Professional Documents
Culture Documents
S.N o
1 2 3 EI08J03 4 EI08J04 Benefit Based Data Caching In Ad Hoc Networks Minimizing File Download Time in Stochastic Peer-to-Peer Networks Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks Two Techniques for Fast Computation of Constrained Shortest Paths P.no
Titles
A Geometric Approach to Improving Active Packet Loss Measurement Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
EI08J01 EI08J02
EI08J05
EI08J06
EI08J07
EI08J08
EI08J09
10
EI08J10
11
EI08J11
Using the Using the Conceptual Cohesion of Classes for Fault Prediction in Object oriented Systems
DATA MINING
S.No
1 EI08J12 2 EI08J13 3 EI08J14 4 EI08J15 5 EI08J16 6 EI08J17 Protection of Database Security via Collaborative Inference Detection A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patt An Efficient Association Rule Mining Algorithm In Distributed Databases Online Index Recommendations for High-Dimensional Databases Using Query Workloads Truth Discovery with multiple Conflicting Information Providers on web Location Based Spatial Query Processing In Wireless Broadcast Environments
P.Code
Titles
MOBILE COMPUTING
S.No
P.Code
1 EI08J18 2 EI08J19
Titles
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
Continue
NETWORK SECURITY
S.No
1
P.Code
EI08J20
Titles
Modeling & Automated Containment of Worms QUIVER Consistent Object Sharing For Edge Services
2 3 4
EI08J21 EI08J22 Dual-Link Failure Resiliency through Backup Link Mutual Exclusion EI08J23 Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
5 6 7 8
EI08J24 Security in large Mediator Protocols EI08J25 Securing User-Controlled Routing Infrastructures E108J26 E108J27 Temporal Partioning of Communication Resources in an Integrated Architecture 30. Watermarking Relational Databases Using Optimization
Based Techniques
IEEE JAVA
27