IEEE / SOFTWARE PROJECTS In various Domains JAVA * J2EE * J2ME

Latest Projects, 2008, 2009, 2010
Our Service Address 6/1, Selvanaayaki Complex1st Floor, Gokulae Street, Ramnagar, Coimbatore- 641009. Mobile: 9894604623 Phone: 0422-4377414

Mai : info@brainrichtech.com Web : www.brainrichtech.com

We are offering IEEE & Non IEEE Projects In various Domains including
IEEE Projects on Image Processing IEEE Projects on Knowledge and Data Mining IEEE Projects on Networking IEEE Projects on Artificial Intelligence IEEE Projects on Audio and Video Processing IEEE Projects on Pattern Analysis & Machine Intelligence IEEE Projects on Multimedia IEEE Projects on Parallel and Distributed Systems IEEE Projects on Mobile Computing IEEE Projects on Software Engineering IEEE Projects on Information Forensics and Security IEEE Projects on Dependable and Secure Computing IEEE Projects on Systems, Man & Cybernetics IEEE Projects on Computers IEEE Projects on Learning Technologies

PROJECT SUPPORTS & DELIVERABLES

 Project Abstract  IEEE Paper  PPT / Review Details  Project Report  Working Procedure/Screen Shots  Materials & Books in CD  Project Certification

TECHNOLOGY : JAVA DOMAIN
S.NO CODE

: IEEE DIGITAL IMAGE PROCESSING
PROJECT TITLE YEAR

01 02

IP 01 IP 02

Multi-body Structure-and-Motion Segmentation by Branch-and-Bound Model Selection Sliding-Window Raptor Codes for Efficient Scalable Wireless Video Broadcasting with Unequal Loss Protection Generic Lossless Visible Watermarking—A New Approach Fusing Local Patterns of Gabor Magnitude and Phase for Face Recognition Data Embedding in JPEG Bit stream by Code Mapping Video Segmentation Based on Motion Coherence of Particles in a Video Sequence Adaptive Non separable Wavelet Transform via Lifting and its Application to Content-Based Image Retrieval Multiplicative Noise Removal Using Variable Splitting and Constrained Optimization Watermarking of Free-view Video Ultrasound De speckling for Contrast Enhancement A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment Cooperation Stimulation Strategies for Peer-to-

2010 2010

03 04 05 06 07

IP 03 IP 04 IP 05 IP 06 IP 07

2010 2010 2010 2010 2010

08 09 10 11 12 13

IP 08 IP 09 IP 10 IP 11 IP 12 IP 13

2010 2010 2010 2010 2010 2010

14 15 16 17 18 19 20 21 22

IP 14 IP 15 IP 16 IP 17 IP 18 IP 19 IP 20 IP 21 IP 22

Peer Wireless Live Video-Sharing Social Networks Soft Edge Smoothness Prior for Color Image Super-Resolution A Shearlet Approach to Edge Analysis and Detection Complex Wavelet Structural Similarity: A New Image Similarity Index A Histogram Modification Framework and Its Application for Image Contrast Enhancement Personal Authentication Using Hand Vein Triangulation and Knuckle Shape Huber Fractal Image Compression Active Mask Segmentation of Fluorescence Microscope Images Color Texture Segmentation Based on the Modal Energy of Deformable Surfaces Entropy Interpretation of the Logarithmic Image Processing Model With Application to Contrast Enhancement A New Look to Multichannel Blind Image Deconvolution Improved Resolution Scalability for Bilevel Image Data in JPEG2000 An Adaptable Image Retrieval System With Relevance Feedback Using Kernel Machines and Selective Sampling A High-Capacity Steganography Scheme for JPEG2000 Baseline System Independent Component Analysis-Based Background Subtraction for Indoor Surveillance Sparse Representation for Color Image Restoration

2009 2009 2009 2009 2009 2009 2009 2009 2009

23 24 25

IP 23 IP 24 IP 25

2009 2009 2009

26 27 28

IP 26 IP 27 IP 28

2009 2008 2008

29 30 31 32 33 34 35 36

IP29 IP30 IP31 IP32 IP33 IP34 IP35 IP36

37 38 39 40

IP37 IP38 IP39 IP40

High-Fidelity Data Embedding for Image Annotation A New Look to Multi channel Blind Image Deconvolution Image Segmentation Using Information Bottleneck Method A Fast Optimization Transfer Algorithm for Image In painting in Wavelet Domains Enhancement of Color Images by Scaling the DCT Coefficients Improved Resolution Scalability for Bilevel Image Data in JPEG2000 A Unified Relevance Feedback Framework for Web Image Retrieval Optimal Spread Spectrum Watermark Embedding via a Multi step Feasibility Formulation Watermarking of Co lour Images in the DCT Domain Using Y Channel A Robust Image Encryption Scheme using StateFeedback Control Color Image Retrieval Using M-Band Wavelet Transform Based Color-Texture Feature A Histogram Modification Framework and Its Application for Image Contrast Enhancement

2008 2008 2008 2008 2008 2008 2008 2008

2008 2008 2008 2008

TECHNOLOGY : JAVA DOMAIN S.NO CODE : IEEE KNOWLEDGE AND DATA MINING PROJECT TITLE YEAR

01 02 03 04 05 06

KD 01 KD 02 KD 03 KD 04 KD 05 KD 06

07 08 09 10 11 12 13

KD 07 KD 08 KD 09 KD 10 KD 11 KD 12 KD 13

MILD: Multiple-Instance Learning via Disambiguation LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs Density Conscious Subspace Clustering for HighDimensional Data Dynamic Dissimilarity Measure for SupportBased Clustering Efficient Algorithm for Localized Support Vector Machine PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects ViDE: A Vision-Based Approach for Deep Web Data Extraction FiVaTech: Page-Level Web Data Extraction from Template Pages Automatic Ontology Matching via Upper Ontologies: A Systematic Evaluation Knowledge-Based Interactive Postmining of Association Rules Using Ontologies Modeling Image Data for Effective Indexing and Retrieval in Large General Image Databases Olex: Effective Rule Learning for Text Categorization Towards Suspicious Behavior Discovery in Video Surveillance System

2010 2010 2010 2010 2010 2010

2010 2010 2010 2010 2009 2009 2009

14 15 16 17 18 19 20 21 22 23 24 25

KD 14 KD 15 KD 16 KD 17 KD 18 KD 19 KD 20 KD 21 KD 22 KD 23 KD 24 KD 25

26 27 28

KD 26 KD 27 KD 28

A Relation-Based Page Rank Algorithm for Semantic Web Search Engines Learning Image-Text Associations A Framework for Clustering Concept-Drifting Categorical Data Communication Perspective on Automatic Text Categorization Predicting Missing Items in Shopping Carts Exact Knowledge Hiding through Database Extension Fast Query Point Movement Techniques for Large CBIR Systems Evaluating the Effectiveness of Personalized Web Search Similarity-Profiled Temporal Association Mining Batch Mode Active Learning with Applications to Text Categorization and Image Retrieval Enhancing Learning Objects with an OntologyBased Memory Using Association Rule Mining to Improve Semantic Web Services Composition Performance Biometric Authentication for Border Control Applications Desktop search in the intranet with integrated desktop search engines A Least Grade Page Replacement Algorithm for Web Cache Optimization

2009 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009 2008

2008 2008 2008

TECHNOLOGY : JAVA DOMAIN S.NO CODE : IEEE NETWORKING PROJECT TITLE YEAR

01

NS 01

02

NS 02

03 04 05 06

NS 03 NS 04 NS 05 NS 06

07 08

NS 07 NS 08

Broadcasting Video Streams Encoded With Arbitrary Bit Rates in Energy-Constrained Mobile TV Networks S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks Rate Control with Pair wise Intersession Network Coding Equilibrium of Heterogeneous Congestion Control: Optimality and Stability Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks Upgrading Mice to Elephants: Effects and EndPoint Solutions Distributed Algorithms for Minimum Cost Multicast With Network Coding Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference Constraints Constrained Relay Node Placement in Wireless Sensor Networks: Formulation and

2010

2010

2010 2010 2010 2010

2010 2010

09 10 11 12

NS 09 NS 10 NS 11 NS 12

2010 2010 2010 2010

Approximations 13 14 NS 13 NS 14 Efficient and Dynamic Routing Topology Inference From End-to-End Measurements Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures Monitoring the Application-Layer DDoS Attacks for Popular Websites Multiple Routing Configurations for Fast IP Network Recovery Improving Locality of Bit Torrent with ISP Cooperation PRIME: Peer-to-Peer Receiver-Driven MeshBased Streaming A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search Capturing Router Congestion and Delay Node Isolation Model and Age-Based Neighbor Selection in Unstructured P2P Networks Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks A Peer-to-Peer Resources Search Algorithm Based on Small-World Model Analysis of Shortest Path Routing for Large MultiHop Wireless Networks Multicast Capacity of Wireless Ad Hoc Networks Evaluating the Vulnerability of Network Traffic 2010 2010

15 16 17 18 19 20

NS 15 NS 16 NS 17 NS 18 NS 19 NS 20

2009 2009 2009 2009 2009 2009

21 22 23 24 25 26 27 28

NS 21 NS 22 NS 23 NS 24 NS 25 NS 26 NS 27 NS 28

2009 2009 2009 2009 2009 2009 2009 2009

Using Joint Security and Routing Analysis 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 NS 29 NS 30 NS 31 NS 32 NS 33 NS34 NS35 NS36 NS37 NS38 NS39 NS40 NS41 NS42 NS43 NS44 NS45 Novel Approach for Computation –Efficient Rekeying for Multicast Key Distribution SIMPS: Using Sociology for Personal Mobility DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks Credit Card Fraud Detection Using Hidden Markov Model Encryption Techniques for the Security of Satellite Images Modeling Node Capture Attacks in Wireless Sensor Networks Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems The Design Trade-Offs of Bit Torrent-Like File Sharing Protocols Honey pot Scheme for Distributed Denial-ofService Attack Vulnerability of Network Traffic under Node Capture Attacks using Circuit Theoretic Analysis P2P File Sharing Software in IPv4/IPv6 Network Design and Implementation of a SIP-based Centralized Multimedia Conferencing System Design and Implementation of Distributed Firewall System for IPv6 A Hypothesis Testing Approach to Semi-fragile Watermark Based Authentication A New RMI Framework for Outdoor Objects Recognition Contributory group key exchange in the presence of malicious participants Schemes for Evaluating Signal Processing 2009 2009 2009 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008 2008

Properties of Audio Watermarking 46 47 48 49 50 51 52 53 NS46 NS47 NS48 NS49 NS50 NS51 NS52 NS53 Double compression in JPEG images 2008

The Evaluation Report of SHA-256 Crypt Analysis 2008 Hash Function Jig DFS: A Secure Distributed File System 2008 General access structures in audio cryptography Improving Locality of Bit Torrent with ISP Cooperation Minimizing File Download Time in Stochastic Peer-to-Peer Networks 2008 2008 2008

Triple DES Algorithm Based Image Watermarking 2008 Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks 2008

TECHNOLOGY : JAVA DOMAIN : IEEE MULTIMEDIA S.NO CODE PROJECT TITLE YEAR

01

M 01

02 03 04 05 06

M 02 M 03 M 04 M 05 M 06

07 08

M 07 M 08

09 10 11

M 09 M 10 M 11

12 13

M 12 M 13

A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization Constructing Concept Lexica With Small Semantic Gaps An Adaptive Computational Model for Salient Object Detection An Adaptive Strategy for Mobile Ad Hoc Media Streaming Video Annotation Through Search and Graph Reinforcement Mining Image Annotation by Graph-Based Inference With Integrated Multiple/Single Instance Representations Network Awareness of P2P Live Streaming Applications: A Measurement Study Fine-Granularity Transmission Distortion Modeling for Video Packet Scheduling Over Mesh Networks Investigating the Scheduling Sensitivity of P2P Video Streaming Coherent Phrase Model for Efficient Image Near Duplicate Retrieval Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor LayerP2P: Using Layered Video Chunks in P2P Live Streaming Content-Based Image Retrieval Using Multi

2010

2010 2010 2010 2010 2010

2010 2010

2009 2009 2009

2009 2008

resolution Color and Texture Features 14 15 16 17 18 19 20 M 14 M 15 M 16 M 17 M 18 M 19 M 20 Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver Locality-Awareness in BitTorrent-Like P2P Applications Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization Analyzing Voice Quality in Popular VoIP Applications Image Retrieval With Relevance Feedback Based on Graph-Theoretic Region Correspondence Estimation Robust Audio Data Hiding Using Correlated Quantization With Histogram-Based Detector Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast 2008 2008 2008 2008 2008 2008 2008

21 22

M 21 M 22

2008 2008

TECHNOLOGY : JAVA DOMAIN S.NO : IEEE AUDIO,SPEECH & VIDEO PROCESSING CODE PROJECT TITLE YEAR

01 02 03 04 05 06

AV 01 AV 02 AV03 AV 04 AV 05 AV 06

Robust Multiplicative Patchwork Method for Audio Watermarking Scalable Audio Compression at Low Bitrates Multiparty Voice over IP (M VoIP) Peer-Based System for Large-Scale Conference Support Extracting Question/Answer Pairs In Multi-Party Meeting Hybrid Signal-and-Link-Parametric Speech Quality Measurement for VoIP Communications Rate-Distortion Optimal Video Transport Over IP Allowing Packets With Bit Errors

2009 2008 2008 2008 2008 2008

TECHNOLOGY : JAVA DOMAIN S.NO : IEEE ARTIFICAL INTELLIGENCE CODE PROJECT TITLE YEAR

01 02 03

AI 01 AI 02 AI 03

04 05 06

AI 04 AI 05 AI 06

Vehicle Number Plate Recognition Using Mathematical Morphology and Neural Networks Vision-Based Eye Blink Monitoring System for Human-Computer Interfacing Multi-modal Interfaces for Interaction Communication between Hearing and Visually Impaired Individuals: Problems & Issues Embedded Vehicle Control System Based on Voice Processing Technologies A Test bed for Voice-Based Robot Control Human Voice Based Wheel Chair Control

2008 2008 2008

2008 2008 2008

TECHNOLOGY : JAVA DOMAIN S.NO : IEEE MOBILE COMPUTING CODE PROJECT TITLE YEAR

01 02 03

MC 01 MC 02 MC 03

Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks

2009

A Novel Scheduled Power Saving Mechanism for 2009 802.11 Wireless LANs MDPF: Minimum Distance Packet Forwarding 2009 for Search Applications in Mobile Ad Hoc Networks Mitigation of Control Channel Jamming under 2009 Node Capture Attacks Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks An Energy Efficient Communication Scheme for Mobile AD HOC Networks Hybrid routing in clustered DTNs with message ferrying Transmission Power Control in Wireless Ad Hoc Networks 2009 2009 2007 2007

04 05 06 07 08

MC 04 MC 05 MC 06 MC 07 MC 08

TECHNOLOGY : JAVA DOMAIN S.NO : IEEE INFORMATION AND FORENSICS SECURITY CODE PROJECT TITLE YEAR

01 02 03 04 05 06 07 08 09 10 11

IF 01 IF 02 IF 03 IF 04 IF 05 IF 06 IF 07 IF 08 IF 09 IF 10 IF 11

Edge Adaptive Image Steganography Based on LSB Matching Revisited Blind Authentication: A Secure Crypto-Biometric Verification Protocol Predictive Network Anomaly Detection and Visualization Lossless Data Embedding in Electronic Inks SVD-Based Universal Spatial Domain Image Steganalysis
Reversible Image Watermarking Using Interpolation Technique

2010 2010 2010 2010 2010 2010 2009 2009 2009 2009 2009

12 13 14

IF 12 IF 13 IF 14

MPSteg-Color: Data Hiding Through Redundant Basis Decomposition Temporal Derivative-Based Spectrum and MelCepstrum Audio Steganalysis Halftone Visual Cryptography Via Error Diffusion A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms Spread-Spectrum Watermarking Security Robust Blind Watermarking of Point-Sampled Geometry

2009 2008 2009

15 16 17 18 19 20 21

IF 15 IF 16 IF 17 IF 18 IF 19 IF 20 IF 21

Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack Multipurpose Watermarking Based on Multiscale Curvelet Transform Cryptographic Secrecy of Steganographic Matrix Embedding Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase A Novel Difference Expansion Transform for Reversible Data Embedding Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Color Image Watermarking Using Multidimensional Fourier Transforms

2008 2008 2008 2008 2008 2008 2008

TECHNOLOGY : JAVA DOMAIN S.NO : IEEE Pattern Analysis & Machine Intelligence CODE PROJECT TITLE YEAR

01 02

PA 01 PA 02

03 04 05 06 07 08 09

PA 03 PA 04 PA 05 PA 06 PA 07 PA 08 PA 09

Using Language to Learn Structured Appearance Models for Image Annotation A Boosting Framework for Visuality-Preserving Distance Metric Learning and Its Application to Medical Image Retrieval Accurate Image Search Using the Contextual Dissimilarity Measure A Nonlinear Derivative Scheme Applied to Edge Detection In the Eye of the Beholder: A Survey of Models for Eyes and Gaze Polynomial Time Algorithms for Ratio Regions and a Variant of Normalized Cut Single-Image Super-Resolution Using Sparse Regression and Natural Image Prior Self-Similarity and Points of Interest Iris Recognition: On the Segmentation of Degraded Images Acquired in the Visible Wavelength Image Segmentation with a Unified Graphical Model A Perceptually Inspired Variation Framework for Color Enhancement Image Transformations and Blurring Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm IRGS: Image Segmentation Using Edge Penalties and Region Growing

2010 2010

2010 2010 2010 2010 2010 2010 2010

10 11 12 13 14

PA 10 PA 11 PA 12 PA 13 PA 14

2010 2009 2009 2009 2009

15 16 17 18 19

PA 15 PA 16 PA 17 PA 18 PA 19

Real World Image Annotation and Retrieval Visual Rank: Applying Page Rank to Large-Scale Image Search Localized Content-Based Image Retrieval

2008 2008 2008

Annotating Images by Mining Image Search 2008 Results A Discriminative Kernel-Based Approach to Rank 2008 Images from Text Queries

TECHNOLOGY : JAVA DOMAIN
S.NO CODE

: IEEE Parallel And Distributed Systems
PROJECT TITLE YEAR

01 02 03 04 05 06

PD 01 PD 02 PD 03 PD 04 PD 05 PD 06

07 08 09 10 11

PD 07 PD 08 PD 09 PD 10 PD 11

12

PD 12

Secure Synchronization of Periodic Updates in Ad Hoc Networks An Analytical Approach to Optimizing Parallel Image Registration/Retrieval Improving Reliability for Application-Layer Multicast Overlays Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems Snoogle: A Search Engine for Pervasive Environments A Cross-Layer Approach-Based Gnutella for Collaborative Virtual Environments over Mobile Ad Hoc Networks Correlation-Based Traffic Analysis Attacks on Anonymity Networks A Hypergraph Approach to Linear Network Coding in Multicast Networks On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic SocioNet: A Social-Based Multimedia Access System for Unstructured P2P Networks An Efficient Superpeer Overlay Construction and Broadcasting Scheme Based on Perfect Difference Graph Toward Systematical Data Scheduling for Layered Streaming in Peer-to-Peer Networks: Can We Go Farther?

2010 2010 2010 2010 2010 2010

2010 2010 2010 2010 2010

2010

13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28

PD 13 PD 14 PD 15 PD 16 PD 17 PD 18 PD 19 PD 20 PD 21 PD 22 PD 23 PD 24 PD 25 PD 26 PD 27 PD 28

mTreebone: A Collaborative Tree-Mesh Overlay 2010 Network for Multicast Video Streaming Efficient Broadcasting Using Network Coding and 2010
Directional Antennas in MANETs A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming Efficient Multicast Algorithms for Multichannel Wireless Mesh Networks A Dynamic Performance-Based Flow Control Method for High-Speed Data Transfer

2010 2010 2010 2009 2009 2009 2009 2009 2009 2009 2009 2009 2008 2008

Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows Delay Asymptotics and Scalability for Peer-toPeer Live Streaming
Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows Scalable Routing in Cyclic Mobile Networks Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions Multipath Dissemination in Regular Mesh Topologies Detecting Malicious Packet Losses Diverse Firewall Design

29

PD 29

Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Systems: Modeling Analysis and Improvement Computation-Efficient Multicast Key Distribution

2008

TECHNOLOGY : JAVA DOMAIN S.NO : IEEE Dependable and Secure Computing CODE PROJECT TITLE YEAR

01 02 03 04 05 06 07

DSC 01 DSC 02 DSC 03 DSC 04 DSC 05 DSC 06 DSC 07

Layered Approach Using Conditional Random Fields for Intrusion Detection In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm An Advanced Hybrid Peer-to-Peer Botnet Error Detection and Fault Tolerance in ECSM Using Input Randomization Security Analysis of the SASI Protocol Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing The Effectiveness of Checksums for Embedded Control Networks

2010 2010 2010 2009 2009 2009 2009

TECHNOLOGY : JAVA DOMAIN S.NO : IEEE Software Engineering CODE PROJECT TITLE YEAR

01 02 03

SW 01 SW 02 SW 03

04 05

SW 04 SW 05

06 07 08 09 10

SW 06 SW 07 SW 08 SW 09 SW 10

Enhanced Modeling and Solution of Layered Queuing Networks COMOM: Efficient Class Oriented Evaluation of Multiclass Performance Models An Investigation Into the Functional Form of the Size-Defect Relationship For Software Modules Optimized Resource Allocation for Software Release Planning Automatic Extraction of Heap ReferenceProperties in Object-Oriented Programs CHARMY: A Framework for Designing andVerifying Architectural Specifications Synthesis of Partial Behavior Models from Properties and Scenarios Identification of Move Method Refactoring Opportunities A Hierarchical Model for Object-Oriented Design Quality Assessment Variability and Reproducibility in Software Engineering: A Study of Four Companies that Developed the same System

2009 2009 2009

2009 2009

2009 2009 2009 2009 2009

Sign up to vote on this title
UsefulNot useful