficient Association
Rule Mining Algorithm In Distributed Databases |
Data Mining |
2008/Java |
32. |
BRA A Bidirectional
Routing Abstraction for Asymmetric Mobile Ad Hoc Networks |
Network Computing |
2008/Java |
33. |
Temporal Partioning of
Communication Resources in an Integrated Architecture |
Secure Computing |
2008/.Net |
34. |
Controlling IP Spoofing
Through Inter Domain Packet Filters |
Secure Computing |
2008/Java |
35. |
Probabilistic Packet
Marking For Large Scale IP Trace Back |
Network Computing |
2008/.Net |
36. |
Statistical Techniques for
Detecting Traffic Anomalies through Packet Header Data |
Network Computing |
2008/.Net |
37. |
Securing User-Controlled
Routing Infrastructures |
Network Computing |
2008/Java |
38. |
Credit Card Fraud
Detection Using Hidden Markov Models |
Secure Computing |
2008/.Net |
39. |
Security in large Mediator
Protocols [IEEE Reference Project] |
Network Computing |
2008/Java |
40. |
A Signature-Based Indexing Method
for Efficient Content-Based Retrieval of Relative Temporal Pattern |
Data Mining |
2008/J2EE |
41. |
Two Techniques for Fast
Computation of Constrained Shortest Paths |
Network Computing |
2008/Java |
42. |
Protection of Database Security
via Collaborative Inference Detection |
Secure Computing |
2008/J2EE |
43. |
Efficient and Secure
Content Processing and Distribution by Cooperative Intermediaries |
Distribute Computing |
2008/Java |
44. |
Online Index Recommendations
for High-Dimensional Databases Using Query Workloads |
Data Mining |
2008/J2EE |
45. |
A Precise Termination
Condition of the Probabilistic Packet Marking Algorithm |
Secure Computing |
2008/Java |
S.N. |
IEEE 2005 to 2007 Project Titles |
Domain |
Lang/Year |
1. |
Distributed cache updating for the Dynamic
source routing protocol
|
Distribute Computing |
Java/2006 |
2. |
An Adaptive
Programming Model for Fault-Tolerant Distributed Computing |
Secure Computing |
Java/2007 |
3. |
Face Recognition
Using Laplacian faces |
Image Processing |
Java/2005 |
4. |
Predictive
Job Scheduling in a Connection Limited System using Parallel Genetic
Algorithm |
Network Computing |
Java/2005 |
5. |
Image
Processing Techniques for the Detection and Removal of Cracks in Digitized
Paintings
|
Image Processing |
. Net/2006 |
6. |
A Distributed Database
Architecture for Global Roaming in Next-Generation Mobile Networks |
Network Computing |
Java/2004 |
7. |
Noise Reduction by Fuzzy Image Filtering
|
Image Processing |
Java/2006 |
8. |
Online
Handwritten Script Recognition |
Image Processing |
Java/2004 |
9. |
ODAM: An
Optimized Distributed Association Rule Mining Algorithm |
Data Mining |
Java/2004 |
10. |
Structure
and Texture Filling-In of Missing Image Blocks in Wireless Transmission and
Compression App |
Image Processing |
Java/2004 |
11. |
An Agent
Based Intrusion Detection, Response and Blocking using signature method in
Active Networks |
Network Computing |
Java/2006 |
12. |
ITP: An
Image Transport Protocol for the Internet |
Network Computing |
Java/2002 |
13. |
Hybrid
Intrusion Detection with Weighted Signature Generation over Anomalous
Internet Episodes (HIDS) |
Secure Computing |
J2EE/2007 |
14. |
Network
border patrol: preventing congestion collapse and promoting fairness in the
Internet |
Network Computing |
Java/2004 |
15. |
Application
of BPCS steganography to wavelet compressed video |
Secure Computing |
Java/2004 |
26. |
Neural
Networks for Unicode Optical Character Recognition |
Image Processing |
. Net/2004 |
27. |
An Acknowledgment-Based
Approach For The Detection Of Routing Misbehavior In MANETs |
Network Computing |
Java/2007 |
28. |
XTC: A Practical
Topology Control Algorithm for Ad-Hoc Networks |
Network Computing |
Java/2004 |
29. |
A
near-optimal multicast scheme for mobile ad hoc networks using a hybrid
genetic algorithm |
Network Computing |
Java/2005 |
20. |
Mobile Agents
In Distributed Multimedia Database Systems |
Multimedia |
Java/2004 |
21. |
Image Stream
Transfer Using Real-Time Transmission Protocol |
Image Processing |
Java/2006 |
22. |
Personal Authentication Using 3-D Finger
Geometry
|
Image Processing |
Java/2006 |
23. |
Efficient
Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks |
Network Computing
|
. Net/2005
|
24. |
A Memory
Learning Framework for Effective Image Retrieval |
Image Processing |
Java/2005 |
25. |
Personal
Identification Based On Iris Texture Analysis |
Image Processing |
Java/2003 |
26. |
GHIC A
Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions |
Data Mining |
Java/2005 |
27. |
Workflow Mining
Discovering Process Models from Event Logs |
Data Mining |
.Net/2004 |
28. |
Identification
of Humans Using Gait |
Image Processing |
Java/2004 |
29. |
Location Aided Routing In Mobile AD-HOC Networks |
Network Computing |
Java/2004 |
30. |
Neural Network Based Face Detection |
Image Processing |
VC++/2002 |
IEEE Reference Projects |
|||
31. |
Genetic
Algorithm Based Train Simulation Using Concurrent Engineering |
Network Computing |
Java |
32. |
Image
Compression and De-compression |
Image Processing |
Java |
33. |
Network
Component For XML Migration |
Network Computing |
Java |
34. |
Java water
marking and image combustion |
Image Processing |
Java |
35. |
Edge
Detection in Images with Wavelet Transform |
Image Processing |
VC++ |
36. |
Neural
Network for Recognition of Handwritten and Digits |
Image Processing |
VC++ |
37. |
Back
Propagation Neural Network for Image Recognition |
Image Processing |
C# .Net |
38. |
Steganography
for Hiding Data in Wave Audio Files |
Secure Computing |
C# .Net |
39. |
Multiple
Ant Colonies Optimization for Load Balancing in Distributed Systems |
Network Computing |
C# .Net |
40. |
Image
Processing for Edge Detection |
Image Processing |
C# .Net |
41. |
Windows
Management Instrumentation (WMI) Implementation |
System |
C# .Net |
42. |
Cryptographically
Safe Server Client Protocol |
Secure Computing |
VC++ |
43. |
Hiding
messages in the Noise of a Picture |
Secure Computing |
C# .Net |
44. |
Performance
Evaluation of RMI |
Network Computing |
Java |
45. |
Public
Key Validation for DNS security Extension |
Network Computing |
Java |
46. |
Java
Visual Editor and Compiler Tool |
System |
Java |
47. |
Homogenous
Network Control and Implementation |
Network Computing |
Java |
48. |
Hopfield
model of neural network for pattern recognition |
Image Processing |
C# .Net |
49. |
Intrusion
Detection Prevention And Traceback Systems |
Network Computing |
VB, C++ |
50. |
Image Processing
for Convolution Filters |
Image Processing |
C# .Net |
Copyright 2010
© Penta Software IT Solution. All rights reserved.
Terms of use | Privacy Policy | Back