Professional Documents
Culture Documents
15. Mitigation of Control Channel Jamming Under Node Capture Attacks 2009
30. Cryptographic versus trust-based method for MANET routing security 2008
37. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion 2008
38. Efficient and Secure Content Processing and Distribution by
2008
Cooperative Intermediaries
Intrusion Detection in Homogeneous and Heterogeneous Wireless
39. 2008
Sensor Networks
Location Based Spatial Query Processing In Wireless Broadcast
40. 2008
Environments
41. Minimizing File Download Time in Stochastic Peer-to-Peer Networks 2008
JAVA IEEE PROJECT LIST
Mitigating Performance Degradation in
42. 2008
Congested Sensor Networks
43.
Modeling & Automated Containment of Worms 2008
68. Hiding Sensitive Association Rules with Limited Side Effects 2007
Multicast Routing with Delay and Delay Variation Constraints for
69. 2007
Collaborative Applications on Overlay Networks
OCGRR: A New Scheduling Algorithm for Differentiated Services
70. 2007
Networks
71. On Natural Language Processing and Plan Recognition 2007
Provably Secure Three-Party Authenticated Quantum Key Distribution
72. 2007
Protocols
Randomized Protocols for Duplicate Elimination in Peer to Peer
73. 2007
Systems
74. Secure Mask for Color Image Hiding 2007
82. Distributed Cache updating for the Dynamic source routing protocol 2006
JAVA IEEE PROJECT LIST
Distributed Collaborative Key Agreement AND Authentication
83. 2006
Protocols for Dynamic Peer Groups
84. Dynamic Signature Verification Using Pattern Recognition 2006
85. Efficient Key Agreement for Large and Dynamic Multicast Groups 2006