1. Reliable Re-encryption in Unreliable Clouds

  2. Satellite Image Fusion by Using Partial Replacement

  3. Minimizing Delay and Maximizing Lifetime

  4. Wireless Sensor Networks with Any cast

  5. A Dynamic En-route Filtering Scheme for Data

  6. Reporting in Wireless Sensor Networks

  7. Scheduling Multisource Divisible Loads on Arbitrary Networks

  8. Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks

  9. Optimal Resource Placement in Structured Peer-to-Peer Networks

  10. A Binary String Approach for Updates in Dynamic Ordered XML Data

  11. Closeness: A New Privacy Measure for Data Publishing

  12. Closing the Loop in Webpage Understanding

  13. A Puzzle-Based Defense Strategy against Flooding Attacks Using Game Theory

  14. Secure Synchronization of Periodic Updates in Ad Hoc Networks

  15. Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks

  16. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks

  17. Route Stability in MANETs under the Random Direction Mobility Model

  18. Random Cast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks

  19. A Gen2 Based RFID Authentication Protocol for Security and Privacy

  20. Greedy Routing with Anti Void Traversal for Wireless Sensor Networks

  21. On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint

  22. Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking

  23. Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period

  24. A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks

  25. Biased Random Walks in Uniform Wireless Networks

  26. Cell Breathing Techniques for Load Balancing in Wireless LANs

  27. Secure and Policy-Compliant Source Routing

  28. Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications

  29. Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks

  30. Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services

  31. Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag Identification

  32. Explicit Load Balancing Technique for NGEO Satellite IP Networks With On-Board Processing Capabilities

  33. Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows

  34. Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks

  35. Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks

  36. Localized Sensor Area Coverage With Low Communication Overhead

  37. A Distributed And Scalable Routing Table Manager For The Next Generation Of IP Routers

  38. Probabilistic Packet Marking For Large Scale IP Trace Back

  39. Credit Card Fraud Detection Using Hidden Markov Models

  40. Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data

  41. Efficient Resource Allocation For Wireless Multicast

  42. Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case

  43. Trustworthy Computing Under Resource Constraints With The Down Policy

  44. Watermarking Relational Databases Using Optimization Based Techniques

  45. Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High-Capacity App

  46. Active Learning Methods for Interactive Image Retrieval

  47. HBA Distributed Metadata Management for Large Cluster-Based Storage Systems

  48. Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light

  49. Hardware enhanced association rule mining with Hashing and Pipelining

  50. A New Model For Dissemination Of XML Content

  51. Efficient 2-D Grayscale Morphological Transformations With Arbitraly Flat Structuring Elements

  52. Temporal Partioning of Communication Resources in an Integrated Architecture

  53. A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video

  54. Estimation of Defects Based On Defect Decay Model ED3M

    1. Online Contact

      Facebook | Twitter | Linked In | You Tube | Google+

      Our Other Project