IEEE / SOFTWARE PROJECTS In various Domains
JAVA * J2EE * J2ME
Latest Projects, 2008, 2009, 2010
Our Service Address 6/1, Selvanaayaki Complex1st Floor, Gokulae Street, Ramnagar, Coimbatore- 641009. Mobile: 9894604623 Phone: 0422-4377414 Mai : [email protected] Web : www.brainrichtech.com
We are offering IEEE & Non IEEE Projects In various Domains including
IEEE Projects on Image Processing
IEEE Projects on Knowledge and Data Mining
IEEE Projects on Networking
IEEE Projects on Artificial Intelligence
IEEE Projects on Audio and Video Processing
IEEE Projects on Pattern Analysis & Machine Intelligence
IEEE Projects on Multimedia
IEEE Projects on Parallel and Distributed Systems
IEEE Projects on Mobile Computing
IEEE Projects on Software Engineering
IEEE Projects on Information Forensics and Security
IEEE Projects on Dependable and Secure Computing
IEEE Projects on Systems, Man & Cybernetics
IEEE Projects on Computers
IEEE Projects on Learning Technologies
PROJECT SUPPORTS & DELIVERABLES
Project Abstract
IEEE Paper
PPT / Review Details
Project Report
Working Procedure/Screen Shots
Materials & Books in CD
Project Certification
TECHNOLOGY : JAVA
DOMAIN : IEEE DIGITAL IMAGE PROCESSING
S.NO CODE PROJECT TITLE YEAR
01 IP 01 Multi-body Structure-and-Motion Segmentation by Branch-and-Bound Model Selection
2010
02 IP 02 Sliding-Window Raptor Codes for Efficient Scalable Wireless Video Broadcasting with Unequal Loss Protection
2010
03 IP 03 Generic Lossless Visible Watermarking—A New Approach
2010
04 IP 04 Fusing Local Patterns of Gabor Magnitude and Phase for Face Recognition
2010
05 IP 05 Data Embedding in JPEG Bit stream by Code Mapping
2010
06 IP 06 Video Segmentation Based on Motion Coherence of Particles in a Video Sequence
2010
07 IP 07 Adaptive Non separable Wavelet Transform via Lifting and its Application to Content-Based Image Retrieval
2010
08 IP 08 Multiplicative Noise Removal Using Variable Splitting and Constrained Optimization
2010
09 IP 09 Watermarking of Free-view Video 2010
10 IP 10 Ultrasound De speckling for Contrast Enhancement
2010
11 IP 11 A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding
2010
12 IP 12 Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment
2010
13 IP 13 Cooperation Stimulation Strategies for Peer-to- 2010
Peer Wireless Live Video-Sharing Social Networks
14 IP 14 Soft Edge Smoothness Prior for Color Image Super-Resolution
2009
15 IP 15 A Shearlet Approach to Edge Analysis and Detection
2009
16 IP 16 Complex Wavelet Structural Similarity: A New Image Similarity Index
2009
17 IP 17 A Histogram Modification Framework and Its Application for Image Contrast Enhancement
2009
18 IP 18 Personal Authentication Using Hand Vein Triangulation and Knuckle Shape
2009
19 IP 19 Huber Fractal Image Compression 2009
20 IP 20 Active Mask Segmentation of Fluorescence Microscope Images
2009
21 IP 21 Color Texture Segmentation Based on the Modal Energy of Deformable Surfaces
2009
22 IP 22 Entropy Interpretation of the Logarithmic Image Processing Model With Application to Contrast Enhancement
2009
23 IP 23 A New Look to Multichannel Blind Image Deconvolution
2009
24 IP 24 Improved Resolution Scalability for Bilevel Image Data in JPEG2000
2009
25 IP 25 An Adaptable Image Retrieval System With Relevance Feedback Using Kernel Machines and Selective Sampling
2009
26 IP 26 A High-Capacity Steganography Scheme for JPEG2000 Baseline System
2009
27 IP 27 Independent Component Analysis-Based Background Subtraction for Indoor Surveillance
2008
28 IP 28 Sparse Representation for Color Image Restoration
2008
29 IP29 High-Fidelity Data Embedding for Image Annotation
2008
30 IP30 A New Look to Multi channel Blind Image De-convolution
2008
31 IP31 Image Segmentation Using Information Bottleneck Method
2008
32 IP32 A Fast Optimization Transfer Algorithm for Image In painting in Wavelet Domains
2008
33 IP33 Enhancement of Color Images by Scaling the DCT Coefficients
2008
34 IP34 Improved Resolution Scalability for Bilevel Image Data in JPEG2000
2008
35 IP35 A Unified Relevance Feedback Framework for Web Image Retrieval
2008
36 IP36 Optimal Spread Spectrum Watermark Embedding via a Multi step Feasibility Formulation
2008
37 IP37 Watermarking of Co lour Images in the DCT Domain Using Y Channel
2008
38 IP38 A Robust Image Encryption Scheme using State-Feedback Control
2008
39 IP39 Color Image Retrieval Using M-Band Wavelet Transform Based Color-Texture Feature
2008
40 IP40 A Histogram Modification Framework and Its Application for Image Contrast Enhancement
2008
TECHNOLOGY : JAVA
DOMAIN : IEEE KNOWLEDGE AND DATA MINING
S.NO CODE PROJECT TITLE YEAR
01 KD 01 MILD: Multiple-Instance Learning via Disambiguation
2010
02 KD 02 LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs
2010
03 KD 03 Density Conscious Subspace Clustering for High-Dimensional Data
2010
04 KD 04 Dynamic Dissimilarity Measure for Support-Based Clustering
2010
05 KD 05 Efficient Algorithm for Localized Support Vector Machine
2010
06 KD 06 PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
2010
07 KD 07 ViDE: A Vision-Based Approach for Deep Web Data Extraction
2010
08 KD 08 FiVaTech: Page-Level Web Data Extraction from Template Pages
2010
09 KD 09 Automatic Ontology Matching via Upper Ontologies: A Systematic Evaluation
2010
10 KD 10 Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
2010
11 KD 11 Modeling Image Data for Effective Indexing and Retrieval in Large General Image Databases
2009
12 KD 12 Olex: Effective Rule Learning for Text Categorization
2009
13 KD 13 Towards Suspicious Behavior Discovery in Video Surveillance System
2009
14 KD 14 A Relation-Based Page Rank Algorithm for Semantic Web Search Engines
2009
15 KD 15 Learning Image-Text Associations 2009 16 KD 16 A Framework for Clustering
Concept-Drifting Categorical Data 2009
17 KD 17 Communication Perspective on Automatic Text Categorization
2009
18 KD 18 Predicting Missing Items in Shopping Carts 2009 19 KD 19 Exact Knowledge Hiding through Database
Extension 2009
20 KD 20 Fast Query Point Movement Techniques for Large CBIR Systems
2009
21 KD 21 Evaluating the Effectiveness of Personalized Web Search
2009
22 KD 22 Similarity-Profiled Temporal Association Mining 2009 23 KD 23 Batch Mode Active Learning with Applications to
Text Categorization and Image Retrieval 2009
24 KD 24 Enhancing Learning Objects with an Ontology-Based Memory
2009
25 KD 25 Using Association Rule Mining to Improve Semantic Web Services Composition Performance
2008
26 KD 26 Biometric Authentication for Border Control Applications
2008
27 KD 27 Desktop search in the intranet with integrated desktop search engines
2008
28 KD 28 A Least Grade Page Replacement Algorithm for Web Cache Optimization
2008
TECHNOLOGY : JAVA
DOMAIN : IEEE NETWORKING
S.NO CODE PROJECT TITLE YEAR
01 NS 01 Broadcasting Video Streams Encoded With Arbitrary Bit Rates in Energy-Constrained Mobile TV Networks
2010
02 NS 02 S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks
2010
03 NS 03 Rate Control with Pair wise Intersession Network Coding
2010
04 NS 04 Equilibrium of Heterogeneous Congestion Control: Optimality and Stability
2010
05 NS 05 Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis
2010
06 NS 06 Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility
2010
07 NS 07 SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks
2010
08 NS 08 A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks
2010
09 NS 09 Upgrading Mice to Elephants: Effects and End-Point Solutions
2010
10 NS 10 Distributed Algorithms for Minimum Cost Multicast With Network Coding
2010
11 NS 11 Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference Constraints
2010
12 NS 12 Constrained Relay Node Placement in Wireless Sensor Networks: Formulation and
2010
Approximations
13 NS 13 Efficient and Dynamic Routing Topology Inference From End-to-End Measurements
2010
14 NS 14 Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications
2010
15 NS 15 Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
2009
16 NS 16 Monitoring the Application-Layer DDoS Attacks for Popular Websites
2009
17 NS 17 Multiple Routing Configurations for Fast IP Network Recovery
2009
18 NS 18 Improving Locality of Bit Torrent with ISP Cooperation
2009
19 NS 19 PRIME: Peer-to-Peer Receiver-Driven Mesh-Based Streaming
2009
20 NS 20 A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection
2009
21 NS 21 Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search
2009
22 NS 22 Capturing Router Congestion and Delay 2009
23 NS 23 Node Isolation Model and Age-Based Neighbor Selection in Unstructured P2P Networks
2009
24 NS 24 Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
2009
25 NS 25 A Peer-to-Peer Resources Search Algorithm Based on Small-World Model
2009
26 NS 26 Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks
2009
27 NS 27 Multicast Capacity of Wireless Ad Hoc Networks 2009
28 NS 28 Evaluating the Vulnerability of Network Traffic 2009
Using Joint Security and Routing Analysis
29 NS 29 Novel Approach for Computation –Efficient Rekeying for Multicast Key Distribution
2009
30 NS 30 SIMPS: Using Sociology for Personal Mobility 2009
31 NS 31 DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks
2009
32 NS 32 Credit Card Fraud Detection Using Hidden Markov Model
2008
33 NS 33 Encryption Techniques for the Security of Satellite Images
2008
34 NS34 Modeling Node Capture Attacks in Wireless Sensor Networks
2008
35 NS35 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
2008
36 NS36 The Design Trade-Offs of Bit Torrent-Like File Sharing Protocols
2008
37 NS37 Honey pot Scheme for Distributed Denial-of-Service Attack
2008
38 NS38 Vulnerability of Network Traffic under Node Capture Attacks using Circuit Theoretic Analysis
2008
39 NS39 P2P File Sharing Software in IPv4/IPv6 Network 2008
40 NS40 Design and Implementation of a SIP-based Centralized Multimedia Conferencing System
2008
41 NS41 Design and Implementation of Distributed Firewall System for IPv6
2008
42 NS42 A Hypothesis Testing Approach to Semi-fragile Watermark Based Authentication
2008
43 NS43 A New RMI Framework for Outdoor Objects Recognition
2008
44 NS44 Contributory group key exchange in the presence of malicious participants
2008
45 NS45 Schemes for Evaluating Signal Processing 2008
Properties of Audio Watermarking
46 NS46 Double compression in JPEG images 2008
47 NS47 The Evaluation Report of SHA-256 Crypt Analysis Hash Function
2008
48 NS48 Jig DFS: A Secure Distributed File System 2008
49 NS49 General access structures in audio cryptography 2008
50 NS50 Improving Locality of Bit Torrent with ISP Cooperation
2008
51 NS51 Minimizing File Download Time in Stochastic Peer-to-Peer Networks
2008
52 NS52 Triple DES Algorithm Based Image Watermarking 2008
53 NS53 Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
2008
TECHNOLOGY : JAVA DOMAIN : IEEE MULTIMEDIA
S.NO CODE PROJECT TITLE YEAR
01 M 01 A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization
2010
02 M 02 Constructing Concept Lexica With Small Semantic Gaps
2010
03 M 03 An Adaptive Computational Model for Salient Object Detection
2010
04 M 04 An Adaptive Strategy for Mobile Ad Hoc Media Streaming
2010
05 M 05 Video Annotation Through Search and Graph Reinforcement Mining
2010
06 M 06 Image Annotation by Graph-Based Inference With Integrated Multiple/Single Instance Representations
2010
07 M 07 Network Awareness of P2P Live Streaming Applications: A Measurement Study
2010
08 M 08 Fine-Granularity Transmission Distortion Modeling for Video Packet Scheduling Over Mesh Networks
2010
09 M 09 Investigating the Scheduling Sensitivity of P2P Video Streaming
2009
10 M 10 Coherent Phrase Model for Efficient Image Near Duplicate Retrieval
2009
11 M 11 Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor
2009
12 M 12 LayerP2P: Using Layered Video Chunks in P2P Live Streaming
2009
13 M 13 Content-Based Image Retrieval Using Multi 2008
resolution Color and Texture Features
14 M 14 Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques
2008
15 M 15 Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing
2008
16 M 16 Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver
2008
17 M 17 Locality-Awareness in BitTorrent-Like P2P Applications
2008
18 M 18 Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization
2008
19 M 19 Analyzing Voice Quality in Popular VoIP Applications
2008
20 M 20 Image Retrieval With Relevance Feedback Based on Graph-Theoretic Region Correspondence Estimation
2008
21 M 21 Robust Audio Data Hiding Using Correlated Quantization With Histogram-Based Detector
2008
22 M 22 Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast
2008
TECHNOLOGY : JAVA
DOMAIN : IEEE AUDIO,SPEECH & VIDEO PROCESSING
S.NO CODE PROJECT TITLE YEAR
01 AV 01 Robust Multiplicative Patchwork Method for Audio Watermarking
2009
02 AV 02 Scalable Audio Compression at Low Bitrates 2008
03 AV03 Multiparty Voice over IP (M VoIP) Peer-Based System for Large-Scale Conference Support
2008
04 AV 04 Extracting Question/Answer Pairs In Multi-Party Meeting
2008
05 AV 05 Hybrid Signal-and-Link-Parametric Speech Quality Measurement for VoIP Communications
2008
06 AV 06 Rate-Distortion Optimal Video Transport Over IP Allowing Packets With Bit Errors
2008
TECHNOLOGY : JAVA
DOMAIN : IEEE ARTIFICAL INTELLIGENCE
S.NO CODE PROJECT TITLE YEAR
01 AI 01 Vehicle Number Plate Recognition Using Mathematical Morphology and Neural Networks
2008
02 AI 02 Vision-Based Eye Blink Monitoring System for Human-Computer Interfacing
2008
03 AI 03 Multi-modal Interfaces for Interaction Communication between Hearing and Visually Impaired Individuals: Problems & Issues
2008
04 AI 04 Embedded Vehicle Control System Based on Voice Processing Technologies
2008
05 AI 05 A Test bed for Voice-Based Robot Control 2008
06 AI 06 Human Voice Based Wheel Chair Control 2008
TECHNOLOGY : JAVA
DOMAIN : IEEE MOBILE COMPUTING
S.NO CODE PROJECT TITLE YEAR
01 MC 01 Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks
2009
02 MC 02 A Novel Scheduled Power Saving Mechanism for 802.11 Wireless LANs
2009
03 MC 03 MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
2009
04 MC 04 Mitigation of Control Channel Jamming under Node Capture Attacks
2009
05 MC 05 Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks
2009
06 MC 06 An Energy Efficient Communication Scheme for Mobile AD HOC Networks
2009
07 MC 07 Hybrid routing in clustered DTNs with message ferrying
2007
08 MC 08 Transmission Power Control in Wireless Ad Hoc Networks
2007
TECHNOLOGY : JAVA
DOMAIN : IEEE INFORMATION AND FORENSICS SECURITY
S.NO CODE PROJECT TITLE YEAR
01 IF 01 Edge Adaptive Image Steganography Based on LSB Matching Revisited
2010
02 IF 02 Blind Authentication: A Secure Crypto-Biometric Verification Protocol
2010
03 IF 03 Predictive Network Anomaly Detection and Visualization
2010
04 IF 04 Lossless Data Embedding in Electronic Inks 2010
05 IF 05 SVD-Based Universal Spatial Domain Image Steganalysis
2010
06 IF 06 Reversible Image Watermarking Using Interpolation Technique
2010
07 IF 07 MPSteg-Color: Data Hiding Through Redundant Basis Decomposition
2009
08 IF 08 Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis
2009
09 IF 09 Halftone Visual Cryptography Via Error Diffusion
2009
10 IF 10 A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication
2009
11 IF 11 Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents
2009
12 IF 12 Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms
2009
13 IF 13 Spread-Spectrum Watermarking Security 2008
14 IF 14 Robust Blind Watermarking of Point-Sampled Geometry
2009
15 IF 15 Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
2008
16 IF 16 Multipurpose Watermarking Based on Multiscale Curvelet Transform
2008
17 IF 17 Cryptographic Secrecy of Steganographic Matrix Embedding
2008
18 IF 18 Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase
2008
19 IF 19 A Novel Difference Expansion Transform for Reversible Data Embedding
2008
20 IF 20 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
2008
21 IF 21 Color Image Watermarking Using Multidimensional Fourier Transforms
2008
TECHNOLOGY : JAVA
DOMAIN : IEEE Pattern Analysis & Machine Intelligence
S.NO CODE PROJECT TITLE YEAR
01 PA 01 Using Language to Learn Structured Appearance Models for Image Annotation
2010
02 PA 02 A Boosting Framework for Visuality-Preserving Distance Metric Learning and Its Application to Medical Image Retrieval
2010
03 PA 03 Accurate Image Search Using the Contextual Dissimilarity Measure
2010
04 PA 04 A Nonlinear Derivative Scheme Applied to Edge Detection
2010
05 PA 05 In the Eye of the Beholder: A Survey of Models for Eyes and Gaze
2010
06 PA 06 Polynomial Time Algorithms for Ratio Regions and a Variant of Normalized Cut
2010
07 PA 07 Single-Image Super-Resolution Using Sparse Regression and Natural Image Prior
2010
08 PA 08 Self-Similarity and Points of Interest 2010
09 PA 09 Iris Recognition: On the Segmentation of Degraded Images Acquired in the Visible Wavelength
2010
10 PA 10 Image Segmentation with a Unified Graphical Model
2010
11 PA 11 A Perceptually Inspired Variation Framework for Color Enhancement
2009
12 PA 12 Image Transformations and Blurring 2009
13 PA 13 Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm
2009
14 PA 14 IRGS: Image Segmentation Using Edge Penalties and Region Growing
2009
15 PA 15 Real World Image Annotation and Retrieval 2008
16 PA 16 Visual Rank: Applying Page Rank to Large-Scale Image Search
2008
17 PA 17 Localized Content-Based Image Retrieval 2008
18 PA 18 Annotating Images by Mining Image Search Results
2008
19 PA 19 A Discriminative Kernel-Based Approach to Rank Images from Text Queries
2008
TECHNOLOGY : JAVA
DOMAIN : IEEE Parallel And Distributed Systems
S.NO CODE PROJECT TITLE YEAR
01 PD 01 Secure Synchronization of Periodic Updates in Ad Hoc Networks
2010
02 PD 02 An Analytical Approach to Optimizing Parallel Image Registration/Retrieval
2010
03 PD 03 Improving Reliability for Application-Layer Multicast Overlays
2010
04 PD 04 Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
2010
05 PD 05 Snoogle: A Search Engine for Pervasive Environments
2010
06 PD 06 A Cross-Layer Approach-Based Gnutella for Collaborative Virtual Environments over Mobile Ad Hoc Networks
2010
07 PD 07 Correlation-Based Traffic Analysis Attacks on Anonymity Networks
2010
08 PD 08 A Hypergraph Approach to Linear Network Coding in Multicast Networks
2010
09 PD 09 On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
2010
10 PD 10 SocioNet: A Social-Based Multimedia Access System for Unstructured P2P Networks
2010
11 PD 11 An Efficient Superpeer Overlay Construction and Broadcasting Scheme Based on Perfect Difference Graph
2010
12 PD 12 Toward Systematical Data Scheduling for Layered Streaming in Peer-to-Peer Networks: Can We Go Farther?
2010
13 PD 13 mTreebone: A Collaborative Tree-Mesh Overlay Network for Multicast Video Streaming
2010
14 PD 14 Efficient Broadcasting Using Network Coding and Directional Antennas in MANETs
2010
15 PD 15 A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
2010
16 PD 16 Efficient Multicast Algorithms for Multichannel Wireless Mesh Networks
2010
17 PD 17 A Dynamic Performance-Based Flow Control Method for High-Speed Data Transfer
2010
18 PD 18 Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows
2009
19 PD 19 Delay Asymptotics and Scalability for Peer-to-Peer Live Streaming
2009
20 PD 20 Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows
2009
21 PD 21 Scalable Routing in Cyclic Mobile Networks 2009
22 PD 22 Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks
2009
23 PD 23 Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
2009
24 PD 24 A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions
2009
25 PD 25 Multipath Dissemination in Regular Mesh Topologies 2009
26 PD 26 Detecting Malicious Packet Losses 2009
27 PD 27 Diverse Firewall Design 2008
28 PD 28 Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Systems: Modeling Analysis and Improvement
2008
29 PD 29 Computation-Efficient Multicast Key Distribution
2008
TECHNOLOGY : JAVA
DOMAIN : IEEE Dependable and Secure Computing
S.NO CODE PROJECT TITLE YEAR
01 DSC 01 Layered Approach Using Conditional Random Fields for Intrusion Detection
2010
02 DSC 02 In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm
2010
03 DSC 03 An Advanced Hybrid Peer-to-Peer Botnet 2010
04 DSC 04 Error Detection and Fault Tolerance in ECSM Using Input Randomization
2009
05 DSC 05 Security Analysis of the SASI Protocol 2009
06 DSC 06 Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
2009
07 DSC 07 The Effectiveness of Checksums for Embedded Control Networks
2009
TECHNOLOGY : JAVA
DOMAIN : IEEE Software Engineering
S.NO CODE PROJECT TITLE YEAR
01 SW 01 Enhanced Modeling and Solution of Layered Queuing Networks
2009
02 SW 02 COMOM: Efficient Class Oriented Evaluation of Multiclass Performance Models
2009
03 SW 03 An Investigation Into the Functional Form of the Size-Defect Relationship For Software Modules
2009
04 SW 04 Optimized Resource Allocation for Software Release Planning
2009
05 SW 05 Automatic Extraction of Heap ReferenceProperties in Object-Oriented Programs
2009
06 SW 06 CHARMY: A Framework for Designing andVerifying Architectural Specifications
2009
07 SW 07 Synthesis of Partial Behavior Models from Properties and Scenarios
2009
08 SW 08 Identification of Move Method Refactoring Opportunities
2009
09 SW 09 A Hierarchical Model for Object-Oriented Design Quality Assessment
2009
10 SW 10 Variability and Reproducibility in Software Engineering: A Study of Four Companies that Developed the same System
2009