JAVA 2012 TITLES

2012

  1. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad

  2. Cloud Computing Security From Single to Multi-Clouds

  3. Efficient Audit Service Outsourcing for Data Integrity in Clouds

  4. Ensuring Distributed Accountability for Data Sharing in the Cloud

  5. Load Balancing Multipath Switching System with Flow Slice

  6. Online System for Grid Resource Monitoring

  7. Privacy- and Integrity-Preserving Range Queries in Sensor Networks

  8. Visual Cryptography

  9. Ranking Model Adaptation for Domain-Specific Search

  10. Learn to Personalized Image Search from the Photo Sharing Websites

  11. Handwritten Chinese Text Recognition by Integrating Multiple Contexts

  12. A Stochastic Model of Multivirus Dynamics

  13. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad

  14. Cloud Computing Security From Single to Multi-Clouds

  15. Efficient Audit Service Outsourcing for Data Integrity in Clouds

  16. Ensuring Distributed Accountability for Data Sharing in the Cloud

  17. Fast Data Collection in Tree-Based Wireless Sensor Networks

  18. Load Balancing Multipath Switching System with Flow Slice

  19. Online System for Grid Resource Monitoring

  20. Privacy- and Integrity-Preserving Range Queries in Sensor Networks

  21. Persuasive Cued Click-Points

  22. Dynamic security risk

  23. Handwritten Chinese Text Recognition by Integrating Multiple Contexts

  24. A learning based approach

  25. A frame work for routing performance analysis

  26. Ranking Model Adaptation

  27. Active visual segmentation

  28. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

  29. Inside the Permutation-Scanning Worms Propagation Modeling and Analysis

  30. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks

  31. Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse

  32. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

  33. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule- Based Model.

  34. Ranking on Data Manifold with Sink Points

  35. Region-Based Foldings in Process Discovery

  36. T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence

  37. Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework

  38. Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures

  39. A Survey of XML Tree Patterns

  40. Covering Points of Interest with Mobile Sensors

  41. Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor Networks

  42. Real-Time I/O Management System with COTS Peripherals

  43. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation

  44. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

  45. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks


    1. Online Contact

      Facebook | Twitter | Linked In | You Tube | Google+

      Our Other Project