1001 seminars topics for computer science latest
#1

1.Dynamic Virtual Private Network
2.Site Search Engine
3.Smart Fabrics
4.BAR CODES
5.A Plan For No Spam
6.Telephony Routing over IP
7.Fiber Distributed Data Interface
8.Unicode And Multilingual Computing
9.multi-wordnets
10.Time Complexity
11.Data Security in Local Network using Distributed Firewalls
12.Quadrics Interconnection Network
13.Digital Video Editing
14.Management Information System
15.Concurrent Programming and Parallel distributed O.S.
16.Blade Servers
17.JIRO Java-based technology
18.TouchFLO Technology
19.Facility Layout Design using Genetic Algorithm
20.LAN PROTOCOL
21.Integrating Structural Design and Formal Methods in RealTime System Design
22.Genetic Programming
23.Autonomic Computing
24.Quantum teleportation
25.Information Extraction from structured & Semi-structured data
26.Jini Technology
27.Haptics
28.Oracle RDBMS
29.Cryptography and steganography
30.Polymer Memory
31.Artificial Intelligence in Machines
32.Embeded Systems
33.Mining the Web: Searching, Integration and Discovery
34.Recognition of VoIP Speech
35.Tablet-pc
36.Fluorescent Multilayer Disc (FMD
37.Voice Routing over IP Telephony
38.Middleware for Wireless Sensor Networks
39.SUNSPOT (wireless sensor network
40.Real Time Application Interface
41.Middleware in Embedded Systems
42.HIGH SPEED LANS
43.Gigabit networking
44.QoS in Cellular Networks Based on MPT
45.Computational Geometry in Drug Design
46.Distributed database management system
47.Split Range Synchronization
48.Location Independent Naming
49.Wisenet
50.MAC address
51.Multimedia Broadcasting via Satellite
52.Quantum computing
53.Financial Forecasting
54.Parasitic Computing
55.Holographic Versatile Disc
56.Diamond chip
57.TOUCH SCREEN SSTEM
58.Future of business Computing
59.ARRAS AND SENSORS
60.Pervasive computing
61.Server side Java
62.BRAIN FINGER PRINT TECHNOLOG
63.Digital Rights Management
64.Wearable computers
65.Multimedia Broadcasting via Satellite
66.GIMP
67.Technotask management
68.Sky X Technology
69.Broad Band Over Power Line
70.Real- Time Systems and Real- Time Operating Systems
71.Fine-grained Access Control in Databases
72.Facial Recognition System
73.Vertical Cavity Surface Emitting Laser
74.EDGE
75.Pen Drive
76.Interupts
77.Geographic Versatile Dist
78.DYNAMIC SOURCE ROUTING PROTOCOL
79.Conditional Access System
80.Intel MMX Technology
81.Acid rains
82.Dynamic Cache Management Technique
83.Viruses and Worms
84.Visualization and Computer Graphics
85.Ubiquitous Networking
86.Parallel Computing In Remote Sensing Data Processing
87.Issues in Middleware for Pervasive Computing
88.Java Cryptography Architecture (JCA
89.Network Attached Storage
90.Recovery in Main Memory Databases
91.Peer to peer Networking
92.Nanorobotics
93.Object Persistence
94.Cyber Crime and Security
95.Layered versioning for software configuration management
96.Reconfigurable Hardware in Wireless communication
97.Dynamic resource allocation in Grid Computing
98.Modular Computing
99.Lucid Linx
100.Smart Card Standards
101.Fusion Memory
102.E-wallet
103.BARCODES
104.Global System for Mobiles
105.Neural networks and applications
106.Choreography
107.Microcontroller Based Automation
108.Integer Fast Fourier Transform
109.multimedia-oriented web based instructional system
110.Internet Searching
111.Compressed Domain Processing And Video Information System
112.Wireless Fidelity
113.Trends in Mobiles & PC’s
114.VOIP Over Wireless LAN
115.64-Bit Computing
116.Satellite Radio
117.Query Processing on Data Streams
118.Ultra-Wideband
119.Globalization
120.Probabilistic I/o Automata
121.Emerging trends in robotics using neural networks
122.RAID
123.Samba Fileserver(38
124.Micro Total analysis systems
125.GABOR Wavelet
126.A cognitive radio approach for using of virtual unlicensed spectrum
127.Virtual P.C
128.Middleware architecture for Pervasive computing
129.Software model checking
130.The MBMS
131.Uniprocessor Virtual Memory Without TLBS
132.Grid Computing
133.Cyberterrorism
134.Reconfigurable computing
135.Gnu Emacs
136.Night Vision Technology
137.Migration From GSM Network To GPRS
138.Space Mouse
139.Blue Gene
140.HomeRF
141.Security threats in the World Wide Web
142.Blogs & their Creation
143.Biometrics
144.Generic Framing Procedure
145.Data Mining concepts & Models
146.BRAIN FINGER
147.Lixto suite
148.Bio-Molecular Computing
149.The MBMS
150.ELLICA
151.Tape Drive Technologies - LTO (linear tape open) & SDLTS (Super Digital Linear Tape)
152.DataBase Migration
153.Database Security
154.Bluetooth Based Smart Sensor Networks
155.Wimax
156.Multiple client’s communication
157.Security Issues In GRID COMPUTING
158.Computerized Paper Evaluation using Neural Network
159.The Mbone And Multicasting
160.Evolution of computers
161.Virtual P.C.
162.Hacking
163.Wi-Fi (802.11b
164.Soft computing
165.Y2K38
166.Opera (web browser)
167.Blue Ray - Future of DVD's
168.Leave Mgnt System
169.BRAIN FINGER PRINT TECHNOLOGY
170.Adding Intelligence to Internet
171.Distributed Interactive Virtual Environment
172.Serial ATA (SATA
173.Encrypted Text chat Using Bluetooth
174.AMD Processors
175.Light emitting polymers
176.Unified Modeling Language (UML)
177.Fuzzified Computer-Automated Crane Control System
178.Voice Portals
179.HomeRF-localized wireless technology optimized for the home environment
180.VOIP Security
181.USB Tape Drives
182.Micro chip production using extreme uv lithography
183.MANETS: Mobile Adhoc Networks
184.Dynamic Memory Allocation
185.Next Generation Secure Computing Base
186.C#
187.NANO TECHONOLGY
188.Surface-conduction Electron-emitter Display (SED
189.RED TACTON
190.Dataset Query algorithms in Streaming Mining
191.Laptop Computer
192.VoiceXML
193.On-line Analytical Processing (OLAP)
194.Speed protocol processors
195.Virtual keyboard
196.Layer 3 Switching
197.Rapid Prototyping
198.Web Search Results' Ranking: PageRank, HITS and Related Work
199.Blue Eyes
200.VQ In Converging Telephony And Ip Networks
201.Software Code Security
202.Channel Allocation Algortihms for Mobile Telephony
203.Cd,dvd,ird
204.Digital Light Processing
205.Computer Forensics
206.Personal Satellite assistant Systems
207.Web Spam
208.Brain computer interface & systems
209.Backup and Recovery planning
210.Enterprise Security
211.Efficiency / Comparative study of routing schemes in event based systems
212.Wireless technology
213.DNA Computing~
214.Plasma Displays
215.DRUG DISCOVERY
216.Third Generation
217.Cisco IOS Firewall
218.TCPA / Palladium
219.Mobile agent
220.Blu Ray Disc
221.Datbase management
222.Stereoscopic Projection Systems
223.Inverse Multiplexing
224.Embedded Linux
225.Smart card
226.Optimization of Protocol Stack for wireless networks
227.BLUE RAY DISKS
228.E-Commerce
229.Attacks on Smart Cards
230.DNA Based computer
231.MANET
232.Serial Attached SCSI
233.GRASSHOPPER Operating System
234.Query Optimization
235.Power Line Networking
236.Mail server Management
237.Virtual LAN Technology
238.Signal Processing for Networking
239.Etl tools(informatica)
240.Virtual Campus
241.Cable Modems
242.Unified Communication
243.Software Testing & Quality Assurance
244.Optical Switching
245.CRYONICS
246.Root cause Localization and analysis of faults[Autonomic Computing]
247.Network Modeling and Simulation
248.Hurd
249.Mesh Radio
250.Real time communication in wireless sensor networks
251.Biological Computers
252.COMPLIERS
253.Project Oxygen
254.GPS
255.Narrow Band and Broad Band ISDN
256.Java Messaging Service (JMS
257.ARGUMENTED VIRTUAL REALIT
258.Inter-Operabilty of 802
259.Cryogenic Processor
260.Cyborgs
261.Revolutions in the Operating System and Servers
262.Handheld Computers
263.Aspect-oriented programming (Aop
264.SPINTRONICS
265.Porting Device Drivers For The Solaris
266.FireWire
267.SAM
268.Blue-ray disk
269.Online software Distribution
270.Voice Over Internet Protocol
271.Linux Kernel 2.6
272.Form Processing
273.Gesture recognition
274.Crusoe Processors
275.Wi-Fi Hotspots
276.NVSRAM- Non Volatile Static RAM
277.REAL TIME OPERATING SYSTEM
278.Voice Roaming
279.3D Searching
280.ZFS File system
281.DNA Based Computing
282.Neural Networks And Their Applications
283.High Speed Data In Mobile Networks
284.Ovonic Unified Memory
285.Internet Cryptopraphy
286.Microcontroller Based Power Theft Identification
287.Forecasting using Double Exponential Smoothing Method
288.Nano computing
289.Magnetic RAM
290.Computer Memory Based on the Protein Bacterio-rhodopsin
291.Digital Rights Management
292.Plasma Displays
293.BRIAN GATE TECHNOLOGY
294.Cluster Computing
295.Small Computer System Interface
296.Data Management in Sensor Networks
297.Parallel computing
298.Magnetic Random Access Memory
299.PHANToM
300.Netowork Security
301.Automatic number plate recognition
302.Fire walls
303.BioComputers
304.Authoring environments for open source courseware
305.Symbian OS
306.Transient Stability Assessment using Neural Networks
307.Optical canoflague
308.Speech Application Language Tags
309.QoS in VoIP
310.Unbiquitos Smart Homes
311.Java Class Loader
312.Quantum Information Technology
313.MAIN FRAMES
314.Co-operative LINUX
315.Samba Fileserver
316.Data Warehouse
317.Application of ANN in Data Mining of Medical Images
318.Digital Subscriber Line
319.Radio Frequency Light Sources
320.Voice Over Internet Protocol
321.Cluster computing
322.Software Architecture Analysis
323.GSM
324.Aeronautical Communication
325.Graphical Processing Unit
326.Computational neuroscience
327.SUNSPOT (wireless sensor network)
328.Hapics
329.Optical networking
330.Orthogonal Frequency Division Multiplplexing
331.Teleportation
332.Fault Tolerance in Virtual Machine Environments
333.M-Commerce
334.Global Positioning System
335.Dataflow machines
336.Search Images By Appearance
337.Open Source Technology
338.Short Message Service (SMS)
339.Bio-Medical Instrumentation and Signal analysis
340.CRPTOGRAPHY AND N/W SECURITY
341.Dual Core Processor
342.Pluggable Authentication Modules (Pam
343.New Age Graphics
344.Secure Computing
345.Software advances in wireless communication (Cognitive Radio, Dynamic spectrum Access, etc.
346.Optical Disc Data Security
347.Reliable Multicast
348.Scheduling algorithm
349.NRAM
350.Web servers
351.CASP
352.Dashboard
353.Semi-supervised Learning using Graph Kernels
354.Tracking and Positioning of Mobiles in Telecommunication
355.Trustworthy Computing
356.Image processing and applications
357.Digital Visual Interface
358.Windows Vista
359.Digital audio
360.Porting Device Drivers For The Solaris
361.Search Engine
362.Internet Access via Cable TV Network
363.Proactive Anomaly Detection
364.Alternative Models Of Computation
365.Brain-Computer Interface
366.Personal Satellite assistant Systems
367.BIO METRICS
368.Cellular Neural Network
369.Scheduling in Embedded Multiprocessors
370.Collaborative Mobile Environments
371.Virtual memory
372.Network Accelerators
373.Image compression
374.Applications of speech recognition
375.Voice morphing
376.Sense-Response Applications
377.Cross Platform Component Object Model
378.Embedded systems and vlsi an architectural approach to reduce leakage energy in memory
379.Genetic Programming
380.Internet Telephony Policy in INDIA
381.Iris Scanning
382.Distributed Firewalls
383.Internet Networking
384.corDECT Wireless in Local Loop System
385.Hackers prospectivs
386.Buffer overflow attack : A potential problem and its Implications
387.Mobile Paradigm
388.Optical Mouse
389.Crusoe Processor
390.Itanium Processor
391.Future of Satellite Communication
392.Embedded systems
393.Mesh Based Geometric data processing
394.High Performance DSP Architectures
395.Synthetic Aperture Radar System
396.Ambiophonics
397.Text Classification
398.HALO
399.Tablet PC
400.eXtensible Bindings Language (XBL)
401.Code Division Duplexing
402.Mobile Library Management
403.CorDECT
404.Session Initiation Protocol (SIP
405.Wireless USB
406.Sand Box Technology
407.Planar Separators
408.The Deep Web
409.Emergency Health Care System
410.Rain Technology
411.Parasitic computing
412.DRM Software Radio
413.Smart Note Taker
414.Storage Area Networks
415.BLOW FISH
416.Intel Centrino Mobile Technology
417.SUPER COMPUTER
418.WATERFALL MODEL
419.Mobile communication
420.Direct Memory Access
421.Steganography
422.Ant Colony optimization for routing in Mobile and Adhoc Networks
423.Mesh Based Geometric data processing
424.Global Positioning System
425.ARM Processor
426.DNA chips
427.Future Programming Techniques and Concepts
428.UMA (Unlicensed Mobile Access)
429.Wireless Connectivity for Rural Areas
430.Dynamic Synchronous Transfer Mode
431.Turbo Codes
432.Struts Integration
433.Micro Total analysis systems
434.Information Extraction modes & techniques
435.Parallel Computing In Remote Sensing Data Processing
436.BLU-RA DISC
437.Digital Media Broadcasting
438.Computer Intelligence Application
439.Proactive computing
440.DVD Technology
441.Human Computer Interface
442.ORACLE DATABASE 10g
443.Gaming Consoles
444.Driving Optical Network Evolution
445.Night Vision Technology
446.INTERFACES
447.Evolutionary Programming
448.DNA Computing in security
449.Blue Tooth
450.Brain computer interface
451.Touch Screen
452.Symbian
453.Computer peripherals
454.LAN PROTOCOL ARCHITECTURE
455.Virtual Network Computing
456.Faultolerant Routing in Mobile Ad-Hoc Network
457.Pervasive Computing
458.Quantum computing
459.Quad core Module technology
460.RFID : Comparative study of Collision Resolution Protocols
461.MPEG-7
462.Computer hardware
463.Synchronous Optical Networking
464.Wireless Application Protocol
465.FRAM
466.NGSCB
467.BitTorrent
468.Content Management
469.Improving tcp performance over mobile ad hoc networks
470.Analysing Software Life Cycle of Different Program Paradigm
471.Spin monics
472.iSCSI: The future of Network Storage
473.DATA WARE HOSUING & MINING
474.Surround Systems
475.High Altitude Aeronautical Platforms
476.Agent Mediated E-commerce
477.Swarm intelligence & traffic Safety
478.CRYPTOGRAPHY
479.Video conference
480.3G vs WiFi
481.INFORMATION SECURITY
482.Nano Ring Memory
483.Bluetooth technology
484.High Performance DSP Architectures
485.Real Time Systems with Linux/RTAI
486.New Dimension of Data Security using Neural Networks and Numerical Functions
487.iSCSI
488.Local Multipoint Distribution Service
489.SALT (Speech Application Language Tags)
490.Socket Programming
491.Kerberos
492.Mobile IP
493.Utility Fog
494.Relational Data Mining
495.Real Time Speech Translation
496.D-Blast
497.Wireless MAN
498.Quality of service in Differentiated Service Architecture
499.Object Oriented Concepts
500.Strata flash Memory
Reply
#2


501.Capacity of Ad-hoc Wireless Networks
502.Secure Database Service
503.Design and Analysis of Algoritms
504.Embedded Configurable Operating system
505.Amorphous Computing and Swarm Intelligence
506.Wearable Computers
507.Stealth Virus
508.Study of TGREP
509.Network Anomaly
510.Stereoscopic Imaging
511.Introduction to LaTeX
512.Distributed and Parallel Computing
513.Statistical Forecasting
514.Worldwide Inter operatibility for Microwave Access
515.PON Topologies
516.Search algorithm
517.Digital Jewellery
518.Smart Quill
519.Tempest and Echelon
520.Sand Box Technology
521.Graphical Processing Unit
522.Embedded web server for remote access
523.X-By-Wire System , Communication Bus perspective
524.Internet Searching
525.Image Processing & Compression
526.Quality of Service Routing in computer networks
527.Form Wizard
528.MANET:-The Art of Networking without a Network
529.Server virtualization
530.VIRTUAL REALITY
531.Cell phones
532.Data warehousing
533.Ovonic Unified Memory
534.Network security with cryptography
535.BEOWULF Cluster
536.Aspect-oriented programming (Aop)
537.Cross Platform Component Object Model
538.Virtual Private Network
539.Security Issues In GRID COMPUTING
540.Zigbee
541.iSCSI: The future of Network Storage
542.Web browsers
543.Implementation Of Zoom FFT
544.Survivable Networks Systems
545.Ethernet Passive Optical Network
546.Query Based Fine-grained PageRank
547.Distributed Garbage Collection
548.Wireless Internet
549.Datagram Congestion Control Protocol (DCCP
550.Intel MMX Technology
551.Watermarking Digital Audio
552.Self Organizing Maps
553.Multiterabit Networks
554.Antimeter
555.Sensors on 3D Digitization
556.Data over Cable System (DOCSIS
557.Web Designing with HTML
558.Personal Mass Media Blogging, Syndication, Podcasting, and Vidcasting
559.IDC
560.NEW STORAGE STRATEGY = Disk -Disk -Tape Back up
561.Embedded Technology
562.RPR
563.Pluggable Authentication Modules (Pam)
564.Optical Networking and Dense Wavelength Division Multiplexing
565.Micro Hard disk Drives
566.Bio metrics IRIS technique
567.Parallel Virtual Machine
568.Intelligent Patient Monitoring System
569.Frequent ItemSet Mining
570.Plan 9 Operating System
571.Smart Dust
572.Security Issues in Wireless Networks
573.Performance Evaluation
574.Design of 2-D Filters using a Parallel Processor Architecture
575.Using Regular Expressions In java
576.GSM Security And Encryption
577.Symbian OS
578.Light-trails
579.Home Networking
580.Dual Energy X-ray Absorptiometry
581.IP SPOOFING
582.Ubiquitous computing
583.DISTRUBUTED COMPUTING
584.Speed Detection of moving vehicle using speed cameras
585.Fiber optic communication
586.LOC technology (Lab On a Chip
587.Embedded computers
588.Torents
589.LWIP
590.HACKERS
591.HYPER THREAD TECHNOLOGY
592.Smart Cards
593.Iris scanning
594.High Performance Clusters
595.Earth Simulator- Fastest Supercomputer
596.Bionetric Authentication
597.Trusted Network Connect (TNC) Specifications
598.Wireless Security
599.Digital Cinema
600.Global positioning response system
601.S/w life cycle/affiliated programs
602.Chess Algorithm
603.Ipod
604.Internet Telephony
605.Silverlight
606.Optical Disc Data Security
607.AUGMNETED VIRTUAL REALIT
608.USB Tape Drives
609.Epsilon nets and transversal of hypergraphs
610.Industrial Applications using Neural Networks
611.Face Recognition Technology
612.Micro Hard disk Drives
613.The Tiger SHARC processor
614.AJAX
615.Voice Quality
616.Botnet
617.Earth Simulator- Fastest Supercomputer
618.Augmented Reality
619.3D Volume Storage
620.Multi Protocol Label Switching
621.High Altitude Aeronautical Platforms
622.Intrution Detection System
623.Holographic Data Storage
624.Mining Document Streams
625.Wireless Applications
626.Terrestrial Trunked Radio
627.Spam Assassin
628.The Mbone And Multicasting
629.Wireless Application Protocol
630.IP Telephony
631.Multicast
632.Integration of Parallel Database in a Service Oriented Architecture
633.Operating systems
634.The Callpaper Concept
635.OpenRAN
636.TCP/ IP
637.Radio Network Controller
638.Image Processing
639.OOPS CONCEPTS
640.Authentication and Key Agreement (AKA
641.Touch Screens
642.Fast Convergence Algorithms for Active Noise Controlin Vehicles
643.E-MINE: A novel web mining approach
644.Resilient Packet Ring Technology
645.Virtual Private Networks(VPNs)
646.Genetic Algorithm
647.Computational Photography
648.New storage strategy = Disk -Disk -Tape Back up
649.Artificial Neural Network (ANN)
650.Steganography - The art of hiding information
651.Wireless Technologies (bluetooth, 802.11x, IRDA
652.Cellular Communications
653.Fuzzy Logic
654.Narrow Band and Broad Band ISDN
655.QoS in Networking using active Networks
656.HUMAN AREA NETWORK
657.Dynamic TCP Connection Elapsing
658.J2EE Security
659.Intelligent RAM : IRAM
660.GAIT RECOGNITION
661.Laser Communications
662.Auto-pilots
663.Classification, Clustering and their Application for Damage Detection in Mechanical Structures
664.HVAC
665.Tele-immersion
666.Determining Global States of Distributed Systems
667.Space-time adaptive processing
668.Biometrics Based Authentication
669.HONE POTS
670.Java Ring
671.Signal Integrity Fundamentals for Digital Design
672.IDS
673.Delay Tolerant Networking
674.Earning Online Money
675.Approximate string matching for Music retrieval
676.Ipv6 - The Next Generation Protocol
677.Intelligent RAM
678.UMA (Unlicensed Mobile Access
679.Google or Yahoo Case Study
680.Routing in Sensor Networks
681.Transient Stability Assessment using Neural Networks
682.HomeRF- localized wireless technology optimized for the home environment
683.HAVi: Home Audio Video Interoperability
684.Multiprotocol Label Switching
685.Captchas
686.Satellite communication
687.Quad core Module technology
688.Honeypots
689.Security On Wireless LAN Adaptive cruise control
690.Ruby on Rails RoR
691.Java Servlets
692.GRASSHOPPER Operating System
693.Intelligent RAM : IRAM
694.Structured Cabling
695.Grid Data Farm for Petascale
696.MAGIC SQUARES
697.Open ‘ssh’
698.Palladium
699.Digital Scent Technology
700.CGI Programming
701.IMode
702.MPEG-7
703.Swarm Intelligence
704.Multiple Domain Orientation
705.Ext3 Filesystem
706.Web Technology
707.Enery efficiency in Wireless sensor networks
708.Clustering
709.Techniques to aid property specification in Model Checking
710.VHDL (VHSIC Hardware Description Language
711.Applications of Soft Computing in Medical Image Analysis
712.The Architecture of a Moletronics Computer
713.Curl: A Gentle Slope Language For The Web
714.Wireless sensor network
715.Extended Mark Up Language
716.Sensor Networks
717.Working of E-Mail
718.Virtual Instrumentation
719.Spatial DataMining
720.Holt-Winters technique for Financial Forecasting
721.Packet Interception
722.SPECT
723.Multicast Routing
724.Wireless Markup Language(WML
725.Pivot Vector Space Approach in Audio-Video Mixing
726.Cooperative Adaptive Cruise Control
727.RFID Security
728.Turbo Codes
729.Free Space Optics
730.Forecasting
731.VHDL
732.Prototype System Design for Telemedicine
733.X-Internet
734.Digital Signal Processing and their applications
735.Trends in Mobiles & PC's
736.Mobile Virtual Reality Service
737.Virtual Reality
738.Firewalls
739.Linux Virtual Server
740.Data Mining concepts & Models
741.Future of the internet
742.Aspects of Database Security and Program Security
743.Knowledge discovery and Data Mining
744.HOLOGRAPHIC MEMORY
745.Natural Language Processor
746.Tamper Resistance
747.Introduction to Speech Recognition
748.Parallel Computations
749.Visual Neuro Prosthetics
750.Mobile Infrastructure Management
751.SMART QUILL
752.Proactive Network Anomaly Detection
753.Millipede
754.Bit And Bytes
755.Optical Fibre Cable
756.Bacterio-Rhodopsin Memory
757.Multicast Congestion Control
758.eXtensible Bindings Language (XBL
759.Semantic Web
760.Web Data Management
761.Hyper Transport Technology
762.SPYWARE
763.Cooperative Linux
764.Firewalls
765.Fluorescent Multi-layer Disc
766.Thermography
767.Compositional Adaptation
768.Optical packet switch architectures
769.Peer to Peer and Overlay Networks
770.Techniques for analysis, verification, validation of digital systems
771.Generic algorithm
772.Tripwire
773.Dynamic spectrum access
774.IP spoofing
775.Secure Socket Layer (SSL
776.Integrated Voice and Data
777.Steganography. The art of hiding information
778.Biometric Technology
779.Trusted Network Connect (TNC
780.Agile Software development
781.MiniDisc system
782.Nano-technology and application
783.Storage Area Network
784.Blue Tooth Technology
785.Light Pen
786.IPODS
787.Wireless Networked Digital Devices
788.OpenGL-application programming interface
789.Rover Technology
790.Spawning Networks
791.Third Generation
792.QOS in software server Firewalls
793.Holographic Versatile Disc
794.Teleportation
795.Wi- Fi Technology
796.PolyBot Modular, self-reconfigurable robots
797.HONEY POTS
798.Futex
799.Text Classification Using Semi-supervised and Active Learning
800.RD RAM
801.Nonvolatile Flash Memory
802.Kinetic data structuring
803.Timing Attacks on Implementations
804.Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network
805.Sniffers
806.Holographic Memory
807.Virtualization Technology
808.Low Power UART Design for Serial Data Communication
809.Compact peripheral component interconnect
810.Computer Forensics
811.AC Performance Of Nanoelectronics
812.SMART CARDS
813.Energy Efficient query Optimization
814.Digital Audio Broadcasting
815.Orthogonal Frequency Division Multiplplexing
816.Mobile ad hoc network
817.Data Mining & Data Warehousing
818.Intelligent Software Agents
819.Bandwidth estimation in broadband access networks
820.Digital Video Editing
821.Advanced Encryption Standard
822.ELECTRONIC CARDIO GRAM
823.Franchise Mgnt System
824.Public Key Encryption And Digital Signature
825.Instant Messaging
826.Semi Supervised Learning using Gaussian Process
827.Unlicensed Mobile Access
828.SPCS
829.Plasmonics
830.Infinite Dimensional Vector Space
831.Biometric Secuirty
832.VHDL (VHSIC Hardware Description Language)
833.Freenet
834.Matlab (matrix lab)
835.Graph Separators
836.Comparative study on Authoring Tools
837.Reconfigurable computing
838.How E-learning Works
839.Internet Protocol Television
840.Task Management
841.Main memory databases
842.Methods in virtual networking
843.Clockless Chip
844.Robocode
845.Gigabit Ethernet
846.Integrating Structural Design and Formal Methods in RealTime System Design
847.Authentication
848.Optical Free Space Communication
849.Trends in Compiler Construction
850.Virtual Keyboards
851.Self Defending Networks
852.Performance Testing
853.Storage Farms
854.Real-Time Obstacle Avoidance
855.Graphic processing Unit
856.Tape Drive Technologies LTO
857.Self-Managing Computing
858.Light Tree
859.Elliptical Curve Cryptography(ECC
860.Multi-Relational Data Mining
861.Storm botnet
862.Smart Client Application Development using .NET
863.NETWORK SECURITY
864.CAPTCHA
865.Seasonal and Adaptive Forecasting
866.MPEG Video Compression
867.IDMA The Future of Wireless Technology
868.MPEG-4 Facial Animation
869.Security of Open-Source Software
870.Crusoe
871.Artificial Neural Networks
872.Ethernet
873.Virtual networking
874.ARM architecture
875.TETRA-Terrestrial Enhanced Trunked Radio
876.Optical Computer
877.Digital Imaging
878.Java Management Extensions (JMX) - component framework for building intelligent network
879.Asynchronous Chips
880.High Performance Computing
881.SATRACK
882.Data Pre Processing
883.Wireless communication system
884.Fluorescent Multilayer Optical Data Storage
885.Middleware for Sensor Networks
886.Modems and ISDN
887.DNA Computing
888.DataWareHosuing
889.Advanced Queue Management Techniques
890.Blue Ray
891.IMAX
892.Optical Satellite Communication
893.Extreme Programming (XP)
894.Optical Packet Switching Network
895.Agent Based Computing
896.Virtual Retinal Display
897.ATM networks
898.Distributed Computing
899.FIBER CHANNELS
900.Managing Data with emerging technologies
901.Secure Socket Layer (SSL)
902.Micro Mouse
903.Mobile Computing
904.Digital Imaging
905.Windows DNA
906.Autonomic Computing
907.Ontological Relation Discovery
908.Remote Administration Trojan's
909.Refactoring
910.Radio Astronomy
911.QoS in Wireless LANs
912.HAVi: Home Audio Video Interoperability
913.HPJava
914.Quantum Computers
915.SyncML
916.OpenGL-application programming interface
917.Search Engine Optimisation
918.Java Security
919.Chameleon Chip
920.GSM Security And Encryption
921.Smart Dust
922.Applications of Graph Theory to Metabolic Pathways
923.Motes
924.Data mining through Active Learning
925.Daknet
926.InfiniBand
927.Performance Evaluation of IEEE 802
928.Aspect oriented programming
929.Bio Telemetry
930.Introduction to the Internet Protocols
931.Tracking and Positioning of Mobiles in Telecommunication
932.Flexible CRT Displays
933.Archiever Analyzer
934.Money Pad, The Future Wallet
935.Application of Genetic Algorithms in Network routing
936.Bio-metrics
937.SALT (Speech Application Language Tags
938.Wireless LAN Security
939.Optical Burst Switching
940.SERVELTS
941.Access gateways
942.Methods in virtual private networks
943.Sensor fusion for video surveillance
944.Internet version 2
945.Longhorn
946.Hyper-Threading Technology
947.Rendering Maths on web with Java Swing
948.Spectral Methods for Graph Partitioning
949.GLUCO METER
950.Ethical Hacking
951.Touch screen technology
952.Media gateways
953.Significance of real-time transport Protocol in VOIP
954.DNA Computing
955.Synchronous Optical Networking
956.Computer Viruses
957.Data Mining and Data Warehousing
958.Wearable Bio-Sensors
959.Network Management and Security
960.Multimedia
961.Cryogenic Processor
962.Mobile Networking
963.Twd radar satellite communications
964.10 Gigabit Ethernet
965.Near Filed Communication (NFC
966.A Probabilistic Approach to Micropayment
967.Stealth Virus
968.SIMPUTERS
969.Object oriented technologies
970.Computer vision
971.Native Command Queuing (NCQ
972.Hyper-Threading technology
973.Quantum Cryptography
974.Robotic Surgery
975.SSL-TLS
976.Digital cash
977.Smart Pixel Arrays
978.Fingerprint recognition system by neural networks
979.Uniprocessor Virtual Memory Without TLBS
980.Geometric Invariants in Biological Molecules
981.Param 10000
982.Parallel Computing In India
983.VoIP in mobile phones
984.4G Wireless Systems
985.Multiple Domain Orientation
986.Molecular Keypad Lock
987.Software-Defined Radio
988.Virtual Keyboards
989.BEANS
990.Personel Digital assistance
991.Magnetic RAM
992.Encrypted Hard disks
993.Earth Simulator
994.Satellite Networks
995.Computational Intelligence and Linguistics
996.Classification, Clustering and Application in Intrusuion Detection System
997.VoCable
998.Multi-application Framework for Smart Cards
999.Search for extra terrestrial intelligence using satellite communication
1000.membrane computing
1001.DIGITAL MOVIES
Reply
#3
1002.Mobile Casts
1003.Development of the Intenet
1004.XML Encryption
1005.TESTING METHODS
1006.Voice Portals
1007.Real Time Operating Systems on Embedded ICs
1008.Free Space Laser Communications
1009.Fine Grained DataBase Security
1010.TDMA implementation for QoS routing in Ad Hoc Networks
Reply
#4
Well, It varies from college to college. Generally, Computer Science is a more rounded version, with hardware and all that good stuff.

Software Engineering is computer programming. Check the college’s site for more in-depth information on the course.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: latest seminar topics for information science, latest computer science seminar topics, computer science latest seminar topics 2013 wikipedia, servelts saminar abstack, latest seminar toipc on computer, latest computer science topics for project, latest project in computer science** epaper**eds,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,385 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 42,023 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  Block Chain and Data Science jntuworldforum 0 7,961 06-10-2018, 12:15 PM
Last Post: jntuworldforum
  Optical Computer Full Seminar Report Download computer science crazy 46 66,341 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  Computer Sci Seminar lists7 computer science crazy 4 11,412 17-07-2015, 10:29 AM
Last Post: dhanyasoubhagya
  Computer Architecture Requirements? shakir_ali 1 26,971 07-04-2015, 12:04 PM
Last Post: Kishore1
  Computer Architecture ACS Project? shakir_ali 0 7,505 30-10-2014, 12:01 AM
Last Post: shakir_ali
  eye gaze human computer interface shabeer 22 20,129 26-02-2014, 03:19 AM
Last Post: Guest
  Modular Computing seminars report computer science crazy 4 21,445 08-10-2013, 04:32 PM
Last Post: Guest
  BRAIN COMPUTER INTERFACE A SEMINAR REPORT Computer Science Clay 53 72,041 28-02-2013, 02:09 PM
Last Post: seminar details

Forum Jump: