You are on page 1of 10

1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23.

Mitigation of Control Channel Jamming under Node Capture Attacks Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments Security Analysis of the SASI Protocol Capturing Router Congestion and Delay SIMPS Using Sociology for Personal Mobility Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows Scalable Routing in Cyclic Mobile Networks Flexible Rollback Recovery in Dynami Heterogeneous Grid Computing Monitoring the Application-Layer DDoS Attacks for Popular Websites Multiple Routing Configurations for Fast IP Network Recovery The Effectiveness of Checksums for Embedded Control Networks Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions Multipath Dissemination in Regular Mesh Topologies Detecting Malicious Packet Losses Dynamic Routing with Security Considerations Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures

Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009 Java/2009

Route Stability in MANETs under the Random Direction Mobility Model On the Security of Route Discovery in MANETs Dynamics of Multiple-Seller and Multiple Buyer Spectrum Trading in Cognitive Radio Networks A GamenTheoretic Modeling Approach

.Net/2009 .Net/2009 .Net/2009

24. 25. 26. 27.

RandomCast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks A Gen2 Based RFID Authentication Protocol for Security and Privacy Greedy Routing with Anti Void Traversal for Wireless Sensor Networks On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint

.Net/2009 .Net/2009 .Net/2009 .Net/2009

28.

Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking

.Net/2009

29. 30. 31. 32. 33. 34. 35. 36. 37.

Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period An Integrated Approach to Sensor Role Selection A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks Biased Random Walks in Uniform Wireless Networks Secure and Policy-Compliant Source Routing Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag

.Net/2009 .Net/2009 .Net/2009 .Net/2009 .Net/2009 .Net/2009 .Net/2009 .Net/2009 .Net/2009

Identification 38. 39. 40. 41. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. Explicit Load Balancing Technique for NGEO Satellite IP Networks With On-Board Processing Capabilities Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks Cell Breathing Techniques for Load Balancing in Wireless LANs Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks QUIVER: Consistent Object Sharing For Edge Services Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing Geometric Approach to Improving Active Packet Loss Measurement A Precise Termination Condition of the Probabilistic Packet Marking Algorithm Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers Watermarking Relational Databases Using Optimization Based Techniques Active Queue Management for Fair Resource Allocation in Wireless Networks Benefit Based Data Caching In Ad Hoc Networks Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction Two Techniques for Fast Computation of Constrained Shortest Paths Controlling IP Spoofing Through Inter Domain Packet Filters A New Model for Dissemination of XML Content Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light Probabilistic Packet Marking For Large Scale IP Trace Back Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems Truth Discovery with Multiple Conflicting Information Providers on Web Location Based Spatial Query Processing In Wireless Broadcast Environments Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks Modeling & Automated Containment of Worms Security In Large Networks Using Mediator Protocols Designing Less - Structured P2p Systems for the Expected High Churn Estimation of Defects Based On Defect Decay Model: ED3M On Guaranteed Smooth Switching For Buffered Crossbar Switches Active Learning Methods for Interactive Image Retrieval Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach Efficient Resource Allocation For Wireless Multicast .Net/2009 .Net/2009 .Net/2009 .Net/2009 2008/ .Net 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/ .Net 2008/ .Net 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/ .Net 2008/ .Net 2008/ .Net 2008/ .Net 2008/ .Net 2008/ .Net 2008/Java 2008/J2EE 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/ .Net 2008/ .Net 2008/ .Net 2008/ .Net 2008/ .Net

36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21.

Localized Sensor Area Coverage With Low Communication Overhead Trustworthy Computing Under Resource Constraints With The Down Policy Credit Card Fraud Detection Using Hidden Markov Models An Efficient Association Rule Mining Algorithm In Distributed Databases BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks COACS: Co - Operative and adaptive caching system for MANETs Scalable and Efficient End-To-End Network Topology Inference Multicast Routing With Delay and Delay Variation Constraints For Collaborative Applications On Overlay Networks OCGRR: A New Scheduling Algorithm for Differentiated Services Network Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data HBA Distributed Metadata Management for Large Cluster-Based Storage Systems Temporal Portioning of Communication Resources in an Integrated Architecture Hardware enhanced association rule mining with Hashing and Pipelining Protection of Database Security via Collaborative Inference Detection Dual-Link Failure Resiliency through Backup Link Mutual Exclusion Securing User-Controlled Routing Infrastructures Online Index Recommendations for High-Dimensional Databases Using Query Workloads A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video Distributed cache updating for the Dynamic source routing protocol An Adaptive Programming Model for Fault-Tolerant Distributed Computing Face Recognition Using Laplacian faces Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks Noise Reduction by Fuzzy Image Filtering Online Handwritten Script Recognition ODAM: An Optimized Distributed Association Rule Mining Algorithm Protocol Scrubbing: Network Security Through Transparent Flow Modification Workflow Mining: Discovering Process Models from Event Logs Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks A Novel Secure Communication Protocol for Ad Hoc networks [SCP] ITP: An Image Transport Protocol for the Internet Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS) Incremental deployment service of Hop by hop multicast routing protocol Network border patrol: preventing congestion collapse and promoting fairness in the Internet Application of BPCS steganography to wavelet compressed video Neural Networks for Unicode Optical Character Recognition An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs

2008/ .Net 2008/ .Net 2008/ .Net 2008/Java 2008/Java 2008/Java 2008/Java 2007/ .Net 2007/ .Net 2008/Java 2008/ .Net 2008/ .Net 2008/ .Net 2008/ .Net 2008/Java 2008/Java 2008/Java 2008/Java 2008/ .Net Java/2006 Java/2007 Java/2005 Java/2005 . Net/2006 Java/2004 Java/2006 Java/2004 Java/2004 Java/2004 . Net/2004 Java/2004 Java/2006 Java/2006 Java/2002 J2EE/2007 Java/2006 Java/2004 Java/2004 . Net/2004 Java/2007

22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 34. 35.

Neural Network-Based Face Detection XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Mobile Agents In Distributed Multimedia Database Systems Image Stream Transfer Using Real-Time Transmission Protocol Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks Personal Authentication Using 3-D Finger Geometry Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networks Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks Reducing Delay and Enhancing DOS Resistance in Multicast Authentication Through Multigrade Security A Memory Learning Framework for Effective Image Retrieval High-Speed Face Recognition Based on Discrete Cosine Transform and RBF Neural Networks GOP-Based Channel Rate Allocation Using Genetic Algorithm for Scalable Video Streaming Over ErrorProne Networks

VC++/2005 Java/2004 Java/2005 Java/2004 Java/2006 Java/2005 Java/2006 Java/2006 . Net/2005 Java//2006 Java/2005 Java/2005 Java/2005 VC++/2003 Java Java VB, C,Java Java Java Java Java Java Java C++ VB, C VC++ Java VB, VC++ Java J2ME J2ME J2ME C# .Net C# .Net C# .Net C# .Net C# .Net VC++ VC++

36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61.

Neural Networks for Handwritten character and Digits Evaluating the Performance of Versatile RMI Approach In Java Effective Packet Analyzing and Filtering System for ATM Network Selective Encryption of Still Image Homogenous Network Control and Implementation Retrieving Files Using Content Based Searching and presenting it in Carousel view Dynamic Signature Verification Using Pattern Recognition Embedding in Video Steganography Genetic Algorithm Based Train Simulation Using Concurrent Engineering Location Aided Routing for Mobile Ad-Hoc Networks Digital Water Marking For Video Piracy Detection Encryption and Decryption technique for secure communication in WLAN File Encryption and Encrypted text embedding in an image Integrating Speech Engine with Web Navigator Intrusion Detection Prevention And Trace back Systems Java Productivity Aids J2ME Mail Client Server Monitoring And Managing The Clusters Using JMX Network Analyzer Flood Fill Algorithms in C# and GDI+ Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM Hiding messages in the Noise of a Picture Windows Management Instrumentation WMI Implementation Steganography for Hiding Data in Wave Audio Files Automatic Dependent Surveillance-Broadcasting (Ads-B) Neural Network for Recognition of Handwritten and Digits Backpropagation

62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 83. 84. 85. 86. 87. 88. 89. 90.

Network Traffic Anomaly Detector Optimal Cryptographic Technique Peer to Peer Messaging System using JXTA Performance Evaluation of DISTANCE Routing Algorithm in MANET Public Key Validation for DNS security Extension Query Routing Optimization In Sensor Communication Networks Virtual Private Network Voice Enabled Smart Browser XML Enabled SQL SERVER An efficient message digest algorithm (MD) for data security Hopfield model of neural network for pattern recognition Using Trigonometry and Pythagoras to Watermark an Image Hiding messages in the Noise of a Picture ERP for Leather Company Cryptographically Using Secure Server/Client Protocol Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM Neural Networks for Handwriting Detection System Using Brain Net Wireless Traffic Viewer Using J2ME Video Steganography Using Mobile Simulation Image Rendering for Grid Technology Java Network File Sharing System Java Visual Editor with Compiler E-Mail Server Using Multithreaded Sockets Network Component for XML Migration Image Water Marking and Combustion Image Processing for Convolution Filters Artificial intelligence network load balancing using Ant Colony Optimization Image Processing for Edge Detection Filters Mobile Information Provider 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. CVS Root File Changing Utility C# MP3 Compressor Convolution Filters Database Schema Comparison Utility C# Displacement filters, including swirl using GDI+ Edge Detection Filters Flood Fill Algorithms in C# and GDI+ Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM Hiding binary data in HTML documents Hiding Messages in MIDI Songs Hiding messages in the Noise of a Picture

J2ME C++ J2ME VC++ Java C,C++ C# .Net Java Java VC++ C# .Net C# .Net C# .Net J2EE VC++ C# .Net VB .Net J2ME J2ME Java Java Java Java Java Java C# .Net C# .Net C# .Net J2ME

C#

C#

C#

C#

C#

C#

C#

C#

C#

C#

C#

12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50.

Image Processing Windows Management Instrumentation WMI Implementation Image Processing for Bilinear Filters and Resizing Image processing for HSL color space Image Processing for Per Pixel Filters using GDI+ Multithreaded Chat Server Reading and Writing AVI files using steganography Steganography for Hiding Data in Wave Audio Files TCPIP Chat client server Using C# Neural Networks for Unicode Optical Character Recognition Using Trigonometry and Pythagoras to Watermark an Image Library Management System Steganography for FTP through a Proxy Server Artificial intelligence network load balancing using Ant Colony Optimization Call Center Management System Online Shopping Textile Web Services Auction System Online Quiz Online Bank Online Voting System Securing Image URL Web Services Smart Knowledge Provider Online Book Shop Electronic Fund Transfer Work Flow Management System Online Customer Care Scribe Automation Textile Management System Sales and Purchase Management System Human Resources Management System Inventory Manage System Job Order System Advertisement Posting Website ASP .Net Mobile shop shopping cart System Patient Management System Property Management System Web Based Content Management System

C#

C#

C#

C#

C#

C#

C#

C#

C#

C#

C#

C#

C#

C#

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

ASP

51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 1. 2. 3. 4. 5. 6. 7. 8. 1. 2. 3. 4. 5. 1.

Neural Networks for Handwriting Detection System Using Brain Net Library Management system Windows Management Instrument (WMI) .Net 2005 Wallpaper Changer Utility Win Application for Word Processing Screen capture Utility HTML Editor Image Converter 2005 Internet History Viewer VB .Net Smart Mail Transfer Protocol Windows Multi File Search utility Message Digest FTP Explorer Convolution Filter Find and Replace utility Apartment Management System Computerized Information Software Employee Management System Hotel Management System Human Resources Management System Inventory System Membership Management System Patient Care System Send SMS To Cell Phone Through SMTP Mail Trainee Management System Wireless Traffic Viewer Using J2ME J2ME Mail Client Server Monitoring And Managing The Clusters Using JMX Peer-To-Peer Messaging Mobile Information Provider Mobile Bank Video Steganography Using Mobile Simulation Network Traffic Anomaly Detector ERP for Leather Company Online Web shop Online Fashion Studios ERP for Small Business Bulk Billing System Cryptographically Using Secure Server/Client Protocol

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

VB

J2

J2

J2

J2

J2

J2

J2

J2

J2

J2

J2

J2

J2

VC

2. 3. 4. 5. 6. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34.

Intrusion Detection Prevention And Trace back Systems Neural Network for Recognition of Handwritten and Digits The File Digest program and the C++ implementation of some Message-Digest algorithms File Encryption and Encrypted text embedding in an image Performance Evaluation of DISTANCE Routing Algorithm in MANET Distributed cache updating for the Dynamic source routing protocol An Adaptive Programming Model for Fault-Tolerant Distributed Computing Face Recognition Using Laplacian faces Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks Noise Reduction by Fuzzy Image Filtering Online Handwritten Script Recognition ODAM: An Optimized Distributed Association Rule Mining Algorithm Protocol Scrubbing: Network Security Through Transparent Flow Modification Workflow Mining: Discovering Process Models from Event Logs Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks A Novel Secure Communication Protocol for Ad Hoc networks [SCP] ITP: An Image Transport Protocol for the Internet Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes(HIDS) Incremental deployment service of Hop by hop multicast routing protocol Network border patrol: preventing congestion collapse and promoting fairness in the Internet Application of BPCS steganography to wavelet compressed video Neural Networks for Unicode Optical Character Recognition An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs Neural Network-Based Face Detection XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Mobile Agents In Distributed Multimedia Database Systems Image Stream Transfer Using Real-Time Transmission Protocol Neural Networks for Handwritten character and Digits Evaluating the Performance of Versatile RMI Approach In Java Effective Packet Analyzing and Filtering System for ATM Network Selective Encryption of Still Image Homogenous Network Control and Implementation Retrieving Files Using Content Based Searching and presenting it in Carousel view Dynamic Signature Verification Using Pattern Recognition Embedding in Video Steganography

VC

VC

VC

VC

VC

Java

Java

Java

Java

Java

Java

Java

Java

Java

Java

.Net

Java

Java

Java

Java

J2EE

Java

Java

Java

.Net

Java

VC++

Java

Java

Java

Java

VC++

Ja

Ja

VB, C

Ja

Ja

Ja

Ja

35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73.

Genetic Algorithm Based Train Simulation Using Concurrent Engineering Location Aided Routing for Mobile Ad-Hoc Networks Image Rendering for Grid Technology Java Network File Sharing System Java Visual Editor with Compiler E-Mail Server Using Multithreaded Sockets Network Component for XML Migration Image Water Marking and Combustion Image Processing for Convolution Filters Artificial intelligence network load balancing using Ant Colony Optimization Image Processing for Edge Detection Filters Flood Fill Algorithms in C# and GDI+ Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM Hiding messages in the Noise of a Picture Windows Management Instrumentation WMI Implementation Steganography for Hiding Data in Wave Audio Files Automatic Dependent Surveillance-Broadcasting(Ads-B) Digital Water Marking For Video Piracy Detection Encryption and Decryption technique for secure communication in WLAN File Encryption and Encrypted text embedding in an image Integrating Speech Engine with Web Navigator Intrusion Detection Prevention And Trace back Systems Java Productivity Aids J2ME Mail Client Server Monitoring And Managing The Clusters Using JMX Network Analyze Neural Network for Recognition of Handwritten and Digits Backpropagation Network Traffic Anomaly Detector Optimal Cryptographic Technique Peer to Peer Messaging System using JXTA Performance Evaluation of DISTANCE Routing Algorithm in MANET Public Key Validation for DNS security Extension Query Routing Optimization In Sensor Communication Networks Virtual Private Network Voice Enabled Smart Browser XML Enabled SQL SERVER An efficient message digest algorithm (MD) for data security Hopfield model of neural network for pattern recognition Using Trigonometry and Pythagoras to Watermark an Image

Ja

Ja

Ja

Ja

Ja

Ja

Ja

Ja

C#

C#

C#

C#

C#

C#

C#

C#

VC

VB

VC

Ja VB,

Ja

J2

J2

Ja

VC

J2

J2

VC

Ja

C,

C#

Ja

Ja

VC

C#

C#

74. 75. 76. 77. 78. 79. 80.

Hiding messages in the Noise of a Picture ERP for Leather Company Cryptographically Using Secure Server/Client Protocol Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM

C#

J2

VC

C#

Neural Networks for Handwriting Detection System Using Brain Net Wireless Traffic Viewer Using J2ME Video Steganography Using Mobile Simulation

VB

J2

J2

You might also like