Professional Documents
Culture Documents
Project Titles
Year 2009
1 A Flexible Privacy-Enhanced Location-Based Services System Framework . and Practice 2 A Relation-Based Page Rank Algorithm for Semantic Web Search Engines . 3 A Tabu Searching Algorithm For Cluster Building in Wirless Sensor . Networks 4 An gen3 based Authentication Protocol . 5 Analysis of Shortest Path Routing for Large Multi-Hop Wirless Networks . 6 Biased Random Walks in Uniform Wirless Networks . 7 Cell Breathing Techniques for Load Balancing in Wirless LANs . 8 Clustering and Sequential Pattern Mining of Online Collaborative Learning . Data 9 Contention-Aware Performance Analysis of Mobility-Assisted Routing . 1 Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading 0 Cognitive Radio Networks A Game-Theoretic Modeling Approach . 1 Energy Maps For Mobile Wirless Networks 1 . 1 Enforcing Minimum-Cost Multicast Routing against Shelfish Information 2 Flows . 1 Evaluating the Generation of Domain Ontologies in the Knowledge Puzzle 3 Project . 1 Explicit Load Balancing Technique for NGEO Satellite Ip Networks With On4 Board Processing Capabilities . 1 Greedy Routing with Anti-Void Traversal for Wirless Sensor Networks 5 . 1 Information Content-Based Sensor Selection and Transmission Power 6 Adjustment for Collaborative Target Tracking . 1 Minimizing Recovery State in Geographic Ad Hoc Routing 7 . 1 Movement-Assisted Connectivity Restoration in Wireless Sensor 8 . 1 On the Planning of Wireless Sensor Networks Energy-Efficient Clustering 9 under the Joint Route . 2 On the Security of Route Discovery in MANETs 0 . 2 Online Scheduling Sequential 1 Information Dissemination . Objects with Periodicity for dynamic in
2009
2009
Mobile Computing
2009
Networking
2009
Mobile Computing
2009
Mobile Computing
2009
2009
2009
2009
Mobile Computing
2009
2009
2009
Networking
2009
Mobile Computing
2009
Mobile Computing
2009
Mobile Computing
2009
2009
Mobile Computing
2009
Mobile Computing
2009
2009
2 Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio 2 Networks . 2 Random Cast An Energy Efficient Communication Scheme for Mobile Ad Hoc 3 Networks . 2 Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel 4 Communications . 2 Resource Allocation in OFDMA 5 Supporting Multimedia Services . Wireless Communications Systems
Mobile Computing
2009
Mobile Computing
2009
Networking
2009
Networking
2009
2 Route Stability in MANETs under the Random Direction Mobility Model 6 . 2 Secure and Policy-Complaint Source Routing 7 . 2 Single-Link Failure Detection in All-Optical Networks Using 8 . 2 The Effectiveness of Checksums for Embedded Control Networks 9 . 3 Two Blocking Algorithm on Adaptive Binary Splitting Single and Pair 0 Resolutions for RFID Tag Identification . 3 Compaction of Schedules and a Two-Stage Approach for Duplication-Based 1 DAG Scheduling . 3 Delay Analysis for Maximal Scheduling With Flow Control in Wireless 2 Networks With Bursty Traffic . 3 Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc 3 Networks . 3 Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise 4 . 3 PRESTO Feedback-Driven Data Management in Sensor Networks 5 . 3 Spread-Spectrum Watermarking Security 6 . 3 Virus Spread in Networks 7 .
Mobile Computing
2009
Networking
2009
Networking
2009
2009
Networking
2009
Distributed Computing
2009
Network Computing
2009
Mobile Computing
2009
Secure Computing
2009
Network Computing
2009
Secure Computing
2009
Network Computing
2009
3 A Distributed And Scalable Routing Table Manager For The Next Generation 8 Of IP Routers . 3 A New Model For Dissemination Of XML Content 9 . 4 Credit Card Fraud Detection Using Hidden Markov Models 0 .
Networking
2008
2008
2008
4 Efficient 2-D Grayscale Morphological Transformations With Arbitraly Flat 1 Structuring Elements . 4 Efficient Resource Allocation For Wireless Multicast 2 . 4 Efficient Routing In Intermittently Connected Mobile Networks The Multiple 3 Copy Case . 4 Localized Sensor Area Coverage With Low Communication Overhead 4 . 4 Location-Based Spatial Queries with Data Sharing in Wireless Broadcast 5 Environments . 4 Provable Protection Against Web Application Vulnerabilities Related to 6 Session Data Dependencies . 4 Quiver On the Edge Consistent Scalable Edge Services 7 . 4 Temporal 8 . Partioning of Communication Architecture Resources in an Integrated
Image Processing
2008
Mobile Computing
2008
Networking
2008
Mobile Computing
2008
2008
2008
2008
2008
4 Vision Based Processing For Real-Time 3-D Data Acquisition Based On 9 Coded Structured Light . 5 Watermarking Relational Databases Using Optimization Based Techniques 0 . 5 A Novel Framework for Semantic Annotation and Personalized Retrieval of 1 Sports Video . 5 Active Learning Methods for Interactive Image Retrieval 2 . 5 Estimation of Defects Based On Defect Decay Model ED3M 3 . 5 Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing 4 Under Information Provision . 5 Hardware enhanced association rule mining with Hashing and Pipelining 5 . 5 HBA Distributed Metadata Management for Large Cluster-Based Storage 6 Systems . 5 Orthogonal Data Embedding for Binary Images in Morphological Transform 7 Domain-A High-Capacity Approach . 5 Probabilistic Packet Marking For Large Scale IP Trace Back 8 . 5 Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks 9 . 6 Statistical Techniques for Detecting Traffic Anomalies through Packet Header
Image Processing
2008
2008
Multimedia
2008
Image Processing
2008
Software Engineering
2008
Transportation System
2008
Data Mining
2008
Distributed Computing
2008
Multimedia Computing
2008
Network Computing
2008
Network Computing
2008
Network Computing
2008
Data 6 Trustworthy Computing Under Resource Constraints With The Down Policy 1 . Secure Computing 2008
6 An SSL Back-End Forwarding Scheme in Cluster-based Web Servers 2 . 6 Efficient Approximate Query Processing in Peer-to-Peer Networks 3 . 6 pFusion: A P2P Architecture for Internet-Scale Content-Based Search and 4 Retrieval . 6 Provably Secure 5 Protocols . Three-Party Authenticated Quantum Key Distribution
2007
2007
2007
2007
2007
6 Benefit Based Data Caching in Adhoc Networks 7 . 6 Image Processing Techniques for the Detection and Removal of Cracks in 8 Digitized Paintings . 6 On the Computational Complexity and Effectiveness of N-Hub Shortest-Path 9 Routing .
Mobile Computing
2006
Image Processing
2006
Networking
2006
7 E-Secure Transactions - Secure Electronic Data Interchange over Internet 0 . 7 Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks 1 . 7 Neural Networks for Unicode Optical Character Recognition 2 .
Internet Computing
2005
Network Computing
2005
Image Processing
2004
7 Credit Card Fraud Detection 3 . 7 Defect Tracking - A Software Defect Report and Tracking System in an 4 Intranet . 7 E Logistics for Warehouse Management Implementation of Authenticated 5 and Dynamic Logistics Support System & Management .
Intelligent Systems