Abile Technologies is Leading software Training and Development company, We also train on IEEE projects, JAVA J2EE IEEE project Titles for CSE IT Students Coimbatore and Tamil Nadu
2. www.abiletechnologies.com Email: info@abiletechnologies.com Call: 9600 984984
1. A Network Coding Equivalent Content Distribution Scheme for Efficient
Peer-to-Peer Interactive VoD Streaming
2012
2. BGP Churn Evolution: A Perspective From the Core 2012
3. Design, Implementation, and Performance of a Load Balancer for SIP
Server Clusters
2012
4. Distributed Packet Buffers for High-Bandwidth Switches and Routers 2012
5. Efficient Error Estimating Coding: Feasibility and Applications 2012
6. Footprint: Detecting Sybil Attacks in Urban Vehicular Networks 2012
7. Insights on Media Streaming Progress Using Bit Torrent-Like Protocols for
On-Demand Streaming
2012
8. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring 2012
9. On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer
Networks
2012
10. Self Adaptive Contention Aware Routing Protocol for Intermittently
Connected Mobile Networks
2012
11. Optimal Source-Based Filtering of Malicious Traffic 2012
12. Packet-Hiding Methods for Preventing Selective Jamming Attacks 2012
13. Clustering with Multi viewpoint-Based Similarity Measure 2012
14. Efficient Fuzzy Type-Ahead Search in XML Data 2012
15. Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword Searching 2012
16. Adding Temporal Constraints to XML Schema 2012
17. Slicing: A New Approach for Privacy Preserving Data Publishing 2012
18. Ranking model adaption for Domain Specific Search 2012
19. A Trapdoor Hash-Based Mechanism for Stream Authentication 2012
20. Cooperative Provable Data Possession for Integrity Verification in Multi-
Cloud Storage
2012
21. Double Guard: Detecting Intrusions in Multitier Web Applications 2012
22. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or
Cyborg?
2012
23. Enhancing Data Trustworthiness via Assured Digital Signing 2012
3. www.abiletechnologies.com Email: info@abiletechnologies.com Call: 9600 984984
24. A Blur-Robust Descriptor with Applications to Face Recognition 2012
25. Handwritten Chinese Text Recognition by Integrating Multiple Contexts 2012
26. An Online Learning Approach to Occlusion Boundary Detection 2012
27. Combining Head Pose and Eye Location Information for Gaze Estimation 2012
28. Probabilistic Exposure Fusion 2012
29. Human Identification Using Temporal Information Preserving Gait
Template
2012
30. Secure Overlay Cloud Storage with Access Control and Assured Deletion 2012
5. www.abiletechnologies.com Email: info@abiletechnologies.com Call: 9600 984984
1. Combining Tag and Value Similarity for Data Extraction and
Alignment
2012
2. Coupled Behavior Analysis with Applications 2012
3. Efficient and Effective Duplicate Detection in Hierarchical Data 2012
4. Efficient Extended Boolean Retrieval 2012
5. Organizing User Search Histories 2012
6. Publishing Search Logs—A Comparative Study of Privacy Guarantees 2012
7. Slicing: A new Approach for Privacy Preserving Data Publishing 2012
8. Robust Face-Name Graph Matching for Movie Character Identification 2012
9. Finding Cheap Routes in Profit-Driven Opportunistic Spectrum Access
Networks: A Truthful Mechanism Design Approach
2012
10. Online Adaptive Compression in Delay Sensitive Wireless Sensor
Networks
2012
11. Design and Implementation of TARF: A Trust-Aware Routing
Framework for WSNs
2012
12. Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword
Searching
2012
13. Enabling Secure and Efficient Ranked Keyword Search over
Outsourced Cloud Data
2012
14. Enhancing Data Trustworthiness via Assured Digital Signing 2012
15. Persuasive Cued Click-Points: Design, Implementation, and
Evaluation of a Knowledge-Based Authentication Mechanism
2012
16. Revisiting Defenses against Large-Scale Online Password Guessing
Attacks
2012
17. Ample - An Adaptive Traffic engineering system based virtual
routing topologies
2012
18. Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and
Cross-Layer Optimization for Scalable Video Streaming
2012
19. A Trigger Identification Service for Defending Reactive Jammers in
WSN
2012
20. Converge Cast: On the Capacity and Delay Tradeoffs 2012
6. www.abiletechnologies.com Email: info@abiletechnologies.com Call: 9600 984984
21. Topology control in mobile ad hoc Networks with cooperative
communications
2012
22. Automatic Image Equalization and Contrast Enhancement Using
Gaussian Mixture Modeling
2012
23. Combining Head Pose and Eye Location Information for Gaze
Estimation
2012
24. Robust Face name graph matching for movie character identify 2012
25. Image Authentication Using Distributed Source Coding 2012
26. Analyzing Image Deblurring Through Three Paradigms 2012
27. Smile Detection by Boosting Pixel Differences 2012
28. An Online Learning Approach to Occlusion Boundary Detection 2012
29. A Secret-Sharing-Based Method for Authentication of Grayscale
Document Images via the Use of the PNG Image With a Data Repair
Capability
2012
30. Cashing in on the Cache in the Cloud 2012
31. Cooperative Provable Data Possession for Integrity Verification in
Multi-Cloud Storage
2012
32. pCloud: A Distributed System for Practical PIR 2012
33. SPOC: A Secure and Privacy-preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
2012