SlideShare une entreprise Scribd logo
1  sur  11
IGENUINE CAREER DEVELOPMENT

HEAD OFFICE
IGENUINE SOFT SOLUTIONS PVT LTD
#153, II Floor, Karuneegar Street, Adambakkam,
Chennai - 600088.
Landmark: Near To St.Thomas Mount Railway Station, Opposite To IOB Bank.
Telephone: 044-43102616.
Mobile: +91-8754427155/8754427209
Enquiry:contact@igenuinesoft.Com,hr@igenuinesoft.com
Web:www.igenuinesoft.com

Branch Office- Coimbatore

Branch Office-Tirchy

iGenuine Soft Solutions Pvt Ltd

iGenuine Soft Solutions Pvt Ltd

#23 1st Floor,Thiruvenkadam Street,

#6-E,Rishivanam,Puthur,

Vadakoavi,

Near Bishop Heber College,
Coimbatore- 641002.

Vayalur Road,Tennur,Trichy-620017.

Mobile No: 8344140708

Phone: 0431-4012700

Phone

Mobile No:8220555869,8220555879

: 0422-4374053

JAVA TITLES 2013

S.No
1
2
3
4
5
6
7
8
9
10
11
12
13

CLOUD COMPUTING
Titles

Transactions/
Conference
A Stochastic Model to Investigate Data Center Performance and 2013 Transactions
Qos in Iaas Cloud Computing Systems
CloudMoV: Cloud-Based Mobile Social TV
2013 Transactions
Dynamic Resource Allocation Using Virtual Machines for Cloud 2013 Transactions
Computing Environment
Error-Tolerant Resource Allocation and Payment Minimization 2013 Transactions
For Cloud System
Harnessing the Cloud for Securely Outscourcing Large-Scale 2013 Transactions
Systems of Linear Equations
On data Staging Algorithms for Shared Data Accesses in Clouds 2013 Transactions
PACk: Predicition-Based Cloud Bandwidth and Cost Reduction
System
Privacy-Preserving Public Auditing for Secure Cloud Storage
Scalable and Secure Sharing of Personal Health Records in
Cloud Computing Using Attribute-Based Encryption
Simple and Efficient Dynamic Provisioning for PowerProportional Data Centers
Toward Privacy Preserving and Collusion Resistance in a
Location Proof Updating System
QoS-Aware Data Replication for Data Intensive Applications in
Cloud Computing Systems
On the Characterization of the Structural Robustness of Data
Center Networks

Year

2013

Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions
14
15
16
17
18
19
20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

Stratus: Load Balancing the Cloud for Carbon Emissions
Control
Practical Compute Capacity Management for Virtualized
Datacenters
Privacy Preserving Back-Propagation Neural Network Learning
Made Practical with Cloud Computing
Price Competition in an Oligopoly Cloud Market with Multiple
IaaS Cloud Providers
A Survey of Mobile Cloud Computing Application Models
Dynamic Scheduling and Pricing in Wireless Cloud Computing
Towards Differential Query Services in Cost-Efficient Clouds
DATA MINING
A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
A New Algorithm for Inferring User Search Goals With
Feedback Sessions
Annotating Search Results From Web Databases
Anomaly Detection Via Online Over-Sampling Principal
Component Analysis
Building A Scalable Database-Driven Reverse Dictionary
Discovering Temporal Change Patterns in the Presence of
Taxonomies
Distributed Processing of Probabilistic Top-k Queries in
Wireless Sensor Networks
Facilitating Effective User Navigation Through Website
Structure Improvement
Information-Theoretical Outlier Detection for Large-Scale
Categorical data
M-Privacy for Collaborative Data Publishing
Protecting Sensitive Labels in Social Network Data
Anonymization
Robust Module-Based data Management
Supporting Flexible, Efficient, and User-Interpretable Retrieval
of similar Time Series
Tweet Analysis for Real-time Event Detection and Earthquake
Reporting System Development
Secure Mining of Association Rules in Horizontally Distributed
Databases.
Preventing Private Information Inference Attacks on Social
Networks
Ranking on Data Manifold with Sink Points
Decision Trees for Mining Data Streams Based on the Gaussian
Approximation
Effective and Efficient Clustering Methods for Correlated
Probabilistic Graphs
Robust Module-based Data Management
IMAGE PROCESSING

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013
2013
2013

Transactions
Transactions
Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions
1

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013

Transactions

19

Blur and Illumination Robust Face Recognition via Set- 2013
Theoretic Characterization

Transactions

20

Visually Weighted Compressive Sensing: Measurement and
Reconstruction.
MOBILE COMPUTING
A Neighbor Coverage-Based Probabilistic Rebroadcast Routing
Overhead in Mobile Ad Hoc Networks
Content Sharing Over Smartphone-Based Delay-Tolerant
Networks
DCIM: Distributed Cache Invalidation Method for Maintaining
Cache Consistency in Wireless Mobile Networks

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18

1
2
3

Separable reversible encrypted data hiding in encrypted image
using AES Algorithm and Lossy technique
Novel iris segmentation and recognition system for human
identification
Colour and texture feature-based image retrieval by using
hadamard matrix in discrete wavelet transform
Perceptual Video Coding Based on SSIM-Inspired Divisive
Normalization
Circular Reranking for Visual Search
Efficient Method for Content Reconstruction with SelfEmbedding
Modeling Iriscode and its Variants as Convex Polyhedral Cones
and its Security Implications
Per-Colorant-Channel color Barcodes for Mobile Applications:
An Interference Cancellation Framework
Robust Document Image Binarization Technique for Degraded
Document Images
A Framework for Mining Signatures From Event Sequences and
its Applications in Healthcare Data
Vector-Valued Image Processing by Parallel Level Sets
Bayesian
Predictor
Combination
for
Lossless Image
Compression
A New Secure Image Transmission Technique via Secretfragment-visible Mosaic Images by Nearly-reversible Color
Transformations
Optimal Inversion of the Generalized Anscombe Transformation
for Poisson-Gaussian Noise
Regularized Discriminative Spectral Regression Method for
Heterogeneous Face Matching
Image-Difference Prediction: From Grayscale to Color
Unsupervised Amplitude and Texture Classification of SAR
Images With Multinomial Latent Model
Adaptive Fingerprint Image Enhancement With Emphasis on
Preprocessing of Data
4

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

Analysis of an Instantaneous Packet Loss Based Vertical 2013
Handover Algorithm for Heterogeneous Wireless
Networks
Mobile App Classification with Enriched Contextual 2013
Information

Transactions

19

Energy-Efficient Reliable Routing Considering Residual 2013
Energy in Wireless Ad Hoc Networks

Transactions

20

On Exploiting Transient Social Contact Patterns for Data
Forwarding in Delay-Tolerant Networks.
INFORMATION SECURITY
EAACK- A Secure Intrusion-Detection Systems for MANETs
Identity-Based Secure Distributed Data Storage Schemes
Modeling the Pairwise Key Predistribution Scheme in the
Presence of Unreliable Links
NICE: Network Intrusion Detection and Counter Measure
Selection in Virtual Network Systems
On Inference-Proof View Processing of XML Documents
Privacy Preserving Data Sharing with Anonymous ID
Assignment

2013

Transactions

2013
2013
2013

Transactions
Transactions
Transactions

2013

Transactions

2013
2013

Transactions
Transactions

5
6
7
8
9
10
11
12
13
14
15
16
17
18

1
2
3
4
5
6

Discovery and Verification of Neighbor Positions in Mobile Ad
Hoc Networks
Distributed Cooperation and Diversity for Hybrid Wireless
Networks
Efficient ReKeying Framework for Secure Multicast with
Diverse-Subscription-Period Mobile Users
Relay Selection for Geographical Forwarding in Sleep-Wake
Cycling wireless Sensor Networks
Toward Privacy Preserving and Collusion Resistance in a
Location Proof Updating System
Toward a Statistical Framework for Source Anonymity in sensor
Networks
Vampire Attacks: Draining Life From Wireless Ad Hoc Sensor
Networks
Data Retrieval Scheduling for Multi-Item Requests in MultiChannel Wireless Broadcast Environments
A Lightweight Encryption Scheme for Network-Coded
Mobile Ad Hoc Networks
Behavioral Malware Detection in Delay Tolerant Networks
STARS: A Statistical Traffic Pattern Discovery System for
MANETs
Optimal Peer-to-Peer Scheduling for Mobile Wireless
Networks with Redundantly Distributed Data
Iterative Group Splitting Algorithm For Opportunistic
Scheduling Systems

Transactions
7
8
9
10
11
12
13
14
15
16
17
18
19
20

1
2
3
4
5
6
7
8
9
10

Securing Class Initialization in JAVA-Like Languages
Security Analysis of a Single Sign-On Mechanism for
Distributed Computer Networks
SORT: A Self- Organizing Trust Model for Peer-to-Peer
Systems
WARNINGBIRD: A Near Real-time Detection System for
Suspicious URLs in Twitter Stream
Authorization Control for a Semantic Data Repository Through
an Inference Policy Engine
Privacy Enhanced Data Aggregation Scheme Against Internal
Attackers in Smart Grid
Distributed, Concurrent, and Independent Access to Encrypted
Cloud Databases
Formal Analysis of Secure Neighbor Discovery in Wireless
Networks
Efficient and Privacy-Aware Data Aggregation in Mobile
Sensing
Secure Two-Party Differentially Private Data Release for
Vertically-Partitioned Data
Private Searching on Streaming Data Based on Keyword
Frequency
Discovery and Resolution of Anomalies in Web Access Control
Policies
Abductive Analysis of Administrative Policies in Rule-based
Access Control
A Random Decision Tree Framework for Privacy-preserving
Data Mining
NETWORKING
Achieving Efficient Flooding by Utilizing Link Correlation in
Wireless Sensor Networks
A Distributed Control Law for Load Balancing in Content
Delivery Networks
A highly Scalable Key Pre-Distribution Scheme For Wireless
Sensor Networks
A Utility Maximization Framework for Fair and Efficient
Multicasting in Multicarrier Wireless Cellular Networks
Complexity Analysis and Algorithm Design for Advance
Bandwidth Scheduling in Dedicated Networks
Delay-Based Network Utility Maximization
Dynamic Control of Coding for Progressive packet Arrivals in
DTNs
Efficient Algorithms for Neighbor Discovery in Wireless
Networks
Semi-Random Backoff: Towards Resource Reservation For
Channel Access in Wireless LANs
Analytical study of security aspects in 6LoWPAN networks

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions

2013

Transactions
11
12
13
14
15
16
17
18
19
20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15

Semantic Approach for Modeling Profiles and Interactions
Based on Digital Content
Asynchronous distributed parallelization of mobile network
optimization algorithms
Knowledge-based cybernetics in decision support system based
on subjective emotional intelligence
Measuring the global domain name system
Communication technologies for differentiated smart grid
environments
Control platform for radiotherapy services
The SANDRA testbed for the future aeronautical
communication network
GENI-Enabled Programming Experiments for Networking
Classes
A sprint-point based estimation technique in Scrum
Investigating the Energy Sink-Hole Problem in Connected kCovered Wireless Sensor Networks
DISTRIBUTED NETWORKING
Distributed Multichannel and Mobility Aware Cluster-based
MAC Protocol for Vehicular Ad-hoc Networks (VANETs)
SMART: Utilizing Distributed Social Map for Lightweight
Routing in Delay-Tolerant Networks
Distributed Channel Allocation Protocols for Wireless Sensor
Networks
Distributed Database Management Techniques for Wireless
Sensor Networks
A Secure Payment Scheme with Low Communication and
Processing Overhead for Multihop wireless Networks
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks
Creation
Cluster-Based Certificate Revocation with Vindication
Capability for Mobile Ad Hoc Networks
Enabling Dynamic data and Indirect Mutual Trust for Cloud
Computing Storage Systems
Fault Tolerance in Distributed Systems Using Fused Data
Structures
Flexible Symmetrical Global-Snapshot Algorithms for LargeScale Distributed Systems
High Performance Resource Allocation Strategies for
Computational Economies
IP-Geolocation mapping for Moderately Connected Internet
Regions
Optimal Client-Server Assignment for Internet Distributed
Systems
Scheduling Sensor Data Collection With Dynamic Traffic
Patterns
From Offline Toward Real-Time: A Hybrid Systems Model

2013

Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013

Transactions
16
17
18
19
20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

Checking and CPS Co-Design Approach for Medical Device
Plug-and-Play Collaborations
Modeling of Distributed File Systems for Practical Performance
Analysis
An Extensible System for Multilevel Automatic Data Partition
and Mapping
Scalable Relative Debugging
Reliability of Heterogeneous Distributed Computing Systems in
the Presence of Correlated Failures
Coding Opportunity Aware Backbone Metrics for Broadcast in
Wireless Networks
SOFTWARE ENGINEERING
Ant Colony Optimization for Software Project Scheduling and
Staffing with an Event-Based Scheduler
Whole Test Suite Generation
Empirical Principles and an Industrial Case Study in Retrieving
Equivalent Requirements via Natural Language Processing
Techniques
Identifying and Summarizing Systematic Code Changes via Rule
Inference
Automated API Property Inference Techniques
Coverage Estimation in Model Checking with Bitstate Hashing
Local versus Global Lessons for Defect Prediction and Effort
Estimation
COMeT+: Continuous Online Memory Testing with MutliThreading Extension
A Study of Variability Models and Languages in the Systems
Software Domain
Identifying Code of Individual Features in Client-side Web
Applications
Determining the Cause of a Design Model Inconsistency
Usability through software design
A Learning-Based Framework for Engineering Feature-Oriented
Self-Adaptive Software Systems
Learning Project Management Decisions: A Case Study with
Case-Based Reasoning Versus Data Farming
Skoll: A Process and Infrastructure for Distributed Continuous
Quality Assurance
A Taxonomy and Mapping of Computer-based Critiquing Tools
Variability Mining: Consistent Semiautomatic Detection of
Product-Line Features
Proactive Self-Adaptation for Improving the Reliability of
Mission-Critical, Embedded, and Mobile Software
Automated Behavioral Testing of Refactoring Engines
A Quantitative Approach to Input Generation in Real-Time
Testing of Stochastic Systems

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013
2013
2013

Transactions
Transactions
Transactions

2013

Transactions

2013

Transactions

2013

Transactions

2013
2013
2013

Transactions
Transactions
Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013
2013

Transactions
Transactions
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

1
2
3
4
5
6
7
8
9

WEB MINING
Web Multimedia Object Classification using Cross-Domain
Correlation Knowledge
Interpreting the Public Sentiment Variations on Twitter
Surfing the Network for Ranking by Multidamping
Data Mining Meets the Needs of Disaster Information
Management
A Probabilistic Approach to String Transformation
Retrieval-based Face Annotation by Weak Label Regularized
Local Coordinate Coding
On the Influence Propagation of Web Videos
Mobile App Classification with Enriched Contextual
Information
The application of web usage mining in E-commerce security
On data integration and data mining for developing business
intelligence
Data mining and wireless sensor network for groundnut
pest/disease precision protection
Data Mining Meets the Needs of Disaster Information
Management
An effective data preprocessing method for Web Usage Mining
The integrating between web usage mining and data mining
techniques
Semantic search for structured Web finder
Tourism e-commerce recommender system based on web data
mining
Adaptive online learning environment and web usage mining
Web product ranking using opinion mining
Web mining framework for security in e-commerce
Semantic Computing of Moods Based on Tags in Social Media
of Music
IMAGE PROCESSING
IMAGE Resolution Enhancement by Using Discrete and
Stationary Wavelet Decomposition
Load Balancing Multipath Switching System With Flow Slice
cloudsim project
A Simple but Effective Maximal Frequent Itemset Mining
Algorithm over Streams
Biomedical invasion
Usage Decisions Through Management Information Base (MIB)
In SNMP
Automated cheque clearance system
HASBE: A Hierarchical Attribute-Based Solution for Flexible
and Scalable Access Control
Fast And Accurate Cooperative Tracking In Wireless Networks

2013

Transactions

2013
2013
2013

Transactions
Transactions
Transactions

2013
2013

Transactions
Transactions

2013
2013

Transactions
Transactions

2013
2013

Transactions
Transactions

2013

Transactions

2013

Transactions

2013
2013

Transactions
Transactions

2013
2013

Transactions
Transactions

2013
2013
2013
2013

Transactions
Transactions
Transactions
Transactions

2012

Transactions

2012
2012
2012

Transactions
Transactions
Transactions

2012
2012

Transactions
Transactions

2012
2012

Transactions
Transactions

2012

Transactions
CONTACT US
Head Office – Chennai
iGenuine Soft Solutions Pvt Ltd.,
#153, II Floor,Karuneegar Street,Adambakkam,
Chennai-600 088,
Landmark: Near To St.Thomas mount railway Station opposite to IOB Bank
Phone: 044-43102616
Mobile: 08754427208, 08754427209
Enquiry:contact@igenuinesoft.com
Web: www.igenuinesoft.com
Branch Office – Coimbatore

Branch Office – Trichy

iGenuine Soft Solutions Pvt Ltd.,

iGenuine Soft Solutions Pvt Ltd.,

#23,1st Floor,Thiruvenkadam Street,Vadakovai,

No: 6-E, Rishivanam, Puthur,

Coimbatore-641002.

Near Bishop Heber College,

Phone: 0422-4374053

Vayalur Road, Tennur,Trichy-620017.

Mobile: 8344140708

Phone: 0431-4012700
Mobile : 8220555869, 8220555879

Contenu connexe

En vedette

JAVA & DOTNET Application Titles
JAVA & DOTNET Application TitlesJAVA & DOTNET Application Titles
JAVA & DOTNET Application Titlessaranya G
 
IEEE NS2 & NS3 Titles
IEEE NS2 & NS3 TitlesIEEE NS2 & NS3 Titles
IEEE NS2 & NS3 Titlessaranya G
 
IEEE EEE Titles
IEEE EEE TitlesIEEE EEE Titles
IEEE EEE Titlessaranya G
 
IEEE VLSI 2013 Titles
IEEE VLSI 2013 TitlesIEEE VLSI 2013 Titles
IEEE VLSI 2013 Titlessaranya G
 
IEEE EMBEDDED 2013 Titles
IEEE EMBEDDED 2013 TitlesIEEE EMBEDDED 2013 Titles
IEEE EMBEDDED 2013 Titlessaranya G
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

En vedette (6)

JAVA & DOTNET Application Titles
JAVA & DOTNET Application TitlesJAVA & DOTNET Application Titles
JAVA & DOTNET Application Titles
 
IEEE NS2 & NS3 Titles
IEEE NS2 & NS3 TitlesIEEE NS2 & NS3 Titles
IEEE NS2 & NS3 Titles
 
IEEE EEE Titles
IEEE EEE TitlesIEEE EEE Titles
IEEE EEE Titles
 
IEEE VLSI 2013 Titles
IEEE VLSI 2013 TitlesIEEE VLSI 2013 Titles
IEEE VLSI 2013 Titles
 
IEEE EMBEDDED 2013 Titles
IEEE EMBEDDED 2013 TitlesIEEE EMBEDDED 2013 Titles
IEEE EMBEDDED 2013 Titles
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similaire à IEEE JAVA 2013 Titles

2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytech
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcway2004
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwayt
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcway2004
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwayt
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcway2004
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcway2004
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytech
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytechnoz
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcwayt
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcway2004
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcwaytechnoz
 
IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEallmightinfo
 

Similaire à IEEE JAVA 2013 Titles (20)

2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
IEEE project titles 2014 for CSE
IEEE project titles 2014 for CSEIEEE project titles 2014 for CSE
IEEE project titles 2014 for CSE
 

Dernier

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

IEEE JAVA 2013 Titles

  • 1. IGENUINE CAREER DEVELOPMENT HEAD OFFICE IGENUINE SOFT SOLUTIONS PVT LTD #153, II Floor, Karuneegar Street, Adambakkam, Chennai - 600088. Landmark: Near To St.Thomas Mount Railway Station, Opposite To IOB Bank. Telephone: 044-43102616. Mobile: +91-8754427155/8754427209 Enquiry:contact@igenuinesoft.Com,hr@igenuinesoft.com Web:www.igenuinesoft.com Branch Office- Coimbatore Branch Office-Tirchy iGenuine Soft Solutions Pvt Ltd iGenuine Soft Solutions Pvt Ltd #23 1st Floor,Thiruvenkadam Street, #6-E,Rishivanam,Puthur, Vadakoavi, Near Bishop Heber College,
  • 2. Coimbatore- 641002. Vayalur Road,Tennur,Trichy-620017. Mobile No: 8344140708 Phone: 0431-4012700 Phone Mobile No:8220555869,8220555879 : 0422-4374053 JAVA TITLES 2013 S.No 1 2 3 4 5 6 7 8 9 10 11 12 13 CLOUD COMPUTING Titles Transactions/ Conference A Stochastic Model to Investigate Data Center Performance and 2013 Transactions Qos in Iaas Cloud Computing Systems CloudMoV: Cloud-Based Mobile Social TV 2013 Transactions Dynamic Resource Allocation Using Virtual Machines for Cloud 2013 Transactions Computing Environment Error-Tolerant Resource Allocation and Payment Minimization 2013 Transactions For Cloud System Harnessing the Cloud for Securely Outscourcing Large-Scale 2013 Transactions Systems of Linear Equations On data Staging Algorithms for Shared Data Accesses in Clouds 2013 Transactions PACk: Predicition-Based Cloud Bandwidth and Cost Reduction System Privacy-Preserving Public Auditing for Secure Cloud Storage Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Simple and Efficient Dynamic Provisioning for PowerProportional Data Centers Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System QoS-Aware Data Replication for Data Intensive Applications in Cloud Computing Systems On the Characterization of the Structural Robustness of Data Center Networks Year 2013 Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions
  • 3. 14 15 16 17 18 19 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Stratus: Load Balancing the Cloud for Carbon Emissions Control Practical Compute Capacity Management for Virtualized Datacenters Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing Price Competition in an Oligopoly Cloud Market with Multiple IaaS Cloud Providers A Survey of Mobile Cloud Computing Application Models Dynamic Scheduling and Pricing in Wireless Cloud Computing Towards Differential Query Services in Cost-Efficient Clouds DATA MINING A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data A New Algorithm for Inferring User Search Goals With Feedback Sessions Annotating Search Results From Web Databases Anomaly Detection Via Online Over-Sampling Principal Component Analysis Building A Scalable Database-Driven Reverse Dictionary Discovering Temporal Change Patterns in the Presence of Taxonomies Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Facilitating Effective User Navigation Through Website Structure Improvement Information-Theoretical Outlier Detection for Large-Scale Categorical data M-Privacy for Collaborative Data Publishing Protecting Sensitive Labels in Social Network Data Anonymization Robust Module-Based data Management Supporting Flexible, Efficient, and User-Interpretable Retrieval of similar Time Series Tweet Analysis for Real-time Event Detection and Earthquake Reporting System Development Secure Mining of Association Rules in Horizontally Distributed Databases. Preventing Private Information Inference Attacks on Social Networks Ranking on Data Manifold with Sink Points Decision Trees for Mining Data Streams Based on the Gaussian Approximation Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs Robust Module-based Data Management IMAGE PROCESSING 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 2013 2013 Transactions Transactions Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions
  • 4. 1 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 Transactions 19 Blur and Illumination Robust Face Recognition via Set- 2013 Theoretic Characterization Transactions 20 Visually Weighted Compressive Sensing: Measurement and Reconstruction. MOBILE COMPUTING A Neighbor Coverage-Based Probabilistic Rebroadcast Routing Overhead in Mobile Ad Hoc Networks Content Sharing Over Smartphone-Based Delay-Tolerant Networks DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1 2 3 Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique Novel iris segmentation and recognition system for human identification Colour and texture feature-based image retrieval by using hadamard matrix in discrete wavelet transform Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization Circular Reranking for Visual Search Efficient Method for Content Reconstruction with SelfEmbedding Modeling Iriscode and its Variants as Convex Polyhedral Cones and its Security Implications Per-Colorant-Channel color Barcodes for Mobile Applications: An Interference Cancellation Framework Robust Document Image Binarization Technique for Degraded Document Images A Framework for Mining Signatures From Event Sequences and its Applications in Healthcare Data Vector-Valued Image Processing by Parallel Level Sets Bayesian Predictor Combination for Lossless Image Compression A New Secure Image Transmission Technique via Secretfragment-visible Mosaic Images by Nearly-reversible Color Transformations Optimal Inversion of the Generalized Anscombe Transformation for Poisson-Gaussian Noise Regularized Discriminative Spectral Regression Method for Heterogeneous Face Matching Image-Difference Prediction: From Grayscale to Color Unsupervised Amplitude and Texture Classification of SAR Images With Multinomial Latent Model Adaptive Fingerprint Image Enhancement With Emphasis on Preprocessing of Data
  • 5. 4 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions Analysis of an Instantaneous Packet Loss Based Vertical 2013 Handover Algorithm for Heterogeneous Wireless Networks Mobile App Classification with Enriched Contextual 2013 Information Transactions 19 Energy-Efficient Reliable Routing Considering Residual 2013 Energy in Wireless Ad Hoc Networks Transactions 20 On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks. INFORMATION SECURITY EAACK- A Secure Intrusion-Detection Systems for MANETs Identity-Based Secure Distributed Data Storage Schemes Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links NICE: Network Intrusion Detection and Counter Measure Selection in Virtual Network Systems On Inference-Proof View Processing of XML Documents Privacy Preserving Data Sharing with Anonymous ID Assignment 2013 Transactions 2013 2013 2013 Transactions Transactions Transactions 2013 Transactions 2013 2013 Transactions Transactions 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1 2 3 4 5 6 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Distributed Cooperation and Diversity for Hybrid Wireless Networks Efficient ReKeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users Relay Selection for Geographical Forwarding in Sleep-Wake Cycling wireless Sensor Networks Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System Toward a Statistical Framework for Source Anonymity in sensor Networks Vampire Attacks: Draining Life From Wireless Ad Hoc Sensor Networks Data Retrieval Scheduling for Multi-Item Requests in MultiChannel Wireless Broadcast Environments A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks Behavioral Malware Detection in Delay Tolerant Networks STARS: A Statistical Traffic Pattern Discovery System for MANETs Optimal Peer-to-Peer Scheduling for Mobile Wireless Networks with Redundantly Distributed Data Iterative Group Splitting Algorithm For Opportunistic Scheduling Systems Transactions
  • 6. 7 8 9 10 11 12 13 14 15 16 17 18 19 20 1 2 3 4 5 6 7 8 9 10 Securing Class Initialization in JAVA-Like Languages Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks SORT: A Self- Organizing Trust Model for Peer-to-Peer Systems WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream Authorization Control for a Semantic Data Repository Through an Inference Policy Engine Privacy Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Formal Analysis of Secure Neighbor Discovery in Wireless Networks Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data Private Searching on Streaming Data Based on Keyword Frequency Discovery and Resolution of Anomalies in Web Access Control Policies Abductive Analysis of Administrative Policies in Rule-based Access Control A Random Decision Tree Framework for Privacy-preserving Data Mining NETWORKING Achieving Efficient Flooding by Utilizing Link Correlation in Wireless Sensor Networks A Distributed Control Law for Load Balancing in Content Delivery Networks A highly Scalable Key Pre-Distribution Scheme For Wireless Sensor Networks A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks Complexity Analysis and Algorithm Design for Advance Bandwidth Scheduling in Dedicated Networks Delay-Based Network Utility Maximization Dynamic Control of Coding for Progressive packet Arrivals in DTNs Efficient Algorithms for Neighbor Discovery in Wireless Networks Semi-Random Backoff: Towards Resource Reservation For Channel Access in Wireless LANs Analytical study of security aspects in 6LoWPAN networks 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions 2013 Transactions
  • 7. 11 12 13 14 15 16 17 18 19 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Semantic Approach for Modeling Profiles and Interactions Based on Digital Content Asynchronous distributed parallelization of mobile network optimization algorithms Knowledge-based cybernetics in decision support system based on subjective emotional intelligence Measuring the global domain name system Communication technologies for differentiated smart grid environments Control platform for radiotherapy services The SANDRA testbed for the future aeronautical communication network GENI-Enabled Programming Experiments for Networking Classes A sprint-point based estimation technique in Scrum Investigating the Energy Sink-Hole Problem in Connected kCovered Wireless Sensor Networks DISTRIBUTED NETWORKING Distributed Multichannel and Mobility Aware Cluster-based MAC Protocol for Vehicular Ad-hoc Networks (VANETs) SMART: Utilizing Distributed Social Map for Lightweight Routing in Delay-Tolerant Networks Distributed Channel Allocation Protocols for Wireless Sensor Networks Distributed Database Management Techniques for Wireless Sensor Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop wireless Networks A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks Enabling Dynamic data and Indirect Mutual Trust for Cloud Computing Storage Systems Fault Tolerance in Distributed Systems Using Fused Data Structures Flexible Symmetrical Global-Snapshot Algorithms for LargeScale Distributed Systems High Performance Resource Allocation Strategies for Computational Economies IP-Geolocation mapping for Moderately Connected Internet Regions Optimal Client-Server Assignment for Internet Distributed Systems Scheduling Sensor Data Collection With Dynamic Traffic Patterns From Offline Toward Real-Time: A Hybrid Systems Model 2013 Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 Transactions
  • 8. 16 17 18 19 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Checking and CPS Co-Design Approach for Medical Device Plug-and-Play Collaborations Modeling of Distributed File Systems for Practical Performance Analysis An Extensible System for Multilevel Automatic Data Partition and Mapping Scalable Relative Debugging Reliability of Heterogeneous Distributed Computing Systems in the Presence of Correlated Failures Coding Opportunity Aware Backbone Metrics for Broadcast in Wireless Networks SOFTWARE ENGINEERING Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler Whole Test Suite Generation Empirical Principles and an Industrial Case Study in Retrieving Equivalent Requirements via Natural Language Processing Techniques Identifying and Summarizing Systematic Code Changes via Rule Inference Automated API Property Inference Techniques Coverage Estimation in Model Checking with Bitstate Hashing Local versus Global Lessons for Defect Prediction and Effort Estimation COMeT+: Continuous Online Memory Testing with MutliThreading Extension A Study of Variability Models and Languages in the Systems Software Domain Identifying Code of Individual Features in Client-side Web Applications Determining the Cause of a Design Model Inconsistency Usability through software design A Learning-Based Framework for Engineering Feature-Oriented Self-Adaptive Software Systems Learning Project Management Decisions: A Case Study with Case-Based Reasoning Versus Data Farming Skoll: A Process and Infrastructure for Distributed Continuous Quality Assurance A Taxonomy and Mapping of Computer-based Critiquing Tools Variability Mining: Consistent Semiautomatic Detection of Product-Line Features Proactive Self-Adaptation for Improving the Reliability of Mission-Critical, Embedded, and Mobile Software Automated Behavioral Testing of Refactoring Engines A Quantitative Approach to Input Generation in Real-Time Testing of Stochastic Systems 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 2013 2013 Transactions Transactions Transactions 2013 Transactions 2013 Transactions 2013 Transactions 2013 2013 2013 Transactions Transactions Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 2013 Transactions Transactions
  • 9. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 1 2 3 4 5 6 7 8 9 WEB MINING Web Multimedia Object Classification using Cross-Domain Correlation Knowledge Interpreting the Public Sentiment Variations on Twitter Surfing the Network for Ranking by Multidamping Data Mining Meets the Needs of Disaster Information Management A Probabilistic Approach to String Transformation Retrieval-based Face Annotation by Weak Label Regularized Local Coordinate Coding On the Influence Propagation of Web Videos Mobile App Classification with Enriched Contextual Information The application of web usage mining in E-commerce security On data integration and data mining for developing business intelligence Data mining and wireless sensor network for groundnut pest/disease precision protection Data Mining Meets the Needs of Disaster Information Management An effective data preprocessing method for Web Usage Mining The integrating between web usage mining and data mining techniques Semantic search for structured Web finder Tourism e-commerce recommender system based on web data mining Adaptive online learning environment and web usage mining Web product ranking using opinion mining Web mining framework for security in e-commerce Semantic Computing of Moods Based on Tags in Social Media of Music IMAGE PROCESSING IMAGE Resolution Enhancement by Using Discrete and Stationary Wavelet Decomposition Load Balancing Multipath Switching System With Flow Slice cloudsim project A Simple but Effective Maximal Frequent Itemset Mining Algorithm over Streams Biomedical invasion Usage Decisions Through Management Information Base (MIB) In SNMP Automated cheque clearance system HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control Fast And Accurate Cooperative Tracking In Wireless Networks 2013 Transactions 2013 2013 2013 Transactions Transactions Transactions 2013 2013 Transactions Transactions 2013 2013 Transactions Transactions 2013 2013 Transactions Transactions 2013 Transactions 2013 Transactions 2013 2013 Transactions Transactions 2013 2013 Transactions Transactions 2013 2013 2013 2013 Transactions Transactions Transactions Transactions 2012 Transactions 2012 2012 2012 Transactions Transactions Transactions 2012 2012 Transactions Transactions 2012 2012 Transactions Transactions 2012 Transactions
  • 10. CONTACT US Head Office – Chennai iGenuine Soft Solutions Pvt Ltd., #153, II Floor,Karuneegar Street,Adambakkam, Chennai-600 088, Landmark: Near To St.Thomas mount railway Station opposite to IOB Bank Phone: 044-43102616 Mobile: 08754427208, 08754427209 Enquiry:contact@igenuinesoft.com Web: www.igenuinesoft.com
  • 11. Branch Office – Coimbatore Branch Office – Trichy iGenuine Soft Solutions Pvt Ltd., iGenuine Soft Solutions Pvt Ltd., #23,1st Floor,Thiruvenkadam Street,Vadakovai, No: 6-E, Rishivanam, Puthur, Coimbatore-641002. Near Bishop Heber College, Phone: 0422-4374053 Vayalur Road, Tennur,Trichy-620017. Mobile: 8344140708 Phone: 0431-4012700 Mobile : 8220555869, 8220555879