0% found this document useful (0 votes)
47 views

Pro List

lk

Uploaded by

Arun Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views

Pro List

lk

Uploaded by

Arun Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 6

RandomCast: An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks(

2009)
A Variable Length Data Encryption Technique using Square Grid Transposition with
Key Wrapping(2010)
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks(2012)
ROAuth: Recommendation Based Open Authorization(2011)
View-invariant action recognition based on Artificial Neural Networks(2012)
On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability(
2010)
Monitoring Service Systems from a Language-Action Perspective(2011)
Digital Image Tracing By Sequential(2011)
AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologie
s(2012)
Optimal Source-Based Filtering of Malicious Traffic(2012)
A New Cell-Counting-Based Attack Against Tor(2012)
Automatic Detection of Paroxysms in EEG Signals using Morphological Descriptors
and Artificial Neural Networks(2011)
Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of
Query-Based Wireless Sensor Networks(2011)
Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sens
or Networks(2012)
Data Leakage Detection(2011)
Query Planning for Continuous Aggregation Queries over a Network of Data Aggrega
tors(2012)
Data Leakage Detection(2011)
One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Dat
abases(2012)
Bridging Socially-Enhanced Virtual Communities(2011)
Optimal Source-Based Filtering of Malicious Traffic(2012)
Expert Discovery and Interactions in Mixed Service-Oriented Systems(2012)
ROAuth: Recommendation Based Open Authorization(2011)
Topology Control In Mobile Ad Hoc Networks With Cooperative Communications(2012)
One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Dat
abases(2012)
Throughput Optimization in High Speed Downlink Packet Access (HSDPA)(2011)
Review and Analysis of Trust Based Routing In MANETs(2011)
A Personalized Ontology Model for Web Information Gathering(2011)
Bridging Socially-Enhanced Virtual Communities(2011)
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data(2
012)
Optimal Source-Based Filtering of Malicious Traffic(2012)
One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Dat
abases(2012)
Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings(2012
)
Towards Secure and Dependable Storage Services in Cloud Computing(2012)
Facial Expression Recognition Using Facial Movement Features(2011)
Optimal Service Pricing for a Cloud Cache(2011)
Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks(2012)
Data Hiding in Audio Signal: A Review(2012)
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data(2011)
Digital Image Tracing by Sequential Multiple Watermarking(2011)
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Inf
ormation Sharing(2013)
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Comput
ing(2010)
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data(2
012)
A Personalized Ontology Model for Web Information Gathering(2011)
Multibiometric Cryptosystems Based on Feature-Level Fusion(2012)

IR-Tree: An Efficient Index for Geographic Document Search(2011)


Analysis of X means and global k means Using TUMOR Classification(2010)
Monitoring Service Systems from a Language-Action Perspective(2011)
Continuous Neighbor Discovery in Asynchronous Sensor Networks(2011)
Data Integrity Proofs in Cloud Storage(2011)
Query Planning for Continuous Aggregation Queries over a Network of Data Aggrega
tors(2012)
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networ
ks(2012)
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks(201
3)
Data Hiding in Audio Signal: A Review(2012)
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data(2011)
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs(2012
)
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using
Attribute-based Encryption(2012)
Latency Equalization as a New Network Service Primitive(2012)
The Geometric Efficient Matching Algorithm for Firewalls(2011)
Throughput Optimization in High Speed Downlink Packet Access (HSDPA)(2011)
FairTorrent: A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to
-Peer Systems(2012)
Automatic Image Equalization and Contrast Enhancement Using Gaussian Mixture Mod
eling(2012)
Robustness of Offline Signature Verification Based on Gray Level Features(2012)
Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Dat
a(2008)
Multibiometric Cryptosystems Based on Feature-Level Fusion(2012)
Minimizing File Download Time in Stochastic Peer-to-Peer Networks(2008)
Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems(2
011)
Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings(2012
)
Continuous Neighbor Discovery in Asynchronous Sensor Networks(2011)
Revisiting Defenses against Large-Scale Online Password Guessing Attacks(2012)
A Personalized Ontology Model for Web Information Gathering(2011)
Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multi-channel Communicat
ions(2009)
Efficient Broadcasting with Guaranteed Coverage in MANETs(2011)
Throughput Optimization in High Speed Downlink Packet Access (HSDPA)(2011)
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data(2011)
Data Hiding in Audio Signal: A Review(2012)
Defenses Against Large Scale Online Password Guessing Attacks By Using Persuasiv
e Click Points(2012)
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Inf
ormation Sharing(2013)
Continuous Neighbor Discovery in Asynchronous Sensor Networks(2011)
Query Planning for Continuous Aggregation Queries over a Network of Data Aggrega
tors(2012)
Automatic Detection of Paroxysms in EEG Signals using Morphological Descriptors
and Artificial Neural Networks(2011)
Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of
Query-Based Wireless Sensor Networks(2011)
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks(2012)
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobi
le-Healthcare Emergency(2012)
Automatic Image Equalization and Contrast Enhancement Using Gaussian Mixture Mod
eling(2012)
Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multi-channel Communicat

ions(2009)
Query Planning for Continuous Aggregation Queries over a Network of Data Aggrega
tors(2012)
A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks(201
1)
Digital Image Tracing by Sequential Multiple Watermarking(2011)
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using
Attribute-based Encryption(2012)
Monitoring Service Systems from a Language-Action Perspective(2011)
Social Network
Auction on Assets
Image Gallery
Advanced Mobile System
Projects Organizer
File Splitter
E-learning community
Distribution Channel Management System
Online Sales And Inventory Management System
Web Dynamics
Brain Strom
Hospital Administration
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Al
gorithms(2012)
Communication media
Crime Records System
Query Migration Assistant
Online Shopping Cart
University Admission System
B2C E-commerce customer relation management based on the long tail
Scholors Practisable Succor
Financial & accounting solution through sales intranet
Job Portal
Online Crime Reports & Records Maintenance System
E-Monitoring For Women
Live Meeting
Network Monitoring System with Simple IP Subnet Calculator Tool
Online College Administration
All Jobs Info
On-line Service
E-learning community
Finalysis
File Splitter
DataMart Management Software
Telecom Connection System
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Al
gorithms(2012)
B2C E-commerce customer relation management based on the long tail
Cargo Manager
E-Health card
Human Resource Reporting System
Your Blog
Census
Online Crime Reports & Records Maintenance System
Vayuyann Airways
Auction on Assets
College Management System
Bandwidth Economizer
Jaybee Industries
Defect Tracking System
XDWorldRecipe

Dynamic Survey Application Designer


Say No To Addict
Central Authentication Registry
Insurance Assist System
Tax completed
E-Kiosk
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Al
gorithms(2012)
Scholors Practisable Succor
Web Based Recruitment System
Network Monitoring System with Simple IP Subnet Calculator Tool
Rich Text Editor
Inventory Administration Scheme
E Cab Services
Electronic Image Sharing
E-Former
Online Bus Ticket Reservation
Blood Donation
My Explorer In C Sharp
District Collector Office Information
Jaybee Industries
Your Blog
Techno Task Manager
Central Authentication Registry
Web portal?s
Knowledge Storm
Web Tourist
Communication media
Social Network
Network Load Balance
All Job Info
Farmers Buddy
Cyber Job Search
Construction PLUS
Poll Designer
Scholors Practisable Succor
Online Polling
Image Gallery
Online Crime Reports & Records Maintenance System
Artificial intelligence network load balancing using Ant Colony Optimisation
Budjet Planner
All Jobs Info
Complaint Monitoring System without Organization
Go Inventory
Helpdesk Technology
Source 4 Talent
Web Server Log Analyzer
Say No To Addict
Pub Maintenance System
Software Project Organization
DataMart Management Software
Online-Results
Online Sales And Inventory Management System
Workflow Tool
Budjet Planner
Cyber Shopping Window
Go Inventory
Resource Scheduling System
Enterprise Organization Portal
Franchisee Management

Network Load Balance


Rich Text Editor
Workflow Tool
SMS Alert System
Prison House Management System
Timesheet monitor
Hospital Billing System
Knowledge Management System
Source 4 Talent
TeleServe
Online Discussion Forum
My Explorer In C Sharp
Product Maintenance System
Automated Ballot Voting
Bug Tracking System
Digital EYE Ad Designer Services
Workflow Tool
E-sanotorium
Visa Processing Information System
Farmers Buddy
Bandwidth Economizer
Hospital Billing System
Communication media
Pub Maintenance System
Social Security Number
Crime Records System
Tourism Development Portal
Desi Gallery
Customer Tech Support
Timesheet monitor
India Study Channel
Arogyasri
Shift Plus
College Management System
Electronic Cash Controller
Edge Detection and Linking Using Wavelet Representation and Image Fusion
Web portal?s
Organization internal survey
Employee Functioning Maintenance
Farmers Buddy
Budjet Planner
Mingle Box
Live Meeting
Knowledge Management System
Insurance Assist Systems
W3Status Analyser
Web portal?s
Hotel Management System
Communication media
Digital EYE Ad Designer Services
Race Lapping Federation
Insurance project
E Sanatorium
Advertising Agencies
E- Support Services
Construction PLUS
Online Staff and Student Interaction
Cableram Network
Students Halt Mart
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Al

gorithms(2012)
Source 4 Talent
Tourism Deveoplment Portal

You might also like