Pro List
Pro List
2009)
A Variable Length Data Encryption Technique using Square Grid Transposition with
Key Wrapping(2010)
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks(2012)
ROAuth: Recommendation Based Open Authorization(2011)
View-invariant action recognition based on Artificial Neural Networks(2012)
On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability(
2010)
Monitoring Service Systems from a Language-Action Perspective(2011)
Digital Image Tracing By Sequential(2011)
AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologie
s(2012)
Optimal Source-Based Filtering of Malicious Traffic(2012)
A New Cell-Counting-Based Attack Against Tor(2012)
Automatic Detection of Paroxysms in EEG Signals using Morphological Descriptors
and Artificial Neural Networks(2011)
Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of
Query-Based Wireless Sensor Networks(2011)
Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sens
or Networks(2012)
Data Leakage Detection(2011)
Query Planning for Continuous Aggregation Queries over a Network of Data Aggrega
tors(2012)
Data Leakage Detection(2011)
One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Dat
abases(2012)
Bridging Socially-Enhanced Virtual Communities(2011)
Optimal Source-Based Filtering of Malicious Traffic(2012)
Expert Discovery and Interactions in Mixed Service-Oriented Systems(2012)
ROAuth: Recommendation Based Open Authorization(2011)
Topology Control In Mobile Ad Hoc Networks With Cooperative Communications(2012)
One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Dat
abases(2012)
Throughput Optimization in High Speed Downlink Packet Access (HSDPA)(2011)
Review and Analysis of Trust Based Routing In MANETs(2011)
A Personalized Ontology Model for Web Information Gathering(2011)
Bridging Socially-Enhanced Virtual Communities(2011)
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data(2
012)
Optimal Source-Based Filtering of Malicious Traffic(2012)
One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Dat
abases(2012)
Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings(2012
)
Towards Secure and Dependable Storage Services in Cloud Computing(2012)
Facial Expression Recognition Using Facial Movement Features(2011)
Optimal Service Pricing for a Cloud Cache(2011)
Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks(2012)
Data Hiding in Audio Signal: A Review(2012)
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data(2011)
Digital Image Tracing by Sequential Multiple Watermarking(2011)
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Inf
ormation Sharing(2013)
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Comput
ing(2010)
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data(2
012)
A Personalized Ontology Model for Web Information Gathering(2011)
Multibiometric Cryptosystems Based on Feature-Level Fusion(2012)
ions(2009)
Query Planning for Continuous Aggregation Queries over a Network of Data Aggrega
tors(2012)
A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks(201
1)
Digital Image Tracing by Sequential Multiple Watermarking(2011)
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using
Attribute-based Encryption(2012)
Monitoring Service Systems from a Language-Action Perspective(2011)
Social Network
Auction on Assets
Image Gallery
Advanced Mobile System
Projects Organizer
File Splitter
E-learning community
Distribution Channel Management System
Online Sales And Inventory Management System
Web Dynamics
Brain Strom
Hospital Administration
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Al
gorithms(2012)
Communication media
Crime Records System
Query Migration Assistant
Online Shopping Cart
University Admission System
B2C E-commerce customer relation management based on the long tail
Scholors Practisable Succor
Financial & accounting solution through sales intranet
Job Portal
Online Crime Reports & Records Maintenance System
E-Monitoring For Women
Live Meeting
Network Monitoring System with Simple IP Subnet Calculator Tool
Online College Administration
All Jobs Info
On-line Service
E-learning community
Finalysis
File Splitter
DataMart Management Software
Telecom Connection System
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Al
gorithms(2012)
B2C E-commerce customer relation management based on the long tail
Cargo Manager
E-Health card
Human Resource Reporting System
Your Blog
Census
Online Crime Reports & Records Maintenance System
Vayuyann Airways
Auction on Assets
College Management System
Bandwidth Economizer
Jaybee Industries
Defect Tracking System
XDWorldRecipe
gorithms(2012)
Source 4 Talent
Tourism Deveoplment Portal