S.No | IEEE 2011 / 2012 NS2 Project Titles | Domain | IEEE YEAR |
1 | Dynamics of Network Connectivity in Urban Vehicular Networks | Communications | 2011 / 2012 |
2 | Delaying Transmissions in Data Communication Networks to Improve Transport-Layer Performance | Communications | 2011 / 2012 |
3 | Performance Modeling of Message Dissemination In Vehicular Ad Hoc Networks with Priority |
Communications | 2011 / 2012 |
4 | A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks | Communications | 2011 / 2012 |
5 | An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks | Communications | 2011 / 2012 |
6 | Sybil Attacks Detection in Vehicular Ad Hoc Networks | Communications | 2011 / 2012 |
7 | RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications | Communications | 2011 / 2012 |
8 | Design and Evaluation of a Proxy Cache for Peer-to-Peer Traffic | Computers | 2011 / 2012 |
9 | Exploiting Heterogeneity in P2P Video Streaming | Computers | 2011 / 2012 |
10 | A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks |
Computers | 2011 / 2012 |
11 | Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks | Dependable and Secure | 2011 / 2012 |
12 | A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks | Dependable and Secure | 2011 / 2012 |
13 | Modeling and Detection of Camouflaging Worm | Dependable and Secure | 2011 / 2012 |
14 | Comparative Evaluation of Spoofing Defenses | Dependable and Secure | 2011 / 2012 |
15 | A Policy Enforcing Mechanism for Trusted Ad Hoc Networks | Dependable and Secure | 2011 / 2012 |
16 | Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing | Mobile Computing | 2011 / 2012 |
17 | Fault Localization Using Passive End-to-End Measurements and Sequential Testing for Wireless Sensor Networks |
Mobile Computing | 2011 / 2012 |
18 | Fast Data Collection in Tree-Based Wireless Sensor Networks | Mobile Computing | 2011 / 2012 |
19 | On Reliable Broadcast in Low Duty-Cycle Wireless Sensor Networks | Mobile Computing | 2011 / 2012 |
20 | Efficient Data Collection in Wireless Sensor Networks with Path-Constrained Mobile Sinks | Mobile Computing | 2011 / 2012 |
21 | A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks | Mobile Computing | 2011 / 2012 |
22 | Estimating Parameters of Multiple Heterogeneous Target Objects Using Composite Sensor Nodes | Mobile Computing | 2011 / 2012 |
23 | Stateless Multicast Protocol for Ad-Hoc Networks | Mobile Computing | 2011 / 2012 |
24 | Localization of Mobile Nodes in Wireless Networks with Correlated in Time Measurement Noise | Mobile Computing | 2011 / 2012 |
25 | Network Connectivity with a Family of Group Mobility Models | Mobile Computing | 2011 / 2012 |
26 | Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries | Mobile Computing | 2011 / 2012 |
27 | Throughput Optimization in Mobile Backbone Networks | Mobile Computing | 2011 / 2012 |
28 | Explicit Congestion Control Algorithms for Time Varying Capacity Media | Mobile Computing | 2011 / 2012 |
29 | Modeling and Improving TCP Performance over Cellular Link with Variable Bandwidth | Mobile Computing | 2011 / 2012 |
30 | A Control-Theoretic Approach to Distributed Optimal Configuration of 802.11 WLANs | Mobile Computing | 2011 / 2012 |
31 | Endpoint-Based Call Admission Control and Resource Management for VoWLAN |
Mobile Computing | 2011 / 2012 |
32 | Spatial-Temporal Coverage Optimization in Wireless Sensor Networks | Mobile Computing | 2011 / 2012 |
33 | Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks | Mobile Computing | 2011 / 2012 |
34 | Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks | Mobile Computing | 2011 / 2012 |
35 | Efficient Data Collection in Wireless Sensor Networks with Path-Constrained Mobile Sinks | Mobile Computing | 2011 / 2012 |
36 | Flexible Broadcasting of Scalable Video Streams to Heterogeneous Mobile Devices | Mobile Computing | 2011 / 2012 |
37 | A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention | Mobile Computing | 2011 / 2012 |
38 | Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and Cross-Layer Optimization for Scalable Video Streaming | Mobile Computing | 2011 / 2012 |
39 | Modeling Nonsaturated IEEE 802.11 DCF Networks Utilizing an Arbitrary Buffer Size | Mobile Computing | 2011 / 2012 |
40 | Wireless Fountain Coding with IEEE 802.11e Block ACK for Media Streaming in Wireline-cum-WiFi Network: A Performance Study | Mobile Computing | 2011 / 2012 |
41 | An Analysis of IEEE 802.11 DCF and Its Application to Energy-Efficient Relaying in Multi-Hop Ad-Hoc Networks | Mobile Computing | 2011 / 2012 |
42 | A Practical Adaptive Pacing Scheme for TCP in Multihop Wireless Networks | Mobile Computing | 2011 / 2012 |
43 | Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure |
Mobile Computing | 2011 / 2012 |
44 | On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks | Mobile Computing | 2011 / 2012 |
45 | Secure High-Throughput Multicast Routing in Wireless Mesh Networks | Mobile Computing | 2011 / 2012 |
46 | Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients | Mobile Computing | 2011 / 2012 |
47 | Secure Multihop Network Programming with Multiple One-Way Key Chains |
Mobile Computing | 2011 / 2012 |
48 | Energy-Efficient Multicasting of Scalable Video Streams Over WiMAX Networks | Multimedia | 2011 / 2012 |
49 | Superchunk-Based Efficient Search in P2P-VoD System | Multimedia | 2011 / 2012 |
50 | Simple Model for Chunk-Scheduling Strategies in P2P Streaming | Multimedia | 2011 / 2012 |
51 | Monitoring the Impact of P2P Users on a Broadband Operator’s Network over Time |
Multimedia | 2011 / 2012 |
52 | Link-State Routing With Hop-by-Hop Forwarding Can Achieve Optimal Traffic Engineering | Networking | 2011 / 2012 |
53 | A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows | Networking | 2011 / 2012 |
54 | Using Link Gradients to Predict the Impact of Network Latency on Multitier Applications | Networking | 2011 / 2012 |
55 | Impact of File Arrivals and Departures on Buffer Sizing in Core Routers | Networking | 2011 / 2012 |
56 | Efficient Network Modification to Improve QoS Stability at Failures | Networking | 2011 / 2012 |
57 | Anomalous Loss Performance for Mixed Real-Time and TCP Traffic in Routers With Very Small Buffers |
Networking | 2011 / 2012 |
58 | Fast Recovery From Dual-Link or Single-Node Failures in IP Networks Using Tunneling | Networking | 2011 / 2012 |
59 | An Optimal Algorithm for Relay Node Assignment in Cooperative Ad Hoc Networks | Networking | 2011 / 2012 |
60 | The Limit of Information Propagation Speed in Large-Scale Multihop Wireless Networks | Networking | 2011 / 2012 |
61 | Detecting Communities in Sparse MANETs | Networking | 2011 / 2012 |
62 | A Simple Critical-Load-Based CAC Scheme for IEEE 802.11 DCF Networks | Networking | 2011 / 2012 |
63 | On the Price of Security in Large-Scale Wireless Ad Hoc Networks | Networking | 2011 / 2012 |
64 | Prediction or Not? An Energy-Efficient Framework for Clustering-Based Data Collection in Wireless Sensor Networks | Parallel And Distributed Systems | 2011 / 2012 |
65 | Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks | Parallel And Distributed Systems | 2011 / 2012 |
66 | Load Balance with Imperfect Information in Structured Peer-to-Peer Systems | Parallel And Distributed Systems | 2011 / 2012 |
67 | The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks |
Parallel And Distributed Systems | 2011 / 2012 |
68 | Privacy in VoIP Networks: Flow Analysis Attacks and Defense | Parallel And Distributed Systems | 2011 / 2012 |
69 | Mechanism Design-Based Secure Leader Election Model Intrusion Detection in MANET |
Secure Computing | 2011 / 2012 |
70 | Blocking Misbehaving Users in Anonymizing Networks | Secure Computing | 2011 / 2012 |
71 | Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET | Secure Computing | 2011 / 2012 |
72 | Loss Performance Modeling for Hierarchical Heterogeneous Wireless Networks With Speed-Sensitive Call Admission Control |
Vehicular Technology | 2011 / 2012 |
73 | Communication Cost Minimization in Wireless Sensor and Actor Networks for Road Surveillance |
Vehicular Technology | 2011 / 2012 |
74 | Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design | Wireless Communications | 2011 / 2012 |
75 | Optimal Selective Forwarding for Energy Saving in Wireless Sensor Networks | Wireless Communications | 2011 / 2012 |
76 | Transient Analysis of IEEE 802.15.4 Sensor Networks | Wireless Communications | 2011 / 2012 |