Professional Documents
Culture Documents
1. A Distributed Protocol to Serve Dynamic 2. A Review of the Applications of Agent TechnologyIn Traffic and Transportation Systems 3. Achieving Network Level Privacy in Wireless Sensor Networks 4. Always Acyclic Distributed Path Computation 5. Bandwidth Recycling in IEEE 802.16 Networks 6. Cooperative Caching in Wireless P2PNetworks to Design,Implementation,And Evaluation 7. Correlation-Based Traffic Analysis Attackson Anonymity Networks 8. Distributed Explicit Rate Schemes in Multi-InputMulti-Output Network Systems 9. Ensuring Data Storage Security in Cloud Computing 10. Host-to-Host Congestion Control for TCP
11. KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services 12. Label-Based DV-Hop Localization against Wormhole AttacksIn Wireless Sensor Networks 13. Layered Approach Using Conditional Random Fields for Intrusion Detection
14. Mesh Based Multicast Routing in MANET Stable Link Based Approach 15. Modified DSR (Preemptive) to reduce link breakage and routing overhead for MANET using Proactive Route Maintenance (PRM) 16. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks
Rando
KNOWLEDGE AND DATA ENGINEERING / DATA MINING
Sno
TITLE
Binrank: Scaling Dynamic Authority-Based Search Using Materialized Sub graphs Closeness: A New Privacy Measure For Data Publishing P2p Reputation Management Using Distributed Decentralized Recommendation Chains Identities And
Year
2010
1 2 3 4 5 6 7 8
2010
2010
Managing Multidimensional Historical Aggregate Data In Unstructured P2p Networks Combinatorial Approach for Preventing SQL Injection Attacks(Secure Computing) Truth Discovery With Multiple Conflicting Information Providers On Web Protection Of Database Security Via Collaborative Inference Detection An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic sis
2010
Image Processing
9 10
Noise Reduction By Fuzzy Image Filtering(Fuzzy System) Application Of BPCS Steganography To Wavelet Compressed Video 2003 2004
Mobile Computing
11 12 13 14 15 16 17
Intrusion Detection In Homogeneous & Heterogeneous Wireless Sensor Networks Location Based Spatial Query Processing In Wireless Broadcast Environments Bandwidth Estimation For Ieee 802.11 Based Adhoc Network Benefit-Based Data Caching In Ad Hoc Networks Distributed Cache Updating For The Dynamic Source Routing Protocol An Acknowledgment-Based Misbehavior In Mantes Approach For The Detection Of Routing 2008 2008 2008 2008 2006 2007 2007
NETWORKING
18 19
On Wireless Scheduling Algorithms For Minimizing The Queue-Overflow Probability Efficient And Dynamic Measurements Routing Topology Inference From End-To-End
2010
2010
20 21 22
23 24
Node Isolation Model And Age-Based Neighbor Selection In Unstructured P2p Networks Leveraging Identity-Based Cryptography Structured P2p Systems For Node Id Assignment In
2009
2009
Multiple Routing Configurations For Fast Ip Network Recovery Geometric Approach To Improving Active Packet Loss Measurement Performance Of A Speculative Transmission Scheme For Scheduling Latency Reduction Modeling & Automated Containment Of Worms(Secure Computing With Networking) Constructing Inter-Domain Packet Filters To Control IP Spoofing Based On BGP Updates Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion Security In Large Mediator Protocols A Distributed Database Architecture For Global Roaming In Next-Generation Mobile Networks A Novel Secure Communication Protocol For Ad Hoc Networks [SCP]
2009
2008 2008
25
2008
26 27 28 29 30
SOFTWARE ENGINEERING
31 32
2009
Atomicity Analysis Of Service Composition Across Organizations Using The Conceptual Cohesion Of Classes For Fault Prediction In Object Oriented Systems
2008
Dynamic Search Algorithm In Unstructured Peer-To-Peer Networks Flexible Deterministic Packet Marking: an Ip Trace back System to Find the Real Source of Attacks Distributed Algorithms For Constructing Approximate Minimum Spanning Trees In Wireless Sensor Networks A Faithful Distributed Mechanism For Sharing The Cost Of Multicast Transmissions Dynamic Routing With Security Considerations Detecting Malicious Packet Losses Quiver: Consistent Object Sharing For Edge Services An Adaptive Programming Model For Fault-Tolerant Distributed Computing Homogenous Network Control And Implementation A BGP Based Mechanism For Lowest Cost Routing
2009
2009
2009
43 44 45 46 47 48 49 50
Enhancing Privacy And Authorization Control Scalability In The Grid Through Ontologies Collusive Piracy Prevention In P2p Content Delivery Networks Combinatorial Approach For Preventing Sql Injection Attacks A Precise Termination Algorithm Condition Of The Probalastic Packet Marking
2009
2009 2009
2008
An Adaptive Programming Model For Fault-Tolerant Distributed Computing Hybrid Intrusion Detection With Anomalous Internet Episodes Weighted Signature Generation Over
2007
2007
Network Border Patrol: Preventing Congestion Collapse And Promoting Fairness In The Internet An Algorithmic Approach To Identify Network Link Failures
2004
2004