Welcome to Available 2007, 2008, 2009, 2010, 2011,2012 & 2013 C#.Net, VB.Net & ASP.Net Major Projects.

Contact us for buying single / bulk .Net projects.

  1. A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems
  2. A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers
  3. A Distributed and scalable routing table manager
  4. A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks
  5. A Distributed Cycle Minimization Protocol for Peer-to-Peer Networks
  6. A Fusion Approach for Efficient Human Skin Detection
  7. A Gen2-based RFID Authendication Protocol for Security and Privacy
  8. A Genetic Programming Approach to Record Deduplication
  9. A Geometric Approach to Improving Active Packet Loss Measurement
  10. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
  11. A Near real time detection system for suspicious urls in twitter stream
  12. A neighbor coverage-based probabilistic
  13. A new algorithm for inferring user search
  14. A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
  15. A New Cell-Counting-Based Attack Against Tor
  16. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video
  17. A Personalized Ontology Model for Web Information Gathering
  18. A probabilistic misbehavior detection scheme
  19. A proxy-based approach to continuous
  20. A Realistic Empirical Evaluation of the Costs And Benefits of UML in Software Maintenance
  21. A Secure Mobile Healthcare System using Trust-Based Multicast Scheme
  22. a tabu search algorithm for cluster building in wireless sensor networks
  23. A Wavelet-Laplace Variational Technique for Image Deconvolution and Inpainting
  24. abacus an auction-based approach to cloud
  25. Achieving privacy in trust negotiations with an ontology-based approach
  26. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
  27. Achieving securecloud computing
  28. Active Learning Methods for Interactive Image Retrieval
  29. Active Visual Segmentation
  30. Activemonitoring And Alarm Management
  31. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
  32. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs
  33. Adaptive Provisioning Of Human Expertise In Service-Oriented Systems
  34. AI and Opinion Mining
  35. AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
  36. An Abuse Free Fair Contract Signing Protocol Based on the RSA Signature
  37. An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity
  38. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting
  39. Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks
  40. Analyzing and Managing Role-Based Access Control Policies
  41. Anonymous Query Processing In Road Networks
  42. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
  43. Attribute-Based Encryption With Verifiable Outsourced Decryption
  44. Automatic image Histogram Equilazation
  45. Automatic Reconfiguration for Large Scale Reliable Storage Systems
  46. Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
  47. Bandwidth estimation for ieee 802
  48. BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected
  49. Benefit-Based Data Caching In Ad Hoc Networks
  50. Beyond Text QA Multimedia Answer Generation by Harvesting Web Information
  51. Blind Image Watermarking Using a Sample Projection Approach
  52. Blocking Of Brute Force Attacks
  53. Bridging Domains Using World Wide Knowledge for Transfer Learning
  54. Bridging Socially-Enhanced Virtual Communities
  55. C-TREND Temporal Cluster Graphs for Identifying and Visualizing Trends in
  56. Calculate Available Subnet And Hosts In LAN
  57. Cashing in on the Cache in the Cloud
  58. Catching Packet Droppers And Modifiers In Wireless Sensor Networks
  59. CDS-Based Virtual Backbone Construction with Guaranteed
  60. Cell breathing techniques for Load Balancing in Wireless LANs
  61. Cloud Computing Security From Single to Multi-Clouds
  62. Clustering and Cluster-Based Routing Protocol for
  63. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
  64. Conditional Shortest Path Routing In Delay Tolerant Networks
  65. Constructing Inter-Domain Packet Filters to Control IP
  66. Content Sharing over Smartphone-Based
  67. Continuous Delivery Message Dissemination (CDMD)
  68. Continuous Neighbor Discovery in Asynchronous Sensor Networks
  69. Correlation-Based Traffic Analysis Attacks on Anonymity Networks
  70. Cost-Based Optimization of Service Compositions
  71. Credit Card Fraud Detection Using Hidden Markov Models
  72. Credit card fraud detection using hidden markov model
  73. Crime Detection Through Facial Features
  74. Cross-Layer Design in Multihop Wireless Networks
  75. Crowdsourcing Predictors of Behavioral Outcomes
  76. DATA Enhanced Association Rule Mining
  77. Data Integrity Proofs In Cloud Storage
  78. Data Leakage Detection
  79. DCIM Distributed Cache Invalidation Method for Maintaining Cache Consistency In Wireless Mobile Networks
  80. DCMP A Distributed Cycle Minimization Protocol
  81. Defenses against Large Scale Online Password Guessing Attacks By Using Persuasive Click Points
  82. Deployment Strategy and Performance Evaluation of the IPv6 Home Network Using the Home Server
  83. Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs
  84. Detecting Kernel-Level Rootkits Using Data Structure Invariants
  85. Developing a single working thread to handle many requests
  86. Digital Image Tracing By Sequential Multiple Watermarking
  87. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
  88. Distributed Dynamic Routing Algorithm
  89. distributed mobility management for target tracking in mobile systems
  90. Distributed Packet Buffers for High-Bandwidth Switches and Routers
  91. Distributed Processing of Probabilistic
  92. Distributional Features for Text Categorization
  93. Distributed collaborative key agreement for dynamic peer groups
  94. Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
  95. Dynamic Personalized Recommendation on Sparse Data
  96. Dynamic Resource Allocation Using Virtual Machines For Cloud
  97. Dynamic Trust Management for Application to Secure Routing
  98. Dynamics of Malware Spread in Decentralized
  99. EAACK-A Secure Intrusion-Detection
  100. Effect of Network Quality on Player Departure
  101. Effective Collaboration with Information Sharing in Virtual Universities
  102. Effective Personalized Privacy Preservation
  103. Effective Risk Communication In Android Apps
  104. Effective Software Merging in the Presence of Object-Oriented Refactorings
  105. Efficient 2-D Gray scale morphological transformations with arbitraly flat structuring elements
  106. Efficient and Effective Duplicate Detection in Hierarchical Data
  107. Efficient approximate query processing in peer to peer networks
  108. Efficient Broadcasting using Store-mix- forward Method
  109. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
  110. Efficient Computation of Range Aggregates Against Uncertain Location Based Queries
  111. Efficient Fuzzy Type-Ahead Search in XML Data
  112. Efficient Retrieval of Files From Cluster Based Web Servers
  113. Efficient Routing In Intermittently Connected Mobile
  114. EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
  115. EMAP Expedite message authentication
  116. Enabling dynamic data and indirect mutual
  117. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
  118. Enhanced Security for Online Exams Using Group Cryptography
  119. Enhancing Downlink Performance in Wireless Networks By Simultaneous Multiple Packet Transmission
  120. Ensuring Data Storage System
  121. estimation of defects based on defect decay model ed3m
  122. Evolution of Social Networks
  123. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
  124. Exploring Application – Level Semantics for Data Compression
  125. Face identification
  126. FairTorrent A Deficit-based Distributed Algorithm
  127. Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
  128. footprint detecting sybil attacks in urban vehicular networks
  129. Fraud Detectionin Credit Card Companies
  130. Fuzzy Keyword Search over Encrypted Data in Cloud Computing
  131. fuzzy keyword
  132. Generic Lossless Visible Watermarking-A New Approach
  133. greedy routing with anti-void traversal
  134. Grid Service Discovery with Rough Sets
  135. Hardware enhanced association rule mining with Hashing and Pipelining
  136. harnessing the cloud for securely outsourcing
  137. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
  138. Highly-Available Web Service Community
  139. Image Mosaicing
  140. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
  141. Inference from Aging Information
  142. Integration of Sound Signature in Graphical Password Authentication System
  143. Internet and Online Information Privacy An Exploratory Study of Preteens and Early Teens
  144. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
  145. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
  146. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
  147. Large-Scale Software Testing Environment using Cloud Computing Technology for Dependable Parallel and Distributed Systems
  148. Latency Equalization as a New Network Service Primitive
  149. Layered Approach for Intrusion Detection
  150. Layered Approach Using Conditional Random Fields for Intrusion Detection
  151. Load-Balancing Multipath Switching System with Flow Slice
  152. Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks
  153. localized sensor area coverage with low communication overhead
  154. MeetYou – Social Networking on Android
  155. Minimize File Download Time
  156. Minimizing File Download Time in Stochastic Peer-to-Peer Networks
  157. Mining User Queries With Markov Chains
  158. Mining Weighted Association Rules without Pre-assigned Weights
  159. Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks
  160. Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
  161. Monitoring Service Systems from a Language-Action Perspective
  162. Multiparty Access Control for Online Social Networks Model and Mechanisms
  163. Network Assisted Mobile Computing with Optimal Uplink Query Processing
  164. Network Capacity Adaptation in Service Overlay Network
  165. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks
  166. NICE Network Intrusion Detection and Counter Measure Selection in Virtual Network Systems
  167. Noise Reduction Based On Partial-Reference
  168. On the Node Clone Detection in Wireless Sensor Networks
  169. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability
  170. One Size Does Not Fit All Towards User-and Query-Dependent Ranking For Web Databases
  171. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
  172. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks Theory and Algorithms
  173. Optimal Resource Placement in Structured Peer-to-Peer Networks
  174. Optimal Service Pricing For A Cloud Cache
  175. optimized resource allocation for software release planning
  176. Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High Capacity Approach
  177. Packet-Hiding Methods for Preventing Selective Jamming Attacks
  178. PAM
  179. Participatory Privacy Enabling Privacy in Participatory Sensing
  180. Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise
  181. Personalizing Web Directories with the Aid of Web Usage Data
  182. Persuasive Cued Click-points Design, Implementation, And Evaluation Of A Knowledge-based Authentication Mechanism
  183. Pfusion A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
  184. Pricing Under Constraints In Access Networks Revenue Maximization And Congestion Management
  185. Privacy Preserving Data Sharing With Anonymous ID Assignment
  186. Privacy Preserving Public Storage
  187. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
  188. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
  189. Privacy-Preserving Public Auditing For Secure Cloud Storage
  190. Probabilistic Packet Marking for Large-Scale IP Trace back
  191. Protecting Sensitive Labels in Social Network Data Anonymization
  192. Publishing Search Logs – A Comparative Study Of Privacy Guarantees
  193. QoS Ranking Prediction for Cloud Services
  194. Query Processing in peer to peer networks
  195. Quiver Consistent Object Sharing For Edge Services
  196. Ranking And Suggesting Popular Items
  197. Rate Allocation and Network Lifetime Problems for Wireless Sensor Networks
  198. Rateless Forward Error Correction for Topology-Transparent Scheduling
  199. Record Matching over Query Results from Multiple Web Databases
  200. Redundancy Management of Multipath Routing for Intrusion Tolerance
  201. Reputation-Based Resource Allocation in P2P
  202. Resource Allocation for QoS Support in Wireless Mesh Networks
  203. Resource Overbooking Using Aggregation profiling in large scale Resource Discovery
  204. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
  205. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
  206. Robust Face-Name Graph Matching for Movie Character Identification
  207. Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding
  208. ROSSE Grid Services Discovery
  209. Rough Cluster Quality Index Based On Decision Theory
  210. Route Stability in MANETs under the Random Direction Mobility Model
  211. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
  212. Scalable Learning Of Collective Behaviour
  213. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
  214. Secure and efficient handover authentication based on bilinear pairing functions
  215. Secure Client-Side ST-DM Watermark Embedding
  216. Secure Data Collection In Wireless
  217. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
  218. Secure Mining Of Association Rules In Horizontally Distributed Databases
  219. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
  220. Securing User-Controlled Routing Infrastructures
  221. Security Analysis of a Single Sign-On Mechanism For Distributed Computer Networks
  222. Security Conscious Web Service Composition with Semantic Web Support
  223. Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval
  224. Service-Oriented Architecture for Privacy-Preserving Data Mashup
  225. SigFree A Signature-Free Buffer Overflow Attack Blocker
  226. SIGFREE
  227. Slicing A New Approach To Privacy Preserving
  228. Slow Adaptive OFDMA Systems Through. Chance Constrained Programming
  229. SocialTube P2P-assisted Video Sharing
  230. Some Performance Aspects Considerations of a Class of Artificial Neural Network
  231. sort a self-organizing trust model for Peer to Peer Systems
  232. SORT A Self-Organizing Trust Model
  233. SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
  234. SSL Backend Forwarding Scheme in Cluster-Based Web Servers
  235. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
  236. Stock And Portfolio Management Solution
  237. Supporting Search-As-You-Type Using SQL in Databases
  238. Target Tracking and Mobile Sensor Navigationin Wireless Sensor Networks
  239. Temporal Partitioning of Communication Resources in an Integrated Architecture
  240. The Awareness Network,To Whom Should I Display My Actions And, Whose Actions Should I Monitor
  241. The Effect of Pairs in Program Design Tasks
  242. The Effectiveness of Checksums for Embedded Control Networks
  243. The Geometric Efficient Matching Algorithm for Firewalls
  244. The Target Tracking in Mobile Sensor Networks
  245. The World in a Nutshell Concise Range Queries
  246. Three-Party Authentication using Quantum Key Distribution Protocols
  247. Throughput Optimization in High Speed Downlink
  248. Topology control in mobile ad hoc networks with cooperative communications
  249. Towards Secure and Dependable Storage Services in Cloud Computing
  250. Towards Secure Multi-Keyword Top-k Retrieval over
  251. Traditionally administrative personnel functions with performance management system
  252. Trustworthy Computing under Resource Constraints with the DOWN Policy
  253. Tv Broadcasting
  254. Understanding The External Links Of Video
  255. Using Ontologies and Vocabularies for Dynamic Linking
  256. VEBEK Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
  257. Video Steganography
  258. Watermarking Relational Databases Using Optimization-Based Techniques
  259. Web server load balancing using ssl back-end forwarding method
  260. Web Service interactions through XML
  261. Xml Database Migration
  262. A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
  263. A General Model for Sequential Pattern Mining with a Progressive Database
  264. Biased Random Walks in Uniform Wirless Networks
  265. Competitor Mining with the Web
  266. Conditional Shortest Routing in Delay Tolerant Network
  267. Hiding Sensitive Association Rules with Limited Side Effects
  268. Intelligent Heart Disease Prediction System (IHDPS) using data mining techniques
  269. Query Processing on Autonomous Incomplete Database
  270. Single Sign-On Assistant An Authentication Broker for Web Applications
  271. Truth Discovery with Multiple Conflicting Information Providers on the Web
  272. Unsupervised Word Sense Disambiguation and Rules Extraction using Non-Aligned Bilingual Corpus