You are on page 1of 3

ECWAY TECHNOLOGIES

IEEE PROJECTS & SOFTWARE DEVELOPMENTS NO.23/A, SKS COMPLEX, OPP. BUS STAND, KARUR -639 001. TAMILNADU. CELL: (0) 98949 17187. VISIT: www.ecwaytechnologies.com MAIL TO: ecwaytechnologies@gmail.com

2012 IEEE JAVA & .NET TITLES


1. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 2. A Probabilistic Model of Visual Cryptography Scheme With

BASE PAPER DOWNLOAD LINK


http://www.4shared.com/rar/aG8_a-Rj/IEEE_2012-_A_Novel_Data_Embedd.html

http://www.4shared.com/rar/8tsyGhIH/IEEE_2012-_A_Probabilistic_Mod.html

Dynamic Group 3. A Secure Intrusion detection system against DDOS attack in


http://www.4shared.com/rar/5plvWrHf/IEEE_2012-__A_Secure_Intrusion.html

Wireless Mobile Ad1 4. Active Visual Segmentation 5. AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies 6. An Efficient Adaptive Deadlock-Free Routing Algorithm for

http://www.4shared.com/rar/gbIVG7NH/IEEE_2012-_Active_Visual_Segme.html http://www.4shared.com/rar/9jv_t0BU/IEEE_2012-_AMPLE_An_Adaptive_T.html

http://www.4shared.com/rar/OY8PoEgn/IEEE_2012-_An_Efficient_Adapti.html

Torus Networks 7. Characterizing the Efficacy of the NRL Network Pump in


http://www.4shared.com/rar/vUPQFPwb/IEEE_2012-_Characterizing_the_.html

Mitigating Covert Timing Channels 8. Cooperative download in vehicular environments 9. Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points 10. Design and Implementation of TARF A Trust-Aware Routing

http://www.4shared.com/rar/cRNY_Oy5/IEEE_2012-_Cooperative_downloa.html http://www.4shared.com/rar/xaDbwwmp/IEEE_2012-_Defenses_Against_La.html

http://www.4shared.com/rar/H_JTgyhR/IEEE_2012-__Design_and_Impleme.html

Framework for WSNs 11. Discovering Characterizations of the Behavior of Anomalous


http://www.4shared.com/rar/b3rmLh_I/IEEE_2012-_Discovering_Charact.html

Sub-populations 12. Efficient Audit Service Outsourcing for Data Integrity in Clouds 13. Ensuring Distributed Accountability for Data Sharing in the Cloud

http://www.4shared.com/rar/kT9-KURs/IEEE_2012-__Efficient_Audit_Se.html http://www.4shared.com/rar/vrq3o3jD/IEEE_2012-_Ensuring_Distribute.html

14. Fast Matrix Embedding by Matrix Extending 15. FireCol A Collaborative Protection Network for the Detection of Flooding DDoS Attacks 16. Learn to Personalized Image Search from the Photo Sharing

http://www.4shared.com/rar/VUKnwypV/IEEE_2012-_Fast_Matrix_Embeddi.html http://www.4shared.com/rar/TpB4_fAj/IEEE_2012-_FireCol_A_Collabora.html

http://www.4shared.com/rar/HszDPsZt/IEEE_2012-_Learn_to_Personaliz.html

Websites 17. Load Balancing Multipath Switching System with Flow Slice 18. Network Assisted Mobile Computing with Optimal Uplink Query Processing 19. Outsourced Similarity Search on Metric Data Assets 20. Privacy- and Integrity-Preserving Range Queries in Sensor Networks 21. Query Planning for Continuous Aggregation Queries over a

http://www.4shared.com/rar/E9WHLy0Y/IEEE_2012-_Load_Balancing_Mult.html http://www.4shared.com/rar/87c6fD66/IEEE_2012-_Network_Assisted_Mo.html http://www.4shared.com/rar/zrjhSUTu/IEEE_2012-_Outsourced_Similari.html http://www.4shared.com/rar/yAzqYcaw/IEEE_2012-_Privacy-_and_Integr.html

http://www.4shared.com/rar/Kl9ZV7yL/IEEE_2012-_Query_Planning_for_.html

Network of Data Aggregators 22. Ranking Model Adaptation for Domain-Specific Search 23. Risk-Aware Mitigation for MANET Routing Attacks 24. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 25. Semi supervised Biased Maximum Margin Analysis for Interactive

http://www.4shared.com/rar/PRJBy1I_/IEEE_2012-_Ranking_Model_Adapt.html http://www.4shared.com/rar/-40-TP7e/IEEE_2012-_Risk-Aware_Mitigati.html http://www.4shared.com/rar/5qPM1M1w/IEEE_2012-_Scalable_and_Secure.html

http://www.4shared.com/rar/h76cuRSE/IEEE_2012-_Semisupervised_Bias.html

Image Retrieval 26. SPOC A Secure and Privacy preserving Opportunistic Computing
http://www.4shared.com/rar/cyPh929y/IEEE_2012-_SPOC_A_Secure_and_P.html

Framework for Mobile Healthcare Emergency 27. The Three-Tier Security Scheme in Wireless Sensor Networks
http://www.4shared.com/rar/-TcSw9g_/IEEE_2012-_The_Three-Tier_Secu.html

with Mobile Sinks 28. Topology Control in Mobile Ad Hoc Networks with Cooperative
http://www.4shared.com/rar/oUQly3UF/IEEE_2012-_Topology_Control_in.html

Communications 29. Towards Accurate Mobile Sensor Network Localization in Noisy


http://www.4shared.com/rar/WXchCTTa/IEEE_2012-_Towards_Accurate_Mo.html

Environments 30. View-invariant action recognition based on Artificial Neural


http://www.4shared.com/rar/yIyEbJZz/IEEE_2012-_View-invariant_acti.html

Networks 31. Fast Data Collection in Tree-Based Wireless Sensor Networks 32. Packet-Hiding Methods for Preventing Selective Jamming Attacks 33. Distributed Throughput Maximization in Wireless Networks via Random Power Allocation

http://www.4shared.com/rar/LaVL0xLM/IEEE_2012-_Fast_Data_Collectio.html http://www.4shared.com/rar/IBUMSNLK/IEEE_2012-_Packet-Hiding_Metho.html

34. Automatic Reconfiguration for Large-Scale Reliable Storage Systems 35. A New Cell Counting Based Attack Against Tor

You might also like