Main Project Training | mini project training is part in BTech projects | Mtech projects | We support on Java project 100% Development | Dotnet project 100% Development | Android project 100% Development | PHP project 100% Development | MatLab project 100% Development | VLSI project 100% Development | MBA Projects support.Bulk projects with low price | paper publication with low prices | SS InfoTech Support for Engineering colleges projects works.
JAVA IEEE 2015/2014/203/2012/2011/2010/2009/2008
PROJECT LIST
TITLE
|
AI And Opinion Mining
|
Credit Card Fraud Detection
Using Hidden Markov Models 2008
|
Random Cast: An
Energy-Efficient Communication Scheme For Mobile Ad Hoc Networks
|
Detecting Malicious Packet
Losses 2009
|
IRM Integrated File
Replication And Consistency Maintenance In P2P Systems
|
Mobility Management
Approaches For Mobile IP Networks
|
Multicast Multi-Path Power
Efficient Routing In Mobile ADHOC Networks
|
A LEVEL SET METHOD FOR IMAGE
SEGMENTATION
|
A Network Coding Equivalent
Content Distribution Scheme For Efficient
|
A Personalized Ontology Model
For Web Information Gathering
|
A Secure Erasure Code-Based
Cloud Storage System With Secure Data Forwarding
|
A Secure Intrusion Detection
System Against DDOS Attack In Wireless Mobile Ad-Hoc Network
|
A Spatiotemporal Approach For
Secure Range Queries In Tiered Sensor Networks
|
A Trigger Identification
Service For Defending Reactive Jammers In Wireless Sensor Network
|
Adaptive Opportunistic
Routing For Wireless Ad Hoc Networks
|
AMPLE: An Adaptive Traffic
Engineering System Based On Virtual Routing Topologies
|
An Efficient Caching Scheme
And Consistency Maintenance In Hybrid P2P System
|
A New Cell-Counting-Based
Attack Against Tor
|
Automatic Discovery Of
Association Orders Between Name And Aliases From The Web Using Anchor
Texts-Based Co-Occurrences
|
Automatic Reconfiguration For
Large-Scale Reliable Storage Systems
|
BECAN: A Bandwidth-Efficient
Cooperative Authentication Scheme For Filtering Injected False Data In
Wireless Sensor Networks
|
BGP Churn Evolution: A
Perspective From The Core
|
Bloomcast: Efficient And
Effective Full-Text Retrieval In Unstructured P2P Networks
|
Bootstrapping Ontologies For
Web Services
|
Catching Packet Droppers And
Modifiers
|
CCD: A Distributed
Publish/Subscribe Framework For Rich Content Formats
|
Cloud Computing Security From
Single To Multi Cloud
|
Cloud Data Protection For The
Masses
|
Clustering With Multiview
Point-Based Similarity Measure
|
Compressed-Sensing-Enabled
Video Streaming For Wireless Multimedia Sensor Networks
|
CONCURRENT TRAIN SIMULATION
|
Fairtorrent A Deficit-Based
Distributed Algorithm
|
Fast Data Collection
|
Firecol A Collaborative
Protection
|
FOGCOMPUTING
|
Footprint Detecting Sybil
Attacks In Urban Vehicular Networks
|
Game-Theoretic Pricing For
Video Streaming In
|
Confucius A Tool Supporting
Collaborative Scientific Workflow Composition
|
Cooperative Caching In
Wireless P2pnetworks Design, Implementation, And Evaluation
|
Cooperative Provable Data
Possession For Integrity Verification In Multi-Cloud Storage
|
Credit Card Fraud Detection
Using Hidden Markov Models 2008
|
Cut Detection In Wireless
Sensor Networks
|
Modeling And Detection Of
Camouflaging Worm
|
Data Integrity Proofs In
Cloud Storage
|
Data Leakage Detection
|
Defenses Against Large Scale
Online Password Guessing Attacks
By Using Persuasive Click
Points
|
Design And Implementation Of
TARF
|
Detecting And Resolving
Firewall Policy Anomalies
|
Detecting Malicious Packet
Losses 2009
|
Detecting And Resolving
Firewall Policy Anomalies
|
Detecting Spam Zombies By
Monitoring Outgoing Messages
|
Detection Of Selfish Nodes In
Networks Using Coopmac Protocol With ARQ
|
Distributed Packet Buffers
For High-Bandwidth Switches And Routers
|
Doubleguard: Detecting
Intrusions In Multitier Web Applications
|
Effective Pattern Discovery
For Text Mining
|
Expert Discovery And
Interactions In Mixed Service Oriented Systems
|
Efficient Audit Service
Outsourcing For Data Integrity In Clouds
|
Efficient Error Estimating
Coding: Feasibility And Applications
|
Efficient Fuzzy Type-Ahead
Search In XML Data
|
Efficient Similarity Search
Over Encrypted Data
|
Energy-Efficient Cooperative
Videodistribution With Statistical Qosprovisions Over Wireless Networks
|
Energy-Efficient Protocol For
Cooperative Networks
|
Ensuring Distributed
Accountability For Data Sharing
|
Grouping-Enhanced Resilient
Probabilistic En-Route Filtering Of Injected False Data In Wsns
|
Handling Selfishness In
Replica Allocation Over Mobile Adhoc Network
|
Handwritten Chinese Text Recognition
By Integrating Multiple
Contexts
|
HASBE A Hierarchical
Attribute-Based Solution
|
Independent Directed Acyclic
Graphs For Resilient Multi Path Routing
|
Jamming-Aware Traffic
Allocation For Multiple-Path Routing Using Portfolio Selection
|
Insights On Media Streaming
Progress Using Bittorrent-Like Protocols For On-Demand Streaming
|
Toward Secure And Dependable
Storage Services In Cloud Computing
|
Tree-Based Mining For
Discovering Patterns Of Human Interaction In Meetings
|
Trust Modeling In Social
Tagging Of Multimedia Content
|
Joint Relay And Jammer
Selection For Secure Two-Way Relay Networks
|
Latency Equalization As A New
Network Service Primitive
|
Learn To Personalized Image
Search From Photo Sharing Web Site
|
Load-Balancing Multipath
Switching System With Flow
Slice
|
Measurouting: A Framework For
Routing Assisted Traffic Monitoring
|
Multibiometric Cryptosystems
Based On Feature-Level Fusion
|
Multiparty Access Control For
Online Social Networks Model And Mechanisms
|
Network Assisted Mobile
Computing With Optimal Uplink Query Processing
|
Network Coding Based Privacy
Preservation Against Traffic Analysis In Multi-Hop Wireless Networks
|
Nymble
|
Online Modeling Of Proactive
Moderation System For Auction
Fraud Detection
|
Optimal Power Allocation In
Multi-Relay MIMO Cooperative Networks: Theory And Algorithms
|
Optimal Source-Based
Filtering Of Malicious Traffic
|
Optimizing Bloom Filter
Settings In Peer To Peer Multi Searching
|
Organizing User Search Histories
|
Outsourced Similarity Search
On Metric Data Assets
|
On Optimizing Overlay
Topologies For Search In Unstructured Peer-To-Peer Networks
|
Portable Cloud Services Using
TOSCA
|
Privacy- And
Integrity-Preserving Range Queries In Sensor Networks
|
Probabilistic Exposure Fusion
|
Progmetowards Programmable
Network Measurement
|
Protecting Location Privacy
In Sensor Networks Against A Global Eavesdropper
|
Ranking Model Adaptation For
Domain Specific Search
|
RIHT: A Novel Hybrid IP Trackback
Scheme
|
Risk-Aware Mitigation In
Wireless Sensor Networks
|
Robust Correlation Of
Encrypted Attack Traffic Through Stepping Stones By Flow Watermarking
|
Robust Face-Name Graph
Matching For Movie Character Identification
|
Scalable And Secure Sharing
Of Personal Health
|
Secure And Efficient Handover
Authentication Based On Bilinear Pairing Functions
|
Securing Node Capture Attacks
For Hierarchical Data Aggregation
|
Self Adaptive Contention
Aware Routing Protocol For Intermittently Connected Mobile Networks
|
Semi Supervised Biased
Maximum Margin Analysis For Interactive Image Retrieval
|
Slicing: A New Approach To
Privacy Preserving Data Publishing
|
SPOC: A Secure And
Privacy-Preserving Opportunistic Computing
Framework For Mobile-Healthcare
Emergency
|
The Geometric Efficient
Matching Algorithm For Firewalls
|
A Distributed Publish
Subscribe Framework For Rich Content Formats
|
A Network Coding Equivalent
Content Distribution Scheme For Efficient Peer-To-Peer Interactive
Vodstreaming(2012)
|
A Neuro-Fuzzy Software Cost
Estimation Tool
|
A Secure Erasure Code-Based
Cloud Storage System With Secure Data Forwarding(2012)
|
An Efficient Self-Organized
Authentication And Key Management Scheme For Distributed Multihop Relay-
Based IEEE 802.16 Networks(2011)
|
Autonomy-Oriented
Self-Equilibrium Routing Model In Traffic Networks(2010)
|
Client Server Protocol
Implementation
|
Closeness A New Privacy Measure For Data
Publishing(2010)
|
Clustering With Multi View
Point Based
|
Conditional Shortest Path
Routing In Delay Tolerant Networks(2010)
|
Cut Detection In Wireless
Sensor Networks(2012)
|
Data Centric Knowledge
Management System
|
Design And Implementation Of
TARF A Trust-Aware Routing
Framework For Wsns(2012)
|
Design, Implementation, And
Performance Of A Load Balancer For SIP Server Clusters(2012)
|
Distributed Explicit Rate
Schemes In Multi-Input-Multi-Output Network Systems(2010)
|
Distributed Packet Buffers
For High-Bandwidth Switches And Routers(2012)
|
Double Guard Detecting
Intrusions In Multitier Web Applications(2012)
|
Efficient Error Estimating
Coding Feasibility And Applications(2012)
|
HASBE A Hierarchical Attribute-Based Solution
For Flexible And Scalable Access Control In Cloud Computing(2012)
|
Handling Selfishness In
Replica Allocation Over A Mobile Ad Hoc Network(2012)
|
Independent Directed Acyclic
Graphs For Resilient Multipath Routing(2012)
|
ISP Automation
|
Latency Equalization As A New
Network Service Primitive(2012)
|
Learn To Personalized Image
Search From The Photo Sharing Websites(2012)
|
Outsourced Similarity Search
On Metric Data Assets(2012)
|
Managing Multidimensional
Historical Aggregate Data In Unstructured P2P Networks(2010)
|
P2P Reputation Management
Using Distributed Identities And Decentralized Recommendation Chains(2010)
|
Packet Loss Control Using
Tokens At The Network Edge(2012)
|
Packet-Hiding Methods For
Preventing Selective Jamming Attacks(2012)
|
Providing Rate Guarantees For
Internet Application Traffic Across ATM Networks(2009)
|
Secure And Practical
Outsourcing Of Linear Programming In Cloud Computing(2011)
|
Sleep Scheduling For Critical
Event Monitoring In Wireless Sensor Networks(2012)
|
The Coquosapproach To
Continuous Queries In Unstructured Overlays(2011)
|
Toward Reliable Data Delivery
For Highly Dynamic Mobile Ad Hoc Networks(2012)
|
Water Marking
|
A Precise Termination
Condition Of The Probabilistic Packet Marking Algorithm(1)
|
A Geometric Approach To
Improving Active Packet Loss Measurement
|
Authentication Of Secret
Information In Image Steganography
|
Mitigating Performance
Degradation In Congested Sensor Networks
|
A Signature Based Indexing
Method For Efficient Content-Based Retrieval Of Relative Temporal Path
|
Netsurey Simulation
|
Active Source Routing
Protocol For Mobile Networks
|
An Suitable Programming Model
For Error Control In Network Environment(1)
|
Bandwidth Estimation For IEEE
802
|
Client-Server Protocol
Implementation
|
Congestion Control Using
NETWORK BASED PROTOCOL
|
Constructing Inter-Domain
Packet Filters To Control IP Spoofing
Based On BGP Updates
|
Data Transmission Using
Multi-Tasking-Sockets
|
NETWORK BORDER PATROL
|
Network Database Junction
|
Network Routing
|
Online Index Recommendations
For High-Dimensional Databases Using Query Workloads
|
C-TREND: Temporal Cluster
Graphs For Identifying And Visualizing Trends In Multiattribute Transactional Data
|
Distributed Collaborative Key
Agreement And Authentication Protocols For Dynamic Peer Groups(1)
|
Group Key Management And
Secured Protocols For Peer Group Communication
|
Hiding Sensitive Association
Rules
|
Image Enhancement Technology
|
Image-Retrieval-Using-Geo-Spatial-Matching
|
Implementation Of Bpcs-Steganography
|
Implementing Multicast
Distribution Through Recursive Unicast Trees
|
Increasing Efficiencyin
Wireless Network
|
Implementation Of Eccentric
Network For Intranet
|
Effective Key Generation For
Multimedia And Web Application
|
Effective Transmission Of
Data Through RBPH For Group Communication
|
Secured Distributed Key
Management For Threshold-Multi Signature Using Cryptography
|
Security For Domain Name
System
|
Security In Large Networks
Using Mediator Protocols(Quantumkey)
|
SECURITY SYSTEM FOR DNS USING
CRYPTOGRAPHY
|
Security On Domain Name
System
|
Self-Interested Routing In Online Environment
|
Shortest Path
|
Re-Ordering Of Packets Using
Retransmission Timer
|
A Wireless Distributed
Intrusion Detection System And A New Attack Model
|
Route Reservation In Inter
Networks
|
Route Stability In Manets
Under The Random Direction Mobility Model
|
Problem Oriented Software
Engineering Solving The Package Router Control Problem
|
Proposed Key Generation For
Multimedia Application
|
Quiver Consistent Object
Sharing For Edge Services
|
Rate Allocation And Network
Lifetime Problems For Wireless Sensor Networks
|
Efficient Key Management For
Threshold-Multi Signature In Distributed System
|
Empowering The RMI In Java
Approach
|
Enterprise-Scheme-Planner-And-Monitoring
|
Pling Based Metrics Form
Easuring The Quality Of A Software
|
Error Control System In
Network Environment
|
Error Tracking System
|
LAYER TO FORWARD PROTOCOL
|
Error Control System In
Network Environment
|
Geometric-Approach-For-Improving-Active-Packet-Loss
|
LOAD BALANCING
|
Location-Based Spatial Query
Processing In Wireless Broadcast Environments
|
Mitigating Performance
Degradation In Congested Sensor Networks
|
Mobile Technology
|
Online Index Recommendations
For High-Dimensional Databases Using Query Workloads
|
Modeling And Automated
Containment Of Worms
|
On Natural Language
Processing And Plan Recognition
|
NDT A Model-Driven Approach
For Web Requirements
|
Intrusion Detection In
Homogeneous And Heterogeneous Wireless Sensor Networks
|
Three Party Authentication
For Key Distributed Protocol Using
Classical And Quantum Cryptography
|
Two Techniques For Fast
Computation Of Constrained Shortest Paths
|
Using The Conceptual Cohesion
Of Classes For Fault Prediction In Object-Oriented Systems
|
Vehicle Identification
|
Vehicle-Traffic-Management-Control-System
|
Evaluating The Efficacy Of
Forward Error Correction Coding
|
File Sharing In Hybrid Model
Based P2P Systems For The Expected
High Churn
|
DCMP: A DISTRIBUTED CYCLE
MINIMIZATION PROTOCOL FOR PEER-TO-PEER NETWORKS
|
Mona: Secure Multi-Owner Data
Sharing For Dynamic Groups In The Cloud
|
A Query Formulation Language
For The Data Web
|
A Secure Erasure Code-Based
Cloud Storage System With Secure Data Forwarding
|
A System To Filter Unwanted
Messages From OSN User Walls
|
Adaptive Opportunistic
Routing For Wireless Ad Hoc Networks
|
Adaptive Provisioning Of Human Expertise In Service-Oriented Systems |
An Efficient Caching Scheme And Consistency Maintenance In Hybrid P2P System |
Attribute Based Access To Scalable Media |
Capcity Based Cryptograpic
Data Access Control In Cloud Computing
|
Centralized Authentication
Registrt
|
Cloud Computing Security From
Single To Multy Cloud
|
Cloud Data Protection For The Masses |
Cloud FTP: A Case Study Of Migrating Traditional Applications To The Cloud |
Cloudmov: Cloud-Based Mobile Social TV |
Clustering With Multiviewpoint-Based Similarity Measure |
Comparable Entity Mining From Comparative Questions |
Data Integrity Proofs In Cloud Storage |
Delay Analysis And Optimality Of Scheduling Policies |
Design And Implementation Of TARF |
Detecting Spam Zombies By Monitoring Outgoing Messages |
Distributed Cooperative Caching In Social Wireless Networks |
Efficient Fuzzy Type-Ahead Search In XML Data |
Dynamic Resource Allocation
Using Virtual Machines For Cloud Computing Environment
|
Efficient Fuzzy Type-Ahead Search In XML Data |
EFFICIENT PATTERN TEXT MINING |
Efficient Similarity Search Over Encrypted Data |
Exploring Application-Level Semantics For Data Compression |
Extended XML Tree Pattern Matching Theories And Algorithms |
Fast Data Collection In Tree-Based Wireless Sensor Networks |
Fast Clustering Based Feature
Selection Algorithm
|
Focus Learning To Crawl Web
Forums
|
Handling Selfishness In
Replica Allocation Over A Mobile Ad Hoc Network
|
Incentive Compatible Privacy-Preserving Data Analysis |
Informative Content Extraction
By Using Eifce[Effective Informative Content Extractor
|
Measurouting: A Framework For
Routing Assisted Traffic Monitoring
|
Mechanism Design-Based Secure Leader Election |
NETWORK INTRUSION DETECTION
AND COUNTERMEASURE
|
Packet Loss Control Using Tokens |
Privacy Preserving Data Sharing With Anonymous ID Assignment |
Privacy-Preserving Public Auditing For Secure Cloud Storage |
Query Formulation Language For The Data Web Ranking Model Adaptation For Domain-Specific Search |
Resource Out Sourcing |
Robust Video Data Hiding
Using Forbidden Zone Data Hiding And Selective Embedding
|
Secure And Scalable PHR In
Cloud Computing
|
Security And Privacy
Enhancing Multi Cloud Architecture
|
Sensitive Label Privacy
Protection On Social Network Data
|
SLEEP SCHDULING FOR CRITICAL
EVENT MONITORING
|
SORT: A Self-Organizing Trust
Model For Peer-To-Peer Systems
|
Spatial Strina Approximate
String Search
|
Super Resolution In Painting
|
Tamper Detection
|
Design And Implementation Of
TARF: A Trust-Aware Routing Framework For Wsns
|
Video Streaming File Merging
|
Voronoi-Based Continuous
Query Processing For Mobile Users
|
Portable Cloud Services Using
TOSCA
|
Privacy- And
Integrity-Preserving Range Queries
|
Privacy Preserving Decision
Tree Learningusing Unrealized Data Sets
|
Probabilistic Exposure Fusion
|
Risk-Aware Mitigation
|
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute-Based Encryption |
Slicing: A New Approach To Privacy Preservingdata Publishing |
Trust Modeling In Social
Tagging Of Multimedia Content
|
Vehicle Detection |
An Efficient Caching Scheme
And Consistencymaintenance In Hybrid P2P System
|
Automatic Discovery Of Association
Orders Between Name And Aliases From The Web Using Anchor Texts-Based
Co-Occurrences
|
BGP Churn Evolution: A Perspective From The Core |
Bloomcast: Efficient And Effective Full-Text Retrieval In Unstructured P2P Networks |
Bootstrapping Ontologies For Web Services |
Catching Packet Droppers And Modifiersin Wireless Sensor Networks |
CCD: A Distributed Publish/Subscribeframework For Rich Content Formats |
Cloud Computing Security From Single To Multi-Clouds |
Cloud Data Protection For The Masses |
Clustering With Multiviewpoint-Based Similarity Measure |
Confucius A Tool Supporting
Collaborative Scientific Workflow Composition
|
Cooperative Provable Data Possession For Integrity Verification In Multi-Cloud Storage |
Cut Detection In Wireless Sensor Networks |
Design And Implementation Of
TARF
|
Design, Implementation, And Performance Of A Load Balancer For SIP Server Clusters |
Detecting And Resolving Firewall Policy Anomalies |
Detecting Spam Zombies By Monitoring Outgoing Messages |
Distributed Packet Buffers For High-Bandwidth Switches And Routers |
Doubleguard: Detecting Intrusions In Multitier Web Applications |
Efficient Error Estimating Coding:Feasibility And Applications |
Efficient Fuzzy Type-Ahead
Search In XML Data
|
Efficient Similarity Search Over Encrypted Data |
Energy-Efficient Cooperative
Video Distribution With Statistical Qos Provisions Over Wireless Networks
|
ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING |
Fast Data Collection In Tree-Based
Wireless Sensor Networks
|
Firecol: A Collaborative
Protection Network For The Detection Of Flooding Ddos Attacks
|
FOGCOMPUTING |
Footprint Detecting Sybil
Attacks In Urban Vehicular Networks
|
Game-Theoretic Pricing For Video Streaming In Mobile Networks |
Handling Selfishness In Replica Allocation Over A Mobile Ad Hoc Network |
Handwritten Chinese Text Recognition By Integrating Multiple Contexts |
HASBE: A Hierarchical Attribute-Based Solution For Flexible And Scalable Access Control In Cloud Computing |
Independent Directed Acyclic Graphs For Resilient Multipath Routing |
Insights On Media Streaming Progress Using Bittorrent-Like Protocols For On-Demand Streaming |
Toward Secure And Dependable
Storage Services In Cloud Computing
|
Latency Equalization As A New
Network Service Primitive
|
Learn To Personalized Image
Search From The Photo Sharing Websites
|
Load-Balancing Multipath
Switching System With Flow Slice
|
Measurouting: A Framework For
Routing Assisted Traffic Monitoring
|
MULTIPARTY ACCESS CONTROL FOR
ONLINE SOCIAL NETWORKS MODEL AND MECHANISMS
|
On Optimizing Overlay
Topologies For Search In Unstructured Peer-To-Peer Networks
|
Online Modeling Of Proactive
Moderation System For Auction Fraud Detection
|
Optimal Source-Based
Filtering Of Malicious Traffic
|
Optimizing Bloom Filter
Settings In Peer-To-Peer Multi-Keyword Searching
|
Organizing User Search
Histories
|
Outsourced Similarity Search
On Metric Data Assets
|
Packet Loss Control Using
Tokens At The Network Edge
|
Packet-Hiding Methods For
Preventing Selective JAMMING ATTACKS
|
Portable Cloud Services Using
TOSCA
|
Privacy- And
Integrity-Preserving Range Queries In Sensor Networks
|
Probabilistic Exposure Fusion
|
Protecting Location Privacy
In Sensor Networks Against A Global Eavesdropper
|
Ranking Model Adaptation For
Domain-Specific Search
|
RIHT A Novel Hybrid IP
Traceback Scheme
|
Risk-Aware Mitigation
|
Scalable And Secure Sharing
Of Personal Health Records In Cloud Computing Using Attribute-Based
Encryption
|
Self Adaptive Contention
Aware Routing Protocol For Intermittently Connected Mobile Networks
|
Slicing: A New Approach To
Privacy Preserving Data Publishing
|
Toward Reliable Data Delivery
For Highly Dynamic Mobile Ad Hoc Networks
|
Toward Secure And Dependable
Storage Services In Cloud Computing
|
In Tags We Trust: Trust Modeling In Social Tagging Of
Multimedia Content
|
Vehicle Detection In Aerial
Surveillance Using Dynamic Bayesian Networks
|
A Competitive Study Of
Cryptography Techniques Over Block Cipher
|
A Cross Layer Architecture
For Multicast And Unicast Video Transmission In Mobile Broadband Networks
|
A Distributed Algorithm For
Finding All Best Swap Edges Of A Minimum Diameter Spanning Tree
|
A Dual Framework And
Algorithms For Targeted Online Data Delivery
|
A Machine Learning Approach
For Identifying Disease-Treatment Relations In Short Texts
|
A New Approach For Fec Decoding Based On The Bp Algorithm In Lte And Wimax Systems |
A New Method For Generating All Positive And Negative Association Rules |
A Permutation-Based Algorithm To Optimally Reschedule Trains In A Railway Traffic Network |
A Privacy-Preserving Location Monitoring System For Wireless Sensor Networks |
A Signature-Based Indexing
Method For Efficient Content-Based Retrieval Of Relative Temporal Patterns
|
A Study On Certificate Revocation In Mobile Ad Hoc Networks |
Advanced Routing Technology For Fast Internet Protocol Network Recovery |
Agent-Based Urban Cloud Computing Transportation Systems |
An Efficient Density Based Improved K- Medoids Clustering Algorithm |
An Efficient Paging Scheme For Terminal Mobility Using Personal Mobility Management Information In Interworked Fixed And Mobile Networks |
An Efficient Self-Organized Authentication And Key Management Scheme For Distributed Multihop Relay- Based Ieee802.16 Networks |
Analysis On Credit Card Fraud Detection Methods |
Buffer Sizing For 802.11 Based Networks |
Secure And Practical Outsourcing Of Linear Programming In Cloud Computing |
Cloud Computing For
Agent-Based Urban Transportation Systems
|
Clustering With Multi-Viewpoint Based Similarity Measure |
Computational Perceptual Features For Texture Representation And Retrieval |
Conceptual Cohesion Of
Classes In Object Oriented Systems
|
Cooperative Caching In Wireless P2pnetworks Design, Implementation, And Evaluation |
Modeling And Detection Of Camouflaging Worm |
Data Leakage Detection |
Decision Trees For Uncertain Data |
Delay Analysis And Optimality Of Scheduling Policies For Multi-Hop Wireless Networks |
Denial Of Service Attacks In Wireless Networks The Case Of Jammers |
Discovering Conditional
Functional Dependencies
|
Dynamic Channel Allocation For Wireless Sensor Networks |
Dynamics Of Malware Spread In Decentralized Peer-To-Peer Networks |
Effective Navigation Of Query Results Based On Concept Hierarchies |
Efficient Public Key Certificate Management For Mobile Ad Hoc Networks |
Embedded Extended Visual Cryptography Schemes |
Enabling Public Auditability And Data Dynamics For Storage Security In Cloud Computing |
Evaluating The Vulnerability
Of Network Traffic Using Joint Security And Routing Analysis
|
Extended Xml Tree Pattern Matching Theories |
Going Back And Forth: Efficient Multi Deployment And Multi Snapshotting On Clouds |
Glip: A Concurrency Control
Protocol For Clipping Indexing
|
Implementation Of Lsb Steganography And Its Evaluation For Various File Formats |
Intrusion Detection: An Energy Efficient Approach In Heterogeneous Wsn |
Live Streaming With Receiver-Based Peer-Division Multiplexing |
Location Aided Flat Hybrid
Routing Protocol (Lafhrp)
|
Modeling And Detection Of
Camouflaging Worm
|
Multiple Routing
Configurations For Fast Ip Network Recovery
|
Nymble: Blocking Misbehaving
Users In Anonym Zing Networks
|
Optimal Bandwidth Assignment
For Multiple-Description-Coded Video
|
Particle Swarm Optimization:
Technique, System And Challenges
|
Providing Rate Guarantees For
Internet Application Traffic Across Atm Networks
|
Ranking Spatial Data By
Quality Preferences
|
Robust Video Data Hiding
Using Forbidden Zone Data Hiding And Selective Embedding
|
Sat: A Security Architecture
Achieving Anonymity And Traceability In Wireless Mesh Networks
|
Scalable And Cost-Effective
Interconnection Of Data-Center Servers Using Dual Server Ports
|
Secure Data Collection In
Wireless Sensor Networks Using Randomized Dispersive Routes
|
Detection Of Selfish Nodes In
Networks Using Coopmac Protocol With Arq
|
Sketch4match – Content-Based
Image Retrieval System
|
Supporting Efficient And
Scalable Multicasting Over Mobile Ad Hoc Networks
|
Interval Ckmeans: An
Algorithm For Clustering Symbolic Data
|
Temporal Data Clustering Via
Weighted Clustering Ensemble With Different Representations
|
The Coquos Approach To
Continuous Queries In Unstructured
Overlays
|
Voronoi-Based Continuous
Query Processing For Mobile Users
|
Wireless Sensor Networks: A
Study On Congestion Routing Algorithms
|
Xlp: A Cross-Layer Protocol
For Efficient Communication In Wireless Sensor Networks
|
A Competitive Study Of
Cryptography Techniques Over Block Cipher
|
A Dual Framework And
Algorithms For Targeted Online Data Recovery
|
A Fuzzy Self-Constructing Feature
Clustering Algorithm For Text Classification
|
A Level Set Method For Image
Segmentation In The Presence Of Intensity In Homogeneities With Application
To Mri
|
A Machine Learning Approach
For Identifying Disease-Treatment Relations In Short Texts
|
A New Approach For Fec
Decoding Based On The Bp Algorithm In Lte And Wimax Systems
|
Sat: A Security Architecture
Achieving Anonymity And Traceability In Wireless Mesh Networks
|
Analysis On Credit Card Fraud
Detection Methods
|
Buffer Sizing For 802.11
Based Networks Chains
|
Caching Strategies Based On
Information Density Estimation In Wireless Ad Hoc Networks
|
Cloud Computing For
Agent-Based Urban Transportation Systems
|
Clustering With
Multi-Viewpoint Based Similarity Measure
|
Computational Perceptual
Features For Texture Representation And Retrieval
|
Cooperative Caching In
Wireless P2pnetworks Design, Implementation, And Evaluation
|
Delay Analysis And Optimality
Of Scheduling Policies For Mulity Hop Wireless Networks
|
Discovering Conditional
Functional Dependencies
|
Dynamics Of Malware Spread In
Decentralized Peer-To-Peer Networks
|
Effective Navigation Of Query
Results Based On Concept Hierarchies
|
Energy-Efficient Protocol For
Cooperative Networks
|
Extended Xml Tree Pattern
Matching: Theories And Algorithms
|
A Dual Framework And
Algorithms For Targeted Online Data Delivery
|
Embedded Extended Visual
Cryptography Schemes
|
Scalable And Cost-Effective
Interconnection Of Data-Center Servers Using Dual Server Ports
|
Cloud Computing For
Agent-Based Urban Transportation Systems
|
Supporting Efficient And
Scalable Multicasting Over Mobile Ad Hoc Networks
|
A Machine Learning Approach
For Identifying Disease-Treatment Relations In Short Texts
|
Caching Strategies Based On
Information Density Estimation In Wireless Ad Hoc Networks
|
Optimal Bandwidth Assignment
For Multiple-Description-Coded Video
|
Dynamics Of Malware Spread In
Decentralized Peer-To-Peer Networks
|
A Fuzzy Self-Constructing
Feature Clustering Algorithm For Text Classification
|
Going Back And Forth:
Efficient Multi Deployment And Multi Snap Shotting On Clouds
|
A Distributed Csma Algorithm
For Throughput And Utility Maximization In Wireless Networks
|
A Distributed Protocol To Serve
Dynamic Groups For Peer-To-Peer Streaming
|
A Dynamic En-Route Filtering
Scheme For Data Reporting In Wireless Sensor Networks
|
A Dynamic En-Route Filtering
Scheme For Data Reporting In Wireless Sensor Networks
|
A Generic Multilevel
Architecture For Time Series Prediction
|
A New Approach To Optical Networks Security: Attack-Aware Routing And Wavelength Assignment |
A Two-Step Method For Clustering Mixed Categroical And Numeric Data |
Active Re Ranking For Web Image Search |
Always Acyclic Distributed Path Computation |
An Application For Web Mining Systems With Services Oriented Architecture |
An Experience In Testing The Security Of Real-World Electronic Voting Systems |
An Object Oriented Email Clustering Model Using Weighted Similarities Between Emails Attributes |
Anonymous Query Processing In Road Networks |
Answering General Time-Sensitive Queries |
Aspect-Oriented Race Detection In Java |
Assessing Software Service Quality And Trustworthiness At Selection Time |
Autonomy-Oriented, Self-Equilibrium Routing Model In Traffic Networks |
Binrank: Scaling Dynamic Authority-Based Search Using Materialized Sub Graphs |
Catching The Trend: A Framework For Clustering Concept-Drifting Categorical Data |
A Framework For An Adaptive Intrusion Detection System Using Bayesian Network |
A High-Capacity Steganography Scheme For Jpeg2000 Baseline System |
A Secure Group Key Management Scheme For Sensor Networks |
Bsmr Byzantine-Resilient Secure Multicast
Routing In Multihop Wireless Networks
|
Captcha |
Dart: Dynamic Address Routing
For Scalable Ad Hoc And Mesh Networks
|
Message Encryption Scheme Using Cheating Text |
Enhanced Text Steganography In Sms |
Information Hiding A New Approach In Text Steganography |
Multiple Routing Configurations For Fast Ip Network Recovery Measurements |
On Path Selection And Rate
Allocation For Video In Wireless Mesh Networks
|
On The Security Of An Efficient Time-Bound Hierarchical Key Management Scheme |
On The Security Of Route Discovery In Manets |
On Unbiased Sampling For Unstructured Peer-To-Peer Networks |
Online Detection And Prevention Of Phishing Attacks In Wireless Broadcast Environments |
Optimally Dos Resistant P2p Topologies For Live Multimedia Streaming |
Path-Diversity P2p Overlay Retransmission For Reliable Ip-Multicast |
Collaborative Sensing To Improve Information Quality
|
Conditional Shortest Path Routing In Delay Tolerant Networks Communication |
Cooperative Caching In Wireless P2pnetworks Design, Implementation, And Evaluation Heterogeneous Grid Computing |
Deriving Concept-Based User Profiles From Search Engine Logs Constrained Environments |
Distributed Algorithms For Constructing Approximate Minimum Spanning Trees In Wireless Networks |
Distributed Explicit Rate Schemes In Multi-Input–Multi-Output Network Systems |
Efficient Compression Of Encrypted Grayscale Images |
Ensuring The Data
Accountability In Cloud Storage
|
Evaluation Of Accuracy In
Design Pattern Occurrence Detection
|
Achieving Network Level
Privacy In Wireless Sensor Networks
|
Agent Based Efficient Anomaly
Intrusion Detection System In Adhoc Networks
|
Conditional Shortest Path
Routing In Delay Tolerant Networks
|
Imine Mining Association
Rules With Item Constraints
|
An Efficient Key Management
Scheme For Secure Data Access Control In Wireless Broadcast Server
|
Layered Approach Using
Conditional Random Fields For Intrusion Detection
|
Minimizing Delay And
Maximizing Lifetime For Wireless Sensor Networks With Any Cast
|
Mitigating Denial-Of-Service
Attacks On The Chord Overlay Network A Location Hiding Approach
|
Monitoring Online Tests Thru
Data Visualization
|
Optimal Jamming Attack
Strategies And Network Defense Policies In Wireless Sensor Networks
|
A User-Level Tool For
Inferring Router Packet Forwarding
Priority
|
Saaas- The Mobile Agent Based
Service For Cloud Computing In Internet Environment
|
Extended Xml Tree Pattern
Matching: Theories And Algorithms
|
Finding Bugs In Web
Applications Using Dynamic Test Generation And Explicit-State Model Checking
|
Fivatech: Page-Level Web Data
Extraction From Template Pages
|
Fog Computing Mitigating
Insider Data Theft Attacks In The Cloud
|
Fuzzy Keyword Search Over
Encrypted Data Using Cloud Computing
|
Grid Scheduling Based On
Collaborative Random Early Detection Strategies
|
Intrusion Detection System
Over Abnormal Internet Sequence
|
Host-To-Host Congestion
Control For Tcp
|
Knowledge-Based Interactive
Post Mining Of Association Rules Using Ontology
|
Low Latency And Energy
Efficient Routing Protocols For Wireless Sensor Networks
|
Managing Multidimensional
Historical Aggregate Data In Unstructured P2p Networks
|
Mitigating Selective
Forwarding Attacks With A Channel-Aware Approach In Wmns
|
Nymble: Blocking Misbehaving
Users In Anonymzing Networks
|
On Modeling, Analysis, And
Optimization Of Packet Aggregation Systems
|
On Wireless Scheduling
Algorithms For Minimizing The Queue-Overflow Probability
|
P2p Reputation Management
Using Distributed Identities And Decentralized Recommendation Chains
|
Providing End-To-End Secure
Communications In Wireless Sensor
Networks
|
Random Access Transport
Capacity
|
Saaas- The Mobile Agent Based
Service For Cloud Computing In Internet Environment
|
Sat-Solving Approaches To
Context-Aware Enterprise Network Security Management
|
Secure And Practical
Outsourcing Of Linear Programming In Cloud Computing
|
Secure Data Collection In
Wireless Sensor Networks Using Randomized Dispersive Routes
|
Traffic Management In Sensor
Networks With A Mobile Sink
|
Trust Modeling In Social
Tagging Of Multimedia Content
|
A Lightweight Algorithm For
Message Type Extraction In System Application Logs
|
A Survey Of Indexing Techniques
For Scalable Record Linkage And Deduplication
|
A Variable Length Data
Encryption Technique Using Square Grid Transposition With Key Wrapping
|
Adaptive Fault-Tolerant Qos
Control Algorithms For Maximizing System Lifetime Of Query-Based Wireless
Sensor Networks
|
Automatic Detection Of
Paroxysms In Eeg Signals Using Morphological Descriptors And Artificial Nural
Networks
|
Trust Based Optimal Routing
In Manet's
|
Data Mining For Xml
Query-Answering Support
|
Development Of A Network Monitoring System With Simple Ip Subnet Calculator
Tool
|
Data Leakage Detection
|
Enabling Multi-Level Trust In
Privacy Preserving Data Mining
|
Maelstrom Transparent Error
Correction For Communication Between Data Centers
|
Minimizing File Download Time
In Stochastic Peer-To-Peer Networks
|
Development Of A Web Based
Recruitment Process System For The Hr Group For A Company
|
Secure Data Collection In
Wireless Sensor Networks Using Randomized Dispersive Routes
|
Trust Based Optimal Routing
In Manet's
|
Watermarking Relational
Databases Using Optimization-Based Techniques
|
Analysis Of Global K Mean And
X Means Algorithms Using Tumor Classification
|
Traffic Management In Sensor
Networks With A Mobile Sink
|
A Clustering Algorithm For
Data Mining Based On Swarm Intelligence
|
A Distributed Explicit Rate
Schemes In Multi-Input–Multi-Output Network Systems
|
Distributed
Collaborative Key Agreement And Authentication Protocol For
Dynamic Peer Groups
|
A Distributed Protocol To Serve
Dynamic Groups For Peer-To-Peer Streaming
|
A Dynamic En-Route Filtering Scheme For Data Reporting In Wireless Sensor Networks |
A Generic Multilevel Architecture For Time Series Prediction |
A New Approach To Optical Networks Security: Attack-Aware Routing And Wavelength Assignment |
A Two-Step Method For Clustering Mixed Categorical And Numeric Data |
Active Re Ranking For Web Image Search |
An Application For Web Mining Systems With Services Oriented Architecture |
An Experience In Testing The Security Of Real-World Electronic Voting Systems |
An Object Oriented Email Clustering Model Using Weighted Similarities Between Emails Attributes |
Anonymous Query Processing In Road Networks |
Answering General Time-Sensitive Queries |
Aspect-Oriented Race
Detection In Java
|
Assessing Software Service Quality And Trustworthiness At Selection Time |
Bandwidth Estimation For Ieee802.11-Based Ad Hoc Networks |
Call-Stack Coverage For Gui Test Suite Reduction |
Carving And Replaying Differential Unit Test Cases From System Test Cases |
Catching The Trend A Framework For Clustering Concept-Drifting Categorical Data |
Closeness: A New Privacy Measure For Data Publishing |
Conditional Shortest Path
Routing In Delay Tolerant Networks
|
Cooperative Caching In Wireless P2p Networks: Design, Implementation, And Evaluation |
A New Approach To Optical
Network Security: Attack-Aware Routing And Wavelength Assignment
|
Deriving Concept-Based User Profiles From Search Engine Logs |
Distributed Algorithms For Constructing Approximate Minimum Spanning Trees In Wireless Networks |
Dynamic Routing With Security Considerations |
Efficient And Dynamic Routing Topology Inference From End-To-End Measurements |
Efficient Broadcasting In Mobile Ad Hoc Networks |
Efficient Compression Of Encrypted Grayscale Images |
Efficient Processing Of Metric Skyline Queries |
Evaluation Of Accuracy In Design Pattern Occurrence Detection |
Continuous Monitoring Of Spatial Queries In Wireless Broadcast Environments |
Detecting Malicious Packet Losses |
Ensuring Data Storage Security In Cloud Computing |
Fast Rendering Algorithm Of
Underwater Optical Effect
|
Finding Bugs In Web Applications Using Dynamic Test Generation And Explicit-State Model Checking Communication |
Flexible Rollback Recovery In Dynamic Heterogeneous Grid Computing |
Message Authentication In Computationally Constrained Environments |
Mobility Management Approaches For Mobile Ip Networks: Performance Comparison And Use Recommendations |
Monitoring Online Tests Through Data Visualization |
Monitoring The Application-Layer Ddos Attacks For Popular Websites |
Multi-Path Dissemination In
Regular Mesh Topologies
|
Optimized Resource Allocation
For Software Release Planning
|
Security Analysis Of The Sasi
Protocol
|
Sigfree A Signature-Free
Buffer Overflow Attack Blocker
|
Traffic Management In Sensor
Networks With A Mobile Sink
|
Wardrop Routing In Wireless
Networks
|
A Signature-Based Indexing
Method For Efficient Content-Based Retrieval Of Relative Temporal Patterns
Content
|
A New Approach For Fec
Decoding Based On The Bp Algorithm In Lte And Wimax Systems
|
A Privacy-Preserving Location
Monitoring System For Wireless Sensor Networks
|
Clustering With
Multi-Viewpoint Based Similarity Measure
|
Analysis On Credit Card Fraud
Detection Methods
|
Delay Analysis And Optimality
Of Scheduling Policies For Multi-Hop Wireless Networks
|
Discovering Conditional
Functional Dependencies
|
Effective Navigation Of Query
Results Based On Concept Hierarchies
|
Modeling And Detection Of
Camouflaging Worm
|
Nymble
|
Ranking Spatial Data By
Quality Preferences
|
Sat: A Security Architecture
Achieving Anonymity And Traceability In Wireless Mesh Networks
|
Secure And Practical
Outsourcing Of Linear Programming In Cloud Computing
|
Sketch4match – Content-Based
Image Retrieval System Using Sketches
|
ROBUST VIDEO DATA HIDING
USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING
|
A Competitive Study Of Cryptography
Techniques Over Block Cipher
|
SCALABLE AND COST-EFFECTIVE
INTERCONNECTION OF DATA-CENTER SERVERS USING DUAL SERVER PORTS
|
DYNAMICS OF MALWARE SPREAD IN
DECENTRALIZED PEER-TO-PEER NETWORKS
|
Supporting Efficient And
Scalable Multicasting Over Mobile Ad Hoc Networks
|
Cloud Computing For
Agent-Based Urban Transportation Systems
|
CACHING STRATEGIES BASED ON
INFORMATION DENSITY ESTIMATION IN WIRELESS AD HOC NETWORKS
|
Optimal Bandwidth Assignment
For Multiple-Description-Coded Video
|
A FUZZY SELF-CONSTRUCTING
FEATURE CLUSTERING ALGORITHM FOR TEXT CLASSIFICATION
|
A MACHINE LEARNING APPROACH
FOR IDENTIFYING DISEASE-TREATMENT RELATIONS IN SHORT TEXTS
|
EMBEDDED EXTENDED VISUAL
CRYPTOGRAPHY SCHEMES
|
Going Back And Forth:
Efficient Multi Deployment And Multi Snapshotting On Clouds
|
A DUAL FRAMEWORK AND
ALGORITHMS FOR TARGETED ONLINE DATA DELIVERY
|
Extended XML Tree Pattern
Matching: Theories And Algorithms
|
Buffer Sizing For 802.11 Based
Networks
|
A Geometric Approach To
Improving Active Packet Loss Measurement
|
A Precise Termination
Condition Of The Probabilistic Packet Marking Algorithm
|
A Signature Based Indexing
Method For Efficient Content-Based Retrieval Of Relative Temporal Pattern
|
Distributed
Collaborative Key Agreement And Authentication Protocol For
Dynamic Peer Groups
|
Glip: A Concurrency Control
Protocol For Clipping Indexing
|
Active Source Routing Protocol For Mobile Networks |
An Integrated Framework For Security And Dependability |
An Suitable Programming Model For Error Control In Network Environment |
Routing-Driven Key Management Scheme For Heterogeneous Wireless Sensor Networks |
Bandwidth Estimation For Ieee802 |
Congestion Control Using Network Based Protocol |
Quiver: Consistent Object Sharing For Edge Services |
Constructing Inter-Domain Packet Filters To Control Ip |
Cryptography Using Blowfish Algorithm |
C-Trend: Temporal Cluster Graphs For Identifying And Visualizing Trends In Multi Attribute Transactional Data |
Data Transmission Using
Multi-Tasking-Sockets
|
Distributed Collaborative Key Agreement And Authentication Protocols For Dynamic Peer Groups |
Distributed Cycle Minimization Protocol (Dcmp) |
Dynamic Load Balancing In Distributed Systems In The Presence Of Delays |
Dynamic Parallel Access |
Secure Multi Signature Generation For Group Communication |
Effective Key Generation For Multimedia And Web Application |
Effective Transmission Of Data Through Rbph For Group Communication |
Efficient And Secure Content Processing And Distribution By Cooperative Intermediaries |
Efficient Key Management For Threshold-Multi Signature In Distributed System |
Effective Key Generation For Multimedia Application |
Empowering The Rmi In Java Approach |
Ensuring Data Storage Security In Cloud Computing |
Error Control System In Network Environment |
Evaluating The Efficacy Of Forward Error Correction Coding |
Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis |
File Sharing In Hybrid Model Based P2p Systems For The Expected High Churn |
Flexible Rollback Recovery In Dynamic Heterogeneous Grid Computing |
Transmitter Distributed
Technology Or (Fuji Distribution)
|
A Geometric Approach To Improving Active Packet Loss Measurement |
Glip: A Concurrency Control Protocol For Clipping Indexing |
Graphical User Interface Art
|
Group Key Management And Secured Protocols For Peer Group Communication |
Hiding Sensitive Association Rules With Limited Side Effects |
Image Enhancement Technology |
Geo Special Matching For Image Retrieval |
Data Hiding In An Image File Using Steganography |
Implementing Multicast Distribution Through Recursive Unicast Trees |
Increasing Efficiency In
Wireless Network
|
Hacker Detection In Wireless
Sensor Network
|
Intrusion Detection In
Homogeneous And Heterogeneous Wireless Sensor Networks
|
Intrusion Detection System
Over Abnormal Internet Sequence
|
Layer To Forward Protocol
|
Load Balancing
|
Location-Based Spatial Query
Processing In Wireless Broadcast Environments
|
Minimizing The File
Downloading In Peer To Peer Networks
|
Mitigating Performance
Degradation In Congested Sensor Networks
|
Modeling And Automated
Containment Of Worms
|
Monitoring The
Application-Layer Ddos Attacks For Popular Websites
|
Multiple Routing
Configurations For Fast Ip Network Recovery
|
On Natural Language
Processing And Plan Recognition
|
Online Index Recommendations
For High-Dimensional Databases Using Query Workloads
|
Online Detection And
Prevention The Sql Injection Attacks
|
Quiver: Consistent Object
Sharing For Edge Services
|
A Routing-Driven Key
Management Scheme For Heterogeneous Wireless Sensor
|
Captcha As A Graphical
Password
|
Packet Hiding Method For
Selective Jamming Attacks
|
Efficient Data Collection For
Large-Scale Mobile Monitoring Applications
|
Quality Of Service Provision
In Cloud-Based Storage System For Multimedia Delivery
|
Secure Data Aggregation In
Wireless Sensor Networks Filtering Out The Attacker’s Impact
|
Cloudqual A Quality Model For
Cloud Services
|
Cross-Layer Approach For
Minimizing Routing Disruption In Ip Networks
|
Distributed Mobile Sink
Routing For Wireless Sensor Networks A Survey
|
Approximate Shortest Distance
Computing A Query-Dependent
Local Landmark Scheme
|
Joint Topology-Transparent
Scheduling And Qos Routing In Ad Hoc Networks
|
Privacy-Enhanced Web Service
Composition
|
Hop-By-Hop Message
Authentication And Source Privacy In Wireless Sensor Networks
|
Multicast Capacity In Manet
With Infrastructure Support
|
Multi-Core Embedded Wireless
Sensor Networks Architecture And Applications
|
Fast And Secure Multi Hop
Broadcast Solutions For Inter Vehicular Communication
|
Optimized Multicast Routing
Algorithm Based On Tree Structure In Manets
|
Security Analysis Of Handover
Key Management In 4g Lease Networks
|
Attribute-Based Access To
Scalable Media In Cloud-Assisted Content Sharing Networks
|
Spatial Approximate String
Search
|
Privacy-Preserving Public
Auditing For Secure Cloud Storage
|
Automatic Test Packet
Generation
|
Cooperative Caching For
Efficient Data Access In Disruption Tolerant Networks
|
Secure And Efficient Data
Transmission For Cluster-Based Wireless Sensor Networks
|
Secure Data Retrieval For
Decentralized Disruption-Tolerant Military Networks
|
Click Prediction For Web
Image Re-Ranking Using Multimodal Sparse Coding
|
Privacy-Preserving
Multi-Keyword Ranked Search Over Encrypted Cloud Data
|
Secure And Efficient Data
Transmission For Cluster Based Wireless Sensor Network
|
Decentralized Access Control
With Anonymous Authentication Of Data Stored In Clouds
|
Dynamic Query Forms For
Database Queries
|
Dynamic Routing With Security
Considerations
|
Efficient Authentication For
Mobile And Pervasive Computing
|
Facilitating Effective User
Navigation Through Website Structure Improvement
|
Fully Anonymous Profile
Matching In Mobile Social Networks
|
Geo-Community-Based Broadcasting
For Data Dissemination In Mobile Social Networks
|
Incentive Compatible
Privacy-Preserving Data Analysis
|
Congestion Aware Routing In
Nonlinear Elastic Optical Networks
|
A Hybrid Cloud Approach For
Secure Authorized Deduplication
|
Accuracy-Constrained
Privacy-Preserving Access Control Mechanism For Relational Data
|
Automatic Test Packet
Generation
|
Congestion Aware Routing In
Nonlinear Elastic Optical Networks
|
Cost Effective Resource
Allocation Of Overlay Routing Relay Nodes
|
Decentralized Access Control
With Anonymous Authentication Of Data Stored In Clouds
|
Efficient Authentication For
Mobile And Pervasive Computing
|
Friend Book A Semantic-Based
Friend Recommendation System For Social Networks
|
Key - Aggregate Cryptosystem
For Scalable Data Sharing In Cloud Storage
|
Oruta Privacy-Preserving
Public Auditing For Shared Data In The Cloud
|
Securing Broker Less Publish
Subscribe Systems Using Identity Based Encryption
|
Security Evaluation Of
Pattern Classifiers Under Attack
|
Supporting Privacy Protection
In Personalized Web Search
|
The Design And Evaluation Of
An Information Sharing System For Human Networks
|
Web Service Recommendation
Via Exploiting Location And Qos Information
|
On The Node Clone Detection
In Wireless Sensor Networks
|
Packet Loss Control Using
Tokens At The Network Edge
|
Discovering Emerging Topics
In Social Streams Via Link-Anomaly Detection
|
Privacy-Preserving
Distributed Profile Matching In Proximity-Based Mobile Social Networks
|
Spatial Approximate String
Search
|
The Design And Evaluation Of
An Information Sharing System For Human Networks
|
The Three-Tier Security
Scheme In Wireless Sensor Networks With Mobile Sinks
|
Vampire Attacks Draining Life
From Wireless Ad-Hoc Sensor Networks
|
A Distributed Three-Hop
Routing Protocol To Increase The Capacity Of Hybrid Wireless Networks
|
College Management System
|
Supporting Privacy Protection In Web Search |
Automatic Test Packet Generation |
Performance And Cost Evaluation Of An Adaptive Encryption Architecture For Cloud Databases |
Supporting Privacy Protection In Personalized Web Search |
Discovering Emerging Topics
In Social Streams Via Link-Anomaly Detection
|
Decentralized Access Control
With Anonymous Authentication Of Data Stored In Clouds
|
Distributed, Concurrent, And
Independent
|
Efficient Authentication For
Mobile And Pervasive Computing
|
Efficient Prediction Of
Difficult Keyword Queries Over Databases
|
Exploiting Service Similarity
For Privacy In Location Based Search Queries
|
Expressive, Efficient, And
Revocable Data
|
Facilitating Document
Annotation Using
|
Fast Nearest Search
|
Friend Book A Semantic
|
Key-Aggregate Cryptosystem
For Scalable
|
OCCT A ONE CLASS CLUSTERING
TREE FOR IMPLEMENTING ONE TO MANY DATA LINKAGE
|
Optimal Distributed Malware
Defense In Mobile
|
ORUTA A PRIVACY PRESERVING
PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD
|
PACK PREDICTION BASED CLOUD
BANDWIDTH AND COST REDUCTION SYSTEM
|
Privacy-Preserving And Content-Protecting
|
Privacy-Preserving
Multi-Keyword Ranked
|
PROFILR Toward Preserving
Privacy And Functionality In Geosocial Networks
|
Qos-Guaranteed Bandwidth
Shifting And Redistribution In Mobile Cloud Environment
|
Scalable Analytics For Iaas Cloud
Availability
|
Scalable Distributed Service
Integrity
|
Secure Data Retrieval For
Decentralized Disruption-Tolerant Military Networks
|
Securing Broker Less Publish
Subscribe Systems Using Identity Based Encryption
|
Security Evaluation Of
Pattern Classifiers Under Attack
|
Supporting Privacy Protection
In Personalized Web Search
|
Towards Differential Query
Services In Cost -Efficient Clouds
|
Towards Online Shortest Path
Computation
|
The Three-Tier Security
Scheme In Wireless Sensor Networks With Mobile Sinks
|
Multiparty Access Control For Online Social Networks: Model And Mechanisms |
Geo-Community-Based Broadcasting For Data Dissemination In Mobile Social Networks |
Fully Anonymous Profile Matching In Mobile Social Networks |
Ensuring Distributed Accountability For Data Sharing In The Cloud |
The Three Tier Security Scheme In Wireless Sensor N/W's With Mobile Sinks |
A Load Balancing Model Based On Cloud Partitioning For The Cloud |
thank you for your comment
pls call me on 8125424511