27-09-2009, 03:21 PM
. Supervised Learning of Semantic Classes for Image Annotation and Retrieval
. Face Recognition Using Laplacianfaces
. Digital Image Processing Techniques for the Detection and Removal
Of Cracks in Digitized Paintings
IEEE TRANSACTION ON DATA MINING
. Hiding Sensitive Association Rules with Limited Side Effects.
. Truth Discovery with Multiple Conflicting Information Providers on the Web.
. Online Index Recommendation for High Dimensional Databases
Using Query Workloads.
. C Trend: Temporal Cluster Graphs For Identifying and Visualization
Trends In Multi Attribute Transaction Data.
. A Signature Based Indexing Method for Efficient Content Based Retrieval
Of Relative Temporal Patterns.
. Ranked Reverse nearest Neighbor Search.
. Increasing Scalability of the Database Using Heuristic Method.
. Effective Querying In Highly Correlated Network.
. Hierarchical Grouping of Different Web Transactions.
. Mining Generalized Associations of Semantic Relations from Textual
Web Content
IEEE TRANSACTION ON SOFTWARE ENGINEERING
. A Formal Framework for Automated Round trip Software
Engineering in Static Aspect Weaving and Transformations
. Using the Conceptual Cohesion of Classes for Fault Prediction in
Object Oriented Systems
IEEE TRANSACTION ON NETWORKING
. Incremental Service Deployment Using the Hop By Hop Multicast Routing Protocol
. Noise Reduction by Fuzzy Image Filtering
. On Selfish Routing in Internet like Environment
. A New Top for Persistent Packet Reordering
. Distributed collaborative key agreement and authentication protocols for dynamic peer groups
. Enhancing Search Performance in
Unstructured PP Networks Based on Usersâ„¢ Common Interest
. A New Kind of Cluster based Key Management Protocol in Wireless Sensor Network
.
Analyses of VOIP services using vex DO Revision System
IEEE TRANSACTION ON NETWORKS & SECURUTY
. Distributed cache updating for the Dynamic source routing protocol
. An Adaptive Programming Model for Fault Tolerant Distributed Computing
. Face Recognition Using Laplacian faces
. Predictive Job Scheduling in a Connection Limited System using
Parallel Genetic Algorithm
. Image Processing Techniques for the Detection and Removal of Cracks
In Digitized Paintings
. A Distributed Database Architecture for Global Roaming in
Next Generation Mobile Networks
. Noise Reduction by Fuzzy Image Filtering
. Online Handwritten Script Recognition
. ODAM: An Optimized Distributed Association Rule Mining Algorithm
. Protocol Scrubbing: Network Security through Transparent Flow Modification
. Workflow Mining: Discovering Process Models from Event Logs
. Structure and Texture Filling In of Missing Image Blocks in Wireless
Transmission and Compression App
. An Agent Based Intrusion Detection, Response and blocking using signature
Method in Active Networks
. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
. ITP: An Image Transport Protocol for the Internet
. Hybrid Intrusion Detection with Weighted Signature Generation over
Anomalous Internet Episodes (HIDS)
. Incremental deployment service of Hop by hop multicast routing protocol
. Network border patrol: preventing congestion collapse and promoting
Fairness in the Internet
. Application of BPCS steganography to wavelet compressed video
. Neural Networks for Unicode Optical Character Recognition
. An Acknowledgment Based Approach for the Detection of Routing
Misbehavior in MANETs
. Neural Network Based Face Detection
. XTC: A Practical Topology Control Algorithm for Ad Hoc Networks
. A near optimal multicast scheme for mobile ad hoc networks using a
Hybrid genetic algorithm
. Mobile Agents in Distributed Multimedia Database Systems
. Image Stream Transfer Using Real Time Transmission Protocol
. Neural Networks for Handwritten character and Digits
. Evaluating the Performance of Versatile RMI Approach in Java
. Effective Packet Analyzing and Filtering System for ATM Network
. Selective Encryption of Still Image
. Homogenous Network Control and Implementation
. Retrieving Files Using Content Based Searching and presenting it in Carousel view
. Dynamic Signature Verification Using Pattern Recognition
. Embedding in Video Steganography
. Genetic Algorithm Based Train Simulation Using Concurrent Engineering
. Location Aided Routing for Mobile Ad Hoc Networks
. Image Rendering for Grid Technology
. Java Network File Sharing System
. Java Visual Editor with Compiler
. E Mail Server Using Multithreaded Sockets
. Network Component for XML Migration
. Image Water Marking and Combustion
. Image Processing for Convolution Filters
. Artificial intelligence network load balancing using Ant Colony Optimization
. Image Processing for Edge Detection Filters
. Flood Fill Algorithms in C# and GDI+
. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM
. Hiding messages in the Noise of a Picture
. Windows Management Instrumentation WMI Implementation
. Steganography for Hiding Data in Wave Audio Files