Professional Documents
Culture Documents
S.NO 1 2 3 4 5 6 7 8 9 10
11
12 13 14 15 16 17 18 19
Ensuring Data Storage Security in Cloud Computing Hiding data in spatial domain images with distortion tolerance Constrained Skyline Query Processing against Distributed Data Sites Scaling Dynamic Authority-Based Search Using Materialized Subgraphs Secure Data Objects Replication in Data Grid
COURSE JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA
DOMAIN
Mobile Computing Mobile Computing Mobile Computing Mobile Computing Mobile Computing
NETWORKING
Mobile Computing Mobile Computing Mobile Computing Mobile Computing
S.NO 1 2 3 4 5
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
On the Planning of Wirless Sensor Networks Energy-Efficient Clustering under the Joint Routing and Coverage The Effectiveness of Checksums for Embedded Control Networks Resequencing Analysis of Stop-and-Wait ARQ for Parallel multichannel communications Single-Link Failure Detection in All-Optical Networks Using monitoring cycles and paths. PRESTO Feedback-Driven Data Management in Sensor Networks
EFFICIENT PROVABLE OF SECURE KEY DISTRIBUTION MANAGEMENT Blind Authentication: A Secure Crypto- Biometric Verification Protocol CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment Data leakage detection Distributed Algorithms for Minimum Cost Multicast With Network Coding Distributed Resource Sharing-cd
Dtrab: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis Efficient and Dynamic Routing Topology Inference From End-to-End Measurements Automatic mining of Threatening e-mail using Ad Infinitum algorithm
An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems