You are on page 1of 4

NETWORKING

S.N o
1 2 3 EI08J03 4 EI08J04 Benefit Based Data Caching In Ad Hoc Networks Minimizing File Download Time in Stochastic Peer-to-Peer Networks Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks Two Techniques for Fast Computation of Constrained Shortest Paths P.no

Titles
A Geometric Approach to Improving Active Packet Loss Measurement Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks

EI08J01 EI08J02

EI08J05

EI08J06

EI08J07

EI08J08

EI08J09

A Precise Termination Condition of the Probabilistic Packet Marking Algorithm

10

EI08J10

Controlling IP Spoofing Through Inter Domain Packet Filters

11

EI08J11

Using the Using the Conceptual Cohesion of Classes for Fault Prediction in Object oriented Systems

DATA MINING
S.No
1 EI08J12 2 EI08J13 3 EI08J14 4 EI08J15 5 EI08J16 6 EI08J17 Protection of Database Security via Collaborative Inference Detection A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patt An Efficient Association Rule Mining Algorithm In Distributed Databases Online Index Recommendations for High-Dimensional Databases Using Query Workloads Truth Discovery with multiple Conflicting Information Providers on web Location Based Spatial Query Processing In Wireless Broadcast Environments

P.Code

Titles

MOBILE COMPUTING

S.No

P.Code
1 EI08J18 2 EI08J19

Titles
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks

Continue

NETWORK SECURITY

S.No
1

P.Code
EI08J20

Titles
Modeling & Automated Containment of Worms QUIVER Consistent Object Sharing For Edge Services

2 3 4

EI08J21 EI08J22 Dual-Link Failure Resiliency through Backup Link Mutual Exclusion EI08J23 Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries

5 6 7 8

EI08J24 Security in large Mediator Protocols EI08J25 Securing User-Controlled Routing Infrastructures E108J26 E108J27 Temporal Partioning of Communication Resources in an Integrated Architecture 30. Watermarking Relational Databases Using Optimization

Based Techniques

IEEE JAVA

27

You might also like