JA AIEEE V PO T R JEC S
DOMAIN
Mobile Computing
YEAR
2009
A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice A New Reliable Networks Broadcasting in Mobile Ad Hoc
Network Security
2009
A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions Agent Mining: The Synergy of Agents and Data Mining
Network Security
2009
Image Processing
2009
Neural Networks
2009
Intelligent Systems
2009
An
Scheme
for
Digital
Network Security
2009
Network Security
2009
Approximate Distributed K-Means Clustering over a Peer-to-Peer Network Capturing Router Congestion and Delay
2009
2009
Channel Access Protocols for Multihop Opportunistic Networks, Challenges and Recent Developments
Networking
2009
NC CT
Smarter way to do your Projects
1 2 . 1 3 . 1 4 . 1 5 . 1 6 . 1 7 . 1 8 . 1 9 . 2 0 .
JA AIEEE V PO T R JEC S
Software Engineering 2009
Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary
Communications
2009
Computers
2009
Mobile Computing
2009
Broadcasting
2009
Parallel and Distributed Systems Parallel and Distributed Systems Industrial Informatics
2009
2009
EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks Entropy Based Adaptive Flow Aggregation
2009
Networking
2009
NC CT
Smarter way to do your Projects
2 1 . 2 2 . 2 3 . 2 4 . 2 5 . 2 6 . 2 7 . 2 8 . 2 9 . 3 0
JA AIEEE V PO T R JEC S
Dependable and Secure Computing 2009
2009
Generalized Sequence-Based and Reverse SequenceBased Models for Broadcasting Hot Videos
Multimedia
2009
Image Processing
2009
Bandwidth
of
Targeted
Path
Networking
2009
Networking
2009
Networking
2009
Multi-Service Load Sharing for Resource Management in the CellularWLAN Integrated Network
Wireless Communications
2009
neighbor
Networking
2009
Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks
Wireless Communications
2009
NC CT
Smarter way to do your Projects
3 1 . 3 2 . 3 3 . 3 4 . 3 5 . 3 6 . 3 7 . 3 8 . 3 9 . 4
JA AIEEE V PO T R JEC S
Knowledge and Data Engineering 2009
Mobile Computing
2009
Communication
Mobile Computing
2009
Wireless Communications
2009
2009
Networking
2009
Wireless Communications
2009
by
Networking
2009
SIR analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets
Wireless Communications
2009
Distributed
2009
NC CT
Smarter way to do your Projects
through Integrated Planning and Deployment 4 1 . 4 2 . 4 3 . 4 4 . 4 5 . 4 6 . 4 7 .
JA AIEEE V PO T R JEC S
Computing Mobile Computing 2009
Energy Maps For Mobile Wireless networks coherence Time Versus Spreading Period
Mobile Computing
2009
Energy-Efficient Wireless
SINR-Based
Routing
for
Multihop
Mobile Computing
2009
Mobile Computing
2009
Mobile Computing
2009
Mobility
Management Networks
Approaches
for
Mobile
IP
Mobile Computing
2009
Network Computing
2009
4 8 . 4 9 . 5 0 .
Networking
2008
A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern
2008
Neural Networks
2008
NC CT
Smarter way to do your Projects
5 1 . 5 2 . 5 3 . 5 4 . 5 5 . 5 6 . 5 7 . 5 8 . 5 9 . 6 A Tree-Based Guarantees Peer-to-Peer Network with
JA AIEEE V PO T R JEC S
Quality Parallel and Distributed Systems Knowledge Discovery and Data Mining Knowledge Discovery and Data Mining Mobile Computing 2008
2008
2008
2008
Mobile Computing
2008
BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
Data Mining
2008
2008
2008
2008
Networking
2008
NC CT
Smarter way to do your Projects
Mutual Exclusion 6 1 . 6 2 . 6 3 . 6 4 . Efficient and Secure Content Processing Distribution by Cooperative Intermediaries
JA AIEEE V PO T R JEC S
and Parallel and Distributed Systems Network Security 2008
Enhanced Communal Global, Local Memory Management for Effective Performance of Cluster Computing High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths
2008
Consumer Electronics
2008
on-demand
2008
6 5 . 6 6 . 6 7 . 6 8 . 6 9 .
and
Mobile Computing
2008
Data Engineering
2008
Networking
2008
Networking
2008
Peertalk System
Peer-to-Peer
Multi-Party
Voice-Over-IP
2008
NC CT
Smarter way to do your Projects
7 0 . 7 1 . 7 2 . 7 3 . 7 4 . 7 5 . 7 6 . 7 7 . 7 8 . 7 9 . Probabilistic Group Uncertain Databases Nearest Neighbor Queries
JA AIEEE V PO T R JEC S
Networking 2008
in
2008
Security
via
Collaborative
2008
Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies
2008
Parallel and Distributed Systems Parallel and Distributed Systems Knowledge and Data Engineering
2008
The Server Reassignment Problem for Load Balancing in Structured P2P Systems
2008
2008
Network Computing
2008
Secure Computing
2008
Data Mining
2008
NC CT
Smarter way to do your Projects
8 0 . 8 1 . 8 2 . 8 3 .
JA AIEEE V PO T R JEC S
Network Computing 2008
Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
Network Computing
2008
Network Computing
2008
Network Computing
2008
8 4 . 8 5 . 8 6 . 8 7 . 8 8 . 8 9 .
Parallel and Distributed Systems Parallel and Distributed Systems Mobile Computing
2007
2007
A Self Repairing Tree Topology Enabling Content based Routing in Mobile Ad Hoc Networks
2007
Mobile Computing
2007
2007
An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net
2007
NC CT
Smarter way to do your Projects
9 0 . 9 1 . 9 2 . 9 3 . Elliptic Curve Cryptography based Cryptography Implementation for MANETs
JA AIEEE V PO T R JEC S
Threshold Computer Science & Network Security 2007
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
2007
2007
Retrieving Files using Content based Searching & Displaying them in a Carousel View
2007
9 4 . 9 5 . 9 6 .
A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
Networking
2006
2006
Image Processing
2006
9 7 . 9 8 .
2006
An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
2006
NC CT
Smarter way to do your Projects
9 9 . 1 0 0 . 1 0 1 . 1 0 2 . 1 0 3 . 1 0 4 . 1 0 5 . 1 0 6 .
JA AIEEE V PO T R JEC S
Mobile Computing 2005
Mobile Computing
2005
Assistants
Using
Datamining
2005
Mobile Computing
2005
Secure
Electronic
Data
Internet Computing
2005
2005
2005
Image Processing
2005
NC CT
Smarter way to do your Projects
1 0 7 .
JA AIEEE V PO T R JEC S
Data Mining 2005
1 0 8 . 1 0 9 . 1 1 0 . 1 1 1 . 1 1 2 .
Global
Networking
2004
Mobile Computing
2004
steganography
to
wavelet
Image Processing
2004
of
Hop
by
hop
Networking
2004
Distributed Computing
2004
1 1 3 . 1
Patrol
For
Congestion
Collapse
Networking
2004
Distributed
2004
NC CT
Smarter way to do your Projects
Mining Algorithm 1 1 5 . 1 1 6 . 1 1 7 . 1 1 8 . Online Handwritten Script Recognition
JA AIEEE V PO T R JEC S
Systems Pattern Analysis and Machine Intelligence 2004
Mobile Computing
2004
Mobile Computing
2004
Image Processing
2004
1 1 9 . 1 2 0 . 1 2 1 . 1 2
E-Commerce Technology
2003
2003
Web Intelligence
2003
Fuzzy Systems
2003
NC CT
Smarter way to do your Projects
1 2 3 . 1 2 4 . 1 2 5 . 1 2 6 .
JA AIEEE V PO T R JEC S
Image Processing 2003
Structure & Texture Filling-In of Missing Image Blocks in Wireless Transmission & Compress
Networking
2003
Web Technology
2003
Image Processing
2003
1 2 7 . 1 2 8 . 1 2 9 . 1 3 0
Networking
2002
Networking
2002
Networking
2002
Networking
2002
NC CT
Smarter way to do your Projects
1 3 1 . Location-Aided Networks Routing (LAR) in Mobile Ad
JA AIEEE V PO T R JEC S
Hoc Wireless Networks 2000
1 3 2 . 1 3 3 . 1 3 4 . 1 3 5 . 1 3 6 .
E Logistics for Warehouse Management Implementation of Authenticated and Dynamic Logistics Support System & Management
Innovative Computing
Computer networks