Home || About us || Contact us || Sales || Course || Multimedia || Project || Netwoking || Back

 

2015 TO 2008 Project Titles in .NET    

 

S.NO

2015 DOTNET

DOMAIN

YEAR

 

1

A Secure and Dynamic Multi-keyword Ranked Search Scheme

over Encrypted Cloud Data

 

CLOUD COMPUTING

2015

2

Cloud-Based Multimedia Content Protection System

CLOUD COMPUTING

2015

3

Control Cloud Data Access Privilege and Anonymity with Fully

Anonymous Attribute-Based Encryption

CLOUD COMPUTING

2015

4

Cost-Minimizing Dynamic Migration of Content Distribution

Services into Hybrid Clouds

CLOUD COMPUTING

2015

5

Enabling Fine-grained Multi-keyword Search Supporting

Classified Sub-dictionaries over Encrypted Cloud Data

CLOUD COMPUTING

2015

6

Energy-aware Load Balancing and Application Scaling for the

Cloud Ecosystem

CLOUD COMPUTING

2015

7

Identity-Based Distributed Provable Data Possession in

Multicloud Storage

CLOUD COMPUTING

2015

8

Panda: Public Auditing for Shared Data with Efficient User

Revocation in the Cloud

CLOUD COMPUTING

2015

9

PSMPA: Patient Self-Controllable and Multi-Level Privacy-

Preserving Cooperative Authentication in Distributed m-

Healthcare Cloud Computing System

CLOUD COMPUTING

2015

10

SelCSP: A Framework to Facilitate Selection of Cloud Service

Providers

CLOUD COMPUTING

2015

11

Discovery of Ranking Fraud for Mobile Apps

DATA MINING

2015

12

PAGE: A Partition Aware Engine for Parallel Graph Computation

DATA MINING

2015

13

Privacy Policy Inference of User-Uploaded Images on Content

Sharing Sites

DATA MINING

2015

14

Query Aware Determinization of Uncertain Objects

DATA MINING

2015

15

Collision Tolerant and Collision Free Packet Scheduling for

Underwater Acoustic Localization

NETWORKING

2015

16

Defeating Jamming With the Power of Silence: A Game-Theoretic

Analysis

NETWORKING

2015

17

Universal Network Coding-Based Opportunistic Routing for

Unicast

NETWORKING

2015

18

A Distributed Three-hop Routing Protocol to Increase the

Capacity of Hybrid Wireless Networks

MOBILE COMPUTING

2015

19

Mobile Data Gathering with Load Balanced Clustering and Dual

Data Uploading in Wireless Sensor Networks

MOBILE COMPUTING

2015

20

Optimal Configuration of Network Coding in Ad Hoc Networks

MOBILE COMPUTING

2015

21

Privacy-Preserving and Truthful Detection of Packet Dropping

Attacks in Wireless Ad Hoc Networks

MOBILE COMPUTING

2015

22

 

Authenticated Key Exchange Protocols for Parallel Network File

Systems

PARALLEL AND

DISTRIBUTED SYSTEMS

2015

23

Behavior Rule Specification-Based Intrusion Detection for Safety

Critical Medical Cyber Physical Systems

SECURE COMPUTING

2015

24

Generating Searchable Public-Key Ciphertexts with Hidden

Structures for Fast Keyword Search

SECURE COMPUTING

2015

25

Improved Privacy-Preserving P2P Multimedia Distribution Based

on Recombined Fingerprints

SECURE COMPUTING

2015

26

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection

System

SECURE COMPUTING

2015

27

An Attribute-Assisted Reranking Model for Web Image Search

IMAGE PROCESSING

2015

28

Automatic Face Naming by Learning Discriminative Affinity

Matrices From Weakly Labeled Images

IMAGE PROCESSING

2015

29

Detection and Rectification of Distorted Fingerprints

IMAGE PROCESSING

2015

30

Eye Gaze Tracking With a Web Camera in a Desktop Environment

IMAGE PROCESSING

2015

31

Learning Fingerprint Reconstruction: From Minutiae to Image

IMAGE PROCESSING

2015

 

32

Multiview Alignment Hashing for Efficient Image Search

IMAGE PROCESSING

2015

33

Single Image Superresolution Based on Gradient Profile

Sharpness

IMAGE PROCESSING

2015

34

Steganography Using Reversible Texture Synthesis

IMAGE PROCESSING

2015

35

Location-Aware and Personalized Collaborative Filtering for Web

Service Recommendation

SERVICE COMPUTING

(WEB SERVICE)

2015

 

 

 

 

S.N

2014 IEEE DOT TITLES  - JP

Domain

2014

1

Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

Cloud Computing

2014

2

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

Cloud Computing

2014

3

Consistency as a Service: Auditing Cloud Consistency

Cloud Computing

2014

4

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

Cloud Computing

2014

5

Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

Cloud Computing

2014

6

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation

Cloud Computing

2014

7

Identity-Based Distributed Provable Data Possession in Multi- Cloud Storage

Cloud Computing

2014

8

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

Cloud Computing

2014

9

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing

2014

10

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Cloud Computing

2014

11

Scalable Distributed Service Integrity Attestation for Software-asa- Service Clouds

Cloud Computing

2014

12

A Cocktail Approach for Travel Package Recommendation

Data mining

2014

13

An Empirical Performance Evaluation of Relational Keyword Search Techniques

Data mining

2014

14

LARS*: An Efficient and Scalable Location-Aware Recommender System

Data mining

2014

15

Product Aspect Ranking and Its Applications

Data mining

2014

16

Secure Mining of Association Rules in Horizontally Distributed Databases

Data mining

2014

17

Supporting Privacy Protection in Personalized Web Search

Data mining

2014

18

TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality

Data mining

2014

19

Typicality-Based Collaborative Filtering Recommendation

Data mining

2014

20

Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems

Secure computing

2014

21

Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic

Networking

2014

22

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Networking

2014

23

A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks

Parallel &

Distributed

2014

24

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

Parallel & Distributed

2014

25

An Error-Minimizing Framework for Localizing Jammers in Wireless Networks

Parallel Distributed

2014

26

Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks

Parallel Distributed

2014

27

Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks

Distributed

2014

28

Multicast Capacity in MANET with Infrastructure Support

Parallel Distributed

2014

29

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

Parallel Distributed

2014

30

Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing

Parallel &

Distributed

2014

31

A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks

Mobile Computing

2014

32

Autonomous Mobile Mesh Networks

Mobile Computing

2014

33

DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks

Mobile Computing

2014

34

Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs

Mobile Computing

2014

35

Preserving Location Privacy in Geosocial Applications

Mobile Computing

2014

36

Web Image Re-Ranking Using Query-Specific Semantic Signatures

 Pattern analysis

2014

37

Click Prediction for Web Image Reranking Using Multimodal Sparse Coding

Image processing

2014

38

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation

Image processing

2014

 

 

 

 

 

 

 

 

S.N

2013 IEEE DOT TITLES

Domain

Year

 

 

 

 

1

A Data Fusion Technique for Wireless Ranging Performance Improvement

Intrumentaion And Measurement

2013

2

A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

Knowledge And Data Engineering

2013

3

A System to Filter Unwanted Messages from OSN User Walls

Knowledge And Data Engineering

2013

4

AML Efficient Approximate Membership Localization within a Web-Based Join Framework

Knowledge And Data Engineering

2013

5

 Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision

Parallel and Distributed systems

2013

6

Capacity of Hybrid Wireless Mesh Networks with Random APs

Mobile Computing

2013

7

Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding

Mobile Computing

2013

8

 Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation

Mobile Computing

2013

9

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Parallel and Distributed systems

2013

10

Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks

Knowledge and data Engineering

2013

11

EAACK—A Secure Intrusion-Detection System for MANETs

Industrial Electronics,

2013

12

EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

Mobile computing

2013

13

Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse

Knowledge and data Engineering

2013

14

 Evaluating Temporal Robustness of Mobile Networks

Mobile computing

2013

15

Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling

Industrial Informatics

2013

 

 

 

 

16

High Performance Resource Allocation Strategies for Computational Economies

Parallel and Distributed systems

2013

17

Importance of Coherence Protocols with Network Applications on Multicore Processors

Network

2013

18

Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks

Industrial Informatics

2013

19

Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks

Mobile Computing

2013

20

Model-Based Analysis of Wireless System Architectures for Real-Time Applications

Mobile Computing

2013

21

 Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm

Mobile Computing

2013

22

Network Traffic Classification Using Correlation Information

Network

2013

23

Optimal Content Downloading in Vehicular Networks

Vehicular Networks

2013

24

PMSE A Personalized Mobile Search Engine

Knowledge And Data Engineering

2013

25

 Ranking on Data Manifold with Sink Points

Knowledge And Data Engineering

2013

26

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

Parallel and Distributed systems

2013

27

 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

Network security

2013

28

SSD A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity

Mobile Computing

2013

29

Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

Mobile Computing

2013

30

The Generalization Ability of Online Algorithms for Dependent Data

 

2013

 

 

 

 

 

IEEE 2012  DOT NET Project Titles

Domain

Year

 

 

 

 

1

A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

Network security

2012

2

A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group

Network security

2012

3

Active Visual Segmentation

Image processing

2012

4

AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

WIRELESS NETWORK

 

5

An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks

Parallel & distributed

2012

6

Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Network security

2012

7

Cooperative download in vehicular environments

Mobile computing

2012

8

Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points

Image processing

2012

9

Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs

Network security

2012

10

Discovering Characterizations of the Behavior of Anomalous Sub-populations

Data mining

2012

11

Efficient Audit Service Outsourcing for Data Integrity in Clouds

Cloud computing

2012

12

Ensuring Distributed Accountability for Data Sharing in the Cloud

Cloud computing

2012

13

Load Balancing Multipath Switching System with Flow Slice

 

2012

14

Network Assisted Mobile Computing with Optimal Uplink Query Processing

Mobile computing

2012

15

Outsourced Similarity Search on Metric Data Assets

Webmining

2012

16

Privacy- and Integrity-Preserving Range Queries in Sensor Networks

Webmining

2012

17

Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

Data mining

2012

18

       Risk-Aware Mitigation for MANET Routing Attacks

Network security

2012

19

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption

Parallel & distributed

2012

20

Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval

Image processing

2012

21

SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare Emergency

Parallel & distributed

2012

22

The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

Parallel & distributed

2012

23

Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

Mobile computing

2012

   24

View-invariant action recognition based on Artificial Neural Networks

Network

2012

25

Distributed Throughput Maximization in Wireless Networks via Random Power Allocation

Network

2012

26

Automatic Reconfiguration for Large-Scale Reliable Storage Systems

Network

2012

27

A New Cell Counting Based Attack Against To

Network

2012

28

Segmentation and Sampling of Moving Object Trajectories Based on Representativeness

Data mining

2012

29

     A Fusion Approach for Efficient Human Skin Detection

Image processing

2012

30

PDE-Based Enhancement of Color Images in RGB Space

Image processing

2012

31

Contrast-Independent Curvilinear Structure Detection in Biomedical Images

Image processing

2012

32

A Unified Spectral-Domain Approach for Saliency Detection and Its Application to Automatic Object Segmentation

Image processing

2012

33

Fast Matrix Embedding by Matrix Extending

Network Security

2012

34

Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images

Image processing

2012

35

SenseLess: A Database-Driven White Spaces Network

Mobile Computing

2012

36

Local Tetra Patterns A New Feature Descriptor for Content-Based Image Retrieval

Image processing

2012

37

Low Distortion Transform for Reversible Watermarking

Image processing

2012

38

Throughput and Energy Efficiency in Wireless Ad Hoc Networks With Gaussian Channels

Network

2012

39

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Adhoc

Wireless Network

2012

 

 

 

 

S.N

IEEE 2011 DOT NET Project Titles

Domain

Year

 

 

 

 

1.

A Personalized Ontology Model For Web Information Gathering

Data Mining

2011

2.

Adaptive Provisioning Of Human Expertise In Service-Oriented Systems

Data Mining

2011

3.

Bridging Socially-Enhanced Virtual Communities

Networking

2011

4.

Data Integrity Proofs In Cloud Storage

Cloud Computing

2011

5.

Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries

Data Mining

2011

6.

Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud

Data mining

2011

7.

Exploring Application-Level Semantics For Data Compression

Data mining

2011

8.

Optimal Service Pricing For A Cloud Cache

Data Mining

2011

9.

Publishing Search Logs – A Comparative Study Of Privacy Guarantees

Data Mining

2011

10.

The Awareness Network, To Whom Should I Display My Actions And, Whose Actions

Data Mining

2011

11.

Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques

Data mining

2011

12.

Monitoring Service Systems From A Language-Action Perspective

Service Computing

2011

13.

One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases

Data mining

2011

14.

The World In A Nutshell: Concise Range Queries

Data mining

2011

15.

A User-oriented Image Retrieval System Based on Interactive Genetic Algorithm

Image Processing

2011

16.

A More Secure Steganography Method in Spatial Domain

Security

2011

17.

Scalable Learning of Collective Behavior

Data Mining

2011

18.

Scalable Scheduling of Updates in Streaming Data Warehouse

Data Engineering

2011

 

 

 

2011

19.

Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks

Secure Computing

2011

20.

Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems

Data Mining

2011

21.

Integration Of Sound Signature In Graphical Password Authentication System

Data Mining

2011

22.

A Fast Multiple Longest Common Subsequence

Data Mining

2011

23.

Combinin HAAR Feature and skin color based classifiers for face

Secure Computing

2011

24.

The Geometric Efficient Matching Algorithm for Firewalls

Network Security

2011

25.

Continuous Neighbor Discovery in Asynchronous Sensor Networks.

Network

2011

26.

Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks

Network

2011

27.

Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design - java

Network

2011

28.

Throughput Optimization in High Speed Downlink Packet Access

Network

2011

29.

A Web Search Engine Based Approach to Measure Semantic Similarity Between Words

Data Mining

2011

30.

Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Flow Watermarking

Network

2011

31.

Problems and Solutions of Web Search Engines

Web Mining

2011

32.

Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems

Network

2011

33.

Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection

Network

2011

 

 

 

2011

S.N.

IEEE 2010 .Net Project Titles

Domain

Lang/Year

1.

Toward Optimal Network Fault Correction in Externally Managed Overlay Networks

Parallel & Distributed

2010

2.

Slow Adaptive OFDMA Systems Through Chance Constrained Programming

Network

2010

3.

Secure Client-Side ST-DM Watermark Embedding

Network Security

2010

4.

Multicast Multi-path Power Efficient Routing in Mobile ADHOC Networks

Network Security

2010

5.

Anonymous Query Processing in Road Networks

Data Engineering

2010

6.

VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks

Mobile Computing

2010

7.

On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability

Network

2010

8.

Privacy Preserving public Auditing Data for data storage security in Cloud computing

Cloud Computing

2010

9.

Deriving Concept – Based User Profiles from search Engine Logs

Data Mining

2010

10.

Cross-Layer Design in Multihop Wireless Networks

Network

2010

11.

S4 Small and Small Stretch Compact Routing Protocol for Large Static Wireless Networks

Mobile Computing

2010

12.

Maximizing Rewards in Wireless Networks with Energy

Network

2010

13.

Secure Distance – Based Localization in the presence of cheating Beacon Node

Network

2010

14.

A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks

Network

2010

15.

Fast Algorithms for Resource Allocation in Cellular Networks

Network

2010

16.

Inference From Aging Information

Neural Network

2010

17.

Collaborative Sensing to Improve Information Quality for Target Tracking in Wireless Sensor Networks

Network

2010

18.

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Cloud Computing

2010

19.

Localized Multicast Efficient And Distributed Replica Detection In Large-Scale Sensor Networks

Wireless Network

2010

20.

Collaborative Sensing to Improve Information Quality for Target Tracking in Wireless Sensor Networks

Wireless Network

2010

21.

Edge Adaptive Image Steganography Based on LSB Matching

Secure Computing

2010

S.N.

IEEE 2009 .Net Project Titles

Domain

Year

1.

A Tabu Searching Algorithm For Cluster Building in Wireless Sensor Networks

Mobile Computing

2009/.Net

2.

Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks

Mobile Computing

2009/.Net

3.

Biased Random Walks in Uniform Wireless Networks

Network Computing

2009/.Net

4.

Cell Breathing Techniques for Load Balancing in Wireless LANs

Mobile Computing

2009/.Net

5.

Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling

Mobile Computing

2009/.Net

6.

Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic

Distribute Computing

2009/.Net

7.

Energy Maps For Mobile Wireless Networks Coherence Time versus Spreading Period

Network Computing

2009/.Net

8.

Enforcing Minimum-Cost Multicast Routing against Shelfish Information Flows

Mobile Computing

2009/.Net

9.

Explicit Load Balancing Technique for NGEO Satellite Ip Networks With On-Board Processing Capabilities

Distribute Computing

2009/.Net

10.

Greedy Routing with Anti-Void Traversal for Wirless Sensor Networks

Network Computing

2009/.Net

11.

Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking

Mobile Computing

2009/.Net

12.

Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc Networks

Mobile Computing

2009/.Net

13.

Movement-Assisted Connectivity Restoration in Wireless Sensor and

Mobile Computing

2009/.Net

14.

On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint Rout

Distribute Computing

2009/.Net

15.

Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise

Mobile Computing

2009/.Net

16.

PRESTO Feedback-Driven Data Management in Sensor Networks

Secure Computing

2009/.Net

17.

Random Cast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks

Network Computing

2009/.Net

18.

Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications

Mobile Computing

2009/.Net

19.

Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services

Network Computing

2009/.Net

20.

Route Stability in MANETs under the Random Direction Mobility Model 

Network Computing

2009/.Net

21.

Secure and Policy-Complaint Source Routing

Mobile Computing

2009/.Net

22.

Single-Link Failure Detection in All-Optical Networks Using

Network Computing

2009/.Net

23.

Spread-Spectrum Watermarking Security

Network Computing

2009/.Net

24.

The Effectiveness of Checksums for Embedded Control Networks

Secure Computing

2009/.Net

25.

Two Blocking Algorithm on Adaptive Binary Splitting Single and Pair Resolutions for RFID Tag Identification

Secure Computing

2009/.Net

26.

Virus Spread in Networks

Network Computing

2009/.Net

27.

Capturing Router Congestion and Delay

Network Computing

2009/.Net

28.

A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment

Secure Computing

   2009/.Net

S.N.

IEEE 2008 .Net Project Titles

Domain

Lang/Year

1.

Estimation of Defects Based On Defect Decay Model ED3M

Software Engineering

2008/.Net

2.

HBA Distributed Metadata Management for Large Cluster-Based Storage Systems

Distribute Computing

2008/.Net

3.

Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks

Network Computing

2008/.Net

4.

Dual-Link Failure Resiliency through Backup Link Mutual Exclusion

Network Computing

2008/Java

5.

Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High-Capacity Approach

Multimedia Computing

2008/.Net

6.

Trustworthy Computing Under Resource Constraints With The Down Policy

Secure Computing

2008/.Net

7.

Localized Sensor Area Coverage With Low Communication Overhead

Mobile Computing

2008/.Net

8.

Active Learning Methods for Interactive Image Retrieval

Image Processing

2008/.Net

9.

Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light

Image Processing

2008/.Net

10.

Hardware enhanced association rule mining with Hashing and Pipelining

Data Mining

2008/.Net

11.

Efficient Resource Allocation For Wireless Multicast

Mobile Computing

2008/.Net

12.

A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video

Multimedia

2008/.Net

13.

A Distributed And Scalable Routing Table Manager For The Next Generation Of IP Routers

Network

2008/.Net

14.

A New Model For Dissemination Of XML Content

Secure Computing

2008/.Net

15.

Efficient 2-D Grayscale Morphological Transformations With Arbitraly Flat Structuring Elements

Image Processing

2008/.Net

16.

Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case

Networking

2008/.Net

17.

Watermarking Relational Databases Using Optimization Based Techniques

Data Mining

2008/.Net

18.

Fuzzy Control Model Optimization for Behavior-Constant Traffic Routing Under Information Provision

Transportation System

2008/.Net

19.

Temporal Partioning of Communication Resources in an Integrated Architecture

Secure Computing

2008/.Net

20.

Probabilistic Packet Marking For Large Scale IP Trace Back

Network Computing

2008/.Net

21.

Credit Card Fraud Detection Using Hidden Markov Models

Secure Computing

2008/.Net

22.

Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings

Image Processing

. Net/2006

23.

Neural Networks for Unicode Optical Character Recognition

Image Processing

. Net/2004

24.

Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks

Network Computing

. Net/2005

25.

Workflow Mining Discovering Process Models from Event Logs

Data Mining

.Net/2004