Computer Science Seminar Topics for CSE with PPT


We provide a big collection of latest 2015-2016 Computer Science seminar topics and advanced research topics with PPT and abstract based on Technical IEEE Papers and journals on recent technologies for CSE, I.T, MCA, MS, B.E, B.Tech, MSc and BSc students. PPT's are provided at the end of each article for free download.

Web Cache

World Wide Web technology (HTTP publishing and browsing) has become so popular that the increasing traffic volume threatens to overwhelm the networking capacity in place within corporate Intranets and on the Internet.

WebOS

Operating system was originally developed to provide a set of common systems services, such as I/O, communication and persistent storage, to simplify application programming. With the advent of multiprogramming, this charter expanded to include abstracting shared resources so that they were as easy to use (and sometimes easier) as dedicated physical resources.

Speech Recognition

The computer revolution is now well advanced, but although we see a starting preparation of computer machines in many forms of work people do, the domain of computers is still significantly small because of the specialized training needed to use them and the lack of intelligence in computer systems.

Kerberos

The internet is an insecure place. Many of the protocols used in the Internet do not provide any security. Tools to “sniff” passwords off of the network are in common use by systems crackers. Thus applications that send an unencrypted password over the network are extremely vulnerable.

Java Performance

The growing excitement about Java in corporate IT departments has been closely followed by a growing concern about its performance. While numerous trade seminars, presentations and articles have explored Java performance, very few have focused on real world IT systems. This article discusses the performance of Java-based applications that solve real IT problems: enforcing business rules, accessing disparate data, and presenting information graphically.

Digital Certificates

A digital certificate is equivalent to an electronic ID card. It serves two purposes

  • To establish the identity of the owner of the certificate 
  • To distribute the owner's public key 

Certificates provide a way of authenticating users, referred to as authentication by trusted third parties. Instead of requiring each participant in an application to authenticate every user, third-party authentication relies on the use of certificates, electronic ID cards.

crusoe processer

Transmeta Corporation introduced Crusoe, a new microprocessor, into a market long controlled by one dominant company. Over the years, many companies have tried to do the same, and none of them has been very successful.

CORBA

Distributed objects are the next wave in Internet innovation. CORBA, the Common Object Request Broker Architecture defined by the Object Management Group (OMG), specifies how software objects distributed over a network can work together without regard to client and server operating systems and programming languages.

BLUETOOTH

Wireless LANs are the hot new enterprise technology that every one is talking about and considering implementing in varying degrees for vertical markets like medical, education and manufacturing. Before delving straight into the details of wireless LAN standards let’s take a look at technologies that make it possible for a wireless LAN to operate. These technologies are

Biomterics

As we rapidly move towards the new millennium, Security and Access Control are becoming more important than ever before. Passwords, though still extensively used, are fast becoming a hazard, requiring an enhanced method of security. Positive Identification of individuals is now a serious business considering the fact that people have to be allowed access to areas only if they are authorized.

Popular Videos

How to speak to people

How to speak so that people want to listen.

Got a tip or Question?
Let us know