Вы находитесь на странице: 1из 3

Project Title

A Geometric Approach to Improving Active Packet Loss Measurement Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Location Based Spatial Query Processing In Wireless Broadcast Environments Modeling & Automated Containment of Worms Benefit Based Data Caching In Ad Hoc Networks Minimizing File Download Time in Stochastic Peer-to-Peer Networks Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction QUIVER Consistent Object Sharing For Edge Services Two Techniques for Fast Computation of Constrained Shortest Paths A Precise Termination Condition of the Probabilistic Packet Marking Algorithm An Efficient Association Rule Mining Algorithm In Distributed Databases BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Path Security in large Mediator Protocols Securing User-Controlled Routing Infrastructures Controlling IP Spoofing Through Inter Domain Packet Filters Using the Using the Conceptual Cohesion of Classes for Fault Prediction in Object oriented Systems Two Techniques for Fast Computation of Constrained Shortest Paths Protection of Database Security via Collaborative Inference Detection Agent Based Intrusion Detection, Response and Blocking using signature method in Active Net Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks Incremental deployment service of Hop by hop multicast routing protocol Noise Reduction by Fuzzy Image Filtering Novel Secure Communication Protocol for Ad Hoc networks ODAM An Optimized Distributed Association Rule Mining Algorithm Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm Dual-Link Failure Resiliency through Backup Link Mutual Exclusion Personal Authentication Using 3-D Finger Geometry Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis OCGRR - A New Scheduling Algorithm for Differentiated Services Networks Efficient Packet Marking for Large-Scale IP Trace back Distributed cache updating for the Dynamic source routing protocol Network Border Patrol Preventing Congestion Collapse Application of BPCS Steganography to wavelet compressed video Image Transformation using Grid Image Transport Protocol ITP XTC A Practical Topology Control Algorithm for Ad-Hoc Networks ATM Networks and Intelligent Packet Filtering An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs Face Recognition Using Laplacianfaces Online Handwritten Script Recognition Retrieving Files Using Content Based Searching Virtual force based geometric routing protocol in MANET

ANGEL Enhancing the Utility of Generalization For Privacy Preserving Publication One To Many Distribution Using Recursive Unicast Trees Randomized Protocol for Duplicate Elimination in Peer-to-Peer Storage System DEMONSTRATION OF SECURE SOCKET LAYER COUPLING-BASED STRUCTURAL METRICS FOR MEASURING THE QUALITY OF A SOFTWARE Dynamic Load Balancing in Distributed Systems in the Presence of Delays : A Regeneration Theory Approach Face recognition for smart interactions Spatio Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures Clustering and Sequential Pattern Mining of Online Collaborative Learning Data Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups Multiple Routing Configurations for Fast IP Network Recovery SAT- Solving Approaches to Context-Aware Enterprise Network Security Management Controlling IP Spoofing through Inter domain Packet Filters Gradient Vector Force - A new External Force for Snakes Computation Efficient Multicast Key Distribution A New, Efficiet Coordinated Checkpointing Protocol combined with Selective Sender - Based Message Logging A wireless Intrusion detection system and a new attack model Three Party Authentication for key Distributed Protocol using Classical and Quantum Cryptography Re-Ordering Of Packets Using Retransmission Timer IMPLEMENTATION OF BPCS-STEGANOGRAPHY Mitigating Performance Degradation in Congested Sensor Networks Truth Discovery with multiple Conflicting Information Providers on web Constructing Inter-Domain Packet Filters to Control IP Layered Approach Using Conditional Random Fields for Intrusion Detection (2010) Online Index Recommendations for High-Dimensional Databases Using Query Workloads Service Level Agreement based Grid Scheduling Detection of Application Layer DDOS Attack using Hidden Semi Markov Model (2009) Identification of Humans Using Gait Continuous Monitoring of Spatial Queries in Wireless Broadcast Energy-Efficient SINR-Based Routing for Multihop Wireless EnergyMaps For Mobile Wireless networks coherence Time Versues Spreding Period Large Connectivity for Dynamic Random Geometric Graphs Measuring Capacity Bandwidth of Targeted Path Segments Mitigation OF Controll Channel Jamming Under Node Caputer Attacks Mobility Management Approaches for Mobile IP Networks Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks SIMPS Using Sociology for Personal Mobility Data leakage detection (2010) Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compress Bandwidth Estimation for IEEE 802 DCMP A DISTRIBUTED CYCLE MINIMIZATION PROTOCOL FOR PEER-TO-PEER NETWORKS Distributed cache updating for the Dynamic source routing protocol Dynamic Load Balancing in Distributed Systems in the Presence of Delays A Regeneration Theory Ap

Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure DAIOS EFFICIENT DYNAMIC WEB SERVICE INVOCATION Dual-Link Failure Resiliency through Backup Link Mutual Exclusion Dynamic Routing with Security Considerations Effective Transmission of Data through RBPH for Group Communication Efficient Key Agreement for Large and Dynamic Multicast Groups Locating Friends and Family Using Mobile Phones With GPS Lord of the Links - A framework for discovering missing links in the internet topology Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks Optimal Server Bandwidth Allocation Among Multiple P2P Multicast Live Video Streaming Sessions PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes EXACT KNOWLEDGE HIDING THROUGH DATABASE EXTENSION Learning in an Ambient Intelligent World Enabling Technologies and Practices Multiple Sequence alignment using Genetic Algorithm Node Isolation Model and Age-Based Neighbor Selection in Unstructured P2P Networks PEER-TO-PEER (P2P) networks SECURE MULTISIGNATURE GENERATION FOR GROUP COMMUNICATION

Вам также может понравиться