You are on page 1of 6

Regd No: 284/2010 Ph:9959969919

1. A Distributed Protocol to Serve Dynamic 2. A Review of the Applications of Agent TechnologyIn Traffic and Transportation Systems 3. Achieving Network Level Privacy in Wireless Sensor Networks 4. Always Acyclic Distributed Path Computation 5. Bandwidth Recycling in IEEE 802.16 Networks 6. Cooperative Caching in Wireless P2PNetworks to Design,Implementation,And Evaluation 7. Correlation-Based Traffic Analysis Attackson Anonymity Networks 8. Distributed Explicit Rate Schemes in Multi-InputMulti-Output Network Systems 9. Ensuring Data Storage Security in Cloud Computing 10. Host-to-Host Congestion Control for TCP

11. KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services 12. Label-Based DV-Hop Localization against Wormhole AttacksIn Wireless Sensor Networks 13. Layered Approach Using Conditional Random Fields for Intrusion Detection

Regd No: 284/2010 Ph:9959969919

14. Mesh Based Multicast Routing in MANET Stable Link Based Approach 15. Modified DSR (Preemptive) to reduce link breakage and routing overhead for MANET using Proactive Route Maintenance (PRM) 16. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks

Rando
KNOWLEDGE AND DATA ENGINEERING / DATA MINING
Sno

TITLE
Binrank: Scaling Dynamic Authority-Based Search Using Materialized Sub graphs Closeness: A New Privacy Measure For Data Publishing P2p Reputation Management Using Distributed Decentralized Recommendation Chains Identities And

Year
2010

1 2 3 4 5 6 7 8

2010

2010

Managing Multidimensional Historical Aggregate Data In Unstructured P2p Networks Combinatorial Approach for Preventing SQL Injection Attacks(Secure Computing) Truth Discovery With Multiple Conflicting Information Providers On Web Protection Of Database Security Via Collaborative Inference Detection An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic sis

2010

2009 2008 2008 2008

Regd No: 284/2010 Ph:9959969919

Image Processing
9 10
Noise Reduction By Fuzzy Image Filtering(Fuzzy System) Application Of BPCS Steganography To Wavelet Compressed Video 2003 2004

Mobile Computing
11 12 13 14 15 16 17
Intrusion Detection In Homogeneous & Heterogeneous Wireless Sensor Networks Location Based Spatial Query Processing In Wireless Broadcast Environments Bandwidth Estimation For Ieee 802.11 Based Adhoc Network Benefit-Based Data Caching In Ad Hoc Networks Distributed Cache Updating For The Dynamic Source Routing Protocol An Acknowledgment-Based Misbehavior In Mantes Approach For The Detection Of Routing 2008 2008 2008 2008 2006 2007 2007

Detection Of Misbehavior In MANATES

NETWORKING

18 19

On Wireless Scheduling Algorithms For Minimizing The Queue-Overflow Probability Efficient And Dynamic Measurements Routing Topology Inference From End-To-End

2010

2010

Regd No: 284/2010 Ph:9959969919

20 21 22
23 24

Node Isolation Model And Age-Based Neighbor Selection In Unstructured P2p Networks Leveraging Identity-Based Cryptography Structured P2p Systems For Node Id Assignment In

2009

2009

Multiple Routing Configurations For Fast Ip Network Recovery Geometric Approach To Improving Active Packet Loss Measurement Performance Of A Speculative Transmission Scheme For Scheduling Latency Reduction Modeling & Automated Containment Of Worms(Secure Computing With Networking) Constructing Inter-Domain Packet Filters To Control IP Spoofing Based On BGP Updates Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion Security In Large Mediator Protocols A Distributed Database Architecture For Global Roaming In Next-Generation Mobile Networks A Novel Secure Communication Protocol For Ad Hoc Networks [SCP]

2009

2008 2008

25

2008

26 27 28 29 30

2008 2008 2008 2004 2008

SOFTWARE ENGINEERING
31 32
2009

Atomicity Analysis Of Service Composition Across Organizations Using The Conceptual Cohesion Of Classes For Fault Prediction In Object Oriented Systems

2008

Regd No: 284/2010 Ph:9959969919

PARALLEL AND DISTRIBUTED SYSTEMS


33 34 35 36 37 38 39 40 41 42
2009

Dynamic Search Algorithm In Unstructured Peer-To-Peer Networks Flexible Deterministic Packet Marking: an Ip Trace back System to Find the Real Source of Attacks Distributed Algorithms For Constructing Approximate Minimum Spanning Trees In Wireless Sensor Networks A Faithful Distributed Mechanism For Sharing The Cost Of Multicast Transmissions Dynamic Routing With Security Considerations Detecting Malicious Packet Losses Quiver: Consistent Object Sharing For Edge Services An Adaptive Programming Model For Fault-Tolerant Distributed Computing Homogenous Network Control And Implementation A BGP Based Mechanism For Lowest Cost Routing

2009

2009

2009

2009 2009 2008 2007 2007 2005

Regd No: 284/2010 Ph:9959969919

Advance Computing, Secure Computing, JOURNAL AND CONFERENCE PAPERS

43 44 45 46 47 48 49 50

Enhancing Privacy And Authorization Control Scalability In The Grid Through Ontologies Collusive Piracy Prevention In P2p Content Delivery Networks Combinatorial Approach For Preventing Sql Injection Attacks A Precise Termination Algorithm Condition Of The Probalastic Packet Marking

2009

2009 2009

2008

An Adaptive Programming Model For Fault-Tolerant Distributed Computing Hybrid Intrusion Detection With Anomalous Internet Episodes Weighted Signature Generation Over

2007

2007

Network Border Patrol: Preventing Congestion Collapse And Promoting Fairness In The Internet An Algorithmic Approach To Identify Network Link Failures

2004

2004

17.m Access Transport Capacity

You might also like