2010, 2009, 2008 IEEE Project Titles, Java - Java IEEE 2010, 2009, 2008 Project Titles
2009 JAVA IEEE PROJECT TITLES
PROJECT TITLES & DOMAINS
2010 JAVA IEEE PROJECT TITLES
* A Scalable and Energy Efficient Context Monitoring Framework for Mobile Personal
Domain - Mobile Computing, Year - 2010
* Energy-Efficient VoIP over Wireless LANs
Domain - Mobile Computing, Year - 2010
* Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks
Domain - Mobile Computing, Year - 2010
* MABS Multicast Authentication Based on Batch Signature
Domain - Mobile Computing, Year - 2010
* Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink
Domain - Mobile Computing, Year - 2010
* Optimal Jamming Attack Strategies and Network Defense
Domain - Mobile Computing, Year - 2010
* Secure Data Collection in Wireless Sensor netwoks using Randomised Desperive Routes
Domain - Mobile Computing, Year - 2010
* TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks
Domain - Mobile Computing, Year - 2010
* Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks
Domain - Networking, Year - 2010
* Conditional Shortest Path Routing in Delay Tolerant Networks
Domain - Networking, Year - 2010
* Constrained Relay node placement in Wireless Sensor Network
Domain - Networking, Year - 2010
* Demand-Aware Content Distribution on the Internet
Domain - Networking, Year - 2010
* Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks
Domain - Networking, Year - 2010
* Host-to-Host Congestion Control for TCP
Domain - Networking, Year - 2010
* Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
Domain - Networking, Year - 2010
* Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast
Domain - Networking, Year - 2010
* On Multihop Distances in Wireless Sensor Networks with Random Node Locations
Domain - Networking, Year - 2010
* POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority
Domain - Networking, Year - 2010
* Rendered Path Range-Free Localization in Anisotropic Sensor Networks With Holes
Domain - Networking, Year - 2010
* TCAM Razor A Systematic Approach Towards Minimizing Packet Classifiers in TCAMS
Domain - Networking, Year - 2010
* The Optimality of Two PricesMaximizing Revenue in a stochastic Communication System
Domain - Networking, Year - 2010
* Virtual Database Technology for Distributed Database
Domain - Networking, Year - 2010
* A Distributed Protocol to Serve Dynamic Groups for Peer to Peer Streaming
Domain - Parallel and Distributed Systems, Year - 2010
* Cooperative Caching in Wireless P2P Networks Design Implementation and Evaluation
Domain - Parallel and Distributed Systems, Year - 2010
* IRM Integrated File Replication and Consistency Maintenance
Domain - Parallel and Distributed Systems, Year - 2010
* Privacy-Conscious Location-Based Queries in Mobile Environments
Domain - Parallel and Distributed Systems, Year - 2010
* Effects of Denial of sleep attacks on wireless sensor networks MAC protocols
Domain - Vehicular Technology, year - 2010
* Random access Transport Capacity
Domain - Wireless Communications, Year - 2010
* Adaptive Multi-Node Incremental Relaying for Hybrid-ARQ in AF Relay Networks
Domain - Wireless Communications, Year - 2010
* Ensuring Data Storage Security in Cloud Computing
Domain - Cloud Computing, Year - 2010
* Upper Bounds for Dynamic Memory Allocation
Domain - Computers, Year - 2010
* Data Mining Techniques For Dynamically Classifying And Analyzing Library Database
Domain - Datamining, Year - 2010
Domain - Datamining, Year - 2010
* Layered Approach Using Conditional Random Fields for Intrusion Detection
Domain - Dependable and Secure Computing, Year - 2010
* SiGFree Asignature based free buffer overflow attack blocker
Domain - Dependable and Secure Computing, Year - 2010
* Secure Data Objects Replication in Data Grid
Domain - Dependable and Secure Computing, Year - 2010
* Analysis of Computational Time of Simple Estimation of Distribution Algorithms
Domain - Evolutionary Computation, Year - 2010
* Unequal Power Allocation for JPEG Transmission Over MIMO Systems
Domain - Image Processing, Year - 2010
* An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature
Domain - Information Forensics And Security, Year - 2010
* Adaptive Join Operators for Result Rate optimization
Domain - Knowledge and Data Engineering, Year - 2010
* False Negative Problem of Counting Bloom Filter
Domain - Knowledge and Data Engineering, Year - 2010
* FiVaTech Page-Level Web Data Extraction from Template Pages
Domain - Knowledge and Data Engineering, Year - 2010
* k-Anonymity in the Presence of External Databases
Domain - Knowledge and Data Engineering, Year - 2010
* LIGHT A Query-Efficient Yet Low-Maintenance --DHT
Domain - Knowledge and Data Engineering, Year - 2010
* PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
Domain - Knowledge and Data Engineering, Year - 2010
* Prospective Infectious Disease Outbreak detection using Markov switching model
Domain - Knowledge and Data Engineering, Year - 2010
* Queries Optimization in SQL using Linear Recursion
Domain - Knowledge and Data Engineering, Year - 2010
----------------------------------------------------------------------------------------------------------
www.ncct.in, ncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
----------------------------------------------------------------------------------------------------------
* A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice
Domain - Mobile Computing, Year - 2009
* Contention-Aware Performance Analysis of Mobility-Assisted Routing
Domain - Mobile Computing, Year - 2009
* Energy Maps For Mobile Wireless networks coherence Time Versus Spreading Period
Domain - Mobile Computing, Year - 2009
* Energy-Efficient SINR-Based Routing for Multihop Wireless
Domain - Mobile Computing, Year - 2009
* Mobility Management Approaches for Mobile IP Networks
Domain - Mobile Computing, Year - 2009
* Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks
Domain - Mobile Computing, Year - 2009
* RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks
Domain - Mobile Computing, Year - 2009
* Continuous Monitoring of Spatial Queries in Wireless Broadcast
Domain - Mobile Computing, Year - 2009
* Large Connectivity for Dynamic Random Geometric Graphs
Domain - Mobile Computing, Year - 2009
* Mitigation of Control Channel Jamming Under Node Capture Attacks
Domain - Mobile Computing, Year - 2009
* Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos
Domain - Multimedia, Year - 2009
* Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
Domain - Network Computing, Year - 2009
* A New Reliable Broadcasting in Mobile Ad Hoc Networks
Domain - Network Security, Year - 2009
* A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution
Domain - Network Security, Year - 2009
* Anonymity in Wireless Broadcast Networks
Domain - Network Security, Year - 2009
* Capturing Router Congestion and Delay
Domain - Networking, Year - 2009
* Channel Access Protocols for Multihop Opportunistic Networks, Challenges and Recent Developments
Domain - Networking, Year - 2009
* Entropy Based Adaptive Flow Aggregation
Domain - Networking, Year - 2009
* Measuring Capacity Bandwidth of Targeted Path Segments
Domain - Networking, Year - 2009
* Monitoring the Application-Layer DDoS Attacks for Popular Websites
Domain - Networking, Year - 2009
* Multiple Routing Configurations for Fast IP Network Recovery
Domain - Networking, Year - 2009
* Node Isolation model and age-based neighbor selection in unstructured P2P networks
Domain - Networking, Year - 2009
* SIMPS Using Sociology for Personal Mobility
Domain - Networking, Year - 2009
* Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
Domain - Networking, Year - 2009
* Optimal Bandwidth Assignment for Multiple Descriptions Coding in Media Streaming
Domain - Networking, Year - 2009
* Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions
Domain - Neural Networks, Year - 2009
* Detecting Malicious Packet Losses
Domain - Parallel and Distributed Systems, Year - 2009
* Dynamic Routing with Security Considerations
Domain - Parallel and Distributed Systems, Year - 2009
* Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks
Domain - Parallel and Distributed Systems, Year - 2009
* Virtual-Force-Based Geometric Routing Protocol in MANETs
Domain - Parallel and Distributed Systems, Year - 2009
* CHARMY: A Framework for Designing and Verifying Architectural Specifications
Domain - Software Engineering, Year - 2009
* Optimized Resource Allocation for Software Release Planning
Domain - Software Engineering, Year - 2009
* Multi-Service Load Sharing for Resource Management in the CellularWLAN Integrated Network
Domain - Wireless Communications, Year - 2009
* Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks
Domain - Wireless Communications, Year - 2009
* Robust cooperative routing protocol in mobile wireless sensor networks
Domain - Wireless Communications, Year - 2009
* Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks
Domain - Wireless Communications, Year - 2009
* SIR – analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets
Domain - Wireless Communications, Year - 2009
* Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
Domain - Biomedicine, Year - 2009
* Continuous Flow Wireless Data Broadcasting for High Speed Environments
Domain - Broadcasting, Year - 2009
* Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary
Domain - Communications, Year - 2009
* SAT- Solving Approaches to Context-Aware Enterprise Network Security Management
Domain - Communications, Year - 2009
* Collusive piracy prevention in P2P content delivery network
Domain - Computers, Year - 2009
* Evaluating the Vulnerability of Network Traffic Using Joint
Domain - Dependable and Secure Computing, Year - 2009
* Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
Domain - Dependable and Secure Computing, Year - 2009
* Security Analysis of the SASI Protocol
Domain - Dependable and Secure Computing, Year - 2009
* A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment
Domain - Distributed Computing, Year - 2009
* Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos
Domain - Image Processing, Year - 2009
* Hierarchical Bayesian sparse image reconstruction with application to MRFM
Domain - Image Processing, Year - 2009
* EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks
Domain - Industrial Informatics, Year - 2009
* SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks
Domain - Information Forensics and Security, Year - 2009
* Agent Mining: The Synergy of Agents and Data Mining
Domain - Intelligent Systems, Year - 2009
* DAIOS - Efficient Dynamic Web Service Invocation
Domain - Internet Computing, Year - 2009
* Approximate Distributed K-Means Clustering over a Peer-to-Peer Network
Domain - Knowledge and Data Engineering, Year - 2009
* OLEX : effective Rule Learning for Text Categorization
Domain - Knowledge and Data Engineering, Year - 2009
* ANGEL - Enhancing the Utility of Generalization for Privacy Preserving Publication
Domain - Knowledge and Data Engineering, Year - 2009
* Efficient Range Query Processing in Peer-to-Peer Systems
Domain - Knowledge and Data Engineering, Year - 2009
----------------------------------------------------------------------------------------------------------
www.ncct.in, ncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
----------------------------------------------------------------------------------------------------------
2008 JAVA IEEE PROJECT TITLES
* Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless
Domain - Mobile Computing, Year - 2008
* Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
Domain - Mobile Computing, Year - 2008
* Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Domain - Mobile Computing, Year - 2008
* BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
Domain - Network Computing, Year - 2008
* Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
Domain - Network Computing, Year - 2008
* Securing User-Controlled Routing Infrastructures
Domain - Network Computing, Year - 2008
* Two Techniques for Fast Computation of Constrained Shortest Paths
Domain - Network Computing, Year - 2008
* Scalable and Efficient End-To-End Network Topology Inference
Domain - Network Computing, Year - 2008
* Enhanced Communal Global, Local Memory Management for Effective Performance of Cluster Computing
Domain - Network Security, Year - 2008
* A Geometric Approach to Improving Active Packet Loss Measurement
Domain - Networking, Year - 2008
* Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion
Domain - Networking, Year - 2008
* Minimizing File Download Time in Stochastic Peer-to-Peer Networks
Domain - Networking, Year - 2008
* Packet caches on Routers the Implications of Universal Redundant Traffic Elimination
Domain - Networking, Year - 2008
* Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
Domain - Networking, Year - 2008
* Cryptographic versus Trust based Method for Manet Routing Security
Domain - Networking, Year - 2008
* A Survey of Learning-Based Techniques of Email Spam Filtering
Domain - Neural Networks, Year - 2008
* A Tree-Based Peer-to-Peer Network with Quality Guarantees
Domain - Parallel and Distributed Systems, Year - 2008
* Computation Efficient Multicast Key Distribution
Domain - Parallel and Distributed Systems, Year - 2008
* Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Domain - Parallel and Distributed Systems, Year - 2008
* Peer talk a Peer-to-Peer Multi-Party Voice-Over-IP System
Domain - Parallel and Distributed Systems, Year - 2008
* QUIVER Consistent Object Sharing For Edge Services
Domain - Parallel and Distributed Systems, Year - 2008
* The Server Reassignment Problem for Load Balancing in Structured P2P Systems
Domain - Parallel and Distributed Systems, Year - 2008
* Continuous Delivery Message Dissemination Problems Under the Multicasting Communication Mode
Domain - Parallel and Distributed Systems, Year - 2008
* Optimal State Allocation for Multicast Communications with Explicit Multicast Forwarding
Domain - Parallel and Distributed Systems, Year - 2008
* Modeling & Automated Containment of Worms
Domain - Secure Computing, Year - 2008
* Using the Conceptual Cohesion of Classes for Fault Prediction in Objectoriented Systems
Domain - Software Engineering, Year - 2008
* Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies
Domain - Software Systems For Secure Systems, Year - 2008
* Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol
Domain - Computer and Communication Engineering, Year - 2008
* High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths
Domain - Consumer Electronics, Year - 2008
* Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments
Domain - Data Engineering, Year - 2008
* Online Index Recommendations for High-Dimensional Databases Using Query Workloads
Domain - Data Mining, Year - 2008
* BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
Domain - Data Mining, Year - 2008
* Controlling IP Spoofing Through Inter Domain Packet Filters
Domain - Dependable and Secure Computing, Year - 2008
* A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
Domain - Dependable and Secure Computing, Year - 2008
* Face Recognition for Smart Recognitions
Domain - Gesture Recognition, Year - 2008
* Protection of Database Security via Collaborative Inference Detection
Domain - Intelligence and Security Informatics, Year - 2008
* A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern
Domain - Knowledge and Data Engineering, Year - 2008
* Distributed Suffix Tree Overlay for Peer-to-Peer Search
Domain - Knowledge and Data Engineering, Year - 2008
* Probabilistic Group Nearest Neighbor Queries in Uncertain Databases
Domain - Knowledge and Data Engineering, Year - 2008
* Truth Discovery with multiple Conflicting Information Providers on web
Domain - Knowledge and Data Engineering, Year - 2008
* C-TREND Temporal Cluster Graphs for Identifying and Visualizing Trends in Multi attribute Transactional Data
Domain - Knowledge and Data Engineering, Year - 2008
* An Efficient Association Rule Mining Algorithm In Distributed Databases
Domain - Knowledge Discovery and Data Mining, Year - 2008
* An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis
Domain - Knowledge Discovery and Data Mining, Year - 2008
----------------------------------------------------------------------------------------------------------
www.ncct.in, ncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
----------------------------------------------------------------------------------------------------------
* Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs
Domain - Computer Science & Network Security, Year - 2007
* An Adaptive Programming Model for Fault Tolerant Distributed Computing
Domain - Dependable and Secure Computing, Year - 2007
* Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
Domain - Dependable and Secure Computing, Year - 2007
* Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm
Domain - Intelligent and Advanced Systems, Year - 2007
* An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net
Domain - Machine Learning And Cybernetics, Year - 2007
* A Self Repairing Tree Topology Enabling Content based Routing in Mobile Ad Hoc Networks
Domain - Mobile Computing, Year - 2007
* An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs
Domain - Mobile Computing, Year - 2007
* A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
Domain - Parallel and Distributed Systems, Year - 2007
* A New Operational Transformation Framework for Real-Time Group Editors
Domain - Parallel and Distributed Systems, Year - 2007
* Dynamic Load Balancing in Distributed Systems in the Presence of Delays A Regeneration-Theory Approach
Domain - Parallel and Distributed Systems, Year - 2007
* OCGRR - A New Scheduling Algorithm for Differentiated Services Networks
Domain - Parallel and Distributed Systems, Year - 2007
* Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Domain - Parallel and Distributed Systems, Year - 2007
* A Wireless Distributed Intrusion Detection System and a New Attack Model
Domain - Computers and Communications, Year - 2006
* Building Intelligent Shopping Assistants Using Individual Consumer Models
Domain - Data mining, Year - 2005
* GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions
Domain - Data Mining, Year - 2005
* Mobile Objects and Mobile Agents: The Future of Distributed Computing
Domain - Distributed Computing, Year - 2004
* ODAM An Optimized Distributed Association Rule Mining Algorithm
Domain - Distributed Systems, Year - 2004
* A Reputation based Trust Model for Peer to Peer E - Commerce Communities
Domain - E-Commerce Technology, Year - 2003
* Noise Reduction by Fuzzy Image Filtering
Domain - Fuzzy Systems, Year - 2003
* Image Transformation using Grid
Domain - Image Processing, Year - 2006
* A Memory Learning Framework for Effective Image Retrieval
Domain - Image Processing, Year - 2005
* Application of BPCS steganography to wavelet compressed video
Domain - Image Processing, Year - 2004
* Identification of Humans Using Gait
Domain - Image Processing, Year - 2004
* Structure & Texture Filling-In of Missing Image Blocks in Wireless Transmission & Compress
Domain - Image Processing, Year - 2003
* Network Topology against Distributed Denial of Service Attacks DDOS
Domain - Information Forensics and Security, Year - 2006
* Personal Authentication Using 3-D Finger Geometry
Domain - Information Forensics and Security, Year - 2006
* E-Secure Transactions - Secure Electronic Data Interchange over Internet
Domain - Internet Computing, Year - 2005
* A Location-Based Routing Method for Mobile Ad Hoc Networks
Domain - Mobile Computing, Year - 2005
* Benefit based Data Caching in Ad Hoc Networks
Domain - Mobile Computing, Year - 2005
* Distributed Cache Updating for the Dynamic Source Routing Protocol
Domain - Mobile Computing, Year - 2005
* A Novel Secure Communication Protocol for Ad Hoc Networks [SCP]
Domain - Mobile Computing, Year - 2004
* Scalable Wireless Adapt Network Simulator Using XTC
Domain - Mobile Computing, Year - 2004
* Slow Start Algorithm Improvement of TCP Performance
Mobile Computing, Year - 2004
* Authenticating Network Attached Storage
Domain - Network & Distributed System, Year - 2003
* A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
Domain - Networking, Year - 2006
* Online Detection and Prevention of Phishing Attacks
Domain - Networking, Year - 2006
* A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
Domain - Networking, Year - 2004
* Incremental deployment service of Hop by hop multicast routing protocol
Domain - Networking, Year - 2004
* Network Border Patrol For Congestion Collapse Preventing
Domain - Networking, Year - 2004
* TCP-LP Low-Priority Service via End-Point Congestion Control
Domain - Networking, Year - 2003
* AI NET - A network that integrates ATM and IP
Domain - Networking, Year - 2002
* Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups
Domain - Networking, Year - 2002
* Dynamic Parallel Access to Replicated Content in the Internet
Domain - Networking, Year - 2002
* ITP: An Image Transport Protocol for the Internet
Domain - Networking, Year - 2002
* Face Recognition using Laplacian Faces
Domain - Pattern Analysis and Machine Intelligence, Year - 2005
* Online Handwritten Script Recognition
Domain - Pattern Analysis and Machine Intelligence, Year - 2004
* Modeling Peer-Peer File Sharing Systems
Domain - Web Intelligence, Year - 2003
* Unified Network Monitoring For Web Technology
Domain - Web Technology, Year - 2003
* Personal Identification Based On Iris Texture Analysis
Year - 2003
* Location-Aided Routing (LAR) in Mobile Ad Hoc Networks
Domain - Wireless Networks, Year - 2000
* Location based Service Routing
Year - 2005
* A Multi-Layered and Multi-Faceted Framework for Mining Evolving Web Click Streams
* Coupling based metrics for measuring the quality of a software
* Demonstration of Secure Sockets Layer Protocol Working and Implementation
* Information Retrieval from Web Search using Keyword Spices
* Security in large Mediator Protocols
* SybilGuard Defending Against Sybil Attacks via Social Networks
* User Authentication based on Human Typing Pattern with Artificial Neural Networks and Support Vector Machine
* Towards Multimodal Interfaces for Intrusion Detection
Domain - Computer Networks
* Distributed Data Mining in Credit Card Fraud Detection
Domain - Datamining & Intelligent Systems
* E Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management
Domain - Innovative Computing
* Secured Password Based Protocol For Downloading A Private Key
Domain - Network and Distributed System
* A Software Defect Report and Tracking System in an Intranet
Domain - Software Maintenance and Reengineering
----------------------------------------------------------------------------------------------------------
www.ncct.in, ncctchennai@gmail.com
044-28235816, 98411 93224, 93801 02891
----------------------------------------------------------------------------------------------------------
No comments:
Post a Comment