Generic technology ieee projects titles,ieee projects 2011, final year projects in trichy, chennai, student projects in trichy, chennai, mca/be/me/bca/bsc/diploma projects in trichy, chnnai
Generic technology ieee projects titles,ieee projects 2011, final year projects in trichy, chennai, student projects in trichy, chennai, mca/be/me/bca/bsc/diploma projects in trichy, chnnai
Generic technology ieee projects titles,ieee projects 2011, final year projects in trichy, chennai, student projects in trichy, chennai, mca/be/me/bca/bsc/diploma projects in trichy, chnnai
Similar a Generic technology ieee projects titles,ieee projects 2011, final year projects in trichy, chennai, student projects in trichy, chennai, mca/be/me/bca/bsc/diploma projects in trichy, chnnai
Similar a Generic technology ieee projects titles,ieee projects 2011, final year projects in trichy, chennai, student projects in trichy, chennai, mca/be/me/bca/bsc/diploma projects in trichy, chnnai(20)
Generic technology ieee projects titles,ieee projects 2011, final year projects in trichy, chennai, student projects in trichy, chennai, mca/be/me/bca/bsc/diploma projects in trichy, chnnai
1. Generic Technology IEEE projects Titles
Mobile Computing 2011
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
Throughput Optimization in Mobile Backbone Networks
Network 2011
A Unified Approach to Optimizing Performance in Networks serving Heterogeneous
Flows
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
Monitoring Service Systems from a Language-Action Perspective
ProgME: Towards Programmable Network Measurement
Selfish Overlay Network Creation and Maintenance
SPAF: Stateless FSA-based Packet Filters
Topological Transformation Approaches to TCAM-Based Packet Classification
Software Engineering 2011
Software Module Clustering as a Multi–Objective Search Problem
A Comparative Study of Software Model Checkers as Unit Testing Tools: An Industrial
Case Study
2. wireless network 2011
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
Cloud Computing 2011
Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
Improving Utilization of Infrastructure Clouds
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
Network Security 2011
Automated Derivation of Application-Specific Error Detectors Using Dynamic Analysis
Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC
Distributed Detection of Clone Attacks in Wireless Sensor Networks
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter
Spanning Tree
A Tamper-Resistant Programming Language System
Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of
Query-Based Wireless Sensor Networks
Chip Self-Organization and Fault-Tolerance in Massively Defective Multicore Arrays
Comparative Evaluation of Spoofing Defenses
3. Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in
MANET
Modeling and Detection of Camouflaging Worm
Nymble: Blocking Misbehaving Users in Anonymizing Networks
RITAS: Services for Randomized Intrusion Tolerance
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow
Watermarking
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless
Mesh Networks
The Geometric Efficient Matching Algorithm for Firewalls
Creating a virtual personal health record using mashup.
service oriented architecture for high dimensional private data mashup
federating websites with the google wave protocol .
Date mining 2011
Efficient Evaluation of Continuous Text Search Queries
A Cumulative Belief Degree-Based Approach for Missing Values in Nuclear Safeguards
Evaluation
Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data
Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data
Exact Top-K Queries in Wireless Sensor Networks
Alpha-Level Aggregation: A Practical Approach to Type-1 OWA Operation for
Aggregating
Uncertain Information with Applications to Breast Cancer Treatments
Grid Computing 2011
4. Collective data stealing with load balancing and multicast for grid applications
A flexible phasor for grid
Grid workload prediction
Image Processing 2011
Differentiating region-of-interest in spatial domain images
Improving quality of high dynamic range video compression using tone-mapping
operator
Non IEEE projects Titles 2011
Voice based bus reservation
Green ajax
Ip address and location tracer
Content based image retrieval
Cyber eye
Vehicle dispatching system
Pharmacy tracking system
Health care projects
Airline reservation
Intelligent support for software release planning
Automated mailing tool
Bus maintenance system
5. Cloud computing
Virtual class room
Virtual medical home
Data warehouse rfid
Defect tracking system
Finger print employee attendance
Finger print lunch booking system
Gas agencies booking
Gsm eb billing system
Gsm medical report
Gsm temperature monitoring
Gsm weather monitoring
Hostel management system
Human resource management system
Insurance management system
Library management system
Luggage rfid booking
Online training and exam
Rail way route
Resume builder
Rfid and smart card verification
Online shopping cart
Smart billing system
Student management system
System monitoring process
6. Tamil search engine
Mobile reminder
Mobile sync
Dicom image
Human resource management system