SlideShare a Scribd company logo
MAXIMIZE INFO TECH (P) LTD 2011-
                                                             2012

                                    CLOUD COMPUTING

S no                               TITLE                                     KEYWORD
  1     Exploiting Dynamic Resource Allocation for Efficient Parallel Data     .NET
        Processing in the Cloud
 2      Privacy-Preserving Multi-keyword Ranked Search over Encrypted          .NET
        Cloud Data
 3      Enabling Public Audit ability and Data Dynamics for Storage           JAVA
        Security in Cloud Computing
 4      Cloud Computing for Agent-Based Urban Transportation Systems          JAVA
 5      Secure and Practical Outsourcing of Linear Programming in Cloud       JAVA
        Computing
 6      Optimal service pricing for a cloud cache                              .NET
 7      Data integrity proofs in cloud storage                                 .NET

                         PARALLEL & DISTRIBUTING SYSTEM
 8      A Distributed Algorithm for the Replica Placement Problem              JAVA

 9      On the Performance of Content Delivery under Competition in a          JAVA
        Stochastic Unstructured Peer-to-Peer Network
 10     Toward Optimal Network Fault Correction in Externally Managed          JAVA
        Overlay Networks
 11     Privacy-Conscious Location-Based Queries in Mobile Environments        JAVA

 12     A Fully Distributed Proactively Secure Threshold-Multisignature        JAVA
        Scheme
 13     Dynamic Load Balancing In Distributed Systems In The Presence Of       JAVA
        Delays A Regeneration-Theory Approach
 14     Monitoring Service Systems from a Language-Action Perspective          JAVA

 15     Adaptive Provisioning of Human Expertise in Service-oriented           JAVA
        Systems

 16     Vulnerability Analysis in SOA-based Business Processes                 JAVA



                                   MOBILE COMPUTING

       No: 18, 13th EAST CROSS STREET, GANDHI NAGAR, KATPADI.
                       Mobile: 9080183848, 0416-3201732.
        Email: info2projectstore@gmail.com, www.myprojectstore.com,
MAXIMIZE INFO TECH (P) LTD 2011-
                                                          2012
16    Endpoint-Based Call Admission Control and Resource Management         .NET
      for Vo-WLAN

17    Caching Strategies Based on Information Density Estimation in         .NET
      Wireless Ad Hoc Networks
18    An Enhanced Selective Forwarding Scheme for real-time applications    .NET
      in MANETs

19    A Virtual Topology for Routing in Ad-hoc Networks                     .NET

20    Cluster-Based Correlated Data Gathering in Wireless Sensor Networks   .NET

21    MABS: Multicast Authentication Based on Batch Signature               .NET

22    Energy Maps For Mobile Wireless networks coherence Time Versus        .NET
      Spreading Period
23    Greedy Routing with Anti-Void Traversal for Wireless Sensor           .NET
      Networks

24    A Tabu Search Algorithm for Cluster Building in Wireless Sensor       .NET
      Networks
25    Energy Maps for Mobile Wireless Networks Coherence Time versus        .NET
      Spreading Period
26    Random Cast An Energy Efficient Communication Scheme for Mobile       .NET
      Ad Hoc Networks
27    SIMPS Using Sociology for Personal Mobility                           .NET

28    Intrusion Detection in Homogeneous and Heterogeneous Wireless         .NET
      Sensor Networks




     No: 18, 13th EAST CROSS STREET, GANDHI NAGAR, KATPADI.
                     Mobile: 9080183848, 0416-3201732.
      Email: info2projectstore@gmail.com, www.myprojectstore.com,
MAXIMIZE INFO TECH (P) LTD 2011-
                                                           2012
                                    DATA MINING
29    Clustering with Multi-Viewpoint based Similarity Measure              JAVA

30    Effective Navigation of Query Results Based on Concept Hierarchies    JAVA

31    Temporal Data Clustering via Weighted Clustering Ensemble with        JAVA
      Different Representations
32    Personalized Ontology Model for Web Information Gathering             .NET

33    Efficient Computation of Range Aggregates Against Uncertain           .NET
      Location Based Queries

34    Text Clustering with Seeds Affinity Propagation                       JAVA

35    A Web Search Engine-Based Approach to Measure Semantic                .NET
      Similarity between Words.
36    Scalable Learning of Collective Behavior                              .NET

37    The World in a Nutshell Concise Range Queries                         .NET

38    Publishing Search Logs – A Comparative Study of Privacy Guarantees    .NET

39    One Size Does Not Fit All Towards User- and Query-Dependent           .NET
      Ranking For Web Databases
40    Improving Aggregate Recommendation Diversity Using Ranking-           .NET
      Based Techniques

41    Exploring Application-Level Semantics for Data Compression            .NET

42    Bridging Socially-Enhanced Virtual Communities                        .NET

43    Discovering Conditional Functional Dependencies                       JAVA

44    Ranking Spatial Data by Quality Preferences                           JAVA

45    Extended XML Tree Pattern Matching: Theories and Algorithms           JAVA

46    Horizontal Aggregations in SQL to prepare Data Sets for Data Mining   .NET
      Analysis



     No: 18, 13th EAST CROSS STREET, GANDHI NAGAR, KATPADI.
                     Mobile: 9080183848, 0416-3201732.
      Email: info2projectstore@gmail.com, www.myprojectstore.com,
MAXIMIZE INFO TECH (P) LTD 2011-
                                                            2012

                            IMAGE PROCSSING & MATLAB

47     Online Intrusion Alert Aggregation with Generative Data Stream          .NET
       Modeling.

 48    Modeling and Detection of Camouflaging Worm                             .NET

 49    Detecting Kernel-Level Rootkits Using Data Structure Invariants         JAVA

 50    Towards Situational Awareness of Large-Scale Botnet Probing Events      .NET

 51    A Competitive Study of Cryptography Techniques over Block Cipher.       .NET

 52    Analysis on Credit Card Fraud Detection Methods.                        JAVA

 53    Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks       JAVA

 54    Nymble- Blocking Misbehaving Users in Anonymizing Networks              JAVA

 55    Embedded Extended Visual Cryptography Schemes                           JAVA

 56    Minimizing Additive Distortion in Steganography Using Syndrome-         JAVA
       Trellis Codes

 57    NABS Novel Approaches for Biometric Systems                             JAVA

 58    Blind Image Watermarking Using a Sample Projection Approach             JAVA

 59    Robust Video Data Hiding Using Forbidden Zone Data Hiding and           .NET
       Selective Embedding
 60    A Unified Approach to Optimizing Performance in Networks Serving        JAVA
       Heterogeneous Flows
 61    Optimal Bandwidth Assignment for Multiple-Description-Coded Video       JAVA

 62    Caching Strategies Based on Information Density                         JAVA

 63    A Distributed and Scalable Time Slot Allocation Protocol for Wireless   .NET
       Sensor Networks
 64    On Combining Shortest-Path and Back-Pressure Routing Over Multi-        .NET
       hop Wireless Networks
 65    Robust Correlation of Encrypted Attack Traffic through Stepping         JAVA
                 th
      No: 18, 13 EAST CROSS STREET, GANDHI NAGAR, KATPADI.
                     Mobile: 9080183848, 0416-3201732.
       Email: info2projectstore@gmail.com, www.myprojectstore.com,
MAXIMIZE INFO TECH (P) LTD 2011-
                                                          2012
      Stones by Flow Watermarking
66    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing         .NET
      System Lifetime of Query-Based Wireless Sensor Networks
67    Integration of Sound Signature in Graphical Password Authentication   .NET
      System

68    SAT: A Security Architecture Achieving Anonymity and Traceability     .NET
      in Wireless Mesh Networks
69    Delay Analysis and Optimality of Scheduling Policies for Multi-Hop    JAVA
      Wireless Networks

70    ProgME: Towards Programmable Network Measurement                      JAVA

71    Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc     JAVA
      Networks

72    Jamming-Aware Traffic Allocation for Multiple-Path Routing Using      JAVA
      Portfolio Selection

73    Continuous Neighbor Discovery in Asynchronous Sensor Networks         .NET

74    Distributed Adaptation of Quantized Feedback for Downlink Network     .NET
      MIMO Systems

75    Network Coding Based Privacy Preservation against Traffic Analysis    .NET
      in Multi-hop Wireless Networks

76    Cloudy Computing: Leveraging Weather Forecasts in Energy              .NET
      Harvesting Sensor Systems

77    Minimizing Delay and Maximizing Lifetime for WSN in any cast          NS2

78    Inside the Permutation-Scanning Worms: Propagation Modeling and       NS2
      Analysis

79    Provisioning of Deadline-Driven Requests With Flexible Transmission   JAVA
      Rates in WDM Mesh Networks

80    Secure Data Objects Replication in Data Grid                          JAVA

81    Layered Approach Using Conditional Random Fields for Intrusion        JAVA
      Detection
     No: 18, 13th EAST CROSS STREET, GANDHI NAGAR, KATPADI.
                     Mobile: 9080183848, 0416-3201732.
      Email: info2projectstore@gmail.com, www.myprojectstore.com,
MAXIMIZE INFO TECH (P) LTD 2011-
                                                          2012
82    Edge Adaptive Image Steganography Based on LSB Matching             .NET


                                          NS2

85    Forward Correction and Fountain Codes in Delay Tolerant Networks    NS2
86    Continuous Neighbor Discovery in Asynchronous Sensor Networks       NS2
87    Throughput Optimization in High Speed Downlink Packet Access        NS2
88    Improving the Performance of Wireless Ad Hoc Networks Through       NS2
      MAC Layer Design
89    Distributed Adaptation of Quantized Feedback for Downlink Network   NS2
      MIMO Systems
90    Secure High-Throughput Multicast Routing in Wireless Mesh           NS2
      Networks
91    Throughput Optimization in Mobile Backbone Networks                 NS2
92    Energy-Efficient Multicasting of Scalable Video Streams Over        NS2
      WiMAX Networks
93    MANET Routing Protocols vs Mobility Models: A Performance           NS2
      Evaluation
94    CACO-Distributed Client-Assisted Channel Assignment Optimization    NS2
      for Uncoordinated WLANs
95    Live Streaming With Receiver-Based Peer-Division Multiplexing       NS2




     No: 18, 13th EAST CROSS STREET, GANDHI NAGAR, KATPADI.
                     Mobile: 9080183848, 0416-3201732.
      Email: info2projectstore@gmail.com, www.myprojectstore.com,

More Related Content

DOCX
IEEE 2014 Title's list for CSC
PDF
IEEE 2012 CSE & IT java_2012-13_titles
DOCX
Ieee 2013 projects titles
DOC
Final year project titles 2013 2014, Kalek Solutions
DOC
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
PDF
Pantech ns2 projects 2016-17
PDF
Dotnet titles 2016 17
PDF
MS.NET IEEE 2015
IEEE 2014 Title's list for CSC
IEEE 2012 CSE & IT java_2012-13_titles
Ieee 2013 projects titles
Final year project titles 2013 2014, Kalek Solutions
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
Pantech ns2 projects 2016-17
Dotnet titles 2016 17
MS.NET IEEE 2015

What's hot (15)

DOCX
2013-2014 IEEE Projects & Application Projects
DOCX
Java project 2013
PDF
2013 2014 ieee dotnet project titles
PDF
Tammina infotech ieee titles 2012 2013
PDF
IEEE 2012 ns2_2012-13_titles.doc
ODT
3i techso project title
DOC
Java non ieee project titles 2014-2015
PDF
2014 list
PDF
Best IEEE Projects 2017 -2018 Titles - IEEE Final Year Projects @ Brainrich T...
PDF
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
PDF
Dotnet 2014 15
PDF
Java 2015 project list
DOCX
Mobileapplicationprojectsformcaingagnerchennai
PDF
Dotnet topics 2014-15
DOCX
IEEE 2014 .Net & Java Projects List
2013-2014 IEEE Projects & Application Projects
Java project 2013
2013 2014 ieee dotnet project titles
Tammina infotech ieee titles 2012 2013
IEEE 2012 ns2_2012-13_titles.doc
3i techso project title
Java non ieee project titles 2014-2015
2014 list
Best IEEE Projects 2017 -2018 Titles - IEEE Final Year Projects @ Brainrich T...
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Dotnet 2014 15
Java 2015 project list
Mobileapplicationprojectsformcaingagnerchennai
Dotnet topics 2014-15
IEEE 2014 .Net & Java Projects List
Ad

Viewers also liked (16)

PDF
2015 application projects
PDF
2015 mobile wireless networks
PDF
latest IEEE 2015 wireless security
PDF
Ieee projects ns2
PDF
Ieee projects list java 2015
PDF
latest Ieee projects ns2
DOCX
About us
PDF
2015 android project
PPT
International differences in work-related values
PDF
Latest php projects
PDF
2015 cloud sim projects
PDF
Latest IEEE 2015 2016 Project Titles
PDF
Cloudy with a chance of computing
PDF
ใบงานที่ 6 เรื่อง โครงงานประเภท “การทดลองทฤษฎี”
PPTX
The Carrot Principle
PPT
Human Resource Management in Starbucks
2015 application projects
2015 mobile wireless networks
latest IEEE 2015 wireless security
Ieee projects ns2
Ieee projects list java 2015
latest Ieee projects ns2
About us
2015 android project
International differences in work-related values
Latest php projects
2015 cloud sim projects
Latest IEEE 2015 2016 Project Titles
Cloudy with a chance of computing
ใบงานที่ 6 เรื่อง โครงงานประเภท “การทดลองทฤษฎี”
The Carrot Principle
Human Resource Management in Starbucks
Ad

Similar to IEEE Projects 2012 (20)

DOC
Java non ieee project titles 2013-2014
DOCX
Dotnet ieee 2014, completed list(gy)
DOCX
IEEE 2014 Title's list for computer science students
PDF
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
DOCX
2014 ieee java project titles
DOCX
2014 ieee java project titles
DOCX
2014 ieee java project titles
DOCX
Ieee 2013 projects titles
DOCX
2013 2014 bulk ieee projects
DOCX
2013 2014 ieee project titles
DOCX
2014 ieee .net project titles
DOCX
2014 ieee .net project titles
DOCX
2014 ieee .net project titles
DOCX
Pvr technologies 2014 java ieee project titles
DOC
Java ieee titles 2013 14
DOCX
Pvr technologies 2013 java ieee project titles
DOCX
CREC List.docx
DOCX
CREC List.docx
DOCX
CREC List.docx
DOC
Java projects 2013 14
Java non ieee project titles 2013-2014
Dotnet ieee 2014, completed list(gy)
IEEE 2014 Title's list for computer science students
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
2014 ieee java project titles
2014 ieee java project titles
2014 ieee java project titles
Ieee 2013 projects titles
2013 2014 bulk ieee projects
2013 2014 ieee project titles
2014 ieee .net project titles
2014 ieee .net project titles
2014 ieee .net project titles
Pvr technologies 2014 java ieee project titles
Java ieee titles 2013 14
Pvr technologies 2013 java ieee project titles
CREC List.docx
CREC List.docx
CREC List.docx
Java projects 2013 14

More from Hari Krishnan (7)

DOCX
latest IEEE NetworkingProjects titles
PDF
Latest IEEE 2015 vehicular ad hoc networks
PDF
Latest Ieee 2015 multimedia projects
PDF
2015 dot net list
PDF
2015 big data project
DOCX
Shakas Technologies in vellore
DOCX
IEEE Projects Low Cost
latest IEEE NetworkingProjects titles
Latest IEEE 2015 vehicular ad hoc networks
Latest Ieee 2015 multimedia projects
2015 dot net list
2015 big data project
Shakas Technologies in vellore
IEEE Projects Low Cost

Recently uploaded (20)

PDF
Training And Development of Employee .pdf
PDF
Business model innovation report 2022.pdf
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
Principles of Marketing, Industrial, Consumers,
DOCX
Euro SEO Services 1st 3 General Updates.docx
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
How to Get Business Funding for Small Business Fast
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
IFRS Notes in your pocket for study all the time
PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
Training And Development of Employee .pdf
Business model innovation report 2022.pdf
Chapter 5_Foreign Exchange Market in .pdf
Nidhal Samdaie CV - International Business Consultant
Principles of Marketing, Industrial, Consumers,
Euro SEO Services 1st 3 General Updates.docx
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
New Microsoft PowerPoint Presentation - Copy.pptx
Power and position in leadershipDOC-20250808-WA0011..pdf
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
unit 1 COST ACCOUNTING AND COST SHEET
How to Get Business Funding for Small Business Fast
MSPs in 10 Words - Created by US MSP Network
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
IFRS Notes in your pocket for study all the time
Unit 1 Cost Accounting - Cost sheet
Belch_12e_PPT_Ch18_Accessible_university.pptx
ICG2025_ICG 6th steering committee 30-8-24.pptx

IEEE Projects 2012

  • 1. MAXIMIZE INFO TECH (P) LTD 2011- 2012 CLOUD COMPUTING S no TITLE KEYWORD 1 Exploiting Dynamic Resource Allocation for Efficient Parallel Data .NET Processing in the Cloud 2 Privacy-Preserving Multi-keyword Ranked Search over Encrypted .NET Cloud Data 3 Enabling Public Audit ability and Data Dynamics for Storage JAVA Security in Cloud Computing 4 Cloud Computing for Agent-Based Urban Transportation Systems JAVA 5 Secure and Practical Outsourcing of Linear Programming in Cloud JAVA Computing 6 Optimal service pricing for a cloud cache .NET 7 Data integrity proofs in cloud storage .NET PARALLEL & DISTRIBUTING SYSTEM 8 A Distributed Algorithm for the Replica Placement Problem JAVA 9 On the Performance of Content Delivery under Competition in a JAVA Stochastic Unstructured Peer-to-Peer Network 10 Toward Optimal Network Fault Correction in Externally Managed JAVA Overlay Networks 11 Privacy-Conscious Location-Based Queries in Mobile Environments JAVA 12 A Fully Distributed Proactively Secure Threshold-Multisignature JAVA Scheme 13 Dynamic Load Balancing In Distributed Systems In The Presence Of JAVA Delays A Regeneration-Theory Approach 14 Monitoring Service Systems from a Language-Action Perspective JAVA 15 Adaptive Provisioning of Human Expertise in Service-oriented JAVA Systems 16 Vulnerability Analysis in SOA-based Business Processes JAVA MOBILE COMPUTING No: 18, 13th EAST CROSS STREET, GANDHI NAGAR, KATPADI. Mobile: 9080183848, 0416-3201732. Email: info2projectstore@gmail.com, www.myprojectstore.com,
  • 2. MAXIMIZE INFO TECH (P) LTD 2011- 2012 16 Endpoint-Based Call Admission Control and Resource Management .NET for Vo-WLAN 17 Caching Strategies Based on Information Density Estimation in .NET Wireless Ad Hoc Networks 18 An Enhanced Selective Forwarding Scheme for real-time applications .NET in MANETs 19 A Virtual Topology for Routing in Ad-hoc Networks .NET 20 Cluster-Based Correlated Data Gathering in Wireless Sensor Networks .NET 21 MABS: Multicast Authentication Based on Batch Signature .NET 22 Energy Maps For Mobile Wireless networks coherence Time Versus .NET Spreading Period 23 Greedy Routing with Anti-Void Traversal for Wireless Sensor .NET Networks 24 A Tabu Search Algorithm for Cluster Building in Wireless Sensor .NET Networks 25 Energy Maps for Mobile Wireless Networks Coherence Time versus .NET Spreading Period 26 Random Cast An Energy Efficient Communication Scheme for Mobile .NET Ad Hoc Networks 27 SIMPS Using Sociology for Personal Mobility .NET 28 Intrusion Detection in Homogeneous and Heterogeneous Wireless .NET Sensor Networks No: 18, 13th EAST CROSS STREET, GANDHI NAGAR, KATPADI. Mobile: 9080183848, 0416-3201732. Email: info2projectstore@gmail.com, www.myprojectstore.com,
  • 3. MAXIMIZE INFO TECH (P) LTD 2011- 2012 DATA MINING 29 Clustering with Multi-Viewpoint based Similarity Measure JAVA 30 Effective Navigation of Query Results Based on Concept Hierarchies JAVA 31 Temporal Data Clustering via Weighted Clustering Ensemble with JAVA Different Representations 32 Personalized Ontology Model for Web Information Gathering .NET 33 Efficient Computation of Range Aggregates Against Uncertain .NET Location Based Queries 34 Text Clustering with Seeds Affinity Propagation JAVA 35 A Web Search Engine-Based Approach to Measure Semantic .NET Similarity between Words. 36 Scalable Learning of Collective Behavior .NET 37 The World in a Nutshell Concise Range Queries .NET 38 Publishing Search Logs – A Comparative Study of Privacy Guarantees .NET 39 One Size Does Not Fit All Towards User- and Query-Dependent .NET Ranking For Web Databases 40 Improving Aggregate Recommendation Diversity Using Ranking- .NET Based Techniques 41 Exploring Application-Level Semantics for Data Compression .NET 42 Bridging Socially-Enhanced Virtual Communities .NET 43 Discovering Conditional Functional Dependencies JAVA 44 Ranking Spatial Data by Quality Preferences JAVA 45 Extended XML Tree Pattern Matching: Theories and Algorithms JAVA 46 Horizontal Aggregations in SQL to prepare Data Sets for Data Mining .NET Analysis No: 18, 13th EAST CROSS STREET, GANDHI NAGAR, KATPADI. Mobile: 9080183848, 0416-3201732. Email: info2projectstore@gmail.com, www.myprojectstore.com,
  • 4. MAXIMIZE INFO TECH (P) LTD 2011- 2012 IMAGE PROCSSING & MATLAB 47 Online Intrusion Alert Aggregation with Generative Data Stream .NET Modeling. 48 Modeling and Detection of Camouflaging Worm .NET 49 Detecting Kernel-Level Rootkits Using Data Structure Invariants JAVA 50 Towards Situational Awareness of Large-Scale Botnet Probing Events .NET 51 A Competitive Study of Cryptography Techniques over Block Cipher. .NET 52 Analysis on Credit Card Fraud Detection Methods. JAVA 53 Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks JAVA 54 Nymble- Blocking Misbehaving Users in Anonymizing Networks JAVA 55 Embedded Extended Visual Cryptography Schemes JAVA 56 Minimizing Additive Distortion in Steganography Using Syndrome- JAVA Trellis Codes 57 NABS Novel Approaches for Biometric Systems JAVA 58 Blind Image Watermarking Using a Sample Projection Approach JAVA 59 Robust Video Data Hiding Using Forbidden Zone Data Hiding and .NET Selective Embedding 60 A Unified Approach to Optimizing Performance in Networks Serving JAVA Heterogeneous Flows 61 Optimal Bandwidth Assignment for Multiple-Description-Coded Video JAVA 62 Caching Strategies Based on Information Density JAVA 63 A Distributed and Scalable Time Slot Allocation Protocol for Wireless .NET Sensor Networks 64 On Combining Shortest-Path and Back-Pressure Routing Over Multi- .NET hop Wireless Networks 65 Robust Correlation of Encrypted Attack Traffic through Stepping JAVA th No: 18, 13 EAST CROSS STREET, GANDHI NAGAR, KATPADI. Mobile: 9080183848, 0416-3201732. Email: info2projectstore@gmail.com, www.myprojectstore.com,
  • 5. MAXIMIZE INFO TECH (P) LTD 2011- 2012 Stones by Flow Watermarking 66 Adaptive Fault Tolerant QoS Control Algorithms for Maximizing .NET System Lifetime of Query-Based Wireless Sensor Networks 67 Integration of Sound Signature in Graphical Password Authentication .NET System 68 SAT: A Security Architecture Achieving Anonymity and Traceability .NET in Wireless Mesh Networks 69 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop JAVA Wireless Networks 70 ProgME: Towards Programmable Network Measurement JAVA 71 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc JAVA Networks 72 Jamming-Aware Traffic Allocation for Multiple-Path Routing Using JAVA Portfolio Selection 73 Continuous Neighbor Discovery in Asynchronous Sensor Networks .NET 74 Distributed Adaptation of Quantized Feedback for Downlink Network .NET MIMO Systems 75 Network Coding Based Privacy Preservation against Traffic Analysis .NET in Multi-hop Wireless Networks 76 Cloudy Computing: Leveraging Weather Forecasts in Energy .NET Harvesting Sensor Systems 77 Minimizing Delay and Maximizing Lifetime for WSN in any cast NS2 78 Inside the Permutation-Scanning Worms: Propagation Modeling and NS2 Analysis 79 Provisioning of Deadline-Driven Requests With Flexible Transmission JAVA Rates in WDM Mesh Networks 80 Secure Data Objects Replication in Data Grid JAVA 81 Layered Approach Using Conditional Random Fields for Intrusion JAVA Detection No: 18, 13th EAST CROSS STREET, GANDHI NAGAR, KATPADI. Mobile: 9080183848, 0416-3201732. Email: info2projectstore@gmail.com, www.myprojectstore.com,
  • 6. MAXIMIZE INFO TECH (P) LTD 2011- 2012 82 Edge Adaptive Image Steganography Based on LSB Matching .NET NS2 85 Forward Correction and Fountain Codes in Delay Tolerant Networks NS2 86 Continuous Neighbor Discovery in Asynchronous Sensor Networks NS2 87 Throughput Optimization in High Speed Downlink Packet Access NS2 88 Improving the Performance of Wireless Ad Hoc Networks Through NS2 MAC Layer Design 89 Distributed Adaptation of Quantized Feedback for Downlink Network NS2 MIMO Systems 90 Secure High-Throughput Multicast Routing in Wireless Mesh NS2 Networks 91 Throughput Optimization in Mobile Backbone Networks NS2 92 Energy-Efficient Multicasting of Scalable Video Streams Over NS2 WiMAX Networks 93 MANET Routing Protocols vs Mobility Models: A Performance NS2 Evaluation 94 CACO-Distributed Client-Assisted Channel Assignment Optimization NS2 for Uncoordinated WLANs 95 Live Streaming With Receiver-Based Peer-Division Multiplexing NS2 No: 18, 13th EAST CROSS STREET, GANDHI NAGAR, KATPADI. Mobile: 9080183848, 0416-3201732. Email: info2projectstore@gmail.com, www.myprojectstore.com,