• Networking
  • Parallel And Distributed Systems
  • Mobile Computing
  • Knowledge And Data Engineering
  • Computational Intelligence And Security
  • Advance Computing
  • Information Technology In Biomedicine
  • Dependable And Secure Computing
  • Image Processing
  • Software Engineering
  • Multimedia

  • JAVA IEEE TITLES-2010
  • Parallel And Distributed Systems-19
  • 1. Privacy-Conscious Location-Based Queries in Mobile Environments- 2010
  • 2. On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network – 2010
  • 3. IRM: Integrated File Replication and Consistency Maintenance in P2P Systems – 2010
  • 4. Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks- 2010
  • 5. Engineering Wireless Mesh Networks: Joint Scheduling, Routing, Power Control, and Rate Adaptation- 2010
  • 6. Congestion Control Of Transmission Control Protocol Based On Bandwidth Estimation – 2010
  • 7. A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming – 2010
  • 8. Conditional Shortest Path Routing in Delay Tolerant Networks- 2010
  • 9. Cross-Layer Design for QoS Support in Multihop Wireless Networks – 2010
  • 10. Distributed Algorithms for Minimum Cost Multicast with Network Coding in Wreless Networks – 2010
  • 11. Fast Algorithms for Resource Allocation in Wireless Cellular Networks- 2010
  • 12. Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast- 2010
  • 13. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks- 2010
  • 14. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability- 2010
  • 15. Efficient and Dynamic Routing Topology Inference From End-to-End Measurements- 2010
  • 16. A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks- 2010
  • 17. A Review of the Applications of Agent Technology in Traffic and Transportation Systems- 2010
  • 18. POPI: A User-level Tool for Inferring Router Packet Forwarding Priority– 2010
  • 19. Achieving Network Level Privacy in Wireless Sensor Networks – 2010
  • Mobile Computing-7
  • 20. Layered Approach Using Conditional Random Fields for Intrusion Detection- 2010
  • 21. Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks- 2010
  • 22. Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks- 2010
  • 23. Bandwidth Recycling in IEEE 802.16 Networks- 2010
  • 24. KTR: an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services – 2010
  • 25. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks- 2010
  • 26. Lightweight Fault-tolerance Mechanism for Distributed Mobile Agent-based Monitoring- 2010
  • Knowledge And Data Engineering-2
  • 27. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains– 2010
  • 28. Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks – 2010

  • DOT NET IEEE TITLES-2010
  • Parallel And Distributed Systems-13
  • 29. An AbuseFree Fair Contract Signing Protocol Based on the RSA Signature- 2010
  • 30. Toward Optimal Network Fault Correction in Externally Managed Overlay Networks- 2010
  • 31. Slow Adaptive OFDMA Systems Through Chance Constrained Programming- 2010
  • 32. A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks – 2010
  • 33. Throughput Analysis for a Contention-Based Dynamic Spectrum Sharing Model- 2010
  • 34. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability- 2010
  • 35. Uncertainty Modeling and Reduction in MANETs- 2010
  • 36. Collaborative Sensing to Improve Information Quality for Target Tracking in Wireless Sensor Networks- 2010
  • 37. Fast Algorithms for Resource Allocation in Wireless Cellular Networks- 2010
  • 38. Dynamic Multichannel Access With Imperfect Channel State Detection- 2010
  • 39. Conditional Shortest Path Routing in Delay Tolerant Networks-2010
  • 40. Equilibrium of Heterogeneous Congestion Control: Optimality and Stability- 2010
  • 41. Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management- 2010
  • Mobile Computing-2
  • 42. Dynamic Authentication for cross-realm SOA-Based Business Processes- 2010
  • 43. SigFree: A Signature-free Buffer Overflow Attack Blocker-2010
  • Cloud Computing-2
  • 44. Ensuring Data Storage Security in Cloud Computing– 2010
  • 45. Fuzzy Keyword Search over Encrypted Data in Cloud Computing- 2010
  • Knowledge And Data Engineering-5
  • 46. Anonymous Query Processing in Road Networks – 2010
  • 47. Bayesian Classifiers Programmed in SQL- 2010
  • 48. PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects- 2010
  • 49. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs- 2010
  • 50. AI and Opinion Mining- 2010

  • JAVA IEEE TITLES-2009
  • Networking-6
  • 51. Capturing Router Congestion and Delay– 2009
  • 52. Monitoring the Application-Layer DDoS Attacks for Popular Websites – 2009
  • 53. Secure and Policy-Compliant Source Routing-2009
  • 54. SIMPS: Using Sociology for Personal Mobility-2009
  • 55. Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures– 2009
  • 56. Web User-Session Inference by Means of Clustering Techniques- 2009
  • 57. Residuala based estimation of peer and link lifetimes in peer to peer networks- 2009
  • Parallel And Distributed Systems-13
  • 58. A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions - 2009
  • 59. Application-Based Collision Avoidance in Wireless Sensor Networks– 2009
  • 60. Detecting Malicious Packet Losses – 2009
  • 61. Distributed Algorithms for Constructing Approximate Minimum Spanning Tree in Wireless Sensor
  • Networks – 2009
  • 62. Dynamic Routing with Security Considerations– 2009
  • 63. Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks– 2009
  • 64. Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows– 2009
  • 65. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis– 2009
  • 66. Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of
  • Attacks– 2009
  • 67. Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks – 2009
  • 68. Multipath Dissemination in Regular Mesh Topologies - 2009
  • 69. Multipath Routing in Wireless Mesh Networks – 2009
  • 70. Multiple Routing Configurations for Fast IP Network Recovery – 2009
  • Mobile Computing-5
  • 71. Cell Breathing Techniques for Load Balancing in Wireless LANs - 2009
  • 72. Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments- 2009
  • 73. Mitigation of Control Channel Jamming under Node Capture Attacks – 2009
  • 74. Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use
  • Recommendations – 2009
  • 75. Route Stability in MANETs under the Random Direction Mobility Model - 2009
  • Computational Intelligence And Security-1
  • 76. A Clustering-Based Evolutionary Algorithm for Traveling Salesman Problem- 2009
  • Knowledge And Data Engineering-6
  • 77. English to Spanish Translation of Signboard Images from Mobile Phone Camera – 2009
  • 78. Interactive Correction and Recommendation for Computer Language Learning and Training - 2009
  • 79. NNexus: An Automatic Linker for Collaborative Web-Based Corpora - 2009
  • 80. Privacy-Preserving Data Mashup - 2009
  • 81. Ranking and Suggesting Popular Items - 2009
  • 82. SQL/XML Hierarchical Query Performance Analysis in an XML-Enabled Database System- 2009
  • 83. Study on intelligent E-Shopping system based on datamining.- 2009
  • Dependable And Secure Computing-3
  • 84. Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing- 2009
  • 85. The Effectiveness of Checksums for Embedded Control Networks- 2009
  • 86. Security Analysis of the SASI Protocol– 2009
  • Image Processing-1
  • 87. Morphological Background Detection and Enhancement of Images With Poor Lighting- 2009
  • Multimedia-1
  • 88. Image Retargeting Using Mesh Parameterization - 2009
  • Advance Computing-1
  • 89. Combinatorial Approach for Preventing SQL Injection Attacks– 2009
  • Information Technology In Biomedicine-1
  • 90. Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontologies- 2009
  • 91. Design a Secure Electronic Voting System for Thailand's Election- 2009
  • 92. Effective and efficient query processing for video subsequent identification - 2009


  • .net IEEE TITLES
  • Networking-8
  • 93. A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks. – 2009
  • 94. Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks. – 2009
  • 95. Cell Breathing Techniques for Load Balancing in Wireless LANs. – 2009
  • 96. Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks. – 2009
  • 97. Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications. – 2009
  • 98. Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services.– 2009
  • 99. Route Stability in MANETs under the Random Direction Mobility Model. – 2009
  • 100. Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths. – 2009
  • 101. A Gen2 based RFID Authentication protocol for security and privacy- 2009


  • JAVA IEEE TITLES-2008
  • Networking-4
  • 102. A Geometric Approach to Improving Active Packet Loss Measurement– 2008
  • 103. Detecting and Preventing IP-spoofed Distributed DoS Attacks– -2008
  • 104. Statistical Techniques for Detecting Traffic Anomalies Through Packet Header Data-2008
  • 105. Two Techniques for Fast Computation of Constrained Shortest Paths-2008
  • Parallel And Distributed Systems-3
  • 106. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries– 2008
  • 107. Runtime Locality Optimizations of Distributed Java Applications– 2008
  • 108. Strategyproof Mechanisms for Scheduling Divisible Loads in Bus-Networked Distributed Systems– 2008
  • 109. Quiver- Final- 2008
  • Mobile Computing-1
  • 110. Efficient Resource Allocation for Wireless Multicast- 2008
  • Knowledge And Data Engineering-12
  • 111. A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns –2008
  • 112. A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Sites- 2008
  • 113. An Efficient Reference-based Approach to Outlier Detection in Large Datasets - 2008
  • 114. Automatic Extraction of Useful Facet Hierarchies from Text Databases - 2008
  • 115. Ranked Reverse Nearest Neighbor Search - 2008
  • 116. C-TREND: Temporal Cluster Graphs for Identifying and Visualizing Trends in Multiattribute Transactional Data -- 2008
  • 117. Employing Clustering Techniques for Automatic Information Extraction From HTML Documents-2008
  • 118. Incentive-Based Scheduling for Market-LikeComputational Grids-2008
  • 119. Online Index Recommendations for High-Dimensional Databases Using Query Workloads-2008
  • 120. Ranked Reverse Nearest Neighbor Search-2008
  • 121. Skyline Query Processing for Incomplete Data-2008
  • 122. Truth Discovery with Multiple Conflicting Information Providers on the Web-2008
  • 123. WARM: Mining weighted association rules without preassigned weights -2008
  • Image Processing-3
  • 124. A Lossless Compression Scheme for Bayer Color Filter Array Images- 2008
  • 125. Image Restoration Using Space-Variant Gaussian Scale Mixtures in Overcomplete Pyramids– 2008
  • 126. Vision Processing for Realtime 3-D Data Acquisition Based on Coded Structured Light-2008
  • Dependable And Secure Computing-3
  • 127. Controlling IP Spoofing through Interdomain Packet Filters– 2008
  • 128. Temporal Partitioning of Communication Resources in an Integrated Architecture-2008
  • 129. Trustworthy Computing under Resource Constraints with the DOWN Policy-2008
  • Software Engineering-3
  • 130. The Effect of Pairs in Program Design Tasks-2008
  • 131. WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation – 2008
  • 132. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems - 2008


  • DOT NET IEEE TITLES-2008
  • Networking-4
  • 133. A Distributed database architecture for global roaming in next generation Mobile Networks– 2008
  • 134. Greedy routing with Anti void traversal for wireless sensors-2008
  • 135. Grid Services discovery with Rough Sets-2008
  • 136. Neural Networks for Unicode optical character Recognition– 2008
  • Parallel And Distributed Systems-3
  • 137. Medicare MediClaims– 2008
  • 138. Retail outlet Operator– 2008
  • 139. Secure Net Auction--– 2008
  • 140. Techno Task Management---2008
  • 141. Web Database Explorer—2008
  • 142. Work Flow Mining---2008
  • 143. Citizen Card System—2008
  • 144. Credit Card Fraud Detection– -2008
  • JAVA IEEE TITLES
  • 145. Anonymizing Classi_cation Data for Privacy Preservation- 2007
  • 146. Cost-Sensitive-Data Preprocessing for Mining Customer Relationship Management Databases- 2007
  • 147. Dynamic Load Balancing in Distributed Systems in the Presence of Delays A Regeneration-Theory Approach- 2007
  • 148. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes-2007
  • 149. Route Reservation in Ad Hoc Wireless Networks- 2007
  • 150. Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-DemandStreaming Media Delivery- 2006
  • 151. Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover’s Distance (EMD) - 2006
  • 152. SIGF: A Family of Con_gurable, Secure Routing Protocols for Wireless Sensor Networks- 2006
  • 153. A New Approach for Authentication Technique
  • 154. SPRINT: A Scalable Parallel Classifier for Data Mining
  • 155. Online Mining (Recently) Maximal Frequent Itemsets over Data Streams- 2005
  • 156. VOICE-TO-PHONEME CONVERSION ALGORITHMS FOR SPEAKER-INDEPENDENT VOICE-TAG APPLICATIONS IN EMBEDDED PLATFORMS- 2005
  • 157. Multicast with Network Coding in Application-Layer Overlay Networks- 2004
  • 158. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression Applications- 2003

Click here
[ Download ]

Download the IEEE domain list and Checkup the topic you are interested in...
Download available on the right side , move your mouse over the right side area!!