Welcome to Available 2007, 2008, 2009, 2010, 2011,2012 and 2013 Java based projects.
Contact us for buying single / bulk java projects.
- A Clustering Algorithm For Data Mining Based On Swarm Intelligence
- A Competitive Study of Cryptography Techniques over Block Cipher
- A Competitive Study of Cryptography Techniques
- A Decentralized Service Discovery
- A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
- A Distributed Control Law for Load Balancing in Content Delivery Networks
- A Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems
- A Dual Framework and Algorithms for Targeted Online Data Delivery
- A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks
- A Fast Cluster ing-Based Feature Subset Selection Algor ithm for High Dimensional Data
- A Framework for an Adaptive Intrusion Detection System
- A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification
- A Gaussian Derivative Based Version Of Jpeg For Image Compression and Decompression
- A Generic multilevel architecture for time series prediction
- A Genetic Programing Approach to Record Duplicaton
- A Geometric Approach To Improving Active Packet Loss Measurement
- A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
- A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
- A machine learning approach for identifying disease-treatment relations in short texts
- A Memory Learning Framework for Effective Image Retrieval
- A Model-Based Approach to Evaluation of the Efficacy of FEC Coding in Combating Network Packet Los
- A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming
- A New Algorithm for Inferring User Search Goals with Feedback Sessions
- A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
- A New Operational Transformation Framework for Real-Time Group Editors
- A Novel Association Rule Mining Mechanism in Wireless Sensor Networks
- A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
- A Permutation Based Algorithm to Optimally Reschedule Trains in a Railway Traffic Network
- A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
- A Precise Termination Condition Of The Probabiistic Packet Marking Algorithm
- A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
- A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
- A Review of the Applications of Agent Technology In Traffic and Transportation Systems-Project
- A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
- A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
- A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
- A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
- A Semantically Enriched Clinical Guideline
- A Signature based indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns
- A Stochastic Approach To Image Retrieval Using Relevance Feedback And Particle Swarm Optimization
- A Stochastic Model to Investigate Data
- A Survey of Payment Card Industry Data Security Standard
- A System to Filter Unwanted Messages from OSN User Walls
- A Trigger Identification Service For Defending Reactive Jammers In Wireless Sensor Network
- Access Policy Consolidation For Event Processing Systems
- Achieving Network Level Privacy in Wireless Sensor Networks
- Active Source Routing Protocol For Mobile Networks
- Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
- Adaptive QoS for Mobile Web Services Through Cross Layer Communication
- Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks
- Always Acyclic Distributed Path Computation
- AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
- An Adaptive Programming Model for Fault-Tolerant Distributed Computing
- An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Net
- An Efficient and secure self organized key mamnagement
- An Efficient Association Rule Mining Algorithm In Distributed Databases
- An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
- An Efficient Paging Scheme for Terminal Mobility Using Personal Mobility Management Information in Interworked Fixed and Mobile Networks
- An Efficient Self-Organized Authentication and Key Management Scheme for Distributed Multihop Relay- Based IEEE 802.16 Networks
- An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers
- Analysis on Credit Card Fraud Detection Methods
- ANEW Aalgorithm
- Application of BPCS steganography to wavelet compressed video
- Architecting a Secure Enterprise Data Sharing Environment to the Edge
- Attribute-Based Encryption With Verifiable
- Audio Cryptography System
- Authorization Recycling In Distributed Systems through Discovery Service
- Automatic Database Schema Generation
- Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
- Automatic Discovery of Association
- Autonomy-Oriented, Self-Equilibrium Routing Model in Traffic Networks
- Back End Communication Management System in Distributed Network
- Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
- Bandwidth Recycling in IEEE 802.16 Networks
- BINRANK Scaling Dynamic Authority-Based Search Using Materialized Sub Graphs
- Buffer Sizing for 802.11 Based Networks
- Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
- Call-Stack Coverage for GUI Test Suite Reduction
- CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
- Capturing Router Congestion and Delay
- Carving and Replaying Differential Unit Test Cases from System Test Cases
- Catching Packet Droppers and Modifiers in Wireless Sensor Networks
- CCD A Distributed Publish OR Subscribe Framework for Rich Content Formats
- Client Side Load Balancer using Cloud
- CLOSENESS A New Privacy Measure for Data Publishing
- Cloud Computing for agent Based Urban Transportation systems
- Cloud Data Protection for the Masses
- CloudMoV Cloud-based Mobile Social TV
- Cloud Computing Security
- Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
- Clustering with Multi-Viewpoint based Similarity Measure
- Super Resolution based Inpainting
- Collaboration in Multicloud
- collaborative filtering using dual information sources
- College Attendance System
- Colleges and Students Information System
- Comparable Entity Mining from Comparative Questions
- Computation-efficient Multicast Key Distribution
- Conditional Shortest Path Routing In Delay Tolerant Networks
- Confucius A Tool Supporting Collaborative Scientific Workflow Composition
- Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
- Continuous Data Protection using struts frame work
- Continuous Monitoring of Spatial Queries in Wireless Broadcast
- Cooperative Caching in Wireless P2PNetworks Design, Implementation, And Evaluation
- Cooperative Provable Data Possession for Integrity Veri fication in Multi-Cloud Storage
- Costing of Cloud Computing Services A Total Cost of Ownership Approach
- Coupling-Based Structural Metrics for Measuring the Quality of Software
- Cross-Layer Design for Wireless Networks
- Crowd sourcing Predictors of Behavioral Outcomes
- Cryptographic Versus Trust-Based Method For Manet Routing Security
- Cut Detection in Wireless Sensor Networks
- Data Leakage Detection
- DECOR A Method for the Specification and Detection of Code and Design Smells
- Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
- Delay Analysis and Optimality of Scheduling
- Delay-Based Network Utility Maximization
- Demonstration of Secure Socket Layer
- Design a Guard System for Sybil Attack
- Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs
- Design and Performance Analysis of Mobility Management Schemes based on Pointer Forwarding for Wireless Mesh Networks
- Designing Less-Structured P2P Systems
- Detecting Malicious Packet Losses
- Detecting Spam Zombies
- Detection of Routing Misbehavior in MANETs
- Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ
- Discovering Conditional Functional Dependencies
- Distributed Cache Updating for Dynamic Source Routing(DSR) Protocol
- Distributed Collaborative Key Agreement And Authentication Protocols For Dynamic Peer Groups
- Distributed Cooperative Caching In Social Wireless Networks
- Distributed E-Health Care System Using SOA Service-Oriented Distributed Data Mining
- Distributed Packet Buffers for High-Bandwidth Switches and Routers
- Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
- Diverse firewall design
- Domain name service system with secured manner
- Double Guard Detecting Intrusions in Multitier Web Applications
- Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion
- Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
- Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries
- Dynamic Load Balancing in Distributed Systems in the Presence of Delays A Regeneration-Theory Approach
- Dynamic MallWare Spread in Decentralized P2P System
- Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
- Dynamic Routing with Security Considerations
- Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks
- Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
- E-fraud Prevention Based N The Self-authentication Of E-documents
- Effective Navigation of Query Results Based on Concept Hierarchies
- Effective Navigation
- Effective Pattern Discovery for Text Mining
- Effective Software Merging in the Presence of Object-Oriented Refactorings
- Efficient and Dynamic Routing Topology Inference From End-to-End Measurements
- Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
- Efficient Approximate Query Processing In Peer-to-Peer Networks
- Efficient Broadcasting in Mobile Ad Hoc Networks
- Efficient Computation of Range Aggregates against Uncertain Location Based Queries
- Efficient Error Estimating Coding Feasibility and Applications
- Efficient Fuzzy Type-Ahead Search in XML Data
- Efficient key Agreement for Large and Dynamic Multicast Groups
- Efficient Key Management For Threshold-Multi Signature In Distributed System
- Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
- Efficient Multi-Dimensional Suppression for K-Anonymity
- Efficient Processing of Metric Skyline Queries
- Embedded Extended Visual Cryptography Schemes
- Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
- Encrypted Marking Based Detection And Filtering (EMDAF)
- Energy Efficient Cooperative Video
- Energy Efficient System
- Energy-Efficient Cooperative Video distribution with Statistical QOS provisions over Wireless Networks
- Energy-Efficient SINR-Based Routing for Multihop Wireless Networks
- EnergyMaps For Mobile Wireless networks coherence Time Versues Spreding Period
- Engineering Privacy
- Enhanced Ant Algorithm Based Load Balanced Task Scheduling In Grid Computing
- Enhancing Search Performance in Unstructured P2P Networks Based on Users Common Interest
- Ensuring Data Storage Security in Cloud Computing
- Ensuring Distributed Accountability for Data Sharing in the Cloud
- Enterprise Collaboration Tool Project
- Error Control System In Network Environment
- Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
- Estimation of Defects Based on Defect Decay Model ED3M
- Evaluating the Efficacy of Forward Error Correction Coding
- Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
- Evaluation of Accuracy in design pattern occurence detection
- Evaluation of User Behavior trust in cloud computing
- Extended Boolean Retrieval
- Extended XML Tree Pattern Matching Theories and Algorithms
- Extracting Actionable Knowledge From Decission Trees
- Extracting Spread-Spectrum Hidden Data from Digital Media
- Face Recognition For Smart Recognitions
- Face Recognition Using Laplacianfaces
- Facial Expression Recognition Using Facial Movement Features
- Facilitating Effective User Navigation through Website Structure Improvement
- FADE Secure Overlay Cloud Storage with File Assured Deletion
- Fast Data Collection in Tree-Based Wireless Sensor Networks
- Fast Rendering Algorithm of Underwater Optical Effect
- Fast Transmission to Remote Cooperative Groups
- Fault Tolerant Scheduling for Hard Real Time Tasks in Uniprocessor System
- FEBA A Bandwidth Allocation Algorithm for Service Differentiation in IEEE 802.16 Mesh Networks
- Filtering Unwanted Packets On Atm Network
- Fingerprint Authentication System
- Flexible Rollback Recovery In Dynamic Heterogeneous Grid Computing
- FoCUS Learning to Crawl Web Forums
- Fog Computing Mitigating Insider Data Theft Attacks in the Cloud
- Footprint Detecting Sybil Attacks in Urban Vehicular Networks
- Fully Anonymous Profile Matching In Mobile Social Networks
- Fuzzy Keyword Search over Encrypted Data in Cloud Computing
- Game-Theoretic Pricing for Video Streaming in Mobile Networks
- Genetic Algorithm Based Train Simulation using Concurrent Engneering
- Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
- Geographical Routing With Location Service in Intermittently Connected MANETs
- GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions
- GLIP A Concurrency Control Protocol for Clipping Indexing
- Going Back and Forth Efficient Multideployment and Multisnapshotting on Clouds
- Grid Scheduling based on Collaborative Random Early Detection Strategies
- Handling Selfishness in Replica Allocation
- Handwritten Chinese Text Recognition by Integrating Multiple Contexts
- Harnessing the Cloud for Securely Outsourcing
- HASBE A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control by Separate Encryption Decryption in Cloud Computing
- HASBE Access Control in Cloud Computing
- Hiding Data Distribution in outsourced Archival Databases
- HIDS Intrusion Detection System Over Abnormal Internet Sequence
- Homogenous Network Control and Implementation
- Horizontal aggregation in SQL to prepare data sets for data mining analysis
- Host-to-Host Congestion Control for TCP
- How Software Developers Use Tagging to Support Reminding and Refinding
- Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HID)
- Hybrid Scheduling Of Dynamic Task Graphs With Selective Duplication For Multiprocessors Under Memory And Time Constraints
- Identification of Humans Using Gait
- Identity-Based Secure Distributed Data Storage
- Image Authentication Over Wireless Channels
- IMine Mining Association Rules with Item Constraints
- Implementing Multicast Distribution through Recursive Unicast Trees
- Implementing security across the networks with Quantum key distribution protocol
- Improving Utilization of Infrastructure Clouds
- Incentive Compatible Privacy-Preserving Data Analysis
- Increasing efficiency in wireless networks using bandwidth routing protocol
- Intrusion detection An Energy efficient approach in Heterogeneous WSN
- Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
- Intrusion Detection System Over Abnormal Internet Sequence
- IP Fast Reroute Framework
- ITP An Image Transport Protocol for the Internet
- Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
- Java Grid Done Using Grid Computing
- Java Program Invention With User Integrated Developed Environment
- Robust video data hiding using forbidden data hiding
- Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
- KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
- Large Connectivity for Dynamic Random Geometric Graphs
- Latency Equalization as a New Network Service
- Layered Approach Using Conditional Random Fields for Intrusion Detection
- Learn to Personalized Image Search from the Photo Sharing Websites
- Live Streaming with Receiver-based Peer-division Multiplexing
- Load Rebalancing for Distributed File Systems in Clouds
- Load-Balancing Multipath. Switching System with Flow Slice
- Location Aided Routing In Mobile Adhoc Networks
- Location Based Routing For Distance Nodes
- Location Based Spatial Query Processing In Wireless Broadcast Environments
- Low Latency And Energy Efficient Routing Protocols For Wireless Sensor Networks
- M-Privacy for Collaborative Data Publishing
- Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks
- Maximizing The Number Of Broadcast Operations In Random Geometric Adhoc Wireless Networks
- Measuring Capacity Bandwidth of Targeted Path Segments
- Message Authentication In Computationally Constrained Environments
- Minimizing Delay and Maximizing Lifetime for Wireless sensor Networks with Anycast
- Minimizing File Download Time in Stochastic Peer-to-Peer Networks
- Mining Contract S For Business Event And Temporal Constraints In Service Engagement
- Mitigating Denial-of-Service Attacks on the Chord Overlay Network A Location Hiding Approach
- Mitigating Performance Degradation in congested sensor networks
- Mitigating selective forwarding attacks with a channel-aware approach in WMNS
- Mitigation of Control Channel Jamming under Node Capture Attacks
- Mobile Agents In_a_Distributed Multimedia Dabase System
- Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
- Mobile Sampling of Sensor Field Data Using Controlled Broadcast
- Mobility Management Approaches for Mobile IP Networks Performance Comparison and Use Recommendations
- Modeling & Automated Containment of Worms
- Modeling and Detection of Camouflaging Worm
- Monitoring Online tests thru data visualisation
- Monitoring patients via a secure and mobile healthcare system
- Monitoring The Aplication Layer DDOS Attacks
- Monitoring the Application-Layer DDoS Attacks for Popular Websites
- Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks
- Multicast Routing with Delay and Delay Variation Constraints for Collaborative Applications on Overlay Networks
- Multiparty Access Control For Online Social Networks Model And Mechanisms
- Multipath Dissemination in Regular Mesh Topologies
- Multiple Routing Configurations for Fast IP Network Recovery
- Network Component for Xml Migration
- Network Load Balancing
- Network Border Patrol Preventing Congestion Collapse
- NICE Network Intrusion Detection and Countermeasure
- Noise Reduction by Fuzzy Image Filtering
- Nymble Blocking Misbehaving Users in Anonymizing Networks
- OCGR A New Scheduling Algorithm for Differentiated Services Networks
- ODAM An Optimized Distributed Association Rule Mining Algorithm
- On Event-Based Middle ware for Location-Aware Mobile Applications
- On Modeling Analysis and Optimization of Packet Aggregation Systems
- On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks
- On the Fly Estimation of the Processes that Are Alive in an Asynchronous Message-Passing System
- On the Impact of Security Protocols on the Performance of SNMP
- On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents
- On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability
- Online Index Recommendations for High-Dimensional Databases Using Query Workloads
- Online Intrusion Alert Aggregation For Data Streaming Modeling Final Source Code
- Online Modeling of Proactive Moderation System for Auction Fraud Detection
- Open Smart Classroom Extensible and Salable Learning System in Smart Space Using Web Service Technology
- Optical Character Recognition on a Grid Infrastructure
- Optimal Bandwidth Assignment for Multiple-Description-Coded Video
- Optimal Client-Server Assignment for Internet
- Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
- Optimal Power Allocation in Multi-Relay
- Optimal service pricing for a cloud cache
- Optimized Resource Allocation for Software Release Planning
- Optimizing Cloud Resources For Delivering Iptv Services Through Virtualization
- Organizing User Search Histories
- P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
- Packet Loss Control Using Tokens at the Network Edge
- Packet-Hiding Methods for Preventing Selective Jamming Attacks
- PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
- PCA-Based Spatially Adaptive Denoising of CFA Images for Single-Sensor Digital Cameras
- Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
- Personal Authentication Using 3-D Finger Geometry
- Pharmacy Management System
- Learn to Personalized Image Search from the Photo Sharing Websites
- PMSE A Personalized Mobile Search Engine
- Policy-by-Example for Online Social Networks
- POPI A User-level Tool for Inferring Router Packet Forwarding Priority
- Portable Cloud Services Using TOSCA (2012)
- Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
- Preventing Private Information Inference Attacks
- Price Differentiation for Communication Networks
- Privacy Preserving Data Sharing With Anonymous ID Assignment
- Privacy Preserving Delegated Access Control
- Privacy-Preserving Distributed Profile Matching In Proximity-Based Mobile Social Networks
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- ProgME Towards Programmable Network Measurement
- Progressive Parametric Query Optimization
- QUIVER Consistent object Sharing for Edge Services
- Random Access Transport Capacity
- Randomized Protocols for Duplicate Elimination in Peer-to Peer Storage Systems
- Ranked Reverse nearest Neighbor Search
- Ranking Model Adaptation for Domain-Specific Search
- Ranking Spatial Data by Quality Preferences
- Re-Ordering Of Packets Using Retransmission Timer
- Reliable And Energy-Efficient Multipath Communications In Underwater Sensor Networks
- Reliable Re-encryption in Unreliable Clouds
- Remote Approach for Effective Task Execution and Data Accessing Tool
- Remote System Access By Using VN
- Research on Ontology-based Representation and Retrieval of Components
- Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
- Resource Management Using Dynamical Load Prediction and Multiprocessor Cooperation
- Retrieving Files Using Content Based Searching and Presenting It in Carousel View
- Revisiting Defenses against Large-Scale Online Password Guessing Attacks
- RIHT A Novel Hybrid IP Traceback Scheme
- Risk-Aware Mitigation for MANET Routing Attacks
- Robust Face-Name Graph Matching for Movie
- Robust Module Based Data Management
- Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
- Route Reservation in Ad Hoc Wireless Networks
- SaaAS
- SAT- Solving Approaches to Context-Aware Enterprise Network Security Management
- SATA Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
- Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
- Scalable and Secure Sharing of Personal Health Records
- Secure and Practical Outsourcing of Linear
- secure communication for next generation internet
- Secure Communications Over Wireless Broadcast Networks Stability and Utility Maximization
- Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
- Secure Encryption System
- Secure Socket Layer Protocol Simulation
- Secureand Practical Outsourcing of Linear Programming in Cloud Computing
- Secured Architecture for Remote Virtual Desktops
- Secured Distributed Key Management for Threshold-Multisignature using Cryptography-
- Securing User-Controlled Routing Infrastructures
- Security Analysis of a Single Sign-On Mechanism
- Security Analysis of the SASI Protocol
- Security in large Mediator Protocols
- Security in Large Networks Using Mediator Protocols
- Security of web forms
- Security System for DNS using Cryptography
- Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
- Self Adaptive Contention Aware Routing
- Selfish Overlay Network Creation and Maintenance
- Sensitive Label Privacy Protection on Social Network Data
- SigFree A Signature-free Buffer Overflow Attack Blocker
- SIMPS Using Sociology for Personal Mobility
- Simulation of Handoff Techniques in Mobile Cellular Networks
- Sketch4Match – Content-based Image Retrieval System Using Sketches
- Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks(2012)
- Slicing A New Approach to Privacy Preserving Data Publishing
- Social Cloud Computing A Vision for Socially Motivated Resource Sharing
- Software as A Agent Service
- Spam Collection and Detection System
- SparkClouds Visualizing Trends in Tag Clouds
- Spatial Approximate String Search
- Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
- Speculative Transmission for Latency Reduction
- SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
- Spread Node Relocation by effective tolerant Process
- Stateless Multicasting In MANETs
- Statistical Entity Extraction from Web
- Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compress
- Subspace-Based Striping Noise Reduction in Hyperspectral Images
- Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks1
- Techniques For A Selective Encryption Of Uncompressed And Compressed Images
- Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations
- Temporal Partitioning of Communication Resources in an Integrated Architecture
- The CoQUOS Approach to Continuous Queries
- The District Medical Data Center Based on Cloud
- The Security Of Cloud Computing System Enabled By Trusted Computing Technology
- Three Party Authentication For Key Distributed Protocol Using Classical And Quantum Cryptography
- Throughput Optimization in Mobile Backbone Networks
- Toward publicly auditable secure cloud data storage services
- Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
- Toward Secure and Dependable Storage Services in Cloud Computing
- Towards A Statistical Framework For Source Anonymity In Sensor Networks
- Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
- Towards Secure And Dependable
- Towards Superhuman Speech Recognition
- Trust modeling in social tagging of multimedia content
- Truth Discovery with Multiple Conflicting Information Providers on the Web
- Two tales of privacy in online social networks
- Two Techniques for Fast Computation of Constrained Shortest Paths
- Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks
- Using Fuzzy Logic Control to Provide
- Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems
- Utility-Privacy Tradeoff in Databases An Information-theoretic Approach
- Vampire attacks Draining life from wireless ad-hoc sensor networks
- Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks
- Verification and Trade-Off Analysis of Security Properties in UML System Models
- Wardrop Routing in wireless networks
- Winds of Change from Vendor Lock-In to the Meta Cloud
- Wireless Sensor Networks A Study on Congestion
- XTC A Practical Topology Control Algorithm for Ad-Hoc Networks
- Zero knowledge protocol for WSN’s
“BEYOND TEXT QA: Multimedia Answer Generation by Harvesting Web Information”
i want a real time project with source code made on javafx,scenebuilder,jsp,jsf and core java.please send me in my mail.
you have this project smart campus on cloud using hadoop bigdata
give me the mejor project
Sir,
I need a source code for Intrusion Detection System using Decision Tree algorithm.
I am in dire need of it.
So, if its possible then can you mail me the source code?
Thanking you
cost for project 251. Load Rebalancing for Distributed File Systems in Clouds
may i get this project with source code for learning .
Monitoring the Application-Layer DDoS Attacks for Popular Websites
sir, please send me a whole project of
36.A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
i want secure user controlled routing infrastructure project in java source code and full project report plz send me its urgent
I want a mini project which is totally based on core java. please send its urgent
I want a project “A Competitive Study of Cryptography Techniques over Block Cipher” injava source code full project.
I want 406:The Security Of Cloud Computing System Enabled By Trusted Computing Technology
can you plz help me
I want 216: HASBE
Can u plz send this to my mail id
hi, i want “Game-Theoretic Pricing for Video Streaming in Mobile Networks” please
I need source code of fast clustering based feature subset selection algorithm for high dimensional data on my email.So plz send it.