IEEE Java Projects – IEEE 2013
1. Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework — Data mining
2. Ranking on Data Manifold with Sink Points — Data mining
3. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks — Data mining
4. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse — Data mining
5. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data — Data mining
6. A Survey of XML Tree Patterns — Data mining
7. Region-Based Foldings in Process Discovery — Data mining
8. Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures — Data mining
9. T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence — Data mining
10. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm — Data mining
11. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model — Data mining
12. A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models — Data mining
13. Ontology Matching: State of the Art and Future Challenges — Data mining
14. Large Graph Analysis in the GMine System — Data mining
15. Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies — Data mining
16. A System to Filter Unwanted Messages from OSN User Walls — Data mining
17. A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments — Data mining
18. A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments — Data mining
19. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia — Data mining
20. AML: Efficient Approximate Membership Localization within a Web-Based Join Framework — Data mining
21. Event Tracking for Real-Time Unaware Sensitivity Analysis — Data mining
22. Detecting Intrinsic Loops Underlying Data Manifold — Data mining
23. Clustering Large Probabilistic Graphs — Data mining
24. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering — Data mining
25. Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping — Data mining
26. Finding Rare Classes: Active Learning with Generative and Discriminative Models — Data mining
27. Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models — Data mining
28. Simple Hybrid and Incremental Postpruning Techniques for Rule Induction — Data mining
29. Supporting Search-As-You-Type Using SQL in Databases — Data mining
30. Reinforced Similarity Integration in Image-Rich Information Networks — Data mining
31. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing — Mobile Computing
32. Quality-Differentiated Video Multicast in Multirate Wireless Networks — Mobile Computing
33. EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks — Mobile Computing
34. Capacity of Hybrid Wireless Mesh Networks with Random APs — Mobile Computing
35. Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding — Mobile Computing
36. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation — Mobile Computing
37. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks — Mobile Computing
38. Evaluating Temporal Robustness of Mobile Networks — Mobile Computing
39. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks — Mobile Computing
40. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System — Mobile Computing
41. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity — Mobile Computing
42. An Investigation on LTE Mobility Management — Mobile Computing
43. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks — Mobile Computing
44. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks — Mobile Computing
45. On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks — Mobile Computing
46. Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information — Mobile Computing
47. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks — Mobile Computing
48. Toward a Statistical Framework for Source Anonymity in Sensor Networks — Mobile Computing
49. On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling — Mobile Computing
50. Model-Based Analysis of Wireless System Architectures for Real-Time Applications — Mobile Computing
51. Successive Interference Cancellation: Carving Out MAC Layer Opportunities — Mobile Computing
52. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks — Mobile Computing
53. Group-Based Medium Access Control for IEEE 802.11n Wireless LANs — Mobile Computing
54. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks — Mobile Computing
55. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications — Mobile Computing
56. Secure Communication Based on Ambient Audio — Mobile Computing
57. Importance of Coherence Protocols with Network Applications on Multicore Processors — Multimedia
58. An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs — Multimedia
59. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes — Networking
60. Distance Bounding A Practical Security Solution for Real-Time Location Systems — Networking
61. Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm — Parallel & Dis Systems
62. Network Traffic Classification Using Correlation Information — Parallel & Dis Systems
63. Distributed Web Systems Performance Forecasting Using Turning Bands Method — Parallel & Dis Systems
64. High Performance Resource Allocation Strategies for Computational Economies — Parallel & Dis Systems
65. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks — Parallel & Dis Systems
66. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption — Parallel & Dis Systems
67. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks — Parallel & Dis Systems
68. Adaptive Network Coding for Broadband Wireless Access Networks — Parallel & Dis Systems
69. Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip — Parallel & Dis Systems
70. MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching — Parallel & Dis Systems
71. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision — Parallel & Dis Systems
72. Covering Points of Interest with Mobile Sensors — Parallel & Dis Systems
73. Topology Abstraction Service for IP-VPNs — Parallel & Dis Systems
74. Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller — Parallel & Dis Systems
75. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models — Parallel & Dis Systems
76. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks — Parallel & Dis Systems
77. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks — Parallel & Dis Systems
78. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks — Parallel & Dis Systems
79. Analysis of Distance-Based Location Management in Wireless Communication Networks — Parallel & Dis Systems
80. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks — Parallel & Dis Systems
81. Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery — Parallel & Dis Systems
82. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks — Parallel & Dis Systems
83. Dynamic Coverage of Mobile Sensor Networks — Parallel & Dis Systems
84. In-Network Estimation with Delay Constraints in Wireless Sensor Networks — Parallel & Dis Systems
85. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks — Parallel & Dis Systems
86. Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor — Parallel & Dis Systems
87. IP-Geolocation Mapping for Moderately Connected Internet Regions — Parallel & Dis Systems
88. IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments — Parallel & Dis Systems
89. A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Parallel and Distributed Systems
90. EAACK-A Secure Intrusion-Detection System for MANETs — Secure Computing
91. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks — Signal Processing
92. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper — Signal Processing
93. Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks — Signal Processing
94. The Generalization Ability of Online Algorithms for Dependent Data —- Webmining
95. Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks — Wireless Networks
96. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling — Wireless Networks
97. A Data Fusion Technique for Wireless Ranging Performance Improvement — Wireless Networks
98. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks — Wireless Networks