04-12-2009, 07:26 PM
1. Real Time Operating Systems on Embedded ICs
2. Real time communication in wireless sensor networks
3. Semi - Supervised Learning using Graph Kernels
4. Collaborative Mobile Environments
5. High Performance Clusters
6. Distributed Computing
7. membrane computing
8. Forecasting
9. Forecasting
10. Middleware architecture for Pervasive computing
11. Query Optimization
12. Software Code Security
13. Query Optimization
14. Network Anomaly
15. Study of TGREP
16. Forecasting
17. Viruses and Worms
18. Netowork Security
19. Inter-Operabilty of 802.11e and 802.11
20. RFID Security
21. Semi Supervised Learning using Gaussian Process
22. Quality of Service Routing in computer networks
23. Wireless Security
24. Wireless MAN
25. multi-wordnets
26. Light-trails
27. Fault Tolerance in Virtual Machine Environments
28. Wireless Connectivity for Rural Areas
29. VOIP Security
30. Semi Supervised Learning using Gaussian Process
31. Efficiency / Comparative study of routing schemes in event based systems
32. Rendering Maths on web with Java Swing
33. Analysing Software Life Cycle of Different Program Paradigm.
34. Authoring environments for open source courseware
35. Integration of Parallel Database in a Service Oriented Architecture
36. Ontological Relation Discovery
37. Issues in Middleware for Pervasive Computing
38. Wireless Connectivity for Rural Areas
39. Energy Efficient query Optimization
40. Semi-supervised Learning using Graph Kernels
41. Comparative study on Authoring Tools
42. network security
43. Security Issues in Wireless Networks
44. Layered versioning for software configuration management
45. Cooperative Adaptive Cruise Control
46. Telephony Routing over IP
47. Virtual Private Networks(VPNs)
48. Holt-Winters technique for Financial Forecasting
49. Fine-grained Access Control in Databases
50. Secure Database Service
51. QoS in Wireless Lans
52. Classification, Clustering and their Application for Damage Detection in Mechanical Structures
53. Middleware in embedded systems
54. Web Search Results' Ranking: PageRank, HITS and Related Work
55. Proactive Anomaly Detection
56. Forecasting using Double Exponential Smoothing Method
57. Enery efficiency in Wireless sensor networks
58. Enterprise Security
59. Seasonal and Adaptive Forecasting
60. Root cause Localization and analysis of faults[Autonomic Computing]
61. RFID : Comparative study of Collision Resolution Protocols
62. Classification clustering and Applications to Intrusion Detection Systems.
63. Faultolerant Routing in Mobile Ad-Hoc Network
64. Channel Allocation Algortihms for Mobile Telephony
65. Middleware for Wireless Sensor Networks
66. Security On Wireless LAN Adaptive cruise control
67. Middleware for Sensor Networks
68. Query Based Fine-grained PageRank
69. Classification, Clustering and Application in Intrusuion Detection System
70. Financial Forecasting
71. Wireless Security
72. Autonomic computing
73. Sensor Networks
74. QoS in VoIP
75. Proactive Network Anomaly Detection
76. RFID
77. Middleware in Embedded Systems
78. Wireless Security
79. Voice Routing over IP Telephony
80. Statistical Forecasting
81. QOS in software server Firewalls
82. Classification, Clustering and their Application for Damage Detection in Mechanical Structures.
83. Fine Grained DataBase Security
84. J2EE Security
85. Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network.
86. VOIP Over Wireless LAN
87. Database Security
88. Reliable Multicast
89. Multicast Congestion Control
90. Capacity of Ad-hoc Wireless Networks
91. Performance Evaluation of IEEE 802.11
92. Quality of service in Differentiated Service Architecture
93. Routing in Sensor Networks
94. TDMA implementation for QoS routing in Ad Hoc Networks
95. case Study : A X-By-Wire System , Communication Bus perspective
96. Approximate string matching for Music retrieval
97. Spectral Methods for Graph Partitioning
98. Signal Processing for Networking
99. Spatial DataMining
100. Bionetric Authentication
101. Aspects of Database Security and Program Security
102. Attacks on Smart Cards
103. Smart Card Standards
104. A Probabilistic Approach to Micropayment
105. Java Security
106. Information Extraction
107. Clustering (Data Mining)
108. Frequent ItemSet Mining
109. Classification Techniques in Data Mining
110. Multi-Relational Data Mining
111. Object Persistence
112. Distributed Garbage Collection
113. Agent Mediated E-commerce
114. Recovery in Main Memory Databases
115. Optimization of Protocol Stack for wireless networks
116. Compressed Domain Processing And Video Information System
117. Introduction to Speech Recognition
118. Reconfigurable Hardware in Wireless communication
119. Applications of speech recognition
120. Geometric Invariants in Biological Molecules
121. Applications of Graph Theory to Metabolic Pathways
122. Computational Geometry in Drug Design
123. Query Processing on Data Streams
124. Multi-application Framework for Smart Cards
125. Semi-supervised Learning
126. Data mining through Active Learning
127. Text Classification Using Semi-supervised and Active Learning
128. Relational Data Mining
129. Dataset Query algorithms in Streaming Mining
130. Mining Document Streams
131. Information Extraction from structured & Semi-structured data
132. Digital Video Editing
133. Determining Global States of Distributed Systems
134. Multi Protocol Label Switching
135. QoS in Wireless LANs
136. Advanced Queue Management Techniques
137. Techniques to aid property specification in Model Checking
2. Real time communication in wireless sensor networks
3. Semi - Supervised Learning using Graph Kernels
4. Collaborative Mobile Environments
5. High Performance Clusters
6. Distributed Computing
7. membrane computing
8. Forecasting
9. Forecasting
10. Middleware architecture for Pervasive computing
11. Query Optimization
12. Software Code Security
13. Query Optimization
14. Network Anomaly
15. Study of TGREP
16. Forecasting
17. Viruses and Worms
18. Netowork Security
19. Inter-Operabilty of 802.11e and 802.11
20. RFID Security
21. Semi Supervised Learning using Gaussian Process
22. Quality of Service Routing in computer networks
23. Wireless Security
24. Wireless MAN
25. multi-wordnets
26. Light-trails
27. Fault Tolerance in Virtual Machine Environments
28. Wireless Connectivity for Rural Areas
29. VOIP Security
30. Semi Supervised Learning using Gaussian Process
31. Efficiency / Comparative study of routing schemes in event based systems
32. Rendering Maths on web with Java Swing
33. Analysing Software Life Cycle of Different Program Paradigm.
34. Authoring environments for open source courseware
35. Integration of Parallel Database in a Service Oriented Architecture
36. Ontological Relation Discovery
37. Issues in Middleware for Pervasive Computing
38. Wireless Connectivity for Rural Areas
39. Energy Efficient query Optimization
40. Semi-supervised Learning using Graph Kernels
41. Comparative study on Authoring Tools
42. network security
43. Security Issues in Wireless Networks
44. Layered versioning for software configuration management
45. Cooperative Adaptive Cruise Control
46. Telephony Routing over IP
47. Virtual Private Networks(VPNs)
48. Holt-Winters technique for Financial Forecasting
49. Fine-grained Access Control in Databases
50. Secure Database Service
51. QoS in Wireless Lans
52. Classification, Clustering and their Application for Damage Detection in Mechanical Structures
53. Middleware in embedded systems
54. Web Search Results' Ranking: PageRank, HITS and Related Work
55. Proactive Anomaly Detection
56. Forecasting using Double Exponential Smoothing Method
57. Enery efficiency in Wireless sensor networks
58. Enterprise Security
59. Seasonal and Adaptive Forecasting
60. Root cause Localization and analysis of faults[Autonomic Computing]
61. RFID : Comparative study of Collision Resolution Protocols
62. Classification clustering and Applications to Intrusion Detection Systems.
63. Faultolerant Routing in Mobile Ad-Hoc Network
64. Channel Allocation Algortihms for Mobile Telephony
65. Middleware for Wireless Sensor Networks
66. Security On Wireless LAN Adaptive cruise control
67. Middleware for Sensor Networks
68. Query Based Fine-grained PageRank
69. Classification, Clustering and Application in Intrusuion Detection System
70. Financial Forecasting
71. Wireless Security
72. Autonomic computing
73. Sensor Networks
74. QoS in VoIP
75. Proactive Network Anomaly Detection
76. RFID
77. Middleware in Embedded Systems
78. Wireless Security
79. Voice Routing over IP Telephony
80. Statistical Forecasting
81. QOS in software server Firewalls
82. Classification, Clustering and their Application for Damage Detection in Mechanical Structures.
83. Fine Grained DataBase Security
84. J2EE Security
85. Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network.
86. VOIP Over Wireless LAN
87. Database Security
88. Reliable Multicast
89. Multicast Congestion Control
90. Capacity of Ad-hoc Wireless Networks
91. Performance Evaluation of IEEE 802.11
92. Quality of service in Differentiated Service Architecture
93. Routing in Sensor Networks
94. TDMA implementation for QoS routing in Ad Hoc Networks
95. case Study : A X-By-Wire System , Communication Bus perspective
96. Approximate string matching for Music retrieval
97. Spectral Methods for Graph Partitioning
98. Signal Processing for Networking
99. Spatial DataMining
100. Bionetric Authentication
101. Aspects of Database Security and Program Security
102. Attacks on Smart Cards
103. Smart Card Standards
104. A Probabilistic Approach to Micropayment
105. Java Security
106. Information Extraction
107. Clustering (Data Mining)
108. Frequent ItemSet Mining
109. Classification Techniques in Data Mining
110. Multi-Relational Data Mining
111. Object Persistence
112. Distributed Garbage Collection
113. Agent Mediated E-commerce
114. Recovery in Main Memory Databases
115. Optimization of Protocol Stack for wireless networks
116. Compressed Domain Processing And Video Information System
117. Introduction to Speech Recognition
118. Reconfigurable Hardware in Wireless communication
119. Applications of speech recognition
120. Geometric Invariants in Biological Molecules
121. Applications of Graph Theory to Metabolic Pathways
122. Computational Geometry in Drug Design
123. Query Processing on Data Streams
124. Multi-application Framework for Smart Cards
125. Semi-supervised Learning
126. Data mining through Active Learning
127. Text Classification Using Semi-supervised and Active Learning
128. Relational Data Mining
129. Dataset Query algorithms in Streaming Mining
130. Mining Document Streams
131. Information Extraction from structured & Semi-structured data
132. Digital Video Editing
133. Determining Global States of Distributed Systems
134. Multi Protocol Label Switching
135. QoS in Wireless LANs
136. Advanced Queue Management Techniques
137. Techniques to aid property specification in Model Checking