Professional Documents
Culture Documents
S.No. 1 2 Project Title A New Cell Counting Based Attack Against Tor. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks. Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. Query Planning for Continuous Aggregation Queries Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms. Robust Face-Name Graph Matching for Movie Character Identify. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency DOMINE TECH .NET .NET
.NET
Image processing
.NET
6 7
Image Processing
.NET
Cloud computing International Conference Image processing Parallel & Distributed Systems
.NET
10
.NET
11
.NET
12
.NET
13
Mobile
.NET
cooperative communications 14 Secure And Efficient Handover Authentication Based On Bilinear Pairing Functions Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs
15
16 17
Latency Equalization as a New Network Service Primitive Efficient audit service outsourcing for data integrity in clouds Fair Torrent A Deficit Based Distributed Algorithm to Ensure Fairness in peer to peer Systems Network Assisted Mobile Computing with Optimal Uplink Query Processing
Networking Systems & Software Networking Mobile Computing Parallel & Distributed Systems
.NET .NET
18
.NET
19
.NET
20
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks Towards Secure and Dependable Storage Services in Cloud Computing Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
.NET
21 22
23 24
Automatic Reconfiguration for Large-Scale Reliable Storage Systems Expert Discovery and Interactions in Mixed Service-Oriented Systems