Vous êtes sur la page 1sur 6

JAVA

TECHNOLOGY: JAVA DOMAIN: IEEE TRANSACTIONS ON NETWORKING S.NO 1 PROJECT CODE SCJNW02 PROJECT TITLES DESCRIPTION

Stabilization of Flood In this project we discuss a family of four flood Sequencing Protocols in Sensor sequencing protocols that use sequence numbers to Networks distinguish between fresh and redundant flood messages. These four protocols are: a sequencing free protocol, a linear sequencing protocol, a circular sequencing protocol, and a differentiated sequencing protocol.

SCJNW03

Update scheduling for This project is to schedule state updates according improving consistency in to Distributed Virtual Environments (DVEs) distributed virtual environments potential impacts on consistency. In DVEs, the perceptions of participants are affected by both the spatial magnitude and temporal duration of inconsistency in the virtual world. Using the metric of time-space inconsistency, we analytically derive the optimal update schedules for minimizing the impact of inconsistency. Group-Based Negotiations in In this project we propose a novel peer group P2P System joining protocol. We introduce a highly expressive resource negotiation language, able to support the specification of a large variety of conditions applying to single peers or groups of peers. Predictable high performance In this project we present a design and Computing using Feedback and implementation of a predictable HPC system using admission control feedback control and admission control. By creating a virtualized application layer and opportunistically multiplexing concurrent applications through the application of formal control theory, we regulate a job progress such s that the job meets its deadline without requiring exclusive access to resources even in the presence of a wide class of unexpected events.

SCJNW06

SCJNW08

SCJNW11

Lightweight Online In this project, a new performance monitoring Performance Monitoring and approach called Embedded Gossip (EG) is Tuning with Embedded Gossip designed to enable lightweight online performance monitoring and tuning. Privacy-Aware Spam Filtering Collaborative In this project, a privacy-aware framework for collaborative spam filtering, preserving message transformation technique that is highly resilient against the latest kinds of spam attacks.

SCJNW12

SCJNW15

SBNNW12

SBJNW07

Plexus: A Scalable Peer-to-Peer In this project, Plexus, a peer-to-peer search Protocol Enabling Efficient protocol that provides an efficient mechanism for Subset Search advertising a bit sequence (pattern), and discovering it using any subset of its 1-bits. Detecting Malicious Packet In this paper, we consider the problem of detecting Losses whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Privacy-Aware Collaborative In this project we fully deal about the concept of Spam Filtering enormous spam e-mails directed at large numbers of recipients, designing effective collaborative anti-spam systems raises several important research challenges. Since e-mails may contain confidential information, any collaborative antispam approach has to guarantee strong privacy protection to the participating entities.. Robust Rate Control for In this project we are going to investigate a novel Heterogeneous Network Access robust flow control framework for heterogeneous in Multi homed Environments network access by devices with multi homing capabilities. The multitude and variety of existing and emerging wireless and wired networking technologies continue to be the driving force toward convergence of networks. It is commonplace today to have electronic devices

10

SBJNW14

with multiple networking capabilities. Personal computing devices, e.g., laptops, ultra-mobile PCs (UMPCs), PDAs, and smartphones

TECHNOLOGY: JAVA DOMAIN: IEEE TRANSACTIONS ON DATA MINING S.NO 11 PROJECT CODE SCJDM02 PROJECT TITLES DESCRIPTION

Deriving Concept-Based User In this project we focus on search engine Profiles from Search Engine personalization and develop several conceptLogs based user profiling methods that are based on both positive and negative preferences. We evaluate the proposed methods against our previously proposed personalized query clustering method. Experimental results show that profiles which capture and utilize both of the users positive and negative preferences perform the best.

12

SCJDM07

13

SCJDM15

14

SBJDM07

Managing Multidimensional In this project a P2P-based framework Historical Aggregate Data in supporting the extraction of aggregates from Unstructured P2P Networks historical multidimensional data is proposed, which provides efficient and robust query evaluation. A Signature-Based Indexing We propose a signature-based indexing method Method for Efficient Content- to optimize the storage and retrieval of a Based Retrieval of Relative relative datas from the large database. datas. Progressive Parametric Query In this project we approach a new technique Optimization called Progressive Parametric Query Optimization. In the Real world, commercial applications usually rely on precompiled parameterized procedures to interact with a database. Unfortunately, executing a procedure with a set of parameters different from those used at compilation time may be arbitrarily suboptimal. Parametric query optimization (PQO) attempts to solve this problem by exhaustively determining the optimal plans at each point of the parameter space at compile time.

TECHNOLOGY: JAVA DOMAIN: IEEE TRANSACTIONS ON NETWORK SECURITY

S.NO 15

PROJECT CODE SCJNS02

PROJECT TITLES An Advanced Hybrid Peer-toPeer Botnet

DESCRIPTION In this project, we present the design of an advanced hybrid peer-to-peer botnet. Compared with current botnets, the proposed botnet is harder to be shut down, monitored, and hijacked. It provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster. In the field of computer networking and other packet-switched telecommunication networks, the traffic engineering term quality of service (QoS) refers to resource reservation control mechanisms rather than the achieved service quality. Quality of service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow In this project we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm in short). The C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. This project, we focus on a common type of MANET that is formed on a temporary basis, and present a secure, efficient, and a fully no interactive admission technique geared for this type of a network. In this project Location Guarda location hiding technique for securing overlay file storage systems from targeted file attacks

16

ITJNS05

On the Quality of Service of Crash-Recovery Failure Detectors

17

SCJNS06

Modeling and Detection Camouflaging Worm

of

18

SCJNS07

Efficient Node Admission and Certificate less Secure Communication in Short-Lived MANETs Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach

19

SCJNS08

20

SCJNS10

21

SCJNS11 (SBJNS08)

Efficient and Secure Content Content services such as content filtering and Processing and Distribution by transcoding adapt contents to meet system Cooperative Intermediaries. requirements, display capacities, or user preferences Security in Large Networks This project presents quantum key distribution Using Mediator Protocols protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography

TECHNOLOGY: JAVA DOMAIN: IEEE TRANSACTIONS MOBILE COMPUTING S.NO 22 PROJECT CODE SCJMC03 PROJECT TITLES DESCRIPTION

Optimize Storage Placement In this project the objective is to address the in Sensor Networks storage node placement problem aiming to minimize the total energy cost for gathering data to the storage nodes and replying queries.

23

SBJMC01

Message Authentication in Computationally Constrained Environments

24

SBJMC04

Efficient Broadcasting in Mobile Ad Hoc Networks

25

SBJMC06

A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks

Message integrity and authenticity, and replay prevention, are essential in security-related communications. Here, a receiver is expected to be able to verify that a received message, originally transmitted by a valid source, was not changed. Also, the receiver has to verify that the message was not transmitted by a cloned source, and is not a retransmission of an originally genuine message transmitted in the past by a valid source. In this Project we approach a Efficient way of Broad casting in Mobile Ad hoc Network. This project presents two efficient broadcasting algorithms based on 1-hop neighbor information.We propose an efficient senderbased broadcasting algorithm based on 1-hop neighbor information that reduces the time complexity of computing forwarding nodes to On. In this paper we proposes a new centralized clustering method for a data collection mechanism in wireless sensor networks, which is based on network energy maps and Quality-ofService (QoS) requirements because nowadays the main challenge in wireless sensor network deployment pertains to optimizing energy consumption when collecting data from sensor nodes. The clustering problem is modeled as a hypergraph partitioning and its resolution is based on a tabu search heuristic.