.NET IEEE Project List Office: c/o smart basis software solutions, DNR College road, Bhimavaram. www.buddhatechnologies.com, e-mail: info@buddhatechnologies.com, Ph: +917386147146, 9502520010
Projects on Networking: 1. The Internet if Energy: A Web-Enabled Smart Grid Systems 2012 2. Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks 2011 3. Continuous Neighbor Discovery in Asynchronous Sensor Networks 2011 4. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks 2011 5. Proportionally Fair Rate Allocation in Regular Wireless Sensor Networks 2011 6. Resource Overbooking: Using Aggregation Profiling in large scale Resource Discovery 2011 7. Pricing Under Constraints in Access Networks: Revenue Maximization and Congestion Management 2010 8. Service Overlay Network Capacity Adaptation For Profit Maximization 2010 9. Automatic Performance Tuning for the Virtualized Cluster System 2009 10. Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic 2009 11. Efficient Skyline Computation in Structured Peer-to-Peer Systems 2009 12. Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows 2009 13. Explicit Load Balancing Technique for NGEO Satellite IP Networks with On- Board Processing Capability 2009 14. Maintaining Colored Trees for Disjoint Multipath Routing Under Node Failures 2009 15. Message Authentication in Computationally Constrained Environments 2009 16. Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks 2009 17. On the Time Synchronization of Distributed Log Files in Networks with Local Broadcast Media 2009 18. PRESTO Feedback-Driven Data Management in Sensor Networks 2009 19. Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel 2009 .NET IEEE Project List Office: c/o smart basis software solutions, DNR College road, Bhimavaram. www.buddhatechnologies.com, e-mail: info@buddhatechnologies.com, Ph: +917386147146, 9502520010
Communications 20. Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services 2009 21. Secure and Policy-Compliant Source Routing 2009 22. Shortest Path Tree Computation in Dynamic Graphs 2009 23. Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths 2009 24. SORD: A Fault-Resilient Service Overlay for Media Port Resource Discovery 2009 25. The Viewpoint of E-Commerce Security in the Digital Economy 2009 26. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers 2008 27. Compaction of Schedules and a Two-Stage Approach for Duplication-Based Dag Scheduling 2008 28. Continuous Delivery Message Dissemination Problems under the Multicasting Communication Mode 2008 29. Efficient Broadcasting Using Network Coding 2008 30. Efficient Routing In Intermittently Connected Mobile Networks the Multiple Copy Case 2008 31. Enhancing Search Performance in Unstructured P2P Networks Based on Users Common Interest 2008 32. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems 2008 33. On Guaranteed Smooth Switching for Buffered, Crossbar Switches 2008 34. On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 2008 35. Probabilistic Packet Marking for Large-Scale IP Traceback 2008 36. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks 2008 37. Rate less Forward Error Correction for Topology-Transparent Scheduling 2008 38. Securing User-Controlled Routing Infrastructures 2008 39. Selecting the Best Spanning Tree in Metro Ethernet Networks using Genetic 2008 .NET IEEE Project List Office: c/o smart basis software solutions, DNR College road, Bhimavaram. www.buddhatechnologies.com, e-mail: info@buddhatechnologies.com, Ph: +917386147146, 9502520010
Algorithm 40. Statistical Techniques for Detecting Traffic Anomalies Through Packet Header Data 2008 41. An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers 2007 42. Efficient Approximate Query Processing In Peer to Networks 2007 43. P-Fusion : A P2P Architecture for Internet-Scale Content-Based Search and Retrieval 2007 Projects on Network Security: 1. A Hybrid Approach to Private Record Matching 2012 2. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data 2012 3. On Privacy of Encrypted Speech Communications 2012 4. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism 2012 5. Privacy-Preserving Enforcement of Spatially Aware RBAC 2012 6. Revisiting Defenses against Large-Scale Online Password Guessing Attacks 2012 7. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 2012 8. Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting 2012 9. A Distributed Dynamic Routing With Security Considerations 2011 10. Compression-Free Checksum-Based Fault-Detection Schemes For Pipelined Processors 2011 11. Integration Of Sound Signature In Graphical Password Authentication 2011 12. NABS: Novel Approaches for Biometric Systems 2011 13. A Variable Length Data Encryption Technique using Square Grid Transposition with Key Wrapping 2010 14. SigFree A Signature-free Buffer Overflow Attack Blocker 2010 15. Enhanced Security for Online Exams Using Group Cryptography 2009 16. Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing 2009 .NET IEEE Project List Office: c/o smart basis software solutions, DNR College road, Bhimavaram. www.buddhatechnologies.com, e-mail: info@buddhatechnologies.com, Ph: +917386147146, 9502520010
17. Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise 2009 18. Spread-Spectrum Watermarking Security 2009 19. The Effectiveness of Checksums for Embedded Control Networks 2009 20. Data Hiding in Audio Signal A Review 2009 21. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting 2008 22. Temporal Portioning of Communication Resources in an Integrated Architecture 2008 23. Trustworthy Computing Under Resource Constraints With The Down Policy 2008 24. Dual RSA and Its Security Analysis 2007 25. Morphological Granulometric Features of Nucleus in Automatic Bone Marrow White Blood Cell Classification 2007 26. Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols 2007 27. Cryptanalysis of Simplified Data Encryption Standard via Optimization Heuristics 2006 28. Cryptanalysis of Some Multimedia Encryption Schemes 2005