Thursday, 28 February 2013

Dotnet Projects Title List


2012  JAVA IEEE PROJECTS

S.NO.
Project Title
Domain
Year
1.       
Online Modeling of Proactive Moderation System for Auction Fraud Detection
Network Security
2012
2.       
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
Cloud Computing
2012
3.       
Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
Data Mining
2012
4.       
Packet-Hiding Methods for Preventing Selective Jamming Attacks
Network Security
2012
5.       
Learn to Personalized Image Search from  the Photo Sharing  Websites
Multimedia
2012
6.       
multiparty access control for online social networks: model and mechanisms
Data Mining
2012
7.       
An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
Networking
2012
8.       
Game-Theoretic Pricing for Video Streaming inMobile Networks
Networking
2012
9.       
In Tags We Trust: Trust modeling in social tagging of multimedia content
Multimedia
2012
10.   
Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
Data Mining
2012
11.   
Packet Loss Control Using Tokens at the Network Edge
Networking
2012
12.   
Ensuring Distributed Accountability for Data Sharing in the Cloud
Cloud Computing
2012
13.   
Cut detection in wireless sensor networks
Wireless Communication
2012
14.   
Organizing User Search Histories
Data Mining
2012
15.   
Ranking Model Adaptation for Domain-Specific Search
Data Mining
2012
16.   
Risk-Aware Mitigation for MANET Routing Attacks
Network Security
2012
17.   
Slicing: A New Approach to Privacy Preserving Data Publishing
Data Mining
2012
18.   
Fast Data Collection in Tree-Based Wireless Sensor Networks.
Mobile Computing
2012
19.   
Cloud Data Production for Masses
 Cloud Computing
2012
20.   
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
Cloud Computing


2011JAVA IEEE PROJECTS

S.NO.
Project Title
Domain
Year
1.       
Effective Navigation of Query Results Based on Concept Hierarchies
Data Mining
2011
2.       
Modeling and Detection of Camouflaging Worm
Network Security
2011
3.       
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
Networking
2011
4.       
Nymble: Blocking Misbehaving Users in Anonymizing Networks
Network Security
2011
5.       
Ranking Spatial Data by Quality Preferences
Data Mining
2011
6.       
Discovering Conditional Functional Dependencies
Data Mining
2011
7.       
Buffer Sizing for 802.11 Based Networks
Networking
2011
8.       
Extended XML Tree Pattern Matching: Theories and Algorithms
Data Mining
2011
9.       
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
Network Security
2011
10.   
The CoQUOS Approach to Continuous Queries in Unstructured Overlays
Data Mining
2011
11.   
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
Mobile Computing
2011
12.   
Decision Trees for Uncertain Data
Data Mining
2011
13.   
Secure and Practical Outsourcing of Linear  Programming in Cloud Computing
Cloud Computing
2011
14.   
Authenticated multi step nearest neighbor search
Networking
2011
15.   
Adaptive cluster Distance bounding for high dimensional indexing
Data mining
2011
16.   
Making aggregation work in uncertain and probabilistic databases
Data Mining
2011
17.   
Improving utilization of infrastructure clouds
Cloud Computing
2011
18.   
Wireless sensor network security model using zero knowledge protocol
Mobile Computing
2011
19.   
Selfish overlay network creation and maintenance.
Networking
2011
20.   
SPAF: Stateless FSA - based packet filters
Networking
2011

2010 JAVA IEEE PROJECTS
S.No
Project Title
Domain
Year
1
A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks.

Networking
2010
2
On wireless scheduling algorithms for minimizing the queue-overflow probability.

Networking
2010
3
Always Acyclic Distributed Path Computation.

Networking
2010
4
Ensuring Data Storage Security in Cloud Computing.
Cloud computing

2010
5
Demonstration of lightpath sharing for video streaming and data collection in lambda grid networks.

Grid Networking

2010
6
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains-abs.

Data Mining
2010
7
PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects.

Data Mining
2010
8
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes.

Mobile Computing
2010
9
Layered Approach Using Conditional Random Fields for Intrusion Detection.

Network Security
2010
10
Closeness a new privacy measure for data publishing.

Data Security
2010
11
Host-to-Host Congestion Control for TCP.

Networking
2010
12
Mesh Based Multicast Routing in MANET Stable Link Based Approach.

Networking
2010
13
Mitigating selective forwarding attacks with a channel-aware approach in WMNS.

On Wireless Comunnication
2010
14
Novel defense mechanism against data flooding attacks in wireless ad hoc networks.
Network Security
2010
15
Random Access Transport Capacity.
On Wireless Communication
2010
16
A Review of the Applications of Agent Technology In Traffic and Transportation Systems.
On Intelligence  Systems
2010
17
Binrank: Scaling Dynamic Authority-Based Search Using Materialized Sub Graphs
.
Data Mining
2010
18
Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks.

Data Mining

2010
19
A Distributed Protocol to Serve Dynamic
Groups for Peer-to-Peer Streaming.

Networking
2010
20
Cooperative Caching in Wireless P2P
Networks: Design, Implementation.

Networking
2010
21
IRM: Integrated File Replication And Consistency Maintenance In P2p Systems.

Networking
2010

2009 JAVA Projects

SR NO

Project Title

Domain

Year
1
Glip A concurrency Control Protocol for Clipping Indexing

Data Mining

2009
 2
Interactive Correction and Recommendations for computer language learning and training

Data Mining

2009
 3
Storing and Indexing spatial data in P2P systems.


Data Mining

2009
 4
Mobility management approaches for mobile IP networks: performance comparision and use recommendations


Mobile Computing

2009
 5
Evaluating the vulnerability of N/W traffic using joint security and routing analysis


Mobile Computing

2009
 6
Mitigation performance Degradation in congested sensor networks.


Mobile Computing

2009
 7
Mitigation of control channel jamming under ode capture attacks


Mobile Computing

2009
 8
Energy maps for mobile wireless. N/W: coherence Time versus spreading period


Mobile Computing

2009
 9
Simps: Using sociology for personal Mobility


Networking

2009
 10
Multiple routing configurations for fast IP network recovery


Networking

2009
 11
Residual-Based estimation of peer and link lifetimes in P2P N/W.


Networking

2009
 12
Flexible roll back recovery in dynamic heterogeneous grid computing


Networking

2009
 13
SAR Image Regularization with Fast Approximate discrete minimization


Image Processing


2009
 14
Dynamic routing with security considerations


Network Security

2009
 15
Cryptographic versus Trust-based methods for MANET routing security


Network Security

2009
 16
A Decentralized Method for Scaling Up
Genome Similarity Search Services

Networking

2009
 17
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks

On Wireless Communications

2009
 18
Capturing Router Congestion and Delay


Networking

2009
 19
Catching the Trend: A Framework for Clustering
Concept-Drifting Categorical Data


Data Mining

2009
 20
CDNs Content Outsourcing Via Generalized Communities


Data Mining

2009
 21
Cooperative Secondary Authorization Recycling

Networking

2009
 22
Detecting Malicious Packet Losses

Network Security

2009
23
Dynamic Search Algorithm in Unstructured
Peer-to-Peer Networks


Networking

2009
 24
Efficient Node Admission and Certificate less Secure Communication in Short-Lived MANETs

Network Security


2009
 25
Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach

Network Security


2009
 26
Multi-path Dissemination in Regular Mesh Topologies

Networking

2009
 27
Privacy-Aware Collaborative Spam Filtering


Networking

2009
 28
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis


Networking

2009






2008JAVA Projects
SR No
Project Title
Domain
Year
1
On the Performance Benefits of Multihoming Route Control.


Networking

2008
2
Two techniques for fast computation of constrained shortest paths


Networking

2008
3
Probabilistic packet marking for Large-Scale IP trace back


Network Security

2008
4
A geometric approach to improving active packet loss measurement


Networking

2008
5
A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks


Networking

2008
6
Minimizing File download time in stochastic Peer to Peer N/W


Networking

2008
7
Computation Efficient multicast key distribution

Networking
2008
8
Quiver: Consistent Object Sharing for Edge Services


Networking
2008
9
Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common Interest


Networking

2008
10
Modeling and Automated Containment of Worms


Network Security

2008
11
Controlling IP spoofing through interdomain packet filters
Network Security

2008
12
C-TREND: Temporal Cluster Graphs for Identifying and Visualizing    Trends in Multiattribute Transactional Data
Data Mining

2008
13
Probabilistic Group Nearest Neighbor Queries
Data Mining

2008
14
A Lossless Compression Scheme for Bayer Color Filter Array Images
image processing

2008
15
Image Restoration Using Space-Variant Gaussian Scale Mixtures in over complete pyramids
Image Processing

2008
16
Bandwidth Estimation for IEEE 802.11 Based Ad Hoc Networks
Mobile computing

2008
17
Efficient Resource Allocation for Wireless Multicast
Mobile Computing

2008
18
Mining the E-commerce Data to Analyze the Target Customer Behavior
Data Mining


2008
19
Incremental Learning of Chunk Data for Online Pattern Classification Systems
Neural Networks

2008
20
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Software Engineering

2008
21
Video Semantic Event/Concept Detection Using a Subspace-Based Multimedia Data Mining Framework

Multimedia

2008



22
Face Recognition Using Laplacian Faces


23
Improving The Performance of Distributed Virtual Environment System(networking)











JAVA WEB APPLICATION
SNO
PROJECT NAME
1.       
Communal Contact
2.       
Back Forty Dense
3.       
Bureaucrat Defended Entity
4.       
Baccalaureate Gateway
5.       
Rescue Squad Overhaul Contributor
6.       
Reckoning Inquisitor
7.       
Bacillus Eavesdropper
8.       
Online Itemization Structure
9.       
Hospice Dossier Control
10.   
Electrorate Conspiracy
11.   
Symposium Schema
12.   
Restrained Netting
13.   
Banter Porch
14.   
Grime Dissolution Scheme
15.   
Endurance Of Employee Particulars
16.   
Paraquat Stockpile
17.   
On-stream Troutville
18.   
Project Regulation
19.   
Ostentatious Storehouse Structure
20.   
Digital Placard
21.   
Almanac Ascertain
22.   
Appositeness Intendance
23.   
Blemish Ascertainers
24.   
Online Allegation
25.   
Mortal Policy Outline
26.   
Confrontation Reconnoiter
27.   
Erudition Damper
28.   
Cartel Communiqué
29.   
Inherent Envoy Scheme
30.   
E-Chain Communicator
31.   
Enormous Employment
32.   
Vendible Internuncio
33.   
First-Rate Sanatorium
34.   
Misdemeanor Abjurer
35.   
Web Linoleum
36.   
Directorial Dispensation                                
37.   
Haul able Overhaul
38.   
Electronic Depository
39.   
Endowment Fathom
40.   
Disburse Mobile Scheme
41.   
Venture Scrutiny
42.   
Stately Sojourn
43.   
e-Acquirements
44.   
Disposition Prospectus
45.   
Tele Dormitory
46.   
Fleet Conveyor                                                          
47.   
Velocipede Dime store
48.   
Widespread Catalog
49.   
Travel Permit Indulgence Scheme
50.   
Infobahn Vendue
51.   
Village Communic Bureau
52.   
Weald Supervision Scheme
53.   
Online Women Kibitzer
54.   
Clodhopper's Pal
55.   
Online Dodge
56.   
Web Athenaeum Governance
57.   
Web Vernacular Referendum
58.   
Web Venture Governance                             
59.   
Convertible Leaflet Governance                    
60.   
Mobility Bill Defrayment                             
61.   
Relevance to Scattered Precinct        
62.   
Cast Your Referendum          
63.   
Embellish Bureau       
64.   
Aero Shuttle   
65.   
Online Symphony      
66.   
Salvage Scheme         
67.   
Barristerial Atrium     
68.   
Mortgage Scheme      
69.   
Online Nuptial           
70.   
Belligerent Tackle Hire Classification
71.   
e-Conscription
72.   
On-Line Patronizing  
73.   
Bistro Stipulation       
74.   
Tangle Emporium       
75.   
Online Fretfulness      
76.   
Hoard Clinician          
77.   
Inure-Avocation Unit
78.   
Sales Auditing Tool   
79.   
Pragmatic Academy   
80.   
Online Burgeons Exposition  
81.   
Panchayathi Financial Aid
82.   
Menage Swop
83.   
Epoch Indemnification  Directorate
84.   
E- Celluloid Rain check  Bespeaking
85.   
E-Voucher on Railway
86.   
Sophomore Strategy   Apportionment and      Directorate FEC Coding
87.   
Lastingness Slots
88.   
Hamlet Possession
89.   
Online Sedative
90.   
Manifold Entrust Scheme                            
91.   
Conjunct Expedient
92.   
E-Assessment Instructor
93.   
Plunge Fraternization
94.   
Online Negotiation
95.   
Indemnification  Stratagem Directorate Scheme
96.   
Malleate Bureau  Directorate Scheme
97.   
Chattels Mega crop
98.   
Ecumenical Archives
99.   
Online Prodigy
100.                       
Motel Recourses Tool
101.                       
Warehouse Executer
102.                       
Forensic Manager
103.                       
Transport Plus
104.                       
Travel Management System
105.                       
Graphics Data Visualization System
106.                       
Hospice Management System
107.                       
Medi Tracker
108.                       
Common Application System For Employment Exchanges
109.                       
Automated Business Process
110.                       
Flow well Automation
111.                       
Automated Sports Club
112.                       
Net Banking
113.                       
NETPOD
114.                       
Easy-pay finance
115.                       
Upholding of corporate sector
116.                       
Info ware Services





CORE JAVA PROJECT
SNO
PROJECT TITLE NAME
1.       
Data –File apportioning
2.       
Java Envoy
3.       
Intranet Control System
4.       
Cryptographic Scheme
5.       
Gouging Scheme
6.       
Net Chatter
7.       
Secure Socket Layer Protocol
8.       
Precedence Based Routing
9.       
FEC in Network Packet Losses
10.   
Consignment Harmonizing
11.   
Multicast Gouging
12.   
Secure Authentication Key
13.   
Sachet Short-out
14.   
Robust Spanning Data Dissemination
15.   
Query Dispensation in Networks
16.   
Adhoc Network Using Lar Protocol
17.   
Cliamable Overlay Multicast System
18.   
Client Server Protocol
19.   
Distributed Cooperative Intermediaries
20.   
Improved Virtual Environment Systems
21.   
Layer To Forward Protocol
22.   
Measurement Control Edge Routers
23.   
Net survey Simulation
24.   
Networks With Double Coverage
25.   
Proactive  Secure Scheme
26.   
Randomized Protocols Networks
27.   
Routing In Intermittently  Networks
28.   
Scheduling Mechanisms In Network
29.   
Secure Routing Control
30.   
Selfish Routing  In Online
31.   
Server Reassign Load






2012 DOTNET IEEE PROJECTS
S.No.
Project Title
Domain
Year
1
AMPLE: An Adaptive Traffic Engineering  System Based on Virtual Routing Topologies.

Wireless Communication
2012
2
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks.

Image Processing
2012
3
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs.

Network Security
2012
5
Network Assisted Mobile Computing with Optimal Uplink Query Processing.

Mobile Computing
2012
6
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms.

Networking
2012
7
Scalable and Secure Sharing of Personal Health Records in Cloud Computing usingAttribute-based Encryption

Cloud Computing
2012
8
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework forMobile-Healthcare Emergency

Parallel and Distributed system
2012
9
Topology control in mobile ad hoc networks with cooperative communications

Mobile Computing
2012
10
Robust Face-Name Graph Matching for Movie Character Identify.

Image Processing
2012
11
Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks

Wireless Communication
2012
12
Automatic Reconfiguration for Large-Scale Reliable Storage Systems

Network Security
2012
13
Expert Discovery and Interactions in Mixed Service-Oriented Systems

SOA
(Service Computing)
2012
14
Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval

Image Processing
2012
15
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks

Network security
2012
16
Efficient Audit Service Outsourcing for Data Integrity in Clouds.

Cloud Computing
2012
17
Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points.

Image Processing
2012
18
A New Cell Counting Based Attack Against Tor.

Networking
2012
19
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.

Parallel and Distributed system
2012
20
Towards Secure and Dependable Storage Services in Cloud Computing.

Cloud Computing
2012

2011 DOTNET IEEE PROJECTS
S.No.
Project Title
Domain
Year
1
Exploiting dynamic resource allocation for efficient parallel data processing in the cloud

Parallel and Distributed systems
2011
2
Adaptive provisioning of human expertise in service-oriented systems

Service Computing
2011
3
Bridging socially-enhanced virtual communities

Datamining
2011
4
Data integrity proofs in cloud storage


Cloud Computing
2011
5

Efficient computation of range aggregates against uncertain location based queries



Data Mining
2011
6

Exploring application-level semantics for   data compression.


Data Mining
2011
7

Improving aggregate recommendation diversity using ranking-based techniques


Data Mining
2011
8
Monitoring service systems from a language-action perspective

Data Mining

2011
9
One size does not fit all towards user- and query-dependent ranking for web databases.

Data Mining
2011
10

Optimal service pricing for a cloud cache


Cloud Computing
2011
11

A personalized ontology model for web information gathering


Data Mining
2011
12

Publishing search logs – a comparative study of privacy guarantees


Data Mining
2011
13

Scalable learning of collective behavior.


Data Mining
2011
14

The awareness network, to whom should i display my actions? And, whose actions should i monitor?


Software Engineering
2011
15

The world in a nutshell concise range queries.


Data Mining
2011
16

A query formulation language for the data web


Data Mining
2011
17

Horizontal aggregations in sql to prepare data sets for data mining analysis


Data Mining
2011
18

Automated certification for compliant cloud-based business processes\


Service Computing SOA
2011
19

Continuous neighbor discovery in asynchronous Sensor networks


Networking
2011
20
Distributed adaptation of quantized feedback for downlink network mimo systems

Wireless Communication
2011
21
The geometric efficient matching algorithm for firewalls

Network Security
2011
22
Adaptive fault tolerant qos control algorithms for maximizing system lifetime of query-based wireless sensor networks


Network Security
2011
23

Jamming-aware traffic allocation for multiple-path routing using portfolio selection


Networking
2011
24

Robust correlation of encrypted attack traffic through stepping stones by flow watermarking



Network Security
2011
25

Vulnerability analysis in soa-based business processes


Service Computing SOA
2011
26

Integration of Sound Signature in Graphical Password Authentication System


Data Mining
2011


2010 DOTNET IEEE PROJECTS

S.No.
Project Title
Domain
Year
1
VEBEK :Virtual Energy –Based Encryption and Keying for Wireless Sensor Network
Mobile Computing
2010
2
Conditional Shortest  Path Routing in Delay Tolerant Networks.
Networking
2010
3
Efficient and Robust Detection of Duplicate Videos in a Large Database.
Circuits and System for Video Technology
2010
4
Data Leakage Detection
Knowledge and Data Engineering
2010
5
A Study for Important Criteria of Feature Selection in Text Categorization.
Knowledge and Data Engineering
2010
6
Inference From Aging Information.
Nural Networks
2010
7
Dynamic Authentication for Cross-Realm SOA-Business Processor.
Service Computing
2010
8
Al and Opinion Mining.
Intelligent  Systems
2010
9
Achieving Secure , Scalable, and Fine-grained Data Access Control  in Cloud Computing
Cloud Computing
2010
10
Privacy-Preserving Public Auditing for Data Storage Security  in Cloud Computing
Cloud Computing
2010


2009 DOTNET IEEE PROJECTS


S.No.
Project Title
Domain
Year
1
A Gen2-Based RFID Authentication Protocol for Security and Privacy.
Mobile Computing
2009
2
A Tabu Search Algorithm for Cluster Building
Mobile Computing
2009
3
Biased Random Walks in Uniform Wireless Networks
Mobile Computing
2009
4
Cell Breathing Techniques for Load Balancing in Wireless LANS
Mobile Computing
2009
5
Energy Maps for Mobile Wireless Network
Mobile Computing
2009
6
Greedy Routing  with Anti-Void Traversal Wireless Sensor NWS
Mobile Computing
2009
7
Information Content-Based Sensor Selection  and Transmission Power Adjustment for Collaborative Target
Mobile Computing
2009
8
Signaling for Multimedia conferencing in Standalone Mobile Ad Hoc Networks
Mobile Computing
2009
9
Analysis of Shortest Path Routing for Large
Networking
2009
10
Explicit Load Balancing Technique for NGEO Satellite IP Networks with On-Board Processing Capabilities
Networking
2009
11
Random Cast An Energy Efficient Communication Schema for Mobile Ad Hoc Networks
Networking
2009
12
Resequencing Analysis Stop-and-Wait ARQ for Parallel Multi-Channel  Communication 
Networking
2009
13
Resource Allocation in OFDMA Wireless
Networking
2009
14
Secure and Policy-Complaint Source  Routing
Networking
2009
15
Histogram-Based Global Load Balancing in Structured Peer-to-Peer System
Networking
2009
16
A Trace-Driven Approach to Evaluate the Scalability of P2P-Based Video-on-Demand
Networking
2009
17
A Parameterized Approach  to  Spam-Resilient Link Analysis of a Web
Networking
2009
18
Measuring Capacity Bandwidth of Targeted Path Segments.
Networking
2009
19
Effective Collaboration with Information Sharing in Virtual Universities   
Networking
2009
20
Network-Coding-Based Signal Recovery for  Efficient Scheduling in Wireless Network
Networking
2009
21
Enforcing Minimum-Cost Multicast Routing Against Selfish Information Flows
Parallel And Distributed System
2009
22
Movement-Assisted Connectivity Restoration In Wireless Sensor and ActorNetworks
Parallel And Distributed System
2009
23
Variability and Reproducibility in Software Engineering A Study of Four Companies that Developed the Same System
Knowledge and Data Engineering
2009
24
Design and Evaluation of the iMed Intelligent medical Search Engine
Data Mining
2009
25
Distributional Features for Text Categorization
Data Mining
2009
26
Design of a robust and secure digital signature schema for image authentication over wireless channel
Network Securities
2009
27
Enhanced Security for Online Exams Using Group Cryptography 
Network Securities
2009
28
Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens
Network Securities
2009
29
A Secure Mobile Healthcare System using Trust-Based Multicast Scheme
Network Securities
2009
30
Gradient Estimation Using Wide Support Operators
Image Processing
2009
31
Continuous Glass Patterns for Painterly Rendering
Image Processing
2009
32
Automated Bidding for Media Services at the Edge of a Content Delivery Network
Image Processing
2009


2008 DOTNET IEEE PROJECTS
S.No.
Project Title
Domain
Year
1
Benefit Based Data Caching in Ad-Hoc Networks
Mobile Computing
2008
2
Location Based Spatial Query Processing in Wireless Broadcast Environment.
Mobile Computing
2008
3
Characterizing Unstructured Overlay Topologies in p2p file sharing systems.
Networking
2008
4
Efficient Broadcasting Using Network Coding
Networking
2008
5
On the Computation Complexity and Effectiveness of N-Hub Shortest- Path Routing
Networking
2008
6
Probabilistic Packet Making for Large-Scale IP Trackback
Networking
2008
7
Securing User Controlled Routing Infrastructures
Networking
2008
8
Statistical techniques for detecting Traffic Anomalies Through Packet Header Data
Networking
2008
9
Incentive Based Scheduling for market like Computational Grids.
Parallel and Distributed Systems
2008
10
A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Sites
Knowledge and Data Engineering
2008
11
An Efficient Clustering Scheme to Exploit hierarchical data in Network Traffic Analysis
Knowledge and Data Engineering
2008
12
On the Design of Distributed Object Placement and Load Balancing Strategies in Large-Scale Networked Multimedia Storage Systems
Knowledge and Data Engineering
2008
13
Semantic Ideation Learning for Agent-Based E-Brainstorming-2008
Knowledge and Data Engineering
2008
14
An efficient time-bound hierarchically key Management Scheme for Secure Broadcasting
Dependable and  Secure Computing
2008
15
CREADIT CARD Fraud Detection Using Hidden Markov Model
Dependable and  Secure Computing
2008
16
Security Requirements Engineering: A Framework for Representation and Analysis
Software Engineering
2008


DOTNET WEB APPLICATION

Sr.No.
PROJECT NAME
1
Academic web wizard
2
Access controlled dairy
3
Accord Leage Counsel
4
Acreage Affairs
5
Agri Help Line
6
Auro Poll
7
Automated trouble shooting
8
Aviation Bounty Schema
9
Bureau Affair System
10
Capital Pivot
11
Cargo Coup
12
City Pilot
13
Civic Referendum
14
Cogs e-Synnergy
15
Communique Board
16
Counsulting org
17
Content mangement sys
18
Corporate legistlature
19
Countrysideontogency
20
Craft cynosure
21
Crusicharater
22
Curb Obsession
23
Customized web deals
24
CyberClassifids
25
Distributed Catalogue System
27
Economic cinch
28
Ehookup
29
Electro Genesis Cue
30
E-Merchantry
31
E-Ndorse
32
Enterprise Catalog
33
Equity Surveillance
34
Errata Overhaul
35
Fabric Banking
36
Feminine Fortified
37
Financial Suit Axis
38
Fiscal Score Card
39
Fleet Consignment
40
Forfeit Control
41
Globe TrotChannel
42
Go Carting Online
43
Image Processing
44
Indoor Navigation System
45
Information cognizance
46
Market plus
47
Metopolis Excise Payoff
48
On Stream Verdict
49
Online Job Portal
50
OnstreamTelecom
51
Optimal In-Stack Absorption
52
Panoptic Crux
53
PC-Grid
54
Pharma Scoop Cache
55
Planetary freight
56
Plugged Inquest
57
Project Tabulation Tool
58
Project Trade Pool
59
Quasi Academia
60
Readers Digest Bustle
61
Restitution E-Channel
62
ScrapCollation&Dispatch
63
Sedan Biz
64
Statesville Sustention
65
Stock Exchange
66
Stock pile control
67
Student Help Desk
68
Summon Cuisine
69
Surplus Syndicate System
70
Synthetic Clinic
71
Terrain Critique
72
CallcenterExecuter
73
Titanic Mart
74
Trade talk center
75
Treasure where house
76
Tune up & step up
77
Ubiquitous Chronicle Manager 1st Review
78
Veggie Delights
79
Vendible Cabinet
80
Askaspecilist
81
ExpenditionCharter
82
Global Employee Acclaimer
83
Online Project Approval System
84
SportsFileDatabase
85
Stop Global Warming
86
The Lawman Modus Operandi
87
Yellow Pages
88
University Admission System
89
Impro
90
OrphanFoundationDevelopment





















No comments:

Post a Comment