IEEE Java Projects – IEEE 2013
1. Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework -- Data mining
2. Ranking on Data Manifold with Sink Points -- Data mining
3. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks -- Data mining
4. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse -- Data mining
5. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data -- Data mining
6. A Survey of XML Tree Patterns -- Data mining
7. Region-Based Foldings in Process Discovery -- Data mining
8. Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures -- Data mining
9. T-Drive Enhancing Driving Directions with Taxi Drivers' Intelligence -- Data mining
10. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm -- Data mining
11. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model -- Data mining
12. A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models -- Data mining
13. Ontology Matching: State of the Art and Future Challenges -- Data mining
14. Large Graph Analysis in the GMine System -- Data mining
15. Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies -- Data mining
16. A System to Filter Unwanted Messages from OSN User Walls -- Data mining
17. A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments -- Data mining
18. A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments -- Data mining
19. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia -- Data mining
20. AML: Efficient Approximate Membership Localization within a Web-Based Join Framework -- Data mining
21. Event Tracking for Real-Time Unaware Sensitivity Analysis -- Data mining
22. Detecting Intrinsic Loops Underlying Data Manifold -- Data mining
23. Clustering Large Probabilistic Graphs -- Data mining
24. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering -- Data mining
25. Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping -- Data mining
26. Finding Rare Classes: Active Learning with Generative and Discriminative Models -- Data mining
27. Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models -- Data mining
28. Simple Hybrid and Incremental Postpruning Techniques for Rule Induction -- Data mining
29. Supporting Search-As-You-Type Using SQL in Databases -- Data mining
30. Reinforced Similarity Integration in Image-Rich Information Networks -- Data mining
31. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing -- Mobile Computing
32. Quality-Differentiated Video Multicast in Multirate Wireless Networks -- Mobile Computing
33. EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks -- Mobile Computing
34. Capacity of Hybrid Wireless Mesh Networks with Random APs -- Mobile Computing
35. Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding -- Mobile Computing
36. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation -- Mobile Computing
37. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks -- Mobile Computing
38. Evaluating Temporal Robustness of Mobile Networks -- Mobile Computing
39. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks -- Mobile Computing
40. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System -- Mobile Computing
41. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices' Heterogeneity -- Mobile Computing
42. An Investigation on LTE Mobility Management -- Mobile Computing
43. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks -- Mobile Computing
44. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks -- Mobile Computing
45. On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks -- Mobile Computing
46. Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information -- Mobile Computing
47. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks -- Mobile Computing
48. Toward a Statistical Framework for Source Anonymity in Sensor Networks -- Mobile Computing
49. On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling -- Mobile Computing
50. Model-Based Analysis of Wireless System Architectures for Real-Time Applications -- Mobile Computing
51. Successive Interference Cancellation: Carving Out MAC Layer Opportunities -- Mobile Computing
52. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks -- Mobile Computing
53. Group-Based Medium Access Control for IEEE 802.11n Wireless LANs -- Mobile Computing
54. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks -- Mobile Computing
55. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications -- Mobile Computing
56. Secure Communication Based on Ambient Audio -- Mobile Computing
57. Importance of Coherence Protocols with Network Applications on Multicore Processors -- Multimedia
58. An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs -- Multimedia
59. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes -- Networking
60. Distance Bounding A Practical Security Solution for Real-Time Location Systems -- Networking
61. Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm -- Parallel & Dis Systems
62. Network Traffic Classification Using Correlation Information -- Parallel & Dis Systems
63. Distributed Web Systems Performance Forecasting Using Turning Bands Method -- Parallel & Dis Systems
64. High Performance Resource Allocation Strategies for Computational Economies -- Parallel & Dis Systems
65. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks -- Parallel & Dis Systems
66. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption -- Parallel & Dis Systems
67. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks -- Parallel & Dis Systems
68. Adaptive Network Coding for Broadband Wireless Access Networks -- Parallel & Dis Systems
69. Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip -- Parallel & Dis Systems
70. MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching -- Parallel & Dis Systems
71. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision -- Parallel & Dis Systems
72. Covering Points of Interest with Mobile Sensors -- Parallel & Dis Systems
73. Topology Abstraction Service for IP-VPNs -- Parallel & Dis Systems
74. Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller -- Parallel & Dis Systems
75. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models -- Parallel & Dis Systems
76. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks -- Parallel & Dis Systems
77. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks -- Parallel & Dis Systems
78. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks -- Parallel & Dis Systems
79. Analysis of Distance-Based Location Management in Wireless Communication Networks -- Parallel & Dis Systems
80. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks -- Parallel & Dis Systems
81. Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery -- Parallel & Dis Systems
82. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks -- Parallel & Dis Systems
83. Dynamic Coverage of Mobile Sensor Networks -- Parallel & Dis Systems
84. In-Network Estimation with Delay Constraints in Wireless Sensor Networks -- Parallel & Dis Systems
85. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks -- Parallel & Dis Systems
86. Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor -- Parallel & Dis Systems
87. IP-Geolocation Mapping for Moderately Connected Internet Regions -- Parallel & Dis Systems
88. IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments -- Parallel & Dis Systems
89. A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Parallel and Distributed Systems
90. EAACK-A Secure Intrusion-Detection System for MANETs -- Secure Computing
91. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks -- Signal Processing
92. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper -- Signal Processing
93. Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks -- Signal Processing
94. The Generalization Ability of Online Algorithms for Dependent Data ---- Webmining
95. Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks -- Wireless Networks
96. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling -- Wireless Networks
97. A Data Fusion Technique for Wireless Ranging Performance Improvement -- Wireless Networks
98. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks -- Wireless Networks
No comments:
Post a Comment