|
Hi friends do not select he college by seeing Infrastructure. choose the college who are providing good placements. Managents says " 85% sudents placed in top MNC's " don't trust their words ask students who are studying in that college.. All the best
|
Last rank admitted in top colleges in Icet-2012
What is the difference between a web-garden and a web-farm?
What is the difference between a web-garden and a web-farm?
Web garden is a web hosting system. It is a setup of multi processors in single server.Web farm is a web hosting system. It is a multi-server scenario.
Where are cookies actually stored on the hard disk
The storage of cookies on the hard disk depends on OS and the browser. The Netscape navigator on Windows, the file cookies.txt contains all the cookies. The path is :
c:\Program Files\Netscape\Users\username\cookies.txt
The Internet Explorer stores the cookies on a file by name username@website.txt is
c:\Windows\Cookies\username@Website.txt
What is the difference between Client side JavaScript and Server side JavaScript.
Client side java script comprises the basic language and predefined objects which are relevant to running java script in a browser. The client side java script is embedded directly by in the HTML pages. This script is interpreted by the browser at run time.
Server side java script also resembles like client side java script. It has relevant java script which is to run in a server. The server side java scripts are deployed only after compilation
Server side java script also resembles like client side java script. It has relevant java script which is to run in a server. The server side java scripts are deployed only after compilation
CMC Ltd recruiting for freshers and exp at bangalore
CMC is integral part of TCS. CMC Limited is a leading IT solutions company and a subsidiary of Tata Consultancy Services Limited (TCS Ltd ), and is one of the world's leading information technology consulting, services and business process outsourcing organization. We are a part of the Tata group, India's best-known business conglomerate. CMC Ltd. 11/2 Palace Road, Bangalore 560052 Toll free no is : 1800 22 8890 CMC Bangalore : 080- 6694 0684 / 66940680 |
Designation | Trainee Engineer - Bangalore |
Job Description | CJET is a Job Enabling work experience program . This is a candidate self financed On-The-JOB skill development cum work experience program offered by CMC Ltd., a TATA Enterprise. Candidates gain knowledge on cutting edge technologies and are deployed on Software / Infrastructure actual PROJECTS of the company and work in a team along with the Regular employees and so, gain real-time work experience on the Job. If in CMC Ltd, the candidate is put on Direct contract employment in the company for a period with a specified salary.. The candidate gets an opportunity to get extended on the project in the company or get into regular rolls of the company purely on basis of performance only. The placement team of CMC Ltd. will also give interview calls to the candidates so that they get placed in other IT companies leveraging the training or project experience of working with a TATA Enterprise. By Working on projects of CMC Ltd , a Tata Enterprise, does offer a great value to the candidate's resume. On successful completion of the program, the candidate will be awarded the prestigious CMC Certification along with Work Experience Letter. . Please contact the below mentioned telephone numbers for your Interview date.Please . You are required to view the home page mentioned below for information on turnkey software and IT Infrastructure solutions by CMC Ltd. If selected you may get an opportunity to work on these prestigious projects.. |
Desired Profile | Fresher with 1st / 2nd class from 2008/2009 / 2010 / 2011 batches. For walkin interviews kindly refer address/phone nos. below. You may be required to appear for an Aptitude Test , Communication test and technical round. |
Experience | 0 - 1 Years |
Industry Type | IT Software, Software Services |
Role | Software Developer |
Functional Area | Application Programming, Maintenance |
Education | UG - B.Com - Commerce, B.Sc - Any Specialization, B.Tech/B.E. - Any Specialization, Computers, BCA - Computers, Diploma - Any Specialization PG - M.Com - Commerce, MCA - Computers |
Location | Bengaluru/Bangalore |
Keywords | fresher, Engineer, Software, IT, B.E, MCA, networking, hardware, job, IT Jobs |
Contact | Mr Srinath CMC Limited |
Telephone | 91-80-66940680 |
Website | http://www.cmcltd.com , http://www.cmctraining.in |
Job Posted | 28 Sep |
APPLY HERE
IEEE 2011 java project titles
S.N
|
2011 IEEE Project Titles
|
Year
|
Domain
|
1.
|
Forward Correction and Fountain Codes in Delay Tolerant Networks
|
2011/ Java
|
Networking
|
2.
|
A Personalized Ontology Model For Web Information Gathering
|
2011/ .Net
|
Data Mining
|
3.
|
Continuous Neighbor Discovery in Asynchronous Sensor Networks
|
2011/ Java
|
Networking
|
4.
|
Adaptive Provisioning Of Human Expertise In Service-Oriented Systems
|
2011/ .Net
|
Data Mining
|
5.
|
Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
|
2011/ Java
|
Networking
|
6.
|
Bridging Socially-Enhanced Virtual Communities
|
2011/ .Net
|
Networking
|
7.
|
Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration
|
2011/ Java
|
Networking
|
8.
|
Data Integrity Proofs In Cloud Storage
|
2011/ .Net
|
Cloud Computing
|
9.
|
ROC: Resilient Online Coverage for Surveillance Applications
|
2011/ Java
|
Networking
|
10.
|
Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries
|
2011/ .Net
|
Data Mining
|
11.
|
Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud
|
2011/ .Net
|
Data mining
|
12.
|
Live Streaming With Receiver-Based Peer-Division Multiplexing
|
2011/ Java
|
Networking
|
13.
|
Exploring Application-Level Semantics For Data Compression
|
2011/ .Net
|
Data mining
|
14.
|
Optimal Service Pricing For A Cloud Cache
|
2011/ .Net
|
Data Mining
|
15.
|
A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
|
2011/ Java
|
Network Security
|
16.
|
Digital Image hiding using curve let transform
|
2011/ .Net
|
Secure Computing
|
17.
|
A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service
|
2011/ Java
|
Network
|
18.
|
Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
|
2011/ Java
|
Network
|
19.
|
Publishing Search Logs – A Comparative Study Of Privacy Guarantees
|
2011/ .Net
|
Data Mining
|
20.
|
MANET Routing Protocols vs Mobility Models: A Performance Evaluation
|
2011/ Java
|
Network
|
21.
|
The Awareness Network, To Whom Should I Display My Actions And, Whose Actions
|
2011/ .Net
|
Data Mining
|
22.
|
Effective Navigation of Query Results Based on Concept Hierarchies
|
2011/J2EE
|
Data Mining
|
23.
|
Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
|
2011/ .Net
|
Data Mining
|
24.
|
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
|
2011/ .Net
|
Data mining
|
25.
|
Integration Of Sound Signature In Graphical Password Authentication System
|
2011/ .Net
|
Data Mining
|
26.
|
Modeling And Detection Of Camouflaging Worm
|
2011/ Java
|
Secure Computing
|
27.
|
Monitoring Service Systems From A Language-Action Perspective
|
2011/ .Net
|
Service Computing
|
28.
|
One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases
|
2011/ .Net
|
Data mining
|
29.
|
Nymble Blocking Misbehaving Users in Anonymizing Networks
|
2011/ Java
|
Network
|
30.
|
Data Integrity Proofs In Cloud Storage
|
2011/ .Net
|
Software Engineering
|
31.
|
The World In A Nutshell: Concise Range Queries
|
2011/ .Net
|
Data mining
|
32.
|
A Generic Multilevel Architecture For Time Series Prediction
|
2011/ Java
|
Data mining
|
33.
|
Intrusion detection: An Energy efficient approach in heterogeneous WSN
|
2011/ .Net
|
Network Security
|
34.
|
NABS Novel Approaches for Biometric Systems
|
2011/ .Net
|
Secure Computing
|
35.
|
A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts
|
2011/ Java
|
Data mining
|
36.
|
A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm
|
2011/ .Net
|
Data mining
|
37.
|
A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
|
2011/ .Net
|
Data mining
|
38.
|
A Link Analysis Extension Of Correspondence
Analysis For Mining Relational Databases
|
2011/ Java
|
Data mining
|
39.
|
A Dual Framework And Algorithms For Targeted Online Data Delivery
|
2011/ Java
|
Data mining
|
40.
|
Adaptive Cluster Distance Bounding For High-Dimensional Indexing
|
2011/ Java
|
Data mining
|
41.
|
Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
|
2011/ Java
|
Network
|
42.
|
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
|
2011/ Java
|
Network Security
|
43.
|
Clustering with Multi- View Point Based Similarity Measure
|
2011/ Java
|
Data mining
|
44.
|
Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
|
Network
| |
45.
|
Going Back and Forth Efficient Multi deployment and Multi snap shutting on Clouds
|
2011/ Java
|
Cloud Computing
|
46.
|
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
|
2011/ Java
|
Cloud Computing
|
47.
|
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
|
2011/ Java
|
Network
|
48.
|
A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows
|
2011/ Java
|
Network
|
49.
|
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
|
2011/ .Net
|
Network
|
50.
|
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
|
2011/ .Net
|
Network
|
51.
|
Supporting Efficient and Scalable Multicasting over
|
2011/ Java
|
Network
|
52.
|
Throughput Optimization in High Speed Downlink Packet Access
|
2011/ .Net
|
Network
|
53.
|
Sketch4Match-Content Based Image Retrival System Using Sketches
|
2011/ Java
|
Image Processing
|
54.
|
Embedded Extended Visual Cryptography Schemes
|
2011/ Java
|
Secure Computing
|
55.
|
A Competitive Study of Cryptography Techniques over Block Cipher
|
2011/ Java
|
Secure Computing
|
56.
|
Roboust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
|
2011/ Java
|
Multimedia
|
57.
|
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
|
2011/ Java
|
Network Security
|
58.
|
A More Secure Steganography Method in Spatial Domain
|
2011/ Java
|
Secure Computing
|
59.
|
A User-oriented Image Retrieval System Based on Interactive Genetic Algorithm
|
2011/ .Net
|
Image Processing
|
60.
|
A Web Search Engine Based Approach to Measure Semantic Similarity Between Words
|
2011/ .Net
|
Data Mining
|
61.
|
Weighted Energy Detection for Noncoherent Ultra-Wideband Receiver Design
|
2011/ .Net
|
Network
|
62.
|
Problems and Solutions of Web Search Engines
|
2011/ .Net
|
Web Mining
|
63.
|
Adaptive Cluster Distance Bounding for High Dimensional Indexing
|
2011/ Java
|
Data Mining
|
64.
|
Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
|
2011/ .Net
|
Network
|
65.
|
Live Streaming with Receiver-based Peer-division Multiplex in
|
2011/ .Net
|
Network
|
66.
|
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
|
2011/ .Net
|
Network
|
67.
|
Secure High-Throughput Multicast Routing in Wireless Mesh Networks
|
2011/ Java
|
Mobile Computing
|
68.
|
Optimal Stochastic Location Updates in
|
2011/ Java
|
Mobile Computing
|
69.
|
Throughput Optimization in
|
2011/ Java
|
Mobile Computing
|
70.
|
RITAS: Services for Randomized Intrusion Tolerance
|
2011/ Java
|
Network Security
|
71.
|
Selfish Overlay Network Creation and Maintenance
|
2011/ Java
|
Network
|
72.
|
Comparative Evaluation of Spoofing Defenses
|
2011/ Java
|
Network Security
|
73.
|
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
|
2011/ Java
|
Network Security
|
74.
|
Topological Transformation Approaches to TCAM-Based Packet Classification
|
2011/ Java
|
Network
|
75.
|
Ranking Spatial Data by Quality Preferences
|
2011/ Java
|
Data Mining
|
Subscribe to:
Posts (Atom)