Dot Net (IEEE)

Java      Java (IEEE)        .Net         .Net (IEEE)
Deriving Concept-Based User Profiles from Search Engine Logs
Record Matching over Query Results from Multiple Web Databases
Filtering Data Streams for Entity-Based Continuous Queries
Interactive Correction & Recommendation for Computer Language Learning
Learning Image-Text Associations
A Relation Based Page Rank Algorithm For Semantic Web Search Engines
English To Spanish Translation Of Signboard Images From Mobile
Message Authentication In Computationally Constrained Environment
Biased Random Walks in Uniform Wireless Networks
Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period
Greedy Routing with Anti-Void Traversal for WSN
On the Security of Route Discovery in MANETs
Route Stability in MANETs under the Random Direction Mobility Model
Multicasting With Localized Control In Wireless Ad Hoc Networks
A Flexible Privacy-Enhanced Location-Based Services System Framework  &Practice
Localized Sensor Area Coverage with Low Communication Overhead
Efficient Resource Allocation For Wireless Multicast
A Gen2 Based RFID Authentication Protocol for Security and Privacy
The Design Trade-Offs Of Bit-torrent-Like File Sharing Protocols
Multiple Routing Configurations For Fast IP Network Recovery
Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services
Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks
Aggregation With Fragment Retransmission For Very High-Speed WLANS
A Traffic Engineering Approach For Placement And Selection Of Network Services
A Distributed and Scalable Routing Table Manager
Efficient Routing in Intermittently Connected Mobile Networks The Multiple copy Case
A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory
A Survey on the Encryption of Converge cast Traffic with In-Network Processing
Credit card fraud detection using hidden Markov model
Trustworthy Computing under Resource Constraints with the DOWN Policy
DECOR: A Method for the Specification and Detection of Code and Design Smells
A Modified Model for Private Data Security Facing E-commerce
Optimized Resource Allocation For Software Release Planning
pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
Adaptive Multi versioning for Open MP parallelization via machine Learning
Network Coding-Based Protection of Many-to-One Wireless Flows
Scheduling Multisource Divisible Loads on Arbitrary Networks

No comments:

Post a Comment