.NET PROJECT TITILES |
1 |
Toward Optimal Network Fault Correction in Externally Managed Overlay Networks (Parallel & Distributed) |
2 |
Slow Adaptive OFDMA Systems Through Chance Constrained Programming (Wireless Network) |
3 |
Secure Client-Side ST-DM Watermark Embedding (Network Security) |
4 |
Multicast Multi-path Power Efficient Routing in Mobile ADHOC Networks(Network Security) |
5 |
Anonymous Query Processing in Road Networks (Network Security) |
6 |
VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks(Mobile Computing) |
7 |
On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability(Wireless Network) |
8 |
Privacy Preserving public Auditing Data for data storage security in Cloud computing(Cloud Computing) |
9 |
Cross-Layer Design in Multihop Wireless Networks (NetWork) |
10 |
S4 Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks(Mobile Computing) |
11 |
Maximizing Rewards in Wireless Networks with Energy (Wireless Network) |
12 |
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes(Wireless Network) |
13 |
A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks (Wireless Network) |
14 |
Fast Algorithms for Resource Allocation in Cellular Networks(Wireless Network ) |
15 |
Dynamic Authentication for Cross-Realm SOA-Based Business Processes (Service Computing) |
16 |
Fuzzy Keyword Search over Encrypted Data in Cloud Computing (Cloud Computing) |
17 |
Localized Multicast Efficient And Distributed Replica Detection In Large-Scale Sensor Networks (Wireless Network) |
18 |
Collaborative Sensing to Improve Information Quality for Target Tracking in Wireless Sensor
Networks(Wireless Network) |
19 |
FiVaTech Page-Level Web Data Extraction from Template Pages(Data Engineering) |
20 |
Image Thumbnails That Represent Blur and Noise |
|
|
21 |
A Web Search Engine-Based Approach to Measure Semantic Similarity between Words
|
22 |
Adaptive Provisioning of Human Expertise in Service-oriented Systems
|
23 |
Bridging Socially-Enhanced Virtual Communities |
24 |
Continuous Neighbor Discovery in Asynchronous Sensor Networks |
25 |
Data integrity proofs in cloud storage |
26 |
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
|
27 |
Efficient Computation of Range Aggregates against uncertain location based queries
|
28 |
Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
|
29 |
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
|
30 |
Exploring Application-Level Semantics for Data Compression |
31 |
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
|
32 |
Monitoring Service Systems from a Language-Action Perspective |
33 |
One Size Does Not Fit All Towards User- And Query-Dependent Ranking For Web Databases
|
34 |
Optimal service pricing for a cloud cache |
35 |
Personalized Ontology Model for Web Information Gathering |
36 |
Publishing Search Logs – A Comparative Study of Privacy Guarantees |
37 |
Scalable Learning of Collective Behavior |
38 |
The Awareness Network, To Whom Should I Display My Actions And, Whose Actions
|
39 |
The World in a Nutshell Concise Range Queries |