Friday, July 6, 2012


           IEEE 2012 Java and .Net Titles


1.    A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
2.    A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group
3.    A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Networks
4.    Active Visual Segmentation
5.    AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
6.    An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks
7.    Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels
8.    Cooperative download in vehicular environments
9.    Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points
10. Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs
11. Discovering Characterizations of the Behavior of Anomalous Sub-populations
12. Efficient Audit Service Outsourcing for Data Integrity in Clouds
13. Ensuring Distributed Accountability for Data Sharing in the Cloud
14. Fast Matrix Embedding by Matrix Extending
15. FireCol A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
16. Learn to Personalized Image Search from the Photo Sharing Websites
17. Load Balancing Multipath Switching System with Flow Slice
18. Network Assisted Mobile Computing with Optimal Uplink Query Processing
19. Outsourced Similarity Search on Metric Data Assets
20. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
21. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
22. Ranking Model Adaptation for Domain-Specific Search
23. Risk-Aware Mitigation for MANET Routing Attacks
24. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
25. Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval
26. SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare Emergency
27. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
28. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
29. Towards Accurate Mobile Sensor Network Localization in Noisy Environments
30. View-invariant action recognition based on Artificial Neural Networks
31. Fast Data Collection in Tree-Based Wireless Sensor Networks
32. Packet-Hiding Methods for Preventing Selective Jamming Attacks
33. Distributed Throughput Maximization in Wireless Networks via Random Power Allocation
34. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
35. A New Cell Counting Based Attack Against Tor