Javaieee 2010&2009
Javaieee 2010&2009
Javaieee 2010&2009
S No
Domain Cloud computing Data Mining Data Mining Data Mining Data Mining Data Mining Mobile Computing Mobile Computing
1 Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing 2 Managing Multidimensional Historical Aggregate Data In Unstructured P2p Networks 3 Bin Rank Scaling Dynamic Authority-Based Search Using Materialized Sub Graphs 4 Mitigating Selective Forwarding Attacks With A Channel-Aware Approach In WMNS 5 P2p Reputation Management Using Distributed Identities And Decentralized Recommendation Chains 6 Pam An Efficient And Privacy-Aware Monitoring Framework For Continuously Moving Objects 7 Secure Data Collection In Wireless Sensor Networks Using Randomized Dispersive Routes TDMA Scheduling With Optimized Energy Efficiency 8 And Minimum Delay In Clustered Wireless Sensor Networks Modified DSR (Preemptive) To Reduce Link Breakage 9 And Routing Overhead For MANNET Using Proactive Route Maintenance (PRM) 10 Privacy-Conscious Location-Based Queries In Mobile Environments 11 Bandwidth Recycling In IEEE 802.16 Networks 12 Agent Based Efficient Anomaly Intrusion Detection System In Adhoc Networks 13 A New Privacy Measure For Data Publishing 14 Distributed Protocol To Serve Dynamic Groups For Peer-To-Peer Streaming 15 Cooperative Caching In Wireless P2p Networks Design, Implementation, And Evaluation 16 IRM: Integrated File Replication And Consistency Maintenance In P2p Systems 17 Correlation-Based Traffic Analysis Attacks On Anonymity Networks 18 A Distributed CSMA Algorithm For Throughput And Utility Maximization In Wireless Networks 19 A Dynamic En-Route Filtering Scheme For Data Reporting In Wireless Sensor Networks 20 Efficient And Dynamic Routing Topology Inference From End-To-End Measurements 21 Active Re-Ranking For Web Image Search
Mobile Computing Mobile Computing Mobile Computing Mobile Computing Data Mining Parallel And Distributed Parallel And Distributed Parallel And Distributed Parallel And Distributed Networking Networking Networking Image Processing
2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010
22 An Improved Loss Less Image Compression 23 Ensuring Data Storage Security In Cloud Computing 24 layered approach using conditional random fields for intrusion detection 25 Improving Bug Tracking Systems 26 Detecting Malicious Packet Losses 27 Dynamic Search Algorithm In Unstructured 28 Flexible Deterministic Packet Marking An Ip Trace Back System To Find The Real Source Of Attacks 29 Mitigating Denial-Of-Service Attacks On The Chord Overlay Network A Location Hiding Approach 30 TCP Performance In Flow-Based Mix Networks Modeling And Analysis 31 Optimizing The Throughput Of Data-Driven 32 Dynamic Routing With Security Considerations 33 Controlling IP Spoofing Through Inter-Domain Packet Filters 34 Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion 35 Monitoring The Application-Layer DDoS Attacks For Popular Websites 36 Measuring Capacity Bandwidth Of Targeted Path Segments 37 Explicit Load Balancing Technique For NGEO Satellite IP Networks With On-Board 38 Capturing Router Congestion And Delay 39 Minimizing File Download Time In Stochastic Peer-ToPeer Network 40 Spatio-Temporal Network Anomaly Detection By Assessing Deviation 41 Mitigating Denial-Of-Service 42 Continuous Monitoring Of Spatial Queries In Wireless Broadcast
Image Processing Secure Computing Secure Computing Software Engineering Parallel And Distributed Parallel And Distributed Parallel And Distributed Parallel And Distributed Parallel And Distributed Parallel And Distributed Parallel And Distributed Software Engineering Software Engineering Networking Networking Networking Networking Networking Networking Network Security Mobile Computing
2010 2010 2010 2010 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009 2009