You are on page 1of 4

S.

Project Titles

Domain Mobile Computing

Year 2009

1 A Flexible Privacy-Enhanced Location-Based Services System Framework . and Practice 2 A Relation-Based Page Rank Algorithm for Semantic Web Search Engines . 3 A Tabu Searching Algorithm For Cluster Building in Wirless Sensor . Networks 4 An gen3 based Authentication Protocol . 5 Analysis of Shortest Path Routing for Large Multi-Hop Wirless Networks . 6 Biased Random Walks in Uniform Wirless Networks . 7 Cell Breathing Techniques for Load Balancing in Wirless LANs . 8 Clustering and Sequential Pattern Mining of Online Collaborative Learning . Data 9 Contention-Aware Performance Analysis of Mobility-Assisted Routing . 1 Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading 0 Cognitive Radio Networks A Game-Theoretic Modeling Approach . 1 Energy Maps For Mobile Wirless Networks 1 . 1 Enforcing Minimum-Cost Multicast Routing against Shelfish Information 2 Flows . 1 Evaluating the Generation of Domain Ontologies in the Knowledge Puzzle 3 Project . 1 Explicit Load Balancing Technique for NGEO Satellite Ip Networks With On4 Board Processing Capabilities . 1 Greedy Routing with Anti-Void Traversal for Wirless Sensor Networks 5 . 1 Information Content-Based Sensor Selection and Transmission Power 6 Adjustment for Collaborative Target Tracking . 1 Minimizing Recovery State in Geographic Ad Hoc Routing 7 . 1 Movement-Assisted Connectivity Restoration in Wireless Sensor 8 . 1 On the Planning of Wireless Sensor Networks Energy-Efficient Clustering 9 under the Joint Route . 2 On the Security of Route Discovery in MANETs 0 . 2 Online Scheduling Sequential 1 Information Dissemination . Objects with Periodicity for dynamic in

Knowledge and Data Engineering Mobile Computing

2009

2009

Mobile Computing

2009

Networking

2009

Mobile Computing

2009

Mobile Computing

2009

Knowledge and Data Engineering Mobile Computing

2009

2009

Computer Theory and Engineering

2009

Mobile Computing

2009

Parallel and Distributed Systems

2009

Knowledge and Data Engineering

2009

Networking

2009

Mobile Computing

2009

Mobile Computing

2009

Mobile Computing

2009

Parallel and Distributed Systems

2009

Mobile Computing

2009

Mobile Computing

2009

Knowledge and Data Engineering

2009

2 Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio 2 Networks . 2 Random Cast An Energy Efficient Communication Scheme for Mobile Ad Hoc 3 Networks . 2 Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel 4 Communications . 2 Resource Allocation in OFDMA 5 Supporting Multimedia Services . Wireless Communications Systems

Mobile Computing

2009

Mobile Computing

2009

Networking

2009

Networking

2009

2 Route Stability in MANETs under the Random Direction Mobility Model 6 . 2 Secure and Policy-Complaint Source Routing 7 . 2 Single-Link Failure Detection in All-Optical Networks Using 8 . 2 The Effectiveness of Checksums for Embedded Control Networks 9 . 3 Two Blocking Algorithm on Adaptive Binary Splitting Single and Pair 0 Resolutions for RFID Tag Identification . 3 Compaction of Schedules and a Two-Stage Approach for Duplication-Based 1 DAG Scheduling . 3 Delay Analysis for Maximal Scheduling With Flow Control in Wireless 2 Networks With Bursty Traffic . 3 Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc 3 Networks . 3 Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise 4 . 3 PRESTO Feedback-Driven Data Management in Sensor Networks 5 . 3 Spread-Spectrum Watermarking Security 6 . 3 Virus Spread in Networks 7 .

Mobile Computing

2009

Networking

2009

Networking

2009

Dependable and Secure Computing

2009

Networking

2009

Distributed Computing

2009

Network Computing

2009

Mobile Computing

2009

Secure Computing

2009

Network Computing

2009

Secure Computing

2009

Network Computing

2009

3 A Distributed And Scalable Routing Table Manager For The Next Generation 8 Of IP Routers . 3 A New Model For Dissemination Of XML Content 9 . 4 Credit Card Fraud Detection Using Hidden Markov Models 0 .

Networking

2008

Systems, Man, and Cybernetics

2008

Dependable and Secure Computing

2008

4 Efficient 2-D Grayscale Morphological Transformations With Arbitraly Flat 1 Structuring Elements . 4 Efficient Resource Allocation For Wireless Multicast 2 . 4 Efficient Routing In Intermittently Connected Mobile Networks The Multiple 3 Copy Case . 4 Localized Sensor Area Coverage With Low Communication Overhead 4 . 4 Location-Based Spatial Queries with Data Sharing in Wireless Broadcast 5 Environments . 4 Provable Protection Against Web Application Vulnerabilities Related to 6 Session Data Dependencies . 4 Quiver On the Edge Consistent Scalable Edge Services 7 . 4 Temporal 8 . Partioning of Communication Architecture Resources in an Integrated

Image Processing

2008

Mobile Computing

2008

Networking

2008

Mobile Computing

2008

Knowledge and Data Engineering

2008

Software Engineering for Secure Systems

2008

Parallel and Distributed Systems

2008

Dependable and Secure Computing

2008

4 Vision Based Processing For Real-Time 3-D Data Acquisition Based On 9 Coded Structured Light . 5 Watermarking Relational Databases Using Optimization Based Techniques 0 . 5 A Novel Framework for Semantic Annotation and Personalized Retrieval of 1 Sports Video . 5 Active Learning Methods for Interactive Image Retrieval 2 . 5 Estimation of Defects Based On Defect Decay Model ED3M 3 . 5 Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing 4 Under Information Provision . 5 Hardware enhanced association rule mining with Hashing and Pipelining 5 . 5 HBA Distributed Metadata Management for Large Cluster-Based Storage 6 Systems . 5 Orthogonal Data Embedding for Binary Images in Morphological Transform 7 Domain-A High-Capacity Approach . 5 Probabilistic Packet Marking For Large Scale IP Trace Back 8 . 5 Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks 9 . 6 Statistical Techniques for Detecting Traffic Anomalies through Packet Header

Image Processing

2008

Knowledge and Data Engineering

2008

Multimedia

2008

Image Processing

2008

Software Engineering

2008

Transportation System

2008

Data Mining

2008

Distributed Computing

2008

Multimedia Computing

2008

Network Computing

2008

Network Computing

2008

Network Computing

2008

Data 6 Trustworthy Computing Under Resource Constraints With The Down Policy 1 . Secure Computing 2008

6 An SSL Back-End Forwarding Scheme in Cluster-based Web Servers 2 . 6 Efficient Approximate Query Processing in Peer-to-Peer Networks 3 . 6 pFusion: A P2P Architecture for Internet-Scale Content-Based Search and 4 Retrieval . 6 Provably Secure 5 Protocols . Three-Party Authenticated Quantum Key Distribution

Parallel and Distributed Systems

2007

Knowledge and Data Engineering

2007

Parallel and Distributed Systems

2007

Dependable and Secure Computing

2007

6 Schema Conversion from Relation to XML with Semantic Constraints 6 .

Fuzzy Systems and Knowledge Discovery

2007

6 Benefit Based Data Caching in Adhoc Networks 7 . 6 Image Processing Techniques for the Detection and Removal of Cracks in 8 Digitized Paintings . 6 On the Computational Complexity and Effectiveness of N-Hub Shortest-Path 9 Routing .

Mobile Computing

2006

Image Processing

2006

Networking

2006

7 E-Secure Transactions - Secure Electronic Data Interchange over Internet 0 . 7 Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks 1 . 7 Neural Networks for Unicode Optical Character Recognition 2 .

Internet Computing

2005

Network Computing

2005

Image Processing

2004

7 Credit Card Fraud Detection 3 . 7 Defect Tracking - A Software Defect Report and Tracking System in an 4 Intranet . 7 E Logistics for Warehouse Management Implementation of Authenticated 5 and Dynamic Logistics Support System & Management .

Intelligent Systems

Software Maintenance and Reengineering

You might also like