Search This Blog

Saturday, 21 January 2012

IEEE Technical Seminar Topics With Pdf's


1. Enhancing Service Federation Trustworthiness through Online Testing 


2. Are Our Online "Friends" Really Friends? 


3. Rural Outsourcing: Delivering ITO and BPO Services from Remote Domestic Locations 


4. Using Process Mining to Bridge the Gap between BI and BPM 


5. Are Password Requirements too Difficult? 



6. Turning on the Lights for Wireless Communications 

7. The iPlant Collaborative: Cyberinfrastructure to Feed the World 


8. Defending against Buffer-Overflow Vulnerabilities 


9. Human Ear Recognition 


10. Securing the Internet of Things 


11. OpenFlow: The Next Generation of the Network?



12. Using Data Mining to Help Design Sustainable Products


13. Biomedical Visual Computing: Case Studies and Challenges

14. Motivation, Awareness, and Perceptions of Computational Science


15. XML Management for Bioinformatics Applications


16. Climate Change Modeling: Computational Opportunities and Challenges


17. Improving Face Recognition Performance Using RBPCA MaxLike and Information Fusion


18. Video-Based Distance Traffic Analysis: Application to Vehicle Tracking and Counting


19. Buying a House, Then and Now


20. Mentoring and Making a Difference: What Can One Person Do?


21. NaturaSketch: Modeling from Images and Natural Sketches


22. Photosketcher: Interactive Sketch-Based Image Synthesis


23. 3D Rotations

24. The Third Wave in Computer Graphics and Interactive Techniques


25. Computer Graphics: From Desktop to Mobile and Web


26. How the Ocean Personality Model Affects the Perception of Crowds


27. Enabling Web Services to Consume and Produce Large Datasets


28. Changing the World


29. Public Sector Clouds Beginning to Blossom: Efficiency, New Culture Trumping Security Fears


30. A Framework for Integrating, Exploring, and Searching Location-Based Web Data


31. Toward Lossless Video Transport


32. Securing Database as a Service: Issues and Compromises


33. Operations with Degraded Security


34. Cloud Computing: A Records and Information Management Perspective


35. Small Is Beautiful, Big Is Inevitable


36. Detecting Fraud on Websites


37. Understanding Cloud Computing Vulnerabilities


38. Verification, Validation, and Evaluation in Information Security Risk Management


39. Monitoring Cloud Computing by Layer, Part 1


40. Securing E-passports with Elliptic Curves


41. Model-Based Testing


42. Access Control in JavaScript


43. Requirements Analysis: The Next Generation









No comments:

Post a Comment