Technologies
No Yea
JAVA IEEE Titles
. r
1
. Study on Intelligent E-Shopping System Based on Data Mining 2009
2
. PBFMCSP: Prefix Based Fast Mining of Closed Sequential Patterns 2009
3
. Capturing Router Congestion and Delay(NW) 2009
4
. Detecting Malicious Packet Losses 2009
5
. Dynamic Routing with Security Considerations(NW) 2009
6
Heuristic algorithms for designing self-repairing protection tress in mesh
. 2009
network(NW)
7
. A New Reliable Broadcasting in Mobile Ad Hoc Networks(NW) 2009
8
Continuous Monitoring of Spatial Queries in Wireless Broadcast 2009
.
Environments(NW)
9
Effective and Efficient Query Processing for Video Subsequence
. 2009
Identification
1 Energy Maps for Mobile Wireless Networks: Coherence Time versus 2009
0
1
1
Energy-Efficient SINR-Based Routing for Multihop Wireless Networks(NW) 2009
.
1
2 Evaluating the Vulnerability of Network Traffic Using Joint Security and
Routing Analysis 2009
.
1
3
Measuring Capacity Bandwidth of Targeted Path Segments(NW) 2009
.
1
4
Mitigation of Control Channel Jamming Under Node Capture Attacks 2009
.
1
5
Multiple Routing Configurations for Fast IP Network Recovery(NW) 2009
.
1
6
Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks 2009
.
1
7
SIMPS Using Sociology for Personal Mobility(NW) 2009
.
2
0
Using The Cohesion Of Classes For Fault Prediction 2008
.
2
1 Optimal State Allocation for Multicast Communication with Explicit
Multicast forwarding 2008
.
2
2 2008
On Performance Benefits of Multihoming Route Control
.
2
3 Online Index Recommendations for High-Dimensional Databases Using
Query Workloads 2008
.
2
4
Modeling & Automated Containment of Worms 2008
.
2
5
Minimizing File Download Time in Stochastic Peer-to-Peer Networks 2008
.
2
8
Computation-Efficient Multicast Key Distribution 2008
.
2
9 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc
Networks 2008
.
3
0 A Model-Based Approach to Evaluation of the Efficacy of FEC Coding In
Combating Network Packet Losses 2008
.
3
1
Cryptographic versus trust-based method for MANET routing security 2008
.
3
2 2008
Connectivity for Dynamic Random Geometric Graphs
.
3
3 C-TREND Temporal Cluster Graphs for Identifying and Visualizing Trends
in Multi attribute Transactional Data 2008
.
3 Designing Less-Structured P2P Systems for the Expected High Churn 2008
4
3
6
Mitigating Performance Degradation in Congested Sensor Networks 2008
.
3
7
NDT A Model-Driven Approach 2008
.
3
8 Problem Oriented Software Engineering Solving the Package Router
Control Problem 2008
.
3
9 Security Requirements Engineering A Framework for Representation and
Analysis 2008
.
4
0
Securing User-Controlled Routing Infrastructures 2008
.
4
1
Security in large Mediator Protocols 2008
.
2
. A Gen2 Based RFID Authentication Protocol for Security and Privacy 2009
3
Explicit Load Balancing Technique for NGEO Satellite IP Networks With
. On-Board Processing Capability(NW) 2009
4
Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc
. Networks(NW) 2009
1
1 Watermarking Relational Databases Using Optimization-Based
Techniques-2008(web based) 2008
.
1
2 Policies for Caching OLAP Queries 2008
.
1
3 A new model for dissemination of xml 2008
.
1
4 Fuzzy Control Model Optimization for Behavior-Constant Traffic Routing
Under Information Provision 2008
.
1
5 Hardware enhanced association rule mining with Hashing and Pipelining 2008
.