This action might not be possible to undo. Are you sure you want to continue?
A Model-Based Approach to Evaluation of the Efficacy of FEC Coding In Combating Network Packet Losses. 3. Hybrid Scheduling Of Dynamic Task Graphs with Selective Duplication for Multiprocessors under Memory and Time Constraints. 4. Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction. 5. Rate and Delay Guarantees Provided By Close Packet Switches with Load Balancing. 6. Two Techniques for Fast Computation of Constrained Shortest Paths 7. Measurement-Based Admission Control at Edge Routers. 8. Designing Less-Structured P2P Systems for the Expected High Churn 9. Geometric Approach to Improving Active Packet Loss Measurement 10. Implementing Multicast Distribution through Recursive UNI-cast Trees 11. Frequent Route Detection and Proactive Cache Updating On Demand Routing Protocols . 12. Adaptive Bandwidth Allocation For Low-Priority Services Using Distributed Algorithm In TCP. 13. Self-Interested Routing In World Wide Web Environments. 14. An Efficient Scheduling Algorithm In Supporting Of Distinguished Service Networks Using Output Controlled Grant Based-Round Robin. 15. A Scalable Overlay Multicast Architecture for Large-Scale Applications. 16. Framework for Duplicate Elimination in Peer-To-Peer Distributed File Systems. 17. A Racy Topology Using Divisible Load Allocation in Networks. 18. A New TCP for Persistent Packet Re-Arrangement Using Retransmission Timer. 19. Active Load Balancing In Groups in Presence of Latency. DOMAIN: IEEE TRANSACTIONS ON DISTRIBUTED NETWORKING TECHNOLOGY: DOT NET 1. Probabilistic Packet Marking for Large-Scale IP Trace-back. 2. Rate Allocation and Network Lifetime Problems for Wireless Sensor Networks. 3. On Guaranteed Smooth Switching for Buffered Crossbar Switches. 4. Efficient Broadcasting Using Store Mix Forward Method . 5. Incentive-Based Scheduling For Market-Like Computational Grids 6. Rate less Forward Error Correction for Topology-Transparent Scheduling 7. HBA: Distributed Metadata Management for Large Cluster-Based Storage Systems. 8. Minimizing File Download Time in Stochastic Peer-To-Peer Networks 9. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data. 10. A Geometric Approach to Improving Active Packet Loss Measurement. 11. The Packet Handling Performances of the Protocol Stack an Ipv6 Home Network. 12. Improving Response Time in Cluster-Based Web Servers through Secure Socket Layer Back-End Forwarding Mechanism. 13. Adaptive Sampling-Based Techniques for the Approximate Answering Of Aggregation Queries in Peer To Peer Databases. 14. Effects of Topologically Aware Overlay Construction Techniques on Efficient Peer To Peer Keyword Search and Retrieval .
DOMAIN: IEEE TRANSACTIONS ON NETWORK SECURITY TECHNOLOGY: JAVA 1. Controlling IP Spoofing through Inter domain Packet Filters. 2. Modeling and Automated Containment of Worms. 3. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm. 4. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. 5. Security in Large Networks Using Mediator Protocols. 6. Secured Distributed Key Management for Threshold-Multi-signature using Cryptography. 7. Effective key generation for multimedia and web application. 8. Efficient Global key Management and secured Protocols for Group communication. 9. A suitable programming model for error control in network environment. 10. Hybrid Invasion Detection System over Abnormal Internet Sequence. TECHNOLOGY: DOT NET 1. Trustworthy Computing under Resource Constraints with the DOWN Policy. 2. Securing User-Controlled Routing Infrastructures. 3. Credit Card Fraud Detection Using Hidden Markov Model. 4. Temporal Partitioning of Communication Resources in an Integrated Architecture. 5. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. 6. Establishing a Group Key via a Distributed and Collaborative Approach for a Dynamic Peer Group. DOMAIN: IEEE TRANSACTIONS MOBILE COMPUTING TECHNOLOGY: JAVA 1. Mitigating Performance Degradation in Congested Sensor Network. 2. Location-Based Spatial Query Processing In Wireless Broadcast Environments. 3. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks. 4. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks. 5. Logarithmic SCFR Protocol in MANET. 6. Fair and Efficient Detection of Routing Misdeed in Mobile Ad-Hoc Network. 7. Inquiring the Performance of Route Reservation in Ad-Hoc Wireless Network. 8. Reducing the Packet Retransmission in Wireless Network . TECHNOLOGY: DOT NET 1. Efficient Resource Allocation for Wireless Multicast. 2. Benefit-Based Data Caching In Ad Hoc Networks. 3. Bandwidth-Satisfied Multicast Trees in MANETS. 4. A Self-Repairing Tree Topology Enabling Content-Based Routing In Mobile Ad Hoc Networks. 5. Localized Sensor Area Coverage with Low Communication Overhead . 6. Effects of Route Optimization to Improve the Throughput Performance in Mobile Networks. 7. Mobility-Enhanced Improvement In The Quality Of Target Tracking Using Bayesian Estimation Theorem. 8. Deterministic Approach to Efficient Broadcasting in Mobile Ad Hoc Networks.
DOMAIN: IEEE TRANSACTIONS ON DATA MINING TECHNOLOGY: JAVA 1. Truth Discovery with Multiple Conflicting Information Providers on the Web. 2. Online Index Recommendation for High-Dimensional Databases Using Query Workloads. 3. C-Trend: Temporal Cluster Graphs for Identifying and Visualizing Trends in Multi attribute Transactional Data. 4. A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns. 5. Ranked Reverse nearest Neighbor Search. 6. Increasing Scalability of the Database Using Heuristic Method. 7. Effective Querying In Highly Correlated Network. 8. Hierarchical Grouping of Different Web Transactions. TECHNOLOGY: DOT NET 1. A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems. 2. Watermarking Relational Databases Using Optimization-Based Techniques . 3. Rough sets-based search engine for grid service discovery . 4. Analyzing and Managing Role-Based Access Control Policies. 5. Hardware-Enhanced Association Rule Mining With Hashing and Pipelining. 6. Distributed Knowledge Management in the Context of Grid Applications. 7. A New Approach for Sensitive Rule Hiding by Considering Side Effects. DOMAIN: IEEE TRANSACTIONS ON IMAGE PROCESSING TECHNOLOGY: JAVA 1. Mica: A Multi-linear ICA Decomposition for Natural Scene Modeling . 2. Image Restoration Using Space-Variant Gaussian Scale Mixtures in over complete Pyramids. 3. A Lossless Compression Scheme for Bayer Color Filter Array Images . 4. A Generic Shape/Texture Descriptor over Multi-scale Edge Field: 2-D Walking Ant Histogram. 5. Image Identification among Different Images with Different Angles 6. Face Identification during the Change of Lighting and Facial Expression. 7. Script Identification According To Handwritten Input. 8. Blare Reduction Using Fuzzy Image Filtering . TECHNOLOGY: DOT NET 1. Vision Processing For Real-time 3-D Data Acquisition Based On Coded Structured Light. 2. Piecewise Linear Digital Curve Representation and Compression Using Graph Theory and a Line Segment Alphabet. 3. A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting. 4. Image Interpolation By Adaptive 2-D Autoregressive Modeling and Soft-Decision Estimation. 5. Active Learning Methods for Interactive Image Retrieval .
DOMAIN: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING. TECHNOLOGY: JAVA. 1. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems . 2. Security Requirements Engineering: A Framework for Representation and Analysis. 3. Call-Stack Coverage for GUI Test Suite Reduction. 4. Problem Oriented Software Engineering: Solving the Package Router Control Problem. 5. A Model-Driven Approach for Web Requirements. 6. Software Characterization Based On Application Programming Interface. 7. Fault Prediction in Source Code Using Pro-me-sir Technique. 8. Self Re-Engineering Of Object Based Systems. TECHNOLOGY: DOT NET 1. Semantics-Based Design for Secure Web Services. 2. The Effect of Pairs in Program Design Tasks. 3. Estimation of Defects Based on Defect Decay Model: ED3M. 4. A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance. 5. Effective Software Merging In The Presence Of Object-Oriented Re-factorings. DOMAIN: IEEE TRANSACTIONS ON NEURAL NETWORKS TECHNOLOGY: JAVA 1. Optimized Approximation Algorithm in Neural Networks Without Over Fitting. 2. Incremental Learning of Chunk Data for Online Pattern Classification Systems. 3. Adaptive Gain Control For Spike-Based Map Communication in a Neuro-morphic Vision System. 4. A Constrained Optimization Approach to Preserving Prior Knowledge during Incremental Training. 5. Non Negative Matrix Factorization in Polynomial Feature Space. DOMAIN: IEEE TRANSACTIONS ON MULTIMEDIA TECHNOLOGY: DOT NET 1. Orthogonal Data Embedding For Binary Images in Morphological Transform Domain- A High-Capacity Approach. 2. VCODE - Pervasive Data Transfer Using Video Barcode. 3. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video. 4. Human Age Estimation with Regression on Discriminative Aging Manifold. 5. Video Annotation Based On Kernel Linear Neighborhood Propagation. 6. Detection of Human Movement Using Locality Preserving Projections . 7. Multi-target Tracking System for Collocated Video and Acoustic Sensors.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.