JAVA_ IEEE_2015/2014/203/2012/2011/2010/2009/2008_PROJECT_LIST

Main Project Training | mini project training is part in BTech projects | Mtech projects | We support on Java project 100% Development | Dotnet project 100% Development | Android project 100% Development | PHP project 100% Development | MatLab project 100% Development | VLSI project 100% Development | MBA Projects support.Bulk projects with low price | paper publication with low prices | SS InfoTech Support for Engineering colleges projects works.


  

SS INFOTECH
JAVA IEEE 2015/2014/203/2012/2011/2010/2009/2008 PROJECT LIST



TITLE


AI And Opinion Mining


Credit Card Fraud Detection Using Hidden Markov Models 2008


Random Cast: An Energy-Efficient Communication Scheme For Mobile Ad Hoc Networks


Detecting Malicious Packet Losses 2009


IRM Integrated File Replication And Consistency Maintenance In P2P Systems


Mobility Management Approaches For Mobile IP Networks


Multicast Multi-Path Power Efficient Routing In Mobile ADHOC Networks


A LEVEL SET METHOD FOR IMAGE SEGMENTATION


A Network Coding Equivalent Content Distribution Scheme For Efficient



A Personalized Ontology Model For  Web Information Gathering


A Secure Erasure Code-Based Cloud Storage System With Secure Data Forwarding


A Secure Intrusion Detection System Against DDOS Attack In Wireless Mobile Ad-Hoc Network


A Spatiotemporal Approach For Secure Range Queries In Tiered Sensor Networks


A Trigger Identification Service For Defending Reactive Jammers In Wireless Sensor Network


Adaptive Opportunistic Routing For Wireless Ad Hoc Networks


AMPLE: An Adaptive Traffic Engineering System Based On Virtual Routing Topologies


An Efficient Caching Scheme And Consistency Maintenance In Hybrid P2P System


A New Cell-Counting-Based Attack Against Tor


Automatic Discovery Of Association Orders Between Name And Aliases From The Web Using Anchor Texts-Based Co-Occurrences



Automatic Reconfiguration For Large-Scale Reliable Storage Systems



BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme For Filtering Injected False Data In Wireless Sensor Networks


BGP Churn Evolution: A Perspective From The Core


Bloomcast: Efficient And Effective Full-Text Retrieval In Unstructured P2P Networks


Bootstrapping Ontologies For Web Services


Catching Packet Droppers And Modifiers


CCD: A Distributed Publish/Subscribe Framework For Rich Content Formats


Cloud Computing Security From Single To Multi Cloud


Cloud Data Protection For The Masses


Clustering With Multiview Point-Based Similarity Measure


Compressed-Sensing-Enabled Video Streaming For Wireless Multimedia Sensor Networks


CONCURRENT TRAIN SIMULATION


Fairtorrent A Deficit-Based Distributed Algorithm


Fast Data Collection


Firecol A Collaborative Protection


FOGCOMPUTING


Footprint Detecting Sybil Attacks In Urban Vehicular Networks


Game-Theoretic Pricing For Video Streaming In


Confucius A Tool Supporting Collaborative Scientific Workflow Composition


Cooperative Caching In Wireless P2pnetworks Design, Implementation, And Evaluation


Cooperative Provable Data Possession For Integrity Verification In Multi-Cloud Storage


Credit Card Fraud Detection Using Hidden Markov Models 2008



Cut Detection In Wireless Sensor Networks


Modeling And Detection Of Camouflaging Worm


Data Integrity Proofs In Cloud Storage


Data Leakage Detection


Defenses Against Large Scale Online  Password Guessing Attacks
By Using Persuasive Click Points


Design And Implementation Of TARF


Detecting And Resolving Firewall Policy Anomalies


Detecting Malicious Packet Losses 2009


Detecting And Resolving Firewall Policy Anomalies


Detecting Spam Zombies By Monitoring Outgoing Messages


Detection Of Selfish Nodes In Networks Using Coopmac Protocol With ARQ


Distributed Packet Buffers For High-Bandwidth Switches And Routers


Doubleguard: Detecting Intrusions In Multitier Web Applications


Effective Pattern Discovery For Text Mining


Expert Discovery And Interactions In Mixed Service Oriented Systems


Efficient Audit Service Outsourcing For Data Integrity In Clouds


Efficient Error Estimating Coding: Feasibility And Applications


Efficient Fuzzy Type-Ahead Search In XML Data


Efficient Similarity Search Over Encrypted Data


Energy-Efficient Cooperative Videodistribution With Statistical Qosprovisions Over Wireless Networks


Energy-Efficient Protocol For Cooperative Networks


Ensuring Distributed Accountability For Data Sharing




Grouping-Enhanced Resilient Probabilistic En-Route Filtering Of Injected False Data In Wsns


Handling Selfishness In Replica Allocation Over Mobile Adhoc Network


Handwritten Chinese Text Recognition By Integrating Multiple
Contexts


HASBE A Hierarchical Attribute-Based Solution


Independent Directed Acyclic Graphs For Resilient Multi Path Routing


Jamming-Aware Traffic Allocation For Multiple-Path Routing Using Portfolio Selection


Insights On Media Streaming Progress Using Bittorrent-Like Protocols For On-Demand Streaming


Toward Secure And Dependable Storage Services In Cloud Computing


Tree-Based Mining For Discovering Patterns Of Human Interaction In Meetings


Trust Modeling In Social Tagging Of Multimedia Content


Joint Relay And Jammer Selection For Secure Two-Way Relay Networks


Latency Equalization As A New Network Service Primitive


Learn To Personalized Image Search From Photo Sharing Web Site


Load-Balancing Multipath Switching System With Flow
Slice


Measurouting: A Framework For Routing Assisted Traffic Monitoring


Multibiometric Cryptosystems Based On Feature-Level Fusion


Multiparty Access Control For Online Social Networks Model And Mechanisms


Network Assisted Mobile Computing With Optimal Uplink Query Processing


Network Coding Based Privacy Preservation Against Traffic Analysis In Multi-Hop Wireless Networks


Nymble


Online Modeling Of Proactive Moderation System For Auction

Fraud Detection


Optimal Power Allocation In Multi-Relay MIMO Cooperative Networks: Theory And Algorithms


Optimal Source-Based Filtering Of Malicious Traffic


Optimizing Bloom Filter Settings In Peer To Peer Multi Searching


Organizing User Search Histories


Outsourced Similarity Search On Metric Data Assets


On Optimizing Overlay Topologies For Search In Unstructured Peer-To-Peer Networks


Portable Cloud Services Using TOSCA


Privacy- And Integrity-Preserving Range Queries In Sensor Networks


Probabilistic Exposure Fusion


Progmetowards Programmable Network Measurement



Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper


Ranking Model Adaptation For Domain Specific Search


RIHT: A Novel Hybrid IP Trackback Scheme


Risk-Aware Mitigation In Wireless Sensor Networks


Robust Correlation Of Encrypted Attack Traffic Through Stepping Stones By Flow Watermarking


Robust Face-Name Graph Matching For Movie Character Identification


Scalable And Secure Sharing Of Personal Health



Secure And Efficient Handover Authentication Based On Bilinear Pairing Functions



Securing Node Capture Attacks For Hierarchical Data Aggregation


Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks


Semi Supervised Biased Maximum Margin Analysis For Interactive Image Retrieval


Slicing: A New Approach To Privacy Preserving Data Publishing


SPOC: A Secure And Privacy-Preserving Opportunistic Computing
Framework For Mobile-Healthcare Emergency



The Geometric Efficient Matching Algorithm For Firewalls


A Distributed Publish Subscribe Framework For Rich Content Formats


A Network Coding Equivalent Content Distribution Scheme For Efficient Peer-To-Peer Interactive Vodstreaming(2012)


A Neuro-Fuzzy Software Cost Estimation Tool


A Secure Erasure Code-Based Cloud Storage System With Secure Data Forwarding(2012)


An Efficient Self-Organized Authentication And Key Management Scheme For Distributed Multihop Relay- Based IEEE 802.16 Networks(2011)


Autonomy-Oriented Self-Equilibrium Routing Model In Traffic Networks(2010)


Client Server Protocol Implementation


Closeness  A New Privacy Measure For Data Publishing(2010)


Clustering With Multi View Point Based


Conditional Shortest Path Routing In Delay Tolerant Networks(2010)


Cut Detection In Wireless Sensor Networks(2012)


Data Centric Knowledge Management System


Design And Implementation Of TARF A Trust-Aware Routing
Framework For Wsns(2012)


Design, Implementation, And Performance Of A Load Balancer For SIP Server Clusters(2012)


Distributed Explicit Rate Schemes In Multi-Input-Multi-Output Network Systems(2010)



Distributed Packet Buffers For High-Bandwidth Switches And Routers(2012)



Double Guard Detecting Intrusions In Multitier Web Applications(2012)


Efficient Error Estimating Coding Feasibility And Applications(2012)


HASBE   A Hierarchical Attribute-Based Solution For Flexible And Scalable Access Control In Cloud Computing(2012)


Handling Selfishness In Replica Allocation Over A Mobile Ad Hoc Network(2012)


Independent Directed Acyclic Graphs For Resilient Multipath Routing(2012)


ISP Automation


Latency Equalization As A New Network Service Primitive(2012)


Learn To Personalized Image Search From The Photo Sharing Websites(2012)


Outsourced Similarity Search On Metric Data Assets(2012)


Managing Multidimensional Historical Aggregate Data In Unstructured P2P Networks(2010)



P2P Reputation Management Using Distributed Identities And Decentralized Recommendation Chains(2010)


Packet Loss Control Using Tokens At The Network Edge(2012)


Packet-Hiding Methods For Preventing Selective Jamming Attacks(2012)


Providing Rate Guarantees For Internet Application Traffic Across ATM Networks(2009)


Secure And Practical Outsourcing Of Linear Programming In Cloud Computing(2011)


Sleep Scheduling For Critical Event Monitoring In Wireless Sensor Networks(2012)


The Coquosapproach To Continuous Queries In Unstructured Overlays(2011)


Toward Reliable Data Delivery For Highly Dynamic Mobile Ad Hoc Networks(2012)


Water Marking


A Precise Termination Condition Of The Probabilistic Packet Marking Algorithm(1)


A Geometric Approach To Improving Active Packet Loss Measurement


Authentication Of Secret Information In Image Steganography


Mitigating Performance Degradation In Congested Sensor Networks


A Signature Based Indexing Method For Efficient Content-Based Retrieval Of Relative Temporal Path


Netsurey Simulation


Active Source Routing Protocol For Mobile Networks


An Suitable Programming Model For Error Control In Network Environment(1)


Bandwidth Estimation For IEEE 802


Client-Server Protocol Implementation


Congestion Control Using NETWORK BASED PROTOCOL


Constructing Inter-Domain Packet Filters To Control IP  Spoofing Based On BGP Updates



Data Transmission Using Multi-Tasking-Sockets


NETWORK BORDER PATROL


Network Database Junction


Network Routing


Online Index Recommendations For High-Dimensional Databases Using Query Workloads


C-TREND: Temporal Cluster Graphs For Identifying And Visualizing Trends In  Multiattribute Transactional Data


Distributed Collaborative Key Agreement And Authentication Protocols For Dynamic Peer Groups(1)


Group Key Management And Secured Protocols For Peer Group Communication


Hiding Sensitive Association Rules


Image Enhancement Technology





Image-Retrieval-Using-Geo-Spatial-Matching


Implementation Of Bpcs-Steganography


Implementing Multicast Distribution Through Recursive Unicast Trees


Increasing Efficiencyin Wireless Network


Implementation Of Eccentric Network For Intranet


Effective Key Generation For Multimedia And Web Application


Effective Transmission Of Data Through RBPH For Group Communication


Secured Distributed Key Management For Threshold-Multi Signature Using Cryptography


Security For Domain Name System


Security In Large Networks Using Mediator Protocols(Quantumkey)


SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY



Security On Domain Name System


Self-Interested  Routing In Online Environment


Shortest Path


Re-Ordering Of Packets Using Retransmission Timer


A Wireless Distributed Intrusion Detection System And A New Attack Model


Route Reservation In Inter Networks


Route Stability In Manets Under The Random Direction Mobility Model


Problem Oriented Software Engineering Solving The Package Router Control Problem


Proposed Key Generation For Multimedia Application


Quiver Consistent Object Sharing For Edge Services



Rate Allocation And Network Lifetime Problems For Wireless Sensor Networks


Efficient Key Management For Threshold-Multi Signature In Distributed System


Empowering The RMI In Java Approach


Enterprise-Scheme-Planner-And-Monitoring


Pling Based Metrics Form Easuring The Quality Of A Software


Error Control System In Network Environment


Error Tracking System


LAYER TO FORWARD PROTOCOL


Error Control System In Network Environment

Geometric-Approach-For-Improving-Active-Packet-Loss

LOAD BALANCING


Location-Based Spatial Query Processing In Wireless Broadcast Environments

Mitigating Performance Degradation In Congested Sensor Networks


Mobile Technology

Online Index Recommendations For High-Dimensional Databases Using Query Workloads


Modeling And Automated Containment Of Worms


On Natural Language Processing And Plan Recognition


NDT A Model-Driven Approach For Web Requirements


Intrusion Detection In Homogeneous And Heterogeneous Wireless Sensor Networks


Three Party Authentication For Key Distributed  Protocol Using Classical And Quantum Cryptography


Two Techniques For Fast Computation Of Constrained Shortest Paths


Using The Conceptual Cohesion Of Classes For Fault Prediction In Object-Oriented Systems


Vehicle Identification


Vehicle-Traffic-Management-Control-System


Evaluating The Efficacy Of Forward Error Correction Coding


File Sharing In Hybrid Model Based P2P Systems For  The Expected High Churn


DCMP: A DISTRIBUTED CYCLE MINIMIZATION PROTOCOL FOR PEER-TO-PEER NETWORKS


Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud


A Query Formulation Language For The Data Web


A Secure Erasure Code-Based Cloud Storage System With Secure Data Forwarding


A System To Filter Unwanted Messages From OSN User Walls


Adaptive Opportunistic Routing For Wireless Ad Hoc Networks



Adaptive Provisioning Of Human Expertise In Service-Oriented Systems


An Efficient Caching Scheme And Consistency Maintenance In Hybrid P2P System


Attribute Based Access To Scalable Media



Capcity Based Cryptograpic Data Access Control In Cloud Computing


Centralized Authentication Registrt


Cloud Computing Security From Single To Multy Cloud


Cloud Data Protection For The Masses


Cloud FTP: A Case Study Of Migrating Traditional Applications To The Cloud

Cloudmov: Cloud-Based Mobile Social TV


Clustering With Multiviewpoint-Based Similarity Measure



Comparable Entity Mining From Comparative Questions



Data Integrity Proofs In Cloud Storage


Delay Analysis And Optimality Of Scheduling Policies

Design And Implementation Of TARF


Detecting Spam Zombies By Monitoring Outgoing Messages


Distributed Cooperative Caching In Social Wireless Networks

Efficient Fuzzy Type-Ahead Search In XML Data

Dynamic Resource Allocation Using Virtual Machines For Cloud Computing Environment


Efficient Fuzzy Type-Ahead Search In XML Data

EFFICIENT PATTERN TEXT MINING

Efficient Similarity Search Over Encrypted Data

Exploring Application-Level Semantics For Data Compression

Extended XML Tree Pattern Matching Theories And Algorithms

Fast Data Collection In Tree-Based Wireless Sensor Networks


Fast Clustering Based Feature Selection Algorithm

Focus Learning To Crawl Web Forums


Handling Selfishness In Replica Allocation Over A Mobile Ad Hoc Network

Incentive Compatible Privacy-Preserving Data Analysis

Informative Content Extraction By Using Eifce[Effective Informative Content Extractor


Measurouting: A Framework For Routing Assisted Traffic Monitoring


Mechanism Design-Based Secure Leader Election

NETWORK INTRUSION DETECTION AND COUNTERMEASURE


Packet Loss Control Using Tokens

Privacy Preserving Data Sharing With Anonymous ID Assignment

Privacy-Preserving Public Auditing For Secure Cloud Storage


Query Formulation Language For The Data Web Ranking Model Adaptation For Domain-Specific Search

Resource Out Sourcing



Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding


Secure And Scalable PHR In Cloud Computing


Security And Privacy Enhancing Multi Cloud Architecture



Sensitive Label Privacy Protection On Social Network Data


SLEEP SCHDULING FOR CRITICAL EVENT MONITORING



SORT: A Self-Organizing Trust Model For Peer-To-Peer Systems



Spatial Strina Approximate String Search


Super Resolution In Painting


Tamper Detection



Design And Implementation Of TARF: A Trust-Aware Routing Framework For Wsns


Video Streaming File Merging


Voronoi-Based Continuous Query Processing For Mobile Users


Portable Cloud Services Using TOSCA


Privacy- And Integrity-Preserving Range Queries


Privacy Preserving Decision Tree Learningusing Unrealized Data Sets



Probabilistic Exposure Fusion



Risk-Aware Mitigation


Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute-Based Encryption


Slicing: A New Approach To Privacy Preservingdata Publishing



Trust Modeling In Social Tagging Of Multimedia Content



Vehicle Detection



An Efficient Caching Scheme And Consistencymaintenance In Hybrid P2P System


Automatic Discovery Of Association Orders Between Name And Aliases From The Web Using Anchor Texts-Based Co-Occurrences


BGP Churn Evolution: A Perspective From The Core


Bloomcast: Efficient And Effective Full-Text Retrieval In Unstructured P2P Networks

Bootstrapping Ontologies For Web Services


Catching Packet Droppers And Modifiersin Wireless Sensor Networks


CCD: A Distributed Publish/Subscribeframework For Rich Content Formats


Cloud Computing Security From Single To Multi-Clouds


Cloud Data Protection For The Masses

Clustering With Multiviewpoint-Based Similarity Measure



Confucius A Tool Supporting Collaborative Scientific Workflow Composition


Cooperative Provable Data Possession For Integrity Verification In Multi-Cloud Storage

Cut Detection In Wireless Sensor Networks

Design And Implementation Of TARF


Design, Implementation, And Performance Of A Load Balancer For SIP Server Clusters

Detecting And Resolving Firewall Policy Anomalies

Detecting Spam Zombies By Monitoring Outgoing Messages

Distributed Packet Buffers For High-Bandwidth Switches And Routers

Doubleguard: Detecting Intrusions In Multitier Web Applications


Efficient Error Estimating Coding:Feasibility And Applications




Efficient Fuzzy Type-Ahead Search In XML Data

Efficient Similarity Search Over Encrypted Data


Energy-Efficient Cooperative Video Distribution With Statistical Qos Provisions Over Wireless Networks

ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING

Fast Data Collection In Tree-Based Wireless Sensor Networks


Firecol: A Collaborative Protection Network For The Detection Of Flooding Ddos Attacks


FOGCOMPUTING

Footprint Detecting Sybil Attacks In Urban Vehicular Networks


Game-Theoretic Pricing For Video Streaming In Mobile Networks

Handling Selfishness In Replica Allocation Over A Mobile Ad Hoc Network

Handwritten Chinese Text Recognition By Integrating Multiple Contexts


HASBE: A Hierarchical Attribute-Based Solution For Flexible And Scalable Access Control In Cloud Computing

Independent Directed Acyclic Graphs For Resilient Multipath Routing

Insights On Media Streaming Progress Using Bittorrent-Like Protocols For On-Demand Streaming


Toward Secure And Dependable Storage Services In Cloud Computing


Latency Equalization As A New Network Service Primitive


Learn To Personalized Image Search From The Photo Sharing Websites


Load-Balancing Multipath Switching System With Flow Slice

Measurouting: A Framework For Routing Assisted Traffic Monitoring




MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS MODEL AND MECHANISMS


On Optimizing Overlay Topologies For Search In Unstructured Peer-To-Peer Networks



Online Modeling Of Proactive Moderation System For Auction Fraud Detection


Optimal Source-Based Filtering Of Malicious Traffic


Optimizing Bloom Filter Settings In Peer-To-Peer Multi-Keyword Searching


Organizing User Search Histories


Outsourced Similarity Search On Metric Data Assets


Packet Loss Control Using Tokens At The Network Edge


Packet-Hiding Methods For Preventing Selective JAMMING ATTACKS


Portable Cloud Services Using TOSCA


Privacy- And Integrity-Preserving Range Queries In Sensor Networks


Probabilistic Exposure Fusion


Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper


Ranking Model Adaptation For Domain-Specific Search


RIHT A Novel Hybrid IP Traceback Scheme


Risk-Aware Mitigation


Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute-Based Encryption


Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks


Slicing: A New Approach To Privacy Preserving Data Publishing


Toward Reliable Data Delivery For Highly Dynamic Mobile Ad Hoc Networks

Toward Secure And Dependable Storage Services In Cloud Computing


In Tags We Trust:  Trust Modeling In Social Tagging Of Multimedia Content


Vehicle Detection In Aerial Surveillance Using Dynamic Bayesian Networks




A Competitive Study Of Cryptography Techniques Over Block Cipher


A Cross Layer Architecture For Multicast And Unicast Video Transmission In Mobile Broadband Networks


A Distributed Algorithm For Finding All Best Swap Edges Of A Minimum Diameter Spanning Tree


A Dual Framework And Algorithms For Targeted Online Data Delivery


A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts


A New Approach For Fec Decoding Based On The Bp Algorithm In Lte And Wimax Systems


A New Method For Generating All Positive And Negative Association Rules


A Permutation-Based Algorithm To Optimally Reschedule Trains In A Railway Traffic Network

A Privacy-Preserving Location Monitoring System For Wireless Sensor Networks





A Signature-Based Indexing Method For Efficient Content-Based Retrieval Of Relative Temporal Patterns

A Study On Certificate Revocation In Mobile Ad Hoc Networks


Advanced Routing Technology For Fast Internet Protocol Network Recovery


Agent-Based Urban Cloud Computing Transportation Systems

An Efficient Density Based Improved K- Medoids Clustering Algorithm


An Efficient Paging Scheme For Terminal Mobility Using Personal Mobility Management Information In Interworked Fixed And Mobile Networks

An Efficient Self-Organized Authentication And Key Management Scheme For Distributed Multihop Relay- Based Ieee802.16 Networks

Analysis On Credit Card Fraud Detection Methods


Buffer Sizing For 802.11 Based Networks

Secure And Practical Outsourcing Of Linear Programming In Cloud Computing



Cloud Computing For Agent-Based Urban Transportation Systems


Clustering With Multi-Viewpoint Based Similarity Measure

Computational Perceptual Features For Texture Representation And Retrieval

Conceptual Cohesion Of Classes In Object Oriented Systems


Cooperative Caching In Wireless P2pnetworks Design, Implementation, And Evaluation

Modeling And Detection Of Camouflaging Worm

Data Leakage Detection

Decision Trees For Uncertain Data

Delay Analysis And Optimality Of Scheduling Policies For Multi-Hop Wireless Networks


Denial Of Service Attacks In Wireless Networks The Case Of Jammers





Discovering Conditional Functional Dependencies

Dynamic Channel Allocation For Wireless Sensor Networks

Dynamics Of Malware Spread In Decentralized  Peer-To-Peer Networks

Effective Navigation Of Query Results Based On Concept Hierarchies

Efficient Public Key Certificate Management For Mobile Ad Hoc Networks


Embedded Extended Visual Cryptography Schemes

Enabling Public Auditability And Data Dynamics For Storage Security In Cloud Computing

Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis


Extended Xml Tree Pattern Matching Theories

Going Back And Forth: Efficient Multi Deployment And Multi Snapshotting On Clouds



Glip: A Concurrency Control Protocol For Clipping Indexing


Implementation Of Lsb Steganography And Its Evaluation For Various File Formats

Intrusion Detection: An Energy Efficient Approach In Heterogeneous Wsn

Live Streaming With Receiver-Based  Peer-Division Multiplexing

Location Aided Flat Hybrid Routing Protocol (Lafhrp)


Modeling And Detection Of Camouflaging Worm


Multiple Routing Configurations For Fast Ip Network Recovery


Nymble: Blocking Misbehaving Users In  Anonym Zing Networks


Optimal Bandwidth Assignment For Multiple-Description-Coded Video



Particle Swarm Optimization: Technique, System And Challenges


Providing Rate Guarantees For Internet Application Traffic Across Atm Networks


Ranking Spatial Data By Quality Preferences


Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding


Sat: A Security Architecture Achieving Anonymity And Traceability In Wireless Mesh Networks


Scalable And Cost-Effective Interconnection Of Data-Center Servers Using Dual Server Ports


Secure Data Collection In Wireless Sensor Networks Using Randomized Dispersive Routes


Detection Of Selfish Nodes In Networks Using Coopmac Protocol With Arq


Sketch4match – Content-Based Image Retrieval System


Supporting Efficient And Scalable Multicasting Over Mobile Ad Hoc Networks


Interval Ckmeans: An Algorithm For Clustering Symbolic Data


Temporal Data Clustering Via Weighted Clustering Ensemble With Different Representations



The Coquos Approach To Continuous Queries In Unstructured  Overlays


Voronoi-Based Continuous Query Processing For Mobile Users


Wireless Sensor Networks: A Study On Congestion Routing Algorithms


Xlp: A Cross-Layer Protocol For Efficient Communication In Wireless Sensor Networks


A Competitive Study Of Cryptography Techniques Over Block Cipher


A Dual Framework And Algorithms For Targeted Online Data Recovery



A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification


A Level Set Method For Image Segmentation In The Presence Of Intensity In Homogeneities With Application To Mri


A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts




A New Approach For Fec Decoding Based On The Bp Algorithm In Lte And Wimax Systems


Sat: A Security Architecture Achieving Anonymity And Traceability In Wireless Mesh Networks


Analysis On Credit Card Fraud Detection Methods


Buffer Sizing For 802.11 Based Networks Chains


Caching Strategies Based On Information Density Estimation In Wireless Ad Hoc Networks


Cloud Computing For Agent-Based Urban Transportation Systems


Clustering With Multi-Viewpoint Based Similarity Measure


Computational Perceptual Features For Texture Representation And Retrieval


Cooperative Caching In Wireless P2pnetworks Design, Implementation, And Evaluation


Delay Analysis And Optimality Of Scheduling Policies For Mulity Hop Wireless Networks


Discovering Conditional Functional Dependencies


Dynamics Of Malware Spread In Decentralized  Peer-To-Peer Networks


Effective Navigation Of Query Results Based On Concept Hierarchies


Energy-Efficient Protocol For Cooperative Networks


Extended Xml Tree Pattern Matching: Theories And Algorithms


A Dual Framework And Algorithms For Targeted Online Data Delivery



Embedded Extended Visual Cryptography Schemes


Scalable And Cost-Effective Interconnection Of Data-Center Servers Using Dual Server Ports


Cloud Computing For Agent-Based Urban Transportation Systems


Supporting Efficient And Scalable Multicasting Over Mobile Ad Hoc Networks


A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts


Caching Strategies Based On Information Density Estimation In Wireless Ad Hoc Networks


Optimal Bandwidth Assignment For Multiple-Description-Coded Video


Dynamics Of Malware Spread In Decentralized  Peer-To-Peer Networks


A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification


Going Back And Forth: Efficient Multi Deployment And Multi Snap Shotting On Clouds


A Distributed Csma Algorithm For Throughput And Utility Maximization In Wireless Networks


A Distributed Protocol To Serve Dynamic Groups For Peer-To-Peer Streaming


A Dynamic En-Route Filtering Scheme For Data Reporting In Wireless Sensor Networks


A Dynamic En-Route Filtering Scheme For Data Reporting In Wireless Sensor Networks




A Generic Multilevel Architecture For Time Series Prediction


A New Approach To Optical Networks Security: Attack-Aware Routing And Wavelength Assignment


A Two-Step Method For Clustering Mixed Categroical And Numeric Data


Active Re Ranking For Web Image Search



Always Acyclic Distributed Path Computation


An Application For Web Mining Systems With Services Oriented Architecture

An Experience In Testing The Security Of Real-World Electronic Voting Systems


An Object Oriented Email Clustering Model Using Weighted Similarities Between Emails Attributes


Anonymous Query Processing In Road Networks

Answering General Time-Sensitive Queries

Aspect-Oriented Race Detection In Java


Assessing Software Service Quality And Trustworthiness At Selection Time

Autonomy-Oriented, Self-Equilibrium Routing Model In Traffic Networks


Binrank: Scaling Dynamic Authority-Based Search Using Materialized Sub Graphs

Catching The Trend: A Framework For Clustering Concept-Drifting Categorical Data


A Framework For An Adaptive Intrusion Detection System Using Bayesian Network


A High-Capacity Steganography Scheme For Jpeg2000 Baseline System

A Secure Group Key Management Scheme For Sensor Networks

Bsmr  Byzantine-Resilient Secure Multicast Routing In Multihop Wireless Networks


Captcha



Dart: Dynamic Address Routing For Scalable Ad Hoc And Mesh Networks

Message Encryption Scheme Using Cheating Text

Enhanced Text Steganography In Sms

Information Hiding  A New Approach In Text Steganography


Multiple Routing Configurations For Fast Ip Network Recovery Measurements



On Path Selection And Rate Allocation For Video In Wireless Mesh Networks

On The Security Of An Efficient Time-Bound Hierarchical Key Management Scheme

On The Security Of Route Discovery In Manets

On Unbiased Sampling For Unstructured Peer-To-Peer Networks

Online Detection And Prevention Of Phishing Attacks In Wireless Broadcast Environments



Optimally Dos Resistant P2p Topologies For Live Multimedia Streaming

Path-Diversity P2p Overlay Retransmission For Reliable Ip-Multicast

Collaborative  Sensing To Improve Information Quality


Conditional Shortest Path Routing In Delay Tolerant Networks   Communication

Cooperative Caching In Wireless P2pnetworks Design, Implementation, And Evaluation Heterogeneous Grid Computing

Deriving Concept-Based User Profiles From Search Engine Logs Constrained Environments


Distributed Algorithms For Constructing Approximate Minimum Spanning Trees In Wireless Networks

Distributed Explicit Rate Schemes In Multi-Input–Multi-Output Network Systems

Efficient Compression Of Encrypted Grayscale Images


Ensuring The Data Accountability In Cloud Storage



Evaluation Of Accuracy In Design Pattern Occurrence Detection


Achieving Network Level Privacy In Wireless Sensor Networks



Agent Based Efficient Anomaly Intrusion Detection System In Adhoc Networks


Conditional Shortest Path Routing In Delay Tolerant Networks



Imine Mining Association Rules With Item Constraints


An Efficient Key Management Scheme For Secure Data Access Control In Wireless Broadcast Server


Layered Approach Using Conditional Random Fields For Intrusion Detection


Minimizing Delay And Maximizing Lifetime For Wireless Sensor Networks With Any Cast


Mitigating Denial-Of-Service Attacks On The Chord Overlay Network A Location Hiding Approach


Monitoring Online Tests Thru Data Visualization



Optimal Jamming Attack Strategies And Network Defense Policies In Wireless Sensor Networks


A User-Level Tool For Inferring Router   Packet Forwarding Priority


Saaas- The Mobile Agent Based Service For Cloud Computing In Internet Environment


Extended Xml Tree Pattern Matching: Theories And Algorithms


Finding Bugs In Web Applications Using Dynamic Test Generation And Explicit-State Model Checking


Fivatech: Page-Level Web Data Extraction From Template Pages


Fog Computing Mitigating Insider Data Theft Attacks In The Cloud


Fuzzy Keyword Search Over Encrypted Data Using Cloud Computing


Grid Scheduling Based On Collaborative Random Early Detection Strategies


Intrusion Detection System Over Abnormal Internet Sequence


Host-To-Host Congestion Control For Tcp

Knowledge-Based Interactive Post Mining Of Association Rules Using Ontology



Low Latency And Energy Efficient Routing Protocols For Wireless Sensor Networks


Managing Multidimensional Historical Aggregate Data In Unstructured P2p Networks


Mitigating Selective Forwarding Attacks With A Channel-Aware Approach In Wmns


Nymble: Blocking Misbehaving Users In Anonymzing Networks


On Modeling, Analysis, And Optimization Of Packet Aggregation Systems


On Wireless Scheduling Algorithms For Minimizing The Queue-Overflow Probability


P2p Reputation Management Using Distributed Identities And Decentralized Recommendation Chains


Providing End-To-End Secure Communications  In Wireless Sensor Networks


Random Access Transport Capacity

Saaas- The Mobile Agent Based Service For Cloud Computing In Internet Environment


Sat-Solving Approaches To Context-Aware Enterprise Network Security Management


Secure And Practical Outsourcing Of Linear Programming In Cloud Computing


Secure Data Collection In Wireless Sensor Networks Using Randomized Dispersive Routes


Traffic Management In Sensor Networks With A Mobile Sink


Trust Modeling In Social Tagging Of Multimedia Content


A Lightweight Algorithm For Message Type Extraction In System Application Logs


A Survey Of Indexing Techniques For Scalable Record Linkage And Deduplication


A Variable Length Data Encryption Technique Using Square Grid Transposition With Key Wrapping


Adaptive Fault-Tolerant Qos Control Algorithms For Maximizing System Lifetime Of Query-Based Wireless Sensor Networks


Automatic Detection Of Paroxysms In Eeg Signals Using Morphological Descriptors And Artificial Nural Networks


Trust Based Optimal Routing In Manet's


Data Mining For Xml Query-Answering Support


Development Of A Network Monitoring   System With Simple Ip Subnet Calculator Tool


Data Leakage Detection


Enabling Multi-Level Trust In Privacy  Preserving Data Mining



Maelstrom Transparent Error Correction For Communication Between Data Centers


Minimizing File Download Time In Stochastic Peer-To-Peer Networks


Development Of A Web Based Recruitment Process System For The Hr Group For A Company


Secure Data Collection In Wireless Sensor Networks Using Randomized Dispersive Routes




Trust Based Optimal Routing In Manet's


Watermarking Relational Databases Using Optimization-Based Techniques


Analysis Of Global K Mean And X Means Algorithms Using Tumor Classification


Traffic Management In Sensor Networks With A Mobile Sink



A Clustering Algorithm For Data Mining Based On Swarm Intelligence


A Distributed Explicit Rate Schemes In Multi-Input–Multi-Output Network Systems


Distributed Collaborative  Key  Agreement And Authentication Protocol For Dynamic Peer Groups


A Distributed Protocol To Serve Dynamic Groups For Peer-To-Peer Streaming


A Dynamic En-Route Filtering Scheme For Data Reporting In Wireless Sensor Networks



A Generic Multilevel Architecture For Time Series Prediction


A New Approach To Optical Networks Security: Attack-Aware Routing And Wavelength Assignment


A Two-Step Method For Clustering Mixed Categorical And Numeric Data


Active Re Ranking For Web Image Search

An Application For Web Mining Systems With Services Oriented Architecture


An Experience In Testing The Security Of Real-World Electronic Voting Systems


An Object Oriented Email Clustering Model Using Weighted Similarities Between Emails Attributes

Anonymous Query Processing In Road Networks


Answering General Time-Sensitive Queries




Aspect-Oriented Race Detection In Java



Assessing Software Service Quality And Trustworthiness At Selection Time


Bandwidth Estimation For Ieee802.11-Based Ad Hoc Networks

Call-Stack Coverage For Gui Test Suite Reduction


Carving And Replaying Differential Unit Test Cases From System Test Cases


Catching The Trend A Framework For Clustering Concept-Drifting Categorical Data

Closeness: A New Privacy Measure For Data Publishing

Conditional Shortest Path Routing In Delay Tolerant Networks


Cooperative Caching In Wireless P2p Networks: Design, Implementation, And Evaluation

A New Approach To Optical Network Security: Attack-Aware Routing And Wavelength Assignment

Deriving Concept-Based User Profiles From Search Engine Logs

Distributed Algorithms For Constructing Approximate Minimum Spanning Trees In Wireless Networks

Dynamic Routing With Security Considerations


Efficient And Dynamic Routing Topology Inference From End-To-End Measurements



Efficient Broadcasting In Mobile Ad Hoc Networks

Efficient Compression Of Encrypted Grayscale Images

Efficient Processing Of Metric Skyline Queries

Evaluation Of Accuracy In Design Pattern Occurrence Detection

Continuous Monitoring Of Spatial Queries In Wireless Broadcast Environments



Detecting Malicious Packet Losses

Ensuring Data Storage Security In Cloud Computing

Fast Rendering Algorithm Of Underwater Optical Effect


Finding Bugs In Web Applications Using Dynamic Test Generation And Explicit-State Model Checking  Communication

Flexible Rollback Recovery In Dynamic Heterogeneous Grid Computing

Message Authentication In Computationally Constrained Environments


Mobility Management Approaches For Mobile Ip Networks: Performance Comparison And Use Recommendations

Monitoring Online Tests Through Data Visualization

Monitoring The Application-Layer Ddos Attacks For Popular Websites


Multi-Path Dissemination In Regular Mesh Topologies


Optimized Resource Allocation For Software Release Planning


Security Analysis Of The Sasi Protocol


Sigfree A Signature-Free Buffer Overflow Attack Blocker


Traffic Management In Sensor Networks With A Mobile Sink


Wardrop Routing In Wireless Networks



A Signature-Based Indexing Method For Efficient Content-Based Retrieval Of Relative Temporal Patterns Content


A New Approach For Fec Decoding Based On The Bp Algorithm In Lte And Wimax Systems


A Privacy-Preserving Location Monitoring System For Wireless Sensor Networks


Clustering With Multi-Viewpoint Based Similarity Measure


Analysis On Credit Card Fraud Detection Methods


Delay Analysis And Optimality Of Scheduling Policies For Multi-Hop Wireless Networks


Discovering Conditional Functional Dependencies


Effective Navigation Of Query Results Based On Concept Hierarchies


Modeling And Detection Of Camouflaging Worm


Nymble


Ranking Spatial Data By Quality Preferences


Sat: A Security Architecture Achieving Anonymity And Traceability In Wireless Mesh Networks


Secure And Practical Outsourcing Of Linear Programming In Cloud Computing


Sketch4match – Content-Based Image Retrieval System Using Sketches


ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING


A Competitive Study Of Cryptography Techniques Over Block Cipher


SCALABLE AND COST-EFFECTIVE INTERCONNECTION OF DATA-CENTER SERVERS USING DUAL SERVER PORTS


DYNAMICS OF MALWARE SPREAD IN DECENTRALIZED  PEER-TO-PEER NETWORKS


Supporting Efficient And Scalable Multicasting Over Mobile Ad Hoc Networks


Cloud Computing For Agent-Based Urban Transportation Systems


CACHING STRATEGIES BASED ON INFORMATION DENSITY ESTIMATION IN WIRELESS AD HOC NETWORKS

Optimal Bandwidth Assignment For Multiple-Description-Coded Video


A FUZZY SELF-CONSTRUCTING FEATURE CLUSTERING ALGORITHM FOR TEXT CLASSIFICATION


A MACHINE LEARNING APPROACH FOR IDENTIFYING DISEASE-TREATMENT RELATIONS IN SHORT TEXTS


EMBEDDED EXTENDED VISUAL CRYPTOGRAPHY SCHEMES


Going Back And Forth: Efficient Multi Deployment And Multi Snapshotting On Clouds


A DUAL FRAMEWORK AND ALGORITHMS FOR TARGETED ONLINE DATA DELIVERY


Extended XML Tree Pattern Matching: Theories  And Algorithms


Buffer Sizing For 802.11 Based Networks



A Geometric Approach To Improving Active Packet Loss Measurement



A Precise Termination Condition Of The Probabilistic Packet Marking Algorithm

A Signature Based Indexing Method For Efficient Content-Based Retrieval Of Relative Temporal Pattern


Distributed Collaborative  Key  Agreement And Authentication Protocol For Dynamic Peer Groups


Glip: A Concurrency Control Protocol For Clipping Indexing

Active Source Routing Protocol For Mobile Networks


An Integrated Framework For Security And Dependability


An Suitable Programming Model For Error Control In Network Environment


Routing-Driven Key Management Scheme For Heterogeneous Wireless Sensor Networks


Bandwidth Estimation For Ieee802

Congestion Control Using Network Based Protocol


Quiver: Consistent Object Sharing For Edge Services


Constructing Inter-Domain Packet Filters To Control Ip


Cryptography Using Blowfish Algorithm


C-Trend: Temporal Cluster Graphs For Identifying And Visualizing Trends In
 Multi Attribute Transactional Data


Data Transmission Using Multi-Tasking-Sockets


Distributed Collaborative Key Agreement And Authentication Protocols For Dynamic Peer Groups


Distributed Cycle Minimization Protocol (Dcmp)

Dynamic Load Balancing In Distributed Systems In The Presence Of Delays


Dynamic Parallel Access


Secure Multi Signature Generation For Group Communication

Effective Key Generation For Multimedia And Web Application

Effective Transmission Of Data Through Rbph For Group Communication



Efficient And Secure Content Processing And Distribution By Cooperative Intermediaries

Efficient Key Management For Threshold-Multi Signature In Distributed System

Effective Key  Generation For Multimedia Application

Empowering The Rmi In Java Approach

Ensuring Data Storage Security In Cloud Computing


Error Control System In Network Environment


Evaluating The Efficacy Of Forward Error Correction Coding

Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis


File Sharing In Hybrid Model Based P2p Systems For The Expected High Churn


Flexible Rollback Recovery In Dynamic Heterogeneous Grid Computing


Transmitter Distributed Technology Or (Fuji Distribution)



A Geometric Approach To Improving Active Packet Loss Measurement

Glip: A Concurrency Control Protocol For Clipping Indexing

Graphical User Interface Art


Group Key Management And Secured Protocols   For   Peer   Group Communication

Hiding Sensitive Association Rules With Limited Side Effects

Image Enhancement Technology


Geo Special Matching For Image Retrieval

Data Hiding In An Image File Using Steganography

Implementing Multicast Distribution Through Recursive Unicast Trees


Increasing Efficiency In Wireless Network



Hacker Detection In Wireless Sensor Network


Intrusion Detection In Homogeneous And Heterogeneous Wireless Sensor Networks


Intrusion Detection System Over Abnormal Internet Sequence


Layer To Forward Protocol


Load Balancing


Location-Based Spatial Query Processing In Wireless Broadcast Environments


Minimizing The File Downloading In Peer To Peer Networks


Mitigating Performance Degradation In Congested Sensor Networks


Modeling And Automated Containment Of Worms


Monitoring The Application-Layer Ddos Attacks For Popular Websites


Multiple Routing Configurations For Fast Ip Network Recovery



On Natural Language Processing And Plan Recognition


Online Index Recommendations For High-Dimensional Databases Using Query Workloads


Online Detection And Prevention The Sql Injection Attacks


Quiver: Consistent Object Sharing For Edge Services


A Routing-Driven Key Management Scheme For Heterogeneous Wireless Sensor


Captcha As A Graphical Password


Packet Hiding Method For Selective Jamming Attacks


Efficient Data Collection For Large-Scale Mobile Monitoring Applications


Quality Of Service Provision In Cloud-Based Storage System For Multimedia Delivery


Secure Data Aggregation In Wireless Sensor Networks Filtering Out The Attacker’s Impact


Cloudqual A Quality Model For Cloud Services


Cross-Layer Approach For Minimizing Routing Disruption In Ip Networks


Distributed Mobile Sink Routing For Wireless Sensor Networks A Survey


Approximate Shortest Distance Computing A Query-Dependent
Local Landmark Scheme


Joint Topology-Transparent Scheduling And Qos Routing In Ad Hoc Networks


Privacy-Enhanced Web Service Composition


Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks


Multicast Capacity In Manet With Infrastructure Support


Multi-Core Embedded Wireless Sensor Networks Architecture And Applications


Fast And Secure Multi Hop Broadcast Solutions For Inter Vehicular Communication


Optimized Multicast Routing Algorithm Based On Tree Structure In Manets


Security Analysis Of Handover Key Management In 4g Lease Networks


Attribute-Based Access To Scalable Media In Cloud-Assisted Content Sharing Networks


Spatial Approximate String Search


Privacy-Preserving Public Auditing For Secure Cloud Storage


Automatic Test Packet Generation


Cooperative Caching For Efficient Data Access In Disruption Tolerant Networks


Secure And Efficient Data Transmission For Cluster-Based Wireless Sensor Networks


Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks


Click Prediction For Web Image Re-Ranking Using Multimodal Sparse Coding


Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data




Secure And Efficient Data Transmission For Cluster Based Wireless Sensor Network


Decentralized Access Control With Anonymous Authentication Of Data Stored In Clouds


Dynamic Query Forms For Database Queries


Dynamic Routing With Security Considerations


Efficient Authentication For Mobile And Pervasive Computing


Facilitating Effective User Navigation Through Website Structure Improvement


Fully Anonymous Profile Matching In Mobile Social Networks


Geo-Community-Based Broadcasting For Data Dissemination In Mobile Social Networks


Incentive Compatible Privacy-Preserving Data Analysis


Congestion Aware Routing In Nonlinear Elastic Optical Networks


A Hybrid Cloud Approach For Secure Authorized Deduplication


Accuracy-Constrained Privacy-Preserving Access Control Mechanism For Relational Data


Automatic Test Packet Generation


Congestion Aware Routing In Nonlinear Elastic Optical Networks


Cost Effective Resource Allocation Of Overlay Routing Relay Nodes


Decentralized Access Control With Anonymous Authentication Of Data Stored In Clouds


Efficient Authentication For Mobile And Pervasive Computing


Friend Book A Semantic-Based Friend Recommendation System For Social Networks


Key - Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage


Oruta Privacy-Preserving Public Auditing For Shared Data In The Cloud



Securing Broker Less Publish Subscribe Systems Using Identity Based Encryption


Security Evaluation Of Pattern Classifiers Under Attack


Supporting Privacy Protection In Personalized Web Search


The Design And Evaluation Of An Information Sharing System For Human Networks


Web Service Recommendation Via Exploiting Location And Qos Information


On The Node Clone Detection In Wireless Sensor Networks


Packet Loss Control Using Tokens At The Network Edge


Discovering Emerging Topics In Social Streams Via Link-Anomaly Detection


Privacy-Preserving Distributed Profile Matching In Proximity-Based Mobile Social Networks


Spatial Approximate String Search


The Design And Evaluation Of An Information Sharing System For Human Networks


The Three-Tier Security Scheme In Wireless Sensor Networks With Mobile Sinks

Vampire Attacks Draining Life From Wireless Ad-Hoc Sensor Networks


A Distributed Three-Hop Routing Protocol To Increase The Capacity Of Hybrid Wireless Networks


College Management System


Supporting Privacy Protection In Web Search


Automatic Test Packet Generation


Performance And Cost Evaluation Of An Adaptive Encryption Architecture For Cloud Databases


Supporting Privacy Protection In Personalized Web Search


Discovering Emerging Topics In Social Streams Via Link-Anomaly Detection


Decentralized Access Control With Anonymous Authentication Of Data Stored In Clouds


Distributed, Concurrent, And Independent


Efficient Authentication For Mobile And Pervasive       Computing

Efficient Prediction Of Difficult Keyword Queries Over Databases


Exploiting Service Similarity For Privacy In Location Based Search Queries


Expressive, Efficient, And Revocable Data

Facilitating Document Annotation Using

Fast Nearest Search

Friend Book A Semantic

Key-Aggregate Cryptosystem For Scalable

OCCT A ONE CLASS CLUSTERING TREE FOR IMPLEMENTING ONE TO MANY DATA LINKAGE


Optimal Distributed Malware Defense In Mobile

ORUTA A PRIVACY PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD


PACK PREDICTION BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM


Privacy-Preserving And Content-Protecting

Privacy-Preserving Multi-Keyword Ranked

PROFILR Toward Preserving Privacy And Functionality In Geosocial Networks


Qos-Guaranteed Bandwidth Shifting And Redistribution In Mobile Cloud Environment


Scalable Analytics For Iaas Cloud Availability

Scalable Distributed Service Integrity

Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks


Securing Broker Less Publish Subscribe Systems Using Identity Based Encryption


Security Evaluation Of Pattern Classifiers Under Attack

Supporting Privacy Protection In Personalized Web Search

Towards Differential Query Services In Cost -Efficient Clouds

Towards Online Shortest Path Computation


The Three-Tier Security Scheme In Wireless Sensor Networks With Mobile Sinks


Multiparty Access Control For Online Social Networks: Model And Mechanisms


Geo-Community-Based Broadcasting For Data Dissemination In Mobile Social Networks


Fully Anonymous Profile Matching In Mobile Social Networks


Ensuring Distributed Accountability For Data Sharing In The Cloud


The Three Tier Security Scheme In Wireless Sensor N/W's With Mobile Sinks


A Load Balancing Model Based On Cloud Partitioning For The Cloud

thank you for your comment

pls call me on 8125424511