18-06-2012, 04:50 PM
S.NO PROJECT NAME YEAR
1. A Competitive Study of Cryptography Techniques over Block Cipher 2011
2. A Cross Layer Architecture For Multicast And Unicast Video Transmission In Mobile Broadband Networks 2011
3. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree 2011
4. A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems 2011
5. A New Method for Generating All Positive and Negative Association Rules 2011
6. A Permutation-Based Algorithm To Optimally Reschedule Trains In A Railway Traffic Network 2011
7. A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows 2011
8. Advanced Routing Technology For Fast Internet Protocol Network Recovery 2011
9. An Efficient Density based Improved K- Medoids Clustering algorithm 2011
10. An Efficient Paging Scheme for Terminal Mobility using Personal Mobility Management Information in Interworked Fixed and Mobile Networks 2011
11. An Efficient Self-Organized Authentication and Key Management Scheme for Distributed Multihop Relay- Based IEEE 802.16 Networks 2011
12. Analysis on Credit Card Fraud Detection Methods 2011
13. Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks 2011
14. Clustering with Multi-Viewpoint based Similarity Measure 2011
15. Color Extended Visual Cryptography Using Error Diffusion 2011
16. Computational Perceptual Features for Texture Representation and Retrieval 2011
17. Conceptual Cohesion of Classes in Object Oriented Systems 2011
18. Decision Trees for Uncertain Data 2011
19. Denial of Service Attacks in Wireless Networks : The case of Jammers 2011
20. Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks 2011
21. Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service 2011
22. Effective Navigation of Query Results Based on Concept Hierarchies 2011
23. Efficient Public Key Certificate Management for Mobile Ad Hoc Networks 2011
24. GLIP: A Concurrency Control Protocol for Clipping Indexing 2011
25. Implementation of LSB Steganography and its Evaluation for Various File Formats 2011
26. Intrusion detection: An Energy efficient approach in Heterogeneous WSN 2011
27. Location Aided Flat Hybrid Routing Protocol (LAFHRP) 2011
28. Modeling and Detection of Camouflaging Worm 2011
29. Nymble: Blocking Misbehaving Users in Anonymizing Networks 2011
30. Online Intrusion Alert Aggregation with Generative Data Stream Modeling 2011
31. Optimal Bandwidth Assignment for Multiple-Description-Coded Video 2011
32. Providing Rate Guarantees For Internet Application Traffic Across ATM Networks 2011
33. Ranking Spatial Data by Quality Preferences 2011
34. Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding 2011
35. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks 2011
36. Secure and Practical Outsourcing of Linear Programming in Cloud Computing 2011
37. Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports 2011
38. Secure Data Collection in Wireless Sensor Networks Using Random Routing Algorithms 2011
39. Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations 2011
40. The CoQUOS Approach to Continuous Queries in Unstructured Overlays 2011
41. Voronoi-based Continuous Query Processing for Mobile Users 2011
42. Wireless Sensor Networks: A Study on Congestion Routing Algorithms 2011
43. Improving Utilization of Infrastructure Clouds 2011
44. A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks 2010
45. A Distributed Protocol To Serve Dynamic Groups For Peer-To-Peer Streaming 2010
46. A Review of the Applications of Agent Technology in Traffic and Transportation Systems 2010
47. Decision Tree Induction: An Approach for Data Classification Using AVL-Tree 2010
48. Always Acyclic Distributed Path Computation 2010
49. Bandwidth Recycling In IEEE 802.16 Networks 2010
50. Closeness: A New Privacy Measure for Data Publishing 2010
51. Conditional Shortest Path Routing in Delay Tolerant Networks 2010
52. Cooperative Caching In Wireless P2p Networks: Design, Implementation, And Valuation 2010
53. Distributed Explicit Rate Schemes In Multi-Input–Multi-Output Network Systems 2010
54. Ensuring Data Storage Security in Cloud Computing 2010
55. Host-to-Host Congestion Control for TCP 2010
56. KTR: an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services 2010
57. Layered Approach Using Conditional Random Fields for Intrusion Detection 2010
58. Mesh Based Multicast Routing in MANET: Stable Link Based Approach 2010
59. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks 2010
60. On Modeling, Analysis, and Optimization of Packet Aggregation Systems 2010
61. Record Matching over Query Results from Multiple Web Databases 2010
62. Staying Connected in a Mobile Healthcare System: Experiences from the MediNet Project 2010
63. A Perceptually Relevant Approach to Ringing Region Detection 2010
64. A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory 2010
65. An Improved Lossless Image Compression Algorithm LOCO-R 2010
66. Chunk distribution in Mesh-Based Large Scale P2P Streaming Systems: A fluid approach 2010
67. Deriving Concept-Based User Profiles from Search Engine Logs 2010
68. Data Mining for Secure Software Engineering – Source Code Management Tool Case Study 2010
69. A New Reliable Broadcasting in Mobile Ad Hoc Networks 2009
70. A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study 2009
71. ANGEL: Enhancing the Utility of Generalization for Privacy Preserving Publication 2009
72. Capturing Router Congestion and Delay 2009
73. Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments 2009
74. Detecting Malicious Packet Losses 2009
75. Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks 2009
76. Dynamic Routing with Security Considerations 2009
77. Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks 2009
78. Effective and Efficient Query Processing for Video Subsequence Identification 2009
79. Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure-Based Systems 2009
80. Efficient Clustering Techniques For Managing Large Datasets 2009
81. Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period 2009
82. Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontologies 2009
83. Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks 2009
84. Heuristic algorithms for designing self-repairing protection tress in mesh network 2009
85. Locating Friends And Family Using Global Positioning System(GPS)-J2ME 2009
86. Measuring Capacity Bandwidth of Targeted Path Segments 2009
87. Mitigation of Control Channel Jamming Under Node Capture Attacks 2009
88. Mobility Management Approaches for Mobile IP Networks 2009
89. Multipath Dissemination in Regular Mesh Topologies 2009
90. Multiple Routing Configurations for Fast IP Network Recovery 2009
91. Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks 2009
92. SAT-Solving Approaches to Context-Aware Enterprise Network Security Management 2009
93. SIMPS Using Sociology for Personal Mobility 2009
94. Study on Intelligent E-Shopping System Based on Data Mining 2009
95. Study on Parallel Clustering Based on Asynchronous Communication 2009
96. TCP Performance in Flow-Based Mix Networks: Modeling and Analysis 2009
97. Exact Knowledge Hiding through Database Extension 2009
98. Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems 2009
99. Virtual-Force-Based Geometric Routing Protocol in MANETs 2009
100. Learning in an Ambient Intelligent World: Enabling Technologies and Practices 2009
101. Node Isolation Model and Age-Based Neighbor Selection in Unstructured P2P Networks 2009
102. IMine: Index Support for Item Set Mining 2009
103. A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks 2008
104. A Geometric Approach to Improving Active Packet Loss Measurement 2008
105. A Model-Based Approach to Evaluation of the Efficacy of FEC Coding In Combating Network Packet Losses 2008
106. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm 2008
107. A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns 2008
108. An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis 2008
109. Sybil Guard: Defending Against Sybil Attacks via Social Networks 2008
110. Bandwidth Efficient Video Multicasting in Multiradio Multicellular Wireless Networks 2008
111. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks 2008
112. Binary Tree Based Public-Key Management for Mobile Ad Hoc Networks 2008
113. Computation-Efficient Multicast Key Distribution 2008
114. Controlling IP Spoofing through Interdomain Packet Filters 2008
115. Cryptographic versus trust-based method for MANET routing security 2008
116. C-TREND Temporal Cluster Graphs for Identifying and Visualizing Trends in Multi attribute Transactional Data 2008
117. DCMP : A Distributed Cycle Minimization Protocol for Peer-to-Peer Networks 2008
118. Designing Less-Structured P2P Systems for the Expected High Churn 2008
119. Distributed Frequent Item set Mining using Trie Data Structure 2008
120. Dual-Link Failure Resiliency through Backup Link Mutual Exclusion 2008
121. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries 2008
122. Fuzzy Concept Mining based on Formal Concept Analysis 2008
123. Incremental Learning of Chunk Data for Online Pattern Classification Systems 2008
124. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks 2008
125. Large Connectivity for Dynamic Random Geometric Graphs 2008
126. Location Based Spatial Query Processing In Wireless Broadcast Environments 2008
127. Minimizing File Download Time in Stochastic Peer-to-Peer Networks 2008
128. Mining Medical Databases with Modified Gini Index Classification 2008
129. Mitigating Performance Degradation in Congested Sensor Networks 2008
130. Modeling & Automated Containment of Worms 2008
131. NDT A Model-Driven Approach 2008
132. On Performance Benefits of Multihoming Route Control 2008
133. Online Index Recommendations for High-Dimensional Databases Using Query Workloads 2008
134. Optimal State Allocation for Multicast Communication with Explicit Multicast forwarding 2008
135. Performance Analysis of Clustering Protocols in Mobile Ad hoc Networks 2008
136. Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction 2008
137. Problem Oriented Software Engineering Solving the Package Router Control Problem 2008
138. Protection of Database Security via Collaborative Inference Detection 2008
139. QUIVER Consistent Object Sharing For Edge Services 2008
140. Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing 2008
141. Security Requirements Engineering A Framework for Representation and Analysis 2008
142. Truth Discovery with Multiple Conflicting Information Providers on the Web 2008
143. Using The Cohesion Of Classes For Fault Prediction 2008
144. Enhancing Search Performance in Unstructured P2P Networks Based on Users’ Common Interest 2008
145. A Fully Distributed Proactively Secure Threshold-Multisignature Scheme 2007
146. A New Operational Transformation Framework for Real-Time Group Editors 2007
147. A Robust Spanning Tree Topology for Data Collection and Dissemination in Distributed Environments 2007
148. A Scalable Overlay Multicast Architecture for Large-Scale Applications 2007
149. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs 2007
150. An Adaptive Programming Model for Fault-Tolerant Distributed Computing 2007
151. An Efficient Genetic Algorithm for the Bandwidth Calculation Problem in TDMA-based Mobile Ad Hoc Networks 2007
152. API-Based and Information-Theoretic - Coupling based metrics for measuring the quality of a software 2007
153. Cheating Prevention in Visual Cryptography 2007
154. Discriminative Learning and Recognition of Image Set Classes Using Canonical Correlations 2007
155. Dynamic Load Balancing in Distributed Systems in the Presence of Delays: A Regeneration-Theory Approach 2007
156. Hiding Sensitive Association Rules with Limited Side Effects 2007
157. Multicast Routing with Delay and Delay Variation Constraints for Collaborative Applications on Overlay Networks 2007
158. OCGRR: A New Scheduling Algorithm for Differentiated Services Networks 2007
159. On Natural Language Processing and Plan Recognition 2007
160. Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols 2007
161. Randomized Protocols for Duplicate Elimination in Peer to Peer Systems 2007
162. Secure Mask for Color Image Hiding 2007
163. A Fast k-Neighborhood Algorithm for Large Point-Clouds 2006
164. A Near-Optimal Multicast Scheme For Mobile Ad Hoc Networks Using A Hybrid Genetic Algorithm 2006
165. A New TCP for Persistent Packet Reordering 2006
166. A Parallel Approach To XML Parsing 2006
167. A Secure Routing Protocol for mobile Ad-hoc Network 2006
168. Benefit Based Data Caching In Ad Hoc Networks 2006
169. Distributed Cache updating for the Dynamic source routing protocol 2006
170. Distributed Collaborative Key Agreement AND Authentication Protocols for Dynamic Peer Groups 2006
171. Efficient Key Agreement for Large and Dynamic Multicast Groups 2006
172. Energy-Efficient SINR-Based Routing for Multihop Wireless Networks 2006
173. Implementing Multicast Distribution Through Recursive Unicast Trees 2006
174. Inside SSL: The Secure Sockets Layer Protocol 2006
175. Neural Networks for Unicode optical Character Recognition 2006
176. Packet Score A Statistics based packet filtering scheme against DDOS attack 2006
177. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm 2006
178. A Memory Learning Framework for Effective Image Retrieval 2005
179. A Novel Secure Communication Protocol for Ad Hoc networks 2005
180. An Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks 2005
181. Face Recognition Using Laplacian faces 2005
182. GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions 2005
183. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks 2004
184. An Algorithmic approach to identify network link failures 2004
185. An Optimized Distributed Association Rule Mining Algorithm-ODAM 2004
186. Application of BPCS steganography to wavelet compressed video 2004
187. Efficient, Authenticated, Fault-Tolerant Key Agreement for Dynamic Peer Group 2004
188. Energy Efficient Routing in Wireless Ad Hoc Networks 2004
189. Leaders–Subleaders: An efficient hierarchical clustering algorithm for large data sets 2004
190. Network Border Patrol Preventing Congestion Collapse 2004
191. Online Handwritten Script Recognition 2004
192. A BGP-based Mechanism for Lowest-Cost Routing 2003
193. Data Clustering using Particle Swarm Optimization 2003
194. Noise Reduction by Fuzzy Image Filtering 2003
195. Self-Organized Public-Key Management for Mobile Ad Hoc Networks 2003
196. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression Applications 2003
197. ITP: An Image Transport Protocol for the Internet 2002
198. Vnc-Based Access To Remote Computers Fromcellular Phones 2002
199. DNS Security 2000