Anda di halaman 1dari 8

Infopark Software

Technologies
No Yea
JAVA IEEE Titles
. r
1
. Study on Intelligent E-Shopping System Based on Data Mining 2009

2
. PBFMCSP: Prefix Based Fast Mining of Closed Sequential Patterns 2009

3
. Capturing Router Congestion and Delay(NW) 2009

4
. Detecting Malicious Packet Losses 2009

5
. Dynamic Routing with Security Considerations(NW) 2009

6
Heuristic algorithms for designing self-repairing protection tress in mesh
. 2009
network(NW)

7
. A New Reliable Broadcasting in Mobile Ad Hoc Networks(NW) 2009

8
Continuous Monitoring of Spatial Queries in Wireless Broadcast 2009
.
Environments(NW)

9
Effective and Efficient Query Processing for Video Subsequence
. 2009
Identification

1 Energy Maps for Mobile Wireless Networks: Coherence Time versus 2009
0

LIVE / IEEE Projects Call @ 9397931234


Infopark Software
Technologies
Spreading Period(NW)

1
1
Energy-Efficient SINR-Based Routing for Multihop Wireless Networks(NW) 2009
.

1
2 Evaluating the Vulnerability of Network Traffic Using Joint Security and
Routing Analysis 2009
.

1
3
Measuring Capacity Bandwidth of Targeted Path Segments(NW) 2009
.

1
4
Mitigation of Control Channel Jamming Under Node Capture Attacks 2009
.

1
5
Multiple Routing Configurations for Fast IP Network Recovery(NW) 2009
.

1
6
Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks 2009
.

1
7
SIMPS Using Sociology for Personal Mobility(NW) 2009
.

1 Spatio-Temporal Network Anomaly Detection 2009


8

LIVE / IEEE Projects Call @ 9397931234


Infopark Software
Technologies
1
9
Electronic Voting Machine Using Elgamal Encryption 2009
.

2
0
Using The Cohesion Of Classes For Fault Prediction 2008
.

2
1 Optimal State Allocation for Multicast Communication with Explicit
Multicast forwarding 2008
.

2
2 2008
On Performance Benefits of Multihoming Route Control
.

2
3 Online Index Recommendations for High-Dimensional Databases Using
Query Workloads 2008
.

2
4
Modeling & Automated Containment of Worms 2008
.

2
5
Minimizing File Download Time in Stochastic Peer-to-Peer Networks 2008
.

2 A Signature-Based Indexing Method for Efficient Content-Based Retrieval 2008


6 of Relative Temporal Patterns
.

LIVE / IEEE Projects Call @ 9397931234


Infopark Software
Technologies
2
7 An Efficient Clustering Scheme to Exploit Hierarchical Data in Network
Traffic Analysis 2008
.

2
8
Computation-Efficient Multicast Key Distribution 2008
.

2
9 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc
Networks 2008
.

3
0 A Model-Based Approach to Evaluation of the Efficacy of FEC Coding In
Combating Network Packet Losses 2008
.

3
1
Cryptographic versus trust-based method for MANET routing security 2008
.

3
2 2008
Connectivity for Dynamic Random Geometric Graphs
.

3
3 C-TREND Temporal Cluster Graphs for Identifying and Visualizing Trends
in Multi attribute Transactional Data 2008
.

3 Designing Less-Structured P2P Systems for the Expected High Churn 2008
4

LIVE / IEEE Projects Call @ 9397931234


Infopark Software
Technologies
3
5 Efficient and Secure Content Processing and Distribution by Cooperative
Intermediaries 2008
.

3
6
Mitigating Performance Degradation in Congested Sensor Networks 2008
.

3
7
NDT A Model-Driven Approach 2008
.

3
8 Problem Oriented Software Engineering Solving the Package Router
Control Problem 2008
.

3
9 Security Requirements Engineering A Framework for Representation and
Analysis 2008
.

4
0
Securing User-Controlled Routing Infrastructures 2008
.

4
1
Security in large Mediator Protocols 2008
.

4 An agent based intrusion detection response and blocking using 2008


2 signature method in active networks
.

LIVE / IEEE Projects Call @ 9397931234


Infopark Software
Technologies
4
3
An Efficient Association Rule Mining Algorithm In Distributed Databases 2008
.

NO .Net IEEE Titles Yea


. r
1
. Two Blocking Algorithms on Adaptive Binary(NW) 2009

2
. A Gen2 Based RFID Authentication Protocol for Security and Privacy 2009

3
Explicit Load Balancing Technique for NGEO Satellite IP Networks With
. On-Board Processing Capability(NW) 2009

4
Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc
. Networks(NW) 2009

5 Delay Analysis for Maximal Scheduling With Flow Control in Wireless


Networks With Bursty Traffic(NW)
. 2009

6 Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise


. 2009

7 The Effectiveness of Checksums for Embedded Control Networks(NW)


. 2009

8 Enforcing Minimum-Cost Multicast Routing against Selfish Information


Flows(NW)
. 2009

9 A Survey on Privacy Preserving Data Mining 2009

LIVE / IEEE Projects Call @ 9397931234


Infopark Software
Technologies
1
0 Watermarking Relational Databases Using Optimization Based
Techniques(NET WORKING) 2008
.

1
1 Watermarking Relational Databases Using Optimization-Based
Techniques-2008(web based) 2008
.

1
2 Policies for Caching OLAP Queries 2008
.

1
3 A new model for dissemination of xml 2008
.

1
4 Fuzzy Control Model Optimization for Behavior-Constant Traffic Routing
Under Information Provision 2008
.

1
5 Hardware enhanced association rule mining with Hashing and Pipelining 2008
.

1 Semantic Ideation Learning for Agent- Based E-Brainstorming


6
2008
.

1 Xml Database Migration


7
2008
.

1 Compaction of Schedules and a Two-Stage Approach for Duplication 2008

LIVE / IEEE Projects Call @ 9397931234


Infopark Software
Technologies
1 Secure Authentication Watermarking for Binary Images using Pattern
Matching
9
2008
.

2 Probabilistic Packet Marking for Large-Scale IP Trace back


0
2008
.

LIVE / IEEE Projects Call @ 9397931234

Anda mungkin juga menyukai