[ Close ]
Username
Password


Forgotten your password?
 
Custom Search
Computer/IT Projects
 Projects Q A, Guidance for your projects » Projects Forum » Computer/IT Projects
Message Icon Topic: 2013-2014 IEEE Dot Net Projects - Latest Post Reply Post New Topic
Found this useful? Give a +1   Add to Facebook: Add to Facebook
Free Project Downloads
CS / IT Project Downloads
.Net Project Downloads
JAVA Project Downloads
PHP Project Downloads
Networking Proj Downloads
Project Topics
Computer(CS/IT) Projects
Software Mini Project Topics
Android Project Topics
Networking Project Ideas
Dot Net Project Topics
Latest IEEE Projects List
IEEE JAVA Project Topics
Project Presentation Tips
How to choose Project Topic
Tips for Final Year Project
Steps for FYP, Mini Project
Preparing a Project Report
Problems faced in Projects
 
Get Free Software CS / IT Project Downloads:

Enter your email address:  

Author Message
Krishna_Sridhar
Senior Member
Senior Member


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Krishna_Sridhar Replybullet Topic: 2013-2014 IEEE Dot Net Projects - Latest
    Posted: 23-Aug-2013 at 12:15pm
2013-2014 IEEE .Net Project Topics - Latest
(This page contains copyrighted material)

CLOUD COMPUTING
A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks
CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
Privacy Preserving Delegated Access Control in Public Clouds
Dynamic Audit Services for Outsourced Storages in Clouds
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
Privacy-Preserving Public Auditing for Secure Cloud Storage
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
An Adaptive Cloud Downloading Service
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
On Data Staging Algorithms for Shared Data Accesses in Clouds
CloudMoV: Cloud-based Mobile Social TV
Privacy Preserving Delegated Access Control in Public Clouds.
Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks.
Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
Privacy-Preserving Public Auditing for Secure Cloud Storage
QoS Ranking Prediction for Cloud Services
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems
Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data

 
IP IP Logged
Krishna_Sridhar
Senior Member
Senior Member


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Krishna_Sridhar Replybullet Posted: 23-Aug-2013 at 12:15pm
KNOWLEDGE AND DATA ENGINEERING
TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
Supporting Search-As-You-Type Using SQL in Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A Survey of XML Tree Patterns
Dynamic Personalized Recommendation on Sparse Data
Mining User Queries with Markov Chains: Application to Online Image Retrieval

 
IP IP Logged
Krishna_Sridhar
Senior Member
Senior Member


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Krishna_Sridhar Replybullet Posted: 23-Aug-2013 at 12:16pm
PARALLEL DISTRIBUTION
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks
Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n Wireless Sensor Networks
Lightweight Location Verification Algorithms for Wireless Sensor Networks
Heterogeneous Resource Allocation under Degree Constraints
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks
Multicast Capacity in MANET with Infrastructure Support
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks
IP IP Logged
Krishna_Sridhar
Senior Member
Senior Member


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Krishna_Sridhar Replybullet Posted: 23-Aug-2013 at 12:17pm
DATA MINING
Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
Optimal Route Queries with Arbitrary Order Constraints
Failure-Aware Cascaded Suppression in Wireless Sensor Networks
A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
Secure Mining of Association Rules in Horizontally Distributed Databases.
A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
ELCA: Evaluation for Keyword Search on Probabilistic XML Data.
Change Detection in Streaming Multivariate Data Using Likelihood Detectors
IP IP Logged
Krishna_Sridhar
Senior Member
Senior Member


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Krishna_Sridhar Replybullet Posted: 23-Aug-2013 at 12:18pm
MOBILE COMPUTING
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
IP-Geolocation Mapping for Moderately Connected Internet Regions
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Optimal Multicast Capacity and Delay Tradeoffs in MANETs
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
EAACK—A Secure Intrusion-Detection System for MANETs
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
Network-Assisted Mobile Computing with Optimal Uplink Query Processing
Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
Toward Accurate Mobile Sensor Network Localization in Noisy Environments
IP IP Logged
Krishna_Sridhar
Senior Member
Senior Member


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Krishna_Sridhar Replybullet Posted: 23-Aug-2013 at 12:20pm
NETWORKING
Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
Delay-Based Network Utility Maximization
A Distributed Control Law for Load Balancing in Content Delivery Networks
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
Resource Allocation for QoS Support in Wireless Mesh Networks
A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With Order-Optimal Per-Flow Delay
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
Efficient Algorithms for Neighbor Discovery in Wireless Networks

IP IP Logged
Krishna_Sridhar
Senior Member
Senior Member


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Krishna_Sridhar Replybullet Posted: 23-Aug-2013 at 12:20pm
SERVICE COMPUTING (WEB SERVICE)
Cost-Based Optimization of Service Compositions
Evolution of Social Networks Based on Tagging Practices
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information
Privacy-Enhanced Web Service Composition
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
IP IP Logged
Krishna_Sridhar
Senior Member
Senior Member


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Krishna_Sridhar Replybullet Posted: 23-Aug-2013 at 12:21pm
SECURE COMPUTING
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
Privacy Preserving Data Sharing With Anonymous ID Assignment
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks.
EAACK—A Secure Intrusion-Detection System for MANETs
IP IP Logged
Krishna_Sridhar
Senior Member
Senior Member


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Krishna_Sridhar Replybullet Posted: 23-Aug-2013 at 12:22pm
IMAGE PROCESSING
Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage
Query-Adaptive Image Search With Hash Codes
Reversible Data Hiding With Optimal Value Transfer
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting

MULTIMEDIA
Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
IP IP Logged

 
Post Reply Post New Topic

Free Programming Courses in JAVA, .Net and PHP (Register Now!)

Java Free Online Course

.Net Free Online Course

PHP Free Online Course


 
Printable version Printable version

Forum Jump
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot delete your posts in this forum
You cannot edit your posts in this forum
You cannot create polls in this forum
You cannot vote in polls in this forum



This page was generated in 0.016 seconds.
© ProjectsQA.com   |   Privacy policy