id | domain | technology | title | year | category |
1 | NETWORK SECURITY | DOTNET | DROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY | 2018 | IEEE |
2 | NETWORK SECURITY | DOTNET | PRIVACY-PRESERVING LOCATION-BASED SERVICES QUERY SCHEME AGAINST QUANTUM ATTACKS | 2018 | IEEE |
3 | NETWORK SECURITY | DOTNET | DYNAMIC PACKET FORWARDING VERIFICATION IN SDN | 2018 | IEEE |
4 | NETWORK SECURITY | DOTNET | A SECURE EXCEPTION MODE FOR FAULT-ATTACK-RESISTANT PROCESSING | 2018 | IEEE |
5 | NETWORK SECURITY | DOTNET | PFP: IMPROVING THE RELIABILITY OF DEDUPLICATION-BASED STORAGE SYSTEMS WITH PER-FILE PARITY | 2019 | IEEE |
6 | NETWORK SECURITY | DOTNET | GENERATION OF SECURE AND RELIABLE HONEYWORDS PREVENTING FALSE DETECTION | 2019 | IEEE |
7 | NETWORK SECURITY | DOTNET | EFFICIENT INTRUSION DETECTION WITH BLOOM FILTERING IN CONTROLLER AREA NETWORKS (CAN) | 2019 | IEEE |
8 | NETWORK SECURITY | DOTNET | A HIGHLY EFFICIENT SIDE CHANNEL ATTACK WITH PROFILING THROUGH RELEVANCE-LEARNING ON PHYSICAL LEAKAGE INFORMATION | 2019 | IEEE |
9 | NETWORK SECURITY | DOTNET | PRIVACY-GUARANTEED TWO-AGENT INTERACTIONS USING INFORMATION-THEORETIC MECHANISMS | 2017 | IEEE |
10 | NETWORK SECURITY | DOTNET | A CROSS TENANT ACCESS CONTROL (CTAC) MODEL FOR CLOUD COMPUTING: FORMAL SPECIFICATION AND VERIFICATION | 2017 | IEEE |
11 | NETWORK SECURITY | DOTNET | STRONG KEY-EXPOSURE RESILIENT AUDITING FOR SECURE CLOUD STORAGE | 2017 | IEEE |
12 | NETWORK SECURITY | DOTNET | A PRACTICAL SYSTEM FOR PUBLIC-AWARE TARGETED MOBILE ADVERTISING SERVICES | 2017 | IEEE |
13 | NETWORK SECURITY | DOTNET | MINING DEFICIENCIES OF ONLINE REPUTATION SYSTEMS: METHODOLOGIES EXPERIMENTS AND IMPLICATIONS | 2017 | IEEE |
14 | NETWORK SECURITY | DOTNET | AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS | 2017 | IEEE |
15 | NETWORK SECURITY | DOTNET | A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD | 2017 | IEEE |
16 | NETWORK SECURITY | DOTNET | A SEMANTICS-AWARE APPROACH TO THE AUTOMATED NETWORK PROTOCOL IDENTIFICATION | 2017 | IEEE |
17 | NETWORK SECURITY | DOTNET | TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE | 2017 | IEEE |
18 | NETWORK SECURITY | DOTNET | ENABLING FINE-GRAINED MULTI-KEYWORD SEARCHSUPPORTING CLASSIFIED SUB-DICTIONARIES OVER ENCRYPTED CLOUD DATA | 2017 | IEEE |
19 | NETWORK SECURITY | DOTNET | ACTIVETRUST: SECURE AND TRUSTABLE ROUTING IN WIRELESS SENSOR NETWORKS | 2017 | IEEE |
20 | NETWORK SECURITY | DOTNET | CHERRY-PICKING RELIABLE PUF BITS WITH DIFFERENTIAL SEQUENCE CODING | 2016 | IEEE |
21 | NETWORK SECURITY | DOTNET | EFFICIENT AND ANONYMOUS MOBILE USER AUTHENTICATION PROTOCOL USING SELF-CERTIFIED PUBLIC KEY CRYPTOGRAPHY FOR MULTI-SERVER ARCHITECTURES | 2016 | IEEE |
22 | NETWORK SECURITY | DOTNET | PPM-HDA: PRIVACY-PRESERVING AND MULTIFUNCTIONAL HEALTH DATA AGGREGATION WITH FAULT TOLERANCE | 2016 | IEEE |
23 | NETWORK SECURITY | DOTNET | A WEB TRAFFIC ANALYSIS ATTACK USING ONLY TIMING INFORMATION | 2016 | IEEE |
24 | NETWORK SECURITY | DOTNET | STEGANALYSIS FEATURES FOR CONTENT-ADAPTIVE JPEG STEGANOGRAPHY | 2016 | IEEE |
25 | NETWORK SECURITY | DOTNET | AUDITING A CLOUD PROVIDERÆS COMPLIANCE WITH DATA BACKUP REQUIREMENTS: A GAMETHEORETICAL ANALYSIS | 2016 | IEEE |
26 | NETWORK SECURITY | DOTNET | GENERIC AND EFFICIENT CONSTRUCTIONS OF ATTRIBUTE-BASED ENCRYPTION WITH VERIFIABLE OUTSOURCED DECRYPTION | 2016 | IEEE |
27 | NETWORK SECURITY | DOTNET | GROUP SECRET KEY GENERATION IN WIRELESS NETWORKS: ALGORITHMS AND RATE OPTIMIZATION | 2016 | IEEE |
28 | NETWORK SECURITY | DOTNET | PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE | 2016 | IEEE |
29 | NETWORK SECURITY | DOTNET | ANONYMOUS TWO-FACTOR AUTHENTICATION IN DISTRIBUTED SYSTEMS: CERTAIN GOALS ARE BEYOND ATTAINMENT | 2016 | IEEE |
30 | NETWORK SECURITY | DOTNET | DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS | 2016 | IEEE |
31 | NETWORK SECURITY | DOTNET | CAPTCHA AS GRAPHICAL PASSWORDSùA NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS | 2016 | IEEE |
32 | NETWORK SECURITY | DOTNET | SECRET KEY GENERATION IN THE TWO-WAY RELAY CHANNEL WITH ACTIVE ATTACKERS | 2016 | IEEE |
33 | NETWORK SECURITY | DOTNET | DYNAMIC AUTHENTICATION WITH SENSORY INFORMATION FOR THE ACCESS CONTROL SYSTEMS | 2016 | IEEE |
34 | NETWORK SECURITY | DOTNET | SECURE CONTINUOUS AGGREGATION IN WIRELESS SENSOR NETWORKS | 2016 | IEEE |
35 | NETWORK SECURITY | DOTNET | A SECURE PAYMENT SCHEME WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTIHOP WIRELESS NETWORKS | 2016 | IEEE |
36 | NETWORK SECURITY | DOTNET | SPOC: A SECURE AND PRIVACY-PRESERVING OPPORTUNISTIC COMPUTING FRAMEWORK FOR MOBILE-HEALTHCARE EMERGENCY | 2016 | IEEE |
37 | NETWORK SECURITY | DOTNET | PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS | 2016 | IEEE |
38 | NETWORK SECURITY | DOTNET | OPASS: A USER AUTHENTICATION PROTOCOL RESISTANT TO PASSWORD STEALING AND PASSWORD REUSE ATTACKS | 2016 | IEEE |
39 | NETWORK SECURITY | DOTNET | DOUBLEGUARD: DETECTING INTRUSIONS IN MULTITIER WEB APPLICATIONS | 2016 | IEEE |
40 | NETWORKING | DOTNET | DETECTING AND MITIGATING TARGET LINK-FLOODING ATTACKS USING SDN | 2018 | IEEE |
41 | NETWORKING | DOTNET | FLOW MANAGEMENT AND LOAD BALANCING IN DYNAMIC HETEROGENEOUS LANS | 2018 | IEEE |
42 | NETWORKING | DOTNET | TRAFFIC CLASSIFICATION BASED ON ZERO-LENGTH PACKETS | 2018 | IEEE |
43 | NETWORKING | DOTNET | FUSO: FAST MULTI-PATH LOSS RECOVERY FOR DATA CENTER NETWORKS | 2018 | IEEE |
44 | NETWORKING | DOTNET | HIAUTH: HIDDEN AUTHENTICATION FOR PROTECTING SOFTWARE DEFINED NETWORKS | 2019 | IEEE |
45 | NETWORKING | DOTNET | WORMHOLE: THE HIDDEN VIRUS PROPAGATION POWER OF A SEARCH ENGINE IN SOCIAL NETWORKS | 2019 | IEEE |
46 | NETWORKING | DOTNET | GENERATION OF SECURE AND RELIABLE HONEYWORDS PREVENTING FALSE DETECTION | 2019 | IEEE |
47 | NETWORKING | DOTNET | EFFICIENT MULTI-FACTOR AUTHENTICATED KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS | 2019 | IEEE |
48 | NETWORKING | DOTNET | EFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS | 2017 | IEEE |
49 | NETWORKING | DOTNET | COLLABORATIVE AUTHENTICATION IN DECENTRALIZED DENSE MOBILE NETWORKS WITH KEY REDISTRIBUTION | 2017 | IEEE |
50 | NETWORKING | DOTNET | CONTENT-AWARE CONCURRENT MULTIPATH TRANSFER FOR HIGH-DEFINITION VIDEO STREAMING OVER HETEROGENEOUS WIRELESS NETWORKS | 2016 | IEEE |
51 | NETWORKING | DOTNET | DISCHARGING THE NETWORK FROM ITS FLOW CONTROL HEADACHES: PACKET DROPS AND HOL BLOCKING | 2016 | IEEE |
52 | NETWORKING | DOTNET | MOBILITY PREDICTION BASED JOINT STABLE ROUTING AND CHANNEL ASSIGNMENT FOR MOBILE AD HOC COGNITIVE NETWORKS | 2016 | IEEE |
53 | NETWORKING | DOTNET | SIMULTANEOUSLY GENERATING SECRET AND PRIVATE KEYS IN A COOPERATIVE PAIRWISE-INDEPENDENT NETWORK | 2016 | IEEE |
54 | NETWORKING | DOTNET | TASK SCHEDULING FOR MAXIMIZING PERFORMANCE AND RELIABILITY CONSIDERING FAULT RECOVERY IN HETEROGENEOUS DISTRIBUTED SYSTEMS | | IEEE |
55 | NETWORKING | DOTNET | TOWARDS DISTRIBUTED OPTIMAL MOVEMENT STRATEGY FOR DATA GATHERING IN WIRELESS SENSOR NETWORKS | 2016 | IEEE |
56 | NETWORKING | DOTNET | IP FAST REROUTING AND DISJOINT MULTIPATH ROUTING WITH THREE EDGE-INDEPENDENT SPANNING TREES | 2016 | IEEE |
57 | NETWORKING | DOTNET | TAG-ORDERING POLLING PROTOCOLS IN RFID SYSTEMS | 2016 | IEEE |
58 | NETWORKING | DOTNET | PACKET-LEVEL NETWORK COMPRESSION: REALIZATION AND SCALING OF THE NETWORK-WIDE BENEFITS | 2016 | IEEE |
59 | NETWORKING | DOTNET | MAXIMIZING NETWORK TOPOLOGY LIFETIME USING MOBILE NODE ROTATION | 2016 | IEEE |
60 | NETWORKING | DOTNET | AN EFFICIENT DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS | 2016 | IEEE |
61 | NETWORKING | DOTNET | A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS | 2016 | IEEE |
62 | NETWORKING | DOTNET | AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS | 2015 | IEEE |
63 | NETWORKING | DOTNET | AN EFFICIENT DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS | 2016 | IEEE |
64 | NETWORKING | DOTNET | A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS | 2015 | IEEE |
65 | NETWORKING | DOTNET | PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM | 2016 | IEEE |
66 | NETWORKING | DOTNET | RELIABLE BULK-DATA DISSEMINATION IN DELAY TOLERANT NETWORKS | 2016 | IEEE |
67 | NETWORKING | DOTNET | NETWORK CODING AWARE COOPERATIVE MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS | 2016 | IEEE |
68 | NETWORKING | DOTNET | FAST TRANSMISSION TO REMOTE COOPERATIVE GROUPS: A NEW KEY MANAGEMENT PARADIGM | 2016 | IEEE |
69 | NETWORKING | DOTNET | DISTORTION-AWARE SCALABLE VIDEO STREAMING TO MULTINETWORK CLIENTS | 2016 | IEEE |
70 | NETWORKING | DOTNET | A DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS | 2016 | IEEE |
71 | NETWORKING | DOTNET | A HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS | 2016 | IEEE |
72 | NETWORKING | DOTNET | MITIGATING ROUTING MISBEHAVIOR IN DISRUPTION TOLERANT NETWORKS | 2016 | IEEE |
73 | NETWORKING | DOTNET | IMPROVING ENERGY SAVING AND RELIABILITY IN WIRELESS SENSOR NETWORKS USING A SIMPLE CRT-BASED PACKET-FORWARDING SOLUTION | 2016 | IEEE |
74 | DATA MINING | DOTNET | SCALABLE CONTENT-AWARE COLLABORATIVE FILTERING FOR LOCATION RECOMMENDATION | 2018 | IEEE |
75 | DATA MINING | DOTNET | A GENERAL FRAMEWORK FOR IMPLICIT AND EXPLICIT SOCIAL RECOMMENDATION | | IEEE |
76 | DATA MINING | DOTNET | ACHIEVING DATA TRUTHFULNESS AND PRIVACY PRESERVATION IN DATA MARKETS | 2018 | IEEE |
77 | DATA MINING | DOTNET | COMPLEMENTARY ASPECT-BASED OPINION MINING | 2018 | IEEE |
78 | DATA MINING | DOTNET | CUSTOMER REVIEWS ANALYSIS WITH DEEP NEURAL NETWORKS FOR E-COMMERCE RECOMMENDER SYSTEMS | 2018 | IEEE |
79 | DATA MINING | DOTNET | DLTA: A FRAMEWORK FOR DYNAMIC CROWDSOURCING CLASSIFICATION TASKS | 2018 | IEEE |
80 | DATA MINING | DOTNET | COOPERATIVE FRAUD DETECTION MODEL WITH PRIVACY-PRESERVING IN REAL CDR DATASETS | 2019 | IEEE |
81 | DATA MINING | DOTNET | EFFECTIVE HEART DISEASE PREDICTION USING HYBRID MACHINE LEARNING TECHNIQUES | 2019 | IEEE |
82 | DATA MINING | DOTNET | HIERARCHICAL MULTI-CLUE MODELLING FOR POI POPULARITY PREDICTION WITH HETEROGENEOUS TOURISTINFORMATION | 2019 | IEEE |
83 | DATA MINING | DOTNET | MULTI-PARTY HIGH-DIMENSIONAL DATA PUBLISHING UNDER DIFFERENTIAL PRIVACY | 2019 | IEEE |
84 | DATA MINING | DOTNET | PRIVACY-PRESERVING SOCIAL MEDIA DATA PUBLISHING FOR PERSONALIZED RANKING-BASED RECOMMENDATION | 2019 | IEEE |
85 | DATA MINING | DOTNET | A MULTI-LAYER DUAL ATTENTION DEEP LEARNING MODEL WITH REFINED WORD EMBEDDINGS FOR ASPECT-BASED SENTIMENT ANALYSIS | 2019 | IEEE |
86 | DATA MINING | DOTNET | SENTIDIFF: COMBINING TEXTUAL INFORMATION AND SENTIMENT DIFFUSION PATTERNS FOR TWITTER SENTIMENT ANALYSIS | 2019 | IEEE |
87 | DATA MINING | DOTNET | A NEW ROBUST APPROACH FOR REVERSIBLE DATABASE WATERMARKING WITH DISTORTION CONTROL | 2019 | IEEE |
88 | DATA MINING | DOTNET | PERSONAL WEB REVISITATION BY CONTEXT AND CONTENT KEYWORDS WITH RELEVANCE FEEDBACK | 2019 | IEEE |
89 | DATA MINING | DOTNET | EFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS | 2019 | IEEE |
90 | DATA MINING | DOTNET | PROBABILISTIC STATIC LOAD-BALANCING OF PARALLEL MINING OF FREQUENT SEQUENCES | 2017 | IEEE |
91 | DATA MINING | DOTNET | SENTIMENT EMBEDDINGS WITH APPLICATIONS TO SENTIMENT ANALYSIS | 2016 | IEEE |
92 | DATA MINING | DOTNET | SIMILARITY MEASURE SELECTION FOR CLUSTERING TIME SERIES DATABASES | 2016 | IEEE |
93 | DATA MINING | DOTNET | SURVEY ON ASPECT-LEVEL SENTIMENT ANALYSIS | 2016 | IEEE |
94 | DATA MINING | DOTNET | TASC:TOPIC-ADAPTIVE SENTIMENT CLASSIFICATION ON DYNAMIC TWEETS | 2016 | IEEE |
95 | DATA MINING | DOTNET | MINING HEALTH EXAMINATION RECORDSùA GRAPH-BASED APPROACH | 2016 | IEEE |
96 | DATA MINING | DOTNET | ACTIVE LEARNING FOR RANKING THROUGH EXPECTED LOSS OPTIMIZATION | 2016 | IEEE |
97 | DATA MINING | DOTNET | DISCOVERY OF RANKING FRAUD FOR MOBILE APPS | 2016 | IEEE |
98 | DATA MINING | DOTNET | LEARNING TO RANK USING USER CLICKS AND VISUAL FEATURES FOR IMAGE RETRIEVAL | 2016 | IEEE |
99 | DATA MINING | DOTNET | T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORATIVE SERVICES | 2016 | IEEE |
100 | DATA MINING | DOTNET | LINQ: A FRAMEWORK FOR LOCATION-AWARE INDEXING AND QUERY PROCESSING | 2016 | IEEE |
101 | DATA MINING | DOTNET | SCALABLE DISTRIBUTED PROCESSING OF K NEAREST NEIGHBOR QUERIES OVER MOVING OBJECTS | 2016 | IEEE |
102 | DATA MINING | DOTNET | RRWùA ROBUST AND REVERSIBLE WATERMARKING TECHNIQUE FOR RELATIONAL DATA | 2016 | IEEE |
103 | DATA MINING | DOTNET | PROGRESSIVE DUPLICATE DETECTION | 2016 | IEEE |
104 | DATA MINING | DOTNET | AUTHENTICATION OF MOVING TOP-K SPATIAL KEYWORD QUERIES | 2016 | IEEE |
105 | DATA MINING | DOTNET | FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE | 2016 | IEEE |
106 | DATA MINING | DOTNET | FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS | 2016 | IEEE |
107 | DATA MINING | DOTNET | PRIVACY-PRESERVING AND CONTENT-PROTECTING LOCATION BASED QUERIES | 2016 | IEEE |
108 | DATA MINING | DOTNET | KEYWORD QUERY ROUTING | 2016 | IEEE |
109 | DATA MINING | DOTNET | A SIMILARITY MEASURE FOR TEXT CLASSIFICATION AND CLUSTERING | 2016 | IEEE |
110 | DATA MINING | DOTNET | EFFICIENT AND EFFECTIVE DUPLICATE DETECTION IN HIERARCHICAL DATA | 2016 | IEEE |
111 | DATA MINING | DOTNET | MINING USER QUERIES WITH MARKOV CHAINS: APPLICATION TO ONLINE IMAGE RETRIEVAL | 2016 | IEEE |
112 | DATA MINING | DOTNET | A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONS | 2016 | IEEE |
113 | DATA MINING | DOTNET | ANOMALY DETECTION VIA ONLINE OVERSAMPLING PRINCIPAL COMPONENT ANALYSIS | 2016 | IEEE |
114 | DATA MINING | DOTNET | CREATING EVOLVING USER BEHAVIOR PROFILES AUTOMATICALLY | 2016 | IEEE |
115 | DATA MINING | DOTNET | SLICING: A NEW APPROACH FOR PRIVACY PRESERVING DATA PUBLISHING | 2016 | IEEE |
116 | DATA MINING | DOTNET | ORGANIZING USER SEARCH HISTORIES | 2016 | IEEE |
117 | DATA MINING | DOTNET | DOUBLE GUARD: DETECTING INTRUSIONS IN MULTITIER WEB APPLICATIONS | 2016 | IEEE |
118 | MOBILE COMPUTING | DOTNET | A LIGHTWEIGHT SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING | 2019 | IEEE |
119 | MOBILE COMPUTING | DOTNET | MULTI-CDN: TOWARDS PRIVACY IN CONTENT DELIVERY NETWORKS | 2019 | IEEE |
120 | MOBILE COMPUTING | DOTNET | RISK ASSESSMENT IN SOCIAL NETWORKS BASED ON USER ANOMALOUS BEHAVIOURS | 2019 | IEEE |
121 | MOBILE COMPUTING | DOTNET | PERSONALIZED PRIVACY-PRESERVING TASK ALLOCATION FOR MOBILE CROWDSENSING | 2019 | IEEE |
122 | MOBILE COMPUTING | DOTNET | ENERGY-EFFICIENT DYNAMIC COMPUTATION OFFLOADING AND COOPERATIVE TASK SCHEDULING IN MOBILE CLOUD COMPUTING | 2019 | IEEE |
123 | MOBILE COMPUTING | DOTNET | PROVABLY SECURE KEY-AGGREGATE CRYPTOSYSTEMS WITH BROADCAST AGGREGATE KEYS FOR ONLINE DATA SHARING ON THE CLOUD | 2019 | IEEE |
124 | MOBILE COMPUTING | DOTNET | EFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS | 2019 | IEEE |
125 | MOBILE COMPUTING | DOTNET | PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN MOBILE CLOUD COMPUTING | 2017 | IEEE |
126 | MOBILE COMPUTING | DOTNET | A NOVEL BLOCK ENCRYPTION ALGORITHM BASED ON CHAOTIC S-BOX FOR WIRELESS SENSOR NETWORK | 2017 | IEEE |
127 | MOBILE COMPUTING | DOTNET | AN EFFICIENT INFORMATION MAXIMIZATION BASED ADAPTIVE CONGESTION CONTROL SCHEME IN WIRELESS SENSOR NETWORK | 2017 | IEEE |
128 | MOBILE COMPUTING | DOTNET | ENERGY-EFFICIENT RELAY NODE PLACEMENT IN WIRELESS HETEROGENEOUS NETWORKS WITH CAPACITY CONSTRAINTS | 2019 | IEEE |
129 | MOBILE COMPUTING | DOTNET | A LOAD-AWARE CLUSTERING MODEL FOR COORDINATED TRANSMISSION IN FUTURE WIRELESS NETWORKS | 2019 | IEEE |
130 | MOBILE COMPUTING | DOTNET | OPTIMAL RESOURCE ALLOCATION IN RANDOM ACCESS COOPERATIVE COGNITIVE RADIO NETWORKS | 2019 | IEEE |
131 | MOBILE COMPUTING | DOTNET | PRIVACY AND QUALITY PRESERVING MULTIMEDIA DATA AGGREGATION FOR PARTICIPATORY SENSING SYSTEMS | 2019 | IEEE |
132 | MOBILE COMPUTING | DOTNET | DISTRIBUTED CHANNEL PROBING FOR EFFICIENT TRANSMISSION SCHEDULING IN WIRELESS NETWORKS | 2016 | IEEE |
133 | MOBILE COMPUTING | DOTNET | DISTORTION-AWARE CONCURRENT MULTIPATH TRANSFER FOR MOBILE VIDEO STREAMING IN HETEROGENEOUS WIRELESS NETWORKS | 2016 | IEEE |
134 | MOBILE COMPUTING | DOTNET | PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS | 2016 | IEEE |
135 | MOBILE COMPUTING | DOTNET | TOWARDS MAXIMIZING TIMELY CONTENT DELIVERY IN DELAY TOLERANT NETWORKS | 2016 | IEEE |
136 | MOBILE COMPUTING | DOTNET | A STUDY ON FALSE CHANNEL CONDITION REPORTING ATTACKS IN WIRELESS NETWORKS | 2016 | IEEE |
137 | MOBILE COMPUTING | DOTNET | COOPERATIVE PACKET DELIVERY IN HYBRID WIRELESS MOBILE NETWORKS: A COALITIONAL GAME APPROACH | 2016 | IEEE |
138 | MOBILE COMPUTING | DOTNET | NETWORK-ASSISTED MOBILE COMPUTING WITH OPTIMAL UPLINK QUERY PROCESSING | 2016 | IEEE |
139 | MOBILE COMPUTING | DOTNET | RELAY SELECTION FOR GEOGRAPHICAL FORWARDING IN SLEEP-WAKE CYCLING WIRELESS SENSOR NETWORKS | 2016 | IEEE |
140 | MOBILE COMPUTING | DOTNET | VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS | 2016 | IEEE |
141 | MOBILE COMPUTING | DOTNET | MITIGATING ROUTING MISBEHAVIOR IN DISRUPTION TOLERANT NETWORKS | 2016 | IEEE |
142 | CLOUD COMPUTING | DOTNET | EFFICIENT TRACEABLE AUTHORIZATION SEARCH SYSTEM FOR SECURE CLOUD STORAGE | 2019 | IEEE |
143 | CLOUD COMPUTING | DOTNET | PRIVACY AWARE DATA DEDUPLICATION FOR SIDE CHANNEL IN CLOUD STORAGE | 2019 | IEEE |
144 | CLOUD COMPUTING | DOTNET | A GAME APPROACH TO MULTI-SERVERS LOAD BALANCING WITH LOAD-DEPENDENT SERVER AVAILABILITY CONSIDERATION | 2018 | IEEE |
145 | CLOUD COMPUTING | DOTNET | DESIGN OF SECURE AUTHENTICATED KEY MANAGEMENT PROTOCOL FOR CLOUD COMPUTING ENVIRONMENTS | 2018 | IEEE |
146 | CLOUD COMPUTING | DOTNET | BLOCKCHAIN-BASED PERSONAL HEALTH RECORDS SHARING SCHEME WITH DATAINTEGRITY VERIFIABLE | 2018 | IEEE |
147 | CLOUD COMPUTING | DOTNET | SECURE ENCRYPTED DATA WITH AUTHORIZED DEDUPLICATION IN CLOUD | 2019 | IEEE |
148 | CLOUD COMPUTING | DOTNET | EFFICIENT DATA PLACEMENT AND REPLICATION FOR QOS-AWARE APPROXIMATE QUERY EVALUATION OF BIG DATA ANALYTICS | 2019 | IEEE |
149 | CLOUD COMPUTING | DOTNET | ENABLING VERIFIABLE AND DYNAMIC RANKED SEARCH OVER OUTSOURCED DATA | 2019 | IEEE |
150 | CLOUD COMPUTING | DOTNET | MULTI-AUTHORITY ATTRIBUTE-BASED KEYWORD SEARC OVER ENCRYPTED CLOUD DATA | 2019 | IEEE |
151 | CLOUD COMPUTING | DOTNET | PRIVACY-PRESERVING MULTI-KEYWORD TOP-K SIMILARITY SEARCH OVER ENCRYPTED DATA | 2019 | IEEE |
152 | CLOUD COMPUTING | DOTNET | REVOCABLE CLOUD-ASSISTED ATTRIBUTE-BASED SIGNCRYPTION IN PERSONAL HEALTH SYSTEM | 2019 | IEEE |
153 | CLOUD COMPUTING | DOTNET | IDENTITY-BASED AUDITING FOR SHARED CLOUD DATA WITH EFFICIENT AND SECURE SENSITIVE INFORMATION HIDING | 2019 | IEEE |
154 | CLOUD COMPUTING | DOTNET | ACHIEVING SECURE UNIVERSAL AND FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH | 2019 | IEEE |
155 | CLOUD COMPUTING | DOTNET | SCHEME OVER ENCRYPTED CLOUD DATA | 2019 | IEEE |
156 | CLOUD COMPUTING | DOTNET | ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS | 2017 | IEEE |
157 | CLOUD COMPUTING | DOTNET | A ROBUST REPUTATION MANAGEMENT MECHANISM IN THE FEDERATED CLOUD | 2017 | IEEE |
158 | CLOUD COMPUTING | DOTNET | PROVABLY SECURE KEY-AGGREGATE CRYPTOSYSTEMS WITH BROADCAST AGGREGATE KEYS FOR ONLINE DATA SHARING ON THE CLOUD | 2017 | IEEE |
159 | CLOUD COMPUTING | DOTNET | BLOCK DESIGN-BASED KEY AGREEMENT FOR GROUP DATA SHARING IN CLOUD COMPUTING | 2017 | IEEE |
160 | CLOUD COMPUTING | DOTNET | MULTITENANT ACCESS CONTROL FOR CLOUD-AWARE DISTRIBUTED FILE SYSTEMS | 2017 | IEEE |
161 | CLOUD COMPUTING | DOTNET | ROLLBACK MECHANISMS FOR CLOUD MANAGEMENT APIS USING AI PLANNING | 2017 | IEEE |
162 | CLOUD COMPUTING | DOTNET | TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM | 2017 | IEEE |
163 | CLOUD COMPUTING | DOTNET | TOWARDS ACHIEVING DATA SECURITY WITH THE CLOUD COMPUTING ADOPTION FRAMEWORK (CCAF) | 2017 | IEEE |
164 | CLOUD COMPUTING | DOTNET | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA | 2016 | IEEE |
165 | CLOUD COMPUTING | DOTNET | A SCALABLE DATA CHUNK SIMILARITY BASED COMPRESSION APPROACH FOR EFFICIENT BIG SENSING DATA PROCESSING ON CLOUD | 2016 | IEEE |
166 | CLOUD COMPUTING | DOTNET | ATTRIBUTE-BASED ACCESS CONTROL FOR MULTI-AUTHORITY SYSTEMS WITH CONSTANT SIZE CIPHERTEXT IN CLOUD COMPUTING | 2016 | IEEE |
167 | CLOUD COMPUTING | DOTNET | FLEXIBLE AND FINE-GRAINED ATTRIBUTE-BASED DATA STORAGE IN CLOUD COMPUTING | 2016 | IEEE |
168 | CLOUD COMPUTING | DOTNET | IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD | 2016 | IEEE |
169 | CLOUD COMPUTING | DOTNET | PRIVACY PRESERVING RANKED MULTI-KEYWORD SEARCH FOR MULTIPLE DATA OWNERS IN CLOUD COMPUTING | 2016 | IEEE |
170 | CLOUD COMPUTING | DOTNET | PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA TORAGE IN THE CLOUD | 2016 | IEEE |
171 | CLOUD COMPUTING | DOTNET | ENABLING PERSONALIZED SEARCH OVER ENCRYPTED OUTSOURCED DATA WITH EFFICIENCY IMPROVEMENT | 2016 | IEEE |
172 | CLOUD COMPUTING | DOTNET | EAVESDROPPING PREVENTION FOR NETWORK CODING ENCRYPTED CLOUD STORAGE SYSTEMS | 2016 | IEEE |
173 | CLOUD COMPUTING | DOTNET | ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING | 2016 | IEEE |
174 | CLOUD COMPUTING | DOTNET | DYNAMIC REQUEST REDIRECTION AND RESOURCE PROVISIONING FOR CLOUD-BASED VIDEO SERVICES UNDER HETEROGENEOUS ENVIRONMENT | 2016 | IEEE |
175 | CLOUD COMPUTING | DOTNET | CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION | 2016 | IEEE |
176 | CLOUD COMPUTING | DOTNET | PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE CLOUD | 2016 | IEEE |
177 | CLOUD COMPUTING | DOTNET | SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING | 2016 | IEEE |
178 | CLOUD COMPUTING | DOTNET | PRIVACY-PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE | 2016 | IEEE |
179 | CLOUD COMPUTING | DOTNET | A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION | 2016 | IEEE |
180 | CLOUD COMPUTING | DOTNET | PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM | 2016 | IEEE |
181 | CLOUD COMPUTING | DOTNET | SECURE DEDUPLICATION WITH EFFICIENT AND RELIABLE CONVERGENT KEY MANAGEMENT | 2016 | IEEE |
182 | CLOUD COMPUTING | DOTNET | KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE | 2016 | IEEE |
183 | CLOUD COMPUTING | DOTNET | ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD | 2016 | IEEE |
184 | CLOUD COMPUTING | DOTNET | PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA | 2016 | IEEE |
185 | CLOUD COMPUTING | DOTNET | A SECURE DATA SELF-DESTRUCTING SCHEME IN CLOUD COMPUTING | 2016 | IEEE |
186 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | ENERGY EFFICIENT COOPERATIVE COMPUTING IN MOBILE WIRELESS SENSOR NETWORKS | 2018 | IEEE |
187 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | A DIFFERENTIATED CACHING MECHANISM TO ENABLE PRIMARY STORAGE DEDUPLICATION IN CLOUDS | 2018 | IEEE |
188 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | ADAPTIVE RESOURCE ALLOCATION AND PROVISIONING IN MULTI-SERVICE CLOUD ENVIRONMENTS | 2018 | IEEE |
189 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | PRIVACY-PRESERVING MULTI-KEYWORD TOP-K SIMILARITY SEARCH OVER ENCRYPTED DATA | 2018 | IEEE |
190 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | FLEXIBLE AND EFFICIENT BLOCKCHAIN-BASED ABE SCHEME WITH MULTI-AUTHORITY FOR MEDICAL ON DEMAND IN TELEMEDICINE SYSTEM | 2018 | IEEE |
191 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | A DISTRIBUTED TRUST EVALUATION PROTOCOL WITH PRIVACY PROTECTION FOR INTERCLOUD | 2019 | IEEE |
192 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | CROWDBC: A BLOCKCHAIN-BASED DECENTRALIZED FRAMEWORK FOR CROWDSOURCING | 2019 | IEEE |
193 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD | 2019 | IEEE |
194 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS | 2016 | IEEE |
195 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | TASK SCHEDULING FOR MAXIMIZING PERFORMANCE AND RELIABILITY CONSIDERING FAULT RECOVERY IN HETEROGENEOUS DISTRIBUTED SYSTEMS | 2016 | IEEE |
196 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD | 2016 | IEEE |
197 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | SECURE AND DISTRIBUTED DATA DISCOVERY AND DISSEMINATION IN WIRELESS SENSOR NETWORKS | 2016 | IEEE |
198 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING | 2016 | IEEE |
199 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | A PROBABILISTIC MISBEHAVIOR DETECTION SCHEME TOWARD EFFICIENT TRUST ESTABLISHMENT IN DELAY-TOLERANT NETWORKS | 2016 | IEEE |
200 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | HOP-BY-HOP MESSAGE AUTHENTICATION AND SOURCE PRIVACY IN WIRELESS SENSOR NETWORKS | 2016 | IEEE |
201 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | A SECURE PAYMENT SCHEME WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTIHOP WIRELESS NETWORKS | 2016 | IEEE |
202 | WEB SERVICE | DOTNET | FLOW CLASSIFICATION FOR SOFTWARE-DEFINED DATA CENTERS USING STREAM MINING | 2019 | IEEE |
203 | WEB SERVICE | DOTNET | A CLOUD BROKERAGE ARCHITECTURE FOR EFFICIENT CLOUD SERVICE SELECTION | 2019 | IEEE |
204 | WEB SERVICE | DOTNET | SECO-LDA: MINING SERVICE CO-OCCURRENCE TOPICS FOR COMPOSITION RECOMMENDATION | 2019 | IEEE |
205 | WEB SERVICE | DOTNET | QOS-AWARE SERVICE SELECTION USING AN INCENTIVE MECHANISM | 2019 | IEEE |
206 | WEB SERVICE | DOTNET | RESCUE WINGS: MOBILE COMPUTING AND ACTIVE SERVICES SUPPORT FOR DISASTER RESCUE | 2018 | IEEE |
207 | WEB SERVICE | DOTNET | SMARTCRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERFACES | 2018 | IEEE |
208 | WEB SERVICE | DOTNET | TICREC: A PROBABILISTIC FRAMEWORK TO UTILIZE TEMPORAL INFLUENCE CORRELATIONS FOR TIME-AWARE LOCATION RECOMMENDATIONS | 2016 | IEEE |
209 | WEB SERVICE | DOTNET | NETWORK AND QOS-BASED SELECTION OF COMPLEMENTARY SERVICES | 2016 | IEEE |
210 | WEB SERVICE | DOTNET | QOS-AWARE WEB SERVICE RECOMMENDATION BY COLLABORATIVE FILTERING | 2016 | IEEE |
211 | WEB SERVICE | DOTNET | SERVICE-CENTRIC FRAMEWORK FOR A DIGITAL GOVERNMENT APPLICATION | 2016 | IEEE |
212 | Application | DOTNET | 3D PASSWORD AUTHENTICATION SYSTEM | Nil | Application |
213 | Application | DOTNET | A GRAPHICAL PASSWORD AUTHENTICATION | Nil | Application |
214 | Application | DOTNET | A NEW SECURITY MODEL BASED ON FINGER PRINT RECOGNITION FOR DISTRIBUTED SYSTEM | Nil | Application |
215 | Application | DOTNET | A SYSTEM BASED HEALTH CARE USING NET | Nil | Application |
216 | Application | DOTNET | A WEB BASED APPROACH FOR HR GROUP IN RECRUITMENT PROCESS SYSTEM | Nil | Application |
217 | Application | DOTNET | ACCOUNT INFORMATION SYSTEM | Nil | Application |
218 | Application | DOTNET | ADVERTISING AGENCY | Nil | Application |
219 | Application | DOTNET | AES BASIC CRYPTO CHANNEL | Nil | Application |
220 | Application | DOTNET | ARTIFICIAL INTELLIGENT BASED VIRTUAL EXAM CONTROLLER | Nil | Application |
221 | Application | DOTNET | ASSET MANAGEMENT | Nil | Application |
222 | Application | DOTNET | ASSOCIATION RULES WITH LIMITED SIDE EFFECTS | Nil | Application |
223 | Application | DOTNET | AUTHENTICATION USING QUANTUM KEY IN THREE-PARTY COMMUNICATION | Nil | Application |
224 | Application | DOTNET | AUTOMATED TOOL SYSTEM | Nil | Application |
225 | Application | DOTNET | AUTOMATIC COLOR ENHANCEMENT (ACE) | Nil | Application |
226 | Application | DOTNET | AUTOMATIC JAVA MEDIA MANAGER | Nil | Application |
227 | Application | DOTNET | BACKUP AND RECOVERY SCHEDULER | Nil | Application |
228 | Application | DOTNET | BLOOD BANK AUTOMATION SYSTEM | Nil | Application |
229 | Application | DOTNET | BUG TRACKING SYSTEM | Nil | Application |
230 | Application | DOTNET | BUNK AUTOMATION SYSTEM | Nil | Application |
231 | Application | DOTNET | CALL CENTER MANAGEMENT | Nil | Application |
232 | Application | DOTNET | CAMPAIGN INFORMATION SYSTEM | Nil | Application |
233 | Application | DOTNET | CARGO CHAIN LOCATOR | Nil | Application |
234 | Application | DOTNET | CHECK POST MONITORING SYSTEM | Nil | Application |
235 | Application | DOTNET | CHEMICAL MANAGEMENT SYSTEM | Nil | Application |
236 | Application | DOTNET | CITIZEN MANAGEMENT INFORMATION SYSTEM USING INTERNET | Nil | Application |
237 | Application | DOTNET | CLIENT FEEDBACK PORTAL. | Nil | Application |
238 | Application | DOTNET | COLLABORATIVE PROCESS FOR ACHIEVING NEGOTIATIONS | Nil | Application |
239 | Application | DOTNET | COLLEGE MANAGEMENT SYSTEM | Nil | Application |
240 | Application | DOTNET | COMMUNICATION SYSTEM PROJECT MANAGEMENT | Nil | Application |
241 | Application | DOTNET | CONGESTION WINDOW CONTROL | Nil | Application |
242 | Application | DOTNET | CONTENT MANAGEMENT SYSTEM | Nil | Application |
243 | Application | DOTNET | CONTENT-BASED SEARCH AND RETRIEVAL | Nil | Application |
244 | Application | DOTNET | CORPORATE RESOURCE PLANNING. | Nil | Application |
245 | Application | DOTNET | CREATIVE THINKING AND BRAINSTORMING | Nil | Application |
246 | Application | DOTNET | CUSTOMER BASE BSNL SERVICING SYSTEM. | Nil | Application |
247 | Application | DOTNET | CUSTOMER RELATIONSHIP MANAGEMENT | Nil | Application |
248 | Application | DOTNET | CUSTOMER SERVICE PORTAL FOR TOURISUM AND TRAVELS | Nil | Application |
249 | Application | DOTNET | CYBER DETERMINATION | Nil | Application |
250 | Application | DOTNET | CYBER EYE | Nil | Application |
251 | Application | DOTNET | CYBER EYE WITH FINGER PRINT | Nil | Application |
252 | Application | DOTNET | DAIRY MANAGEMENT | Nil | Application |
253 | Application | DOTNET | DATA HIDING IN AUDIO FILES | Nil | Application |
254 | Application | DOTNET | DATA INTEGRITY PROOFS IN CLOUD STORAGE | Nil | Application |
255 | Application | DOTNET | DESIGN AND DEVELOPMENT OF INSURANCE AGENTÆS SAMURAI | Nil | Application |
256 | Application | DOTNET | DETECTION AND REMOVAL OF CRACKS IN IMAGES | Nil | Application |
257 | Application | DOTNET | DEVELOPMENT OF A FEATURE-RICH PRACTICAL ONLINE ON-REQUEST COURSES COORDINATION SYSTEM (ORS) | Nil | Application |
258 | Application | DOTNET | DEVELOPMENT OF A FEATURE-RICH TRAINING GATEWAY APPLICATION. | Nil | Application |
259 | Application | DOTNET | DEVELOPMENT OF A WAREHOUSE FOR ALUMNI OF COLLEGE | Nil | Application |
260 | Application | DOTNET | DEVELOPMENT OF A WEB BASED PRACTICAL RESOURCE MANAGEMENT SYSTEM (RMS) | Nil | Application |
261 | Application | DOTNET | DEVELOPMENT OF WEB BASED FILE MANAGEMENT SYSTEM | Nil | Application |
262 | Application | DOTNET | DIGITAL IMAGE PROCESSING TECHNOQUES | Nil | Application |
263 | Application | DOTNET | DISCOVERING WEB ACCESS PATTERNS AND USER PROFILE EVALUATION | Nil | Application |
264 | Application | DOTNET | DISPENSARY MANAGEMENT SYSTEM | Nil | Application |
265 | Application | DOTNET | DISTRIBUTED DOCUMENTOM AND WORK SCHEDULER | Nil | Application |
266 | Application | DOTNET | DOCUMENT MANAGEMENT VERSIONING | Nil | Application |
267 | Application | DOTNET | E PROCUREMENT SYSTEM | Nil | Application |
268 | Application | DOTNET | E-AUCTION PLAN. | Nil | Application |
269 | Application | DOTNET | E-BANKING TRANSACTION SYSTEM | Nil | Application |
270 | Application | DOTNET | E-BANKING TRANSACTIONS SYSTEM WITH PORTAL FOR BANK OFFICIALS AND CUSTOMERS | Nil | Application |
271 | Application | DOTNET | EDGE DEDUCTION IN HIGH RESOLUTION IMAGES USING CANY & SOBAL | Nil | Application |
272 | Application | DOTNET | EDUCATION MANAGEMENT SYSTEM | Nil | Application |
273 | Application | DOTNET | EFFECTIVE BOOK STORAGE | Nil | Application |
274 | Application | DOTNET | EFFICIENT WEB IMPROVEMENT IN P2P DOMAIN. | Nil | Application |
275 | Application | DOTNET | E-GAS AGENCY AUTOMATION | Nil | Application |
276 | Application | DOTNET | EMPLOYMENT REGISTRATION PORTAL SYSTEM | Nil | Application |
277 | Application | DOTNET | ENTERPRISE NETWORK CONTROLLER | Nil | Application |
278 | Application | DOTNET | E-POLLING | Nil | Application |
279 | Application | DOTNET | ERP FOR CONSTRUCTION COMPANY | Nil | Application |
280 | Application | DOTNET | ESTIMATION OF DEFECTS BASED ON DEFECT DECAY MODEL: ED3M | Nil | Application |
281 | Application | DOTNET | E-STOCK TRADING. | Nil | Application |
282 | Application | DOTNET | E-TRAVEL | Nil | Application |
283 | Application | DOTNET | EXE STARTER & SCHEDULER | Nil | Application |
284 | Application | DOTNET | FACE RECOGNIZATION FROM BRIGHTNESS IMAGES | Nil | Application |
285 | Application | DOTNET | FACTORY MANAGEMENT SYSTEM | Nil | Application |
286 | Application | DOTNET | FEATURE-RICH TRAINING PORTAL APPLICATION | Nil | Application |
287 | Application | DOTNET | FILE COMPRESSION USING HUFFMAN CODING | Nil | Application |
288 | Application | DOTNET | FILE PROTECTION USING TRIPLEDES ALGORITHM | Nil | Application |
289 | Application | DOTNET | FILE SECURITY SYSTEM | Nil | Application |
290 | Application | DOTNET | FILE TRANSFER PROTOCOL CLIENT | Nil | Application |
291 | Application | DOTNET | FILTERING AND SELECTING WEB SERVICES WITH INTERACTIVE COMPOSITION TECHNIQUES | Nil | Application |
292 | Application | DOTNET | FINGER PRINT BASED APPLICATION CONTROLLER | Nil | Application |
293 | Application | DOTNET | FINGER PRINT BASED ATTENDANCE SYSTEM | Nil | Application |
294 | Application | DOTNET | FINGER PRINT BASED HOSTEL ATTENDANCE SYSTEM | Nil | Application |
295 | Application | DOTNET | FINGER PRINT BASED LIBRARY MANAGEMENT SYSTEM | Nil | Application |
296 | Application | DOTNET | FINGERPRINT BASED ATM | Nil | Application |
297 | Application | DOTNET | FLEXIBLE NETWORK MONITORING TOOL BASED ON DATA STREAM MANAGEMENT SYSTEM | Nil | Application |
298 | Application | DOTNET | FRAME EXTRACTION AND PROCESS IN VIDEOCLIPS | Nil | Application |
299 | Application | DOTNET | FUEL AUTOMATION SCHEME. | Nil | Application |
300 | Application | DOTNET | FURNITURE AUTOMATION SYSTEM | Nil | Application |
301 | Application | DOTNET | GENERIC PROJECT MANAGEMENT PORTAL | Nil | Application |
302 | Application | DOTNET | GLOBAL SQL EDITOR | Nil | Application |
303 | Application | DOTNET | HARDWARE SHOP MAINTENANCE SYSTEM | Nil | Application |
304 | Application | DOTNET | HIDING TEXT FILE IN AUDIO FILE USING L-B ENCODING STEGANOGRAPHY | Nil | Application |
305 | Application | DOTNET | HOSPITAL MANAGEMENT SYSTEM | Nil | Application |
306 | Application | DOTNET | HTTP NETWORK CONTROLLER THROUGH WEB BROWSER | Nil | Application |
307 | Application | DOTNET | HTTP PROTOCOL SECURITY IN WINDOWS APPLICATION | Nil | Application |
308 | Application | DOTNET | HUMAN RESOURCE MANAGEMENT SYSTEM | Nil | Application |
309 | Application | DOTNET | IMAGE ENCRYPTION | Nil | Application |
310 | Application | DOTNET | INBOUND/OUTBOUND SERVICES | Nil | Application |
311 | Application | DOTNET | INFORMATION SCHEME FOR DEBIT. | Nil | Application |
312 | Application | DOTNET | INFORMATION SYSTEM ABOUT THE RAILWAY | Nil | Application |
313 | Application | DOTNET | INFORMATION SYSTEM FOR AUTOMOBILE COMPANY | Nil | Application |
314 | Application | DOTNET | INSURANCE AGENTÆS SAMURAI. | Nil | Application |
315 | Application | DOTNET | INTERACTIVE GUIDLINE TO THE VISITOR FOR AN INSTITUTE. | Nil | Application |
316 | Application | DOTNET | INTERACTIVE INFORMATION USING WEB BASED WAP. | Nil | Application |
317 | Application | DOTNET | INTERACTIVE TRAINING SYSTEM. | Nil | Application |
318 | Application | DOTNET | INTERNET CAFâ•” AUTOMATION | Nil | Application |
319 | Application | DOTNET | INTRANET MAIL SERVER | Nil | Application |
320 | Application | DOTNET | INTRANET MULTI CLIENT CHATTING | Nil | Application |
321 | Application | DOTNET | INTRANET NAVIGATION SYSTEM | Nil | Application |
322 | Application | DOTNET | INVENTORY CONTROL MANAGEMENT | Nil | Application |
323 | Application | DOTNET | JOB PORTALS BASE ON ONLINE EXAM. | Nil | Application |
324 | Application | DOTNET | JOB PORTFOLIO APPLICATION. | Nil | Application |
325 | Application | DOTNET | KNIT TECH MANAGEMENT SYSTEM | Nil | Application |
326 | Application | DOTNET | KNOWLEDGE BASE CHANNEL | Nil | Application |
327 | Application | DOTNET | LAPTOP ENDORSEMENT | Nil | Application |
328 | Application | DOTNET | LIBRARY MANAGEMENT SYSTEM | Nil | Application |
329 | Application | DOTNET | LICENSE PROVIDER FOR SOFTWARE PRODUCTS AND PROJECTS | Nil | Application |
330 | Application | DOTNET | MACHINERY MANAGEMENT SYSTEM | Nil | Application |
331 | Application | DOTNET | MAIL SERVER DEVELOPMENT. | Nil | Application |
332 | Application | DOTNET | Maintenance of goods tranportaton details | Nil | Application |
333 | Application | DOTNET | MANAGEMENT INFORMATION SYSTEM | Nil | Application |
334 | Application | DOTNET | MANAGEMENT OF DEALERSHIP INFORMATION | Nil | Application |
335 | Application | DOTNET | MANAGING THE LABOUR PROFILE | Nil | Application |
336 | Application | DOTNET | MANAGING THE RENTAL OF A TASK | Nil | Application |
337 | Application | DOTNET | MEDICAL MANAGEMENT SYSTEM | Nil | Application |
338 | Application | DOTNET | MEDICAL STAFF MANAGEMENT SYSTEM | Nil | Application |
339 | Application | DOTNET | MEDICAL TRANSCRIPTION | Nil | Application |
340 | Application | DOTNET | MINIMIZED ROAMING IN MOBILE AD-HOC NETWORKS USING DISTRIBUTED DATABASE | Nil | Application |
341 | Application | DOTNET | MISUSE DETECTION SYSTEM | Nil | Application |
342 | Application | DOTNET | MOBILE INVENTORY SYSTEM | Nil | Application |
343 | Application | DOTNET | MONITORING MASTER DATA FOR AN ENTERPRISE. | Nil | Application |
344 | Application | DOTNET | MULTI PURPOSE centralized ID CARD | Nil | Application |
345 | Application | DOTNET | MULTI USER CHATTING | Nil | Application |
346 | Application | DOTNET | MULTIDESTINATION FILE TRANSFER PROTOCAL. | Nil | Application |
347 | Application | DOTNET | MULTIPLE WATERMARKING | Nil | Application |
348 | Application | DOTNET | MULTIPROTOCOL WEB BROWSER | Nil | Application |
349 | Application | DOTNET | MUSICAL STORE MAINTENANCE MANAGEMENT | Nil | Application |
350 | Application | DOTNET | NETWORK BANKING | Nil | Application |
351 | Application | DOTNET | ONLINE BOOK SHOP MANAGEMENT SYSTEM | Nil | Application |
352 | Application | DOTNET | POLLING SYSTEM WITH BIOMETRICS AUTHENTICATION | Nil | Application |
353 | Application | DOTNET | PREDICTING MISSING ITEMS IN SHOPPING CARTS | Nil | Application |
354 | Application | DOTNET | PRODUCTION TRANSACTION SYSTEM | Nil | Application |
355 | Application | DOTNET | QOS IN WIRELESS NETWORK | Nil | Application |
356 | Application | DOTNET | QUERY PROCESSING IN PEER GROUPS | Nil | Application |
357 | Application | DOTNET | REAL ESTATE & INSURANCE. | Nil | Application |
358 | Application | DOTNET | REAL ESTATE MANAGEMENT SYSTEM | Nil | Application |
359 | Application | DOTNET | REMOTE LOGIN SQL SERVER | Nil | Application |
360 | Application | DOTNET | RESUME CRUISER FOR LARGE SCALE ENVIRONMENTS | Nil | Application |
361 | Application | DOTNET | RFID BASED PASSPORT VERIFICATION | Nil | Application |
362 | Application | DOTNET | RFID SECURITY SYSTEM | Nil | Application |
363 | Application | DOTNET | ROBUST HTML TO DOM CONVERSION AND APPLICATIONS | Nil | Application |
364 | Application | DOTNET | SECURE DATA OBJECTS REPLICATION IN DATA GRID | Nil | Application |
365 | Application | DOTNET | SECURING NETWORK DATAS OVER DYNAMIC PEER GROUPS | Nil | Application |
366 | Application | DOTNET | SENDING MAIL USING ASP.NET | Nil | Application |
367 | Application | DOTNET | SENDING MAILS USING VB.NET | Nil | Application |
368 | Application | DOTNET | SEO û SEARCH ENGINE OPTIMIZATION | Nil | Application |
369 | Application | DOTNET | SESSION INITIATION PROTOCOL | Nil | Application |
370 | Application | DOTNET | SIGNATURE VERIFICATION USING DIRECTION BASED ALGORITHM | Nil | Application |
371 | Application | DOTNET | SMART CARD BASED TOLL GATE SYSTEM | Nil | Application |
372 | Application | DOTNET | SMART MEDICAL BILLING SYSTEM | Nil | Application |
373 | Application | DOTNET | SMART TRADE MANAGEMENT SYSTEM | Nil | Application |
374 | Application | DOTNET | SOFTWARE QUALITY ANALYSIS | Nil | Application |
375 | Application | DOTNET | SOFTWARE TOOL FOR EDUCATIONL ADMINISTRATION. | Nil | Application |
376 | Application | DOTNET | SPIDER ALERTS WEB SERVICES | Nil | Application |
377 | Application | DOTNET | STOCK ALERT FOR TRADING SYSTEM | Nil | Application |
378 | Application | DOTNET | STUDY OF INTERNET MARKETING | Nil | Application |
379 | Application | DOTNET | SUPERMARK MECHANISM | Nil | Application |
380 | Application | DOTNET | SUPPLY CHAIN MANAGEMENT SYSTEM | Nil | Application |
381 | Application | DOTNET | SUSPICIOUS EMAIL DETECTION SYSTEM | Nil | Application |
382 | Application | DOTNET | SYSTEM FOR MONITORING THE ATM NETWORK BY ONLINE | Nil | Application |
383 | Application | DOTNET | System Optimizer | Nil | Application |
384 | Application | DOTNET | SYSTEMATIC REMEDY CONSOLE | Nil | Application |
385 | Application | DOTNET | TARGET TRACKING IN MOBILE SENSOR NETWORKS | Nil | Application |
386 | Application | DOTNET | TAX MANAGEMENT SYSTEM | Nil | Application |
387 | Application | DOTNET | TAXI TRIP AUTOMATION SYSTEM | Nil | Application |
388 | Application | DOTNET | TCP-IP BASED PROCESS MONITOR AND CONTROLLER FOR BOTH LOCAL AND REMOTE MACHINES | Nil | Application |
389 | Application | DOTNET | TERMINAL EMULATION SYSTEM FOR TCP/IP NETWORKS | Nil | Application |
390 | Application | DOTNET | TOURISM AND TRAVELS TUTOR. | Nil | Application |
391 | Application | DOTNET | TRAINEE MANAGEMENT SYSTEM | Nil | Application |
392 | Application | DOTNET | Trainee SUPERVISION system | Nil | Application |
393 | Application | DOTNET | UNIVERSITY ADMISSION SYSTEM | Nil | Application |
394 | Application | DOTNET | USER BROWSING BEHAVIOR ANALYSIS | Nil | Application |
395 | Application | DOTNET | USER FREINDLY AND EFICIENT MULTITHREADING GDI SYSTEM | Nil | Application |
396 | Application | DOTNET | USING ASSOCIATION RULES TO SECURE SENSITIVE INFORMATIONS | Nil | Application |
397 | Application | DOTNET | VEHICLE DEALERSHIP MANAGEMENT | Nil | Application |
398 | Application | DOTNET | VIRTUAL EXAM CONTROLLER | Nil | Application |
399 | Application | DOTNET | WEB BASED BLOOD BANK | Nil | Application |
400 | Application | DOTNET | WEB BASED BOOK SUPERSTORE. | Nil | Application |
401 | Application | DOTNET | WEB BASED CONJUGAL SYSTEM. | Nil | Application |
402 | Application | DOTNET | WEB BASED MEETING S CHEDULER | Nil | Application |
403 | Application | DOTNET | WEB BASED MULTI LEVEL MARKETING SYSTEM | Nil | Application |
404 | Application | DOTNET | WEB BASED PLACEMENT CELL PROCESS OF THE COLLEGE | Nil | Application |
405 | Application | DOTNET | WEB CONTENT ADMIN TOOL | Nil | Application |
406 | Application | DOTNET | WEB DOCUMENT MANGEMENT SYSTEM. | Nil | Application |
407 | Application | DOTNET | WEB MAIL FILTER | Nil | Application |
408 | Application | DOTNET | XML AGENCY SMART CARD | Nil | Application |
409 | IEEE | C# DOTNET | FACIAL EXPRESSION RECOGNITION USING FACIAL MOVEMENT FEATURES | Nil | IEEE |
410 | IEEE | C# DOTNET | FILE ENCRYPTION | Nil | IEEE |
411 | IEEE | C# DOTNET | PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS | Nil | IEEE |
412 | IEEE | C# DOTNET | CUED CLICK-POINTS BASED AUTHENTICATION MECHANISM | Nil | IEEE |
413 | IEEE | C# DOTNET | REVERSIBLE IMAGE WATERMARKING USING INTERPOLATION TECHNIQUE | Nil | IEEE |
414 | IEEE | C# DOTNET | ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING | Nil | IEEE |
415 | IEEE | C# DOTNET | SPIDER ALERT IN NETWORK | Nil | IEEE |
416 | IEEE | C# DOTNET | DATA INTEGRITY PROOFS IN CLOUD STORAGE | Nil | IEEE |
417 | IEEE | C# DOTNET | SORT: A SELF-ORGANIZING TRUST MODEL FOR PEER-TO-PEER SYSTEMS | Nil | IEEE |
418 | IEEE | C# DOTNET | NETWORK CODING AWARE COOPERATIVE MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS | Nil | IEEE |
419 | IEEE | C# DOTNET | SECURE AUTHENTICATED QUANTUM KEY DISTRIBUTION PROTOCOLS | Nil | IEEE |
420 | IEEE | C# DOTNET | A FLEXIBLE NETWORK MONITORING TOOL BASED ON A DATA STREAM DETECTION | Nil | IEEE |
421 | IEEE | C# DOTNET | A SECURED GRAPHICAL PASSWORD AUTHENTICATION MECHANISM | Nil | IEEE |
422 | IEEE | C# DOTNET | A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION | Nil | IEEE |
423 | IEEE | C# DOTNET | A SECURE DATA SELF-DESTRUCTING SCHEME IN CLOUD COMPUTING | Nil | IEEE |
424 | IEEE | C# DOTNET | MINING DATA MOVEMENT FOR TRACKING MOVING OBJECTS | Nil | IEEE |
425 | IEEE | C# DOTNET | WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES | Nil | IEEE |
426 | IEEE | C# DOTNET | NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS | Nil | IEEE |
427 | IEEE | C# DOTNET | DATA LEAKAGE DETECTION | Nil | IEEE |
428 | IEEE | C# DOTNET | TRUSTWORTHY COMPUTING IN SECURITY NETWORKS | Nil | IEEE |
429 | IEEE | C# DOTNET | WEB USAGE MINING | Nil | IEEE |
430 | IEEE | C# DOTNET | DYNAMIC AUTHENTICATION WITH SENSORY INFORMATION FOR THE ACCESS CONTROL SYSTEMS | Nil | IEEE |
431 | IEEE | C# DOTNET | NETWORK ASSISTED MOBILE COMPUTING WITH OPTIMAL UPLINK QUERY PROCESSING | Nil | IEEE |
432 | IEEE | C# DOTNET | NEW CHAOTIC ENCRYPTION ALGORITHM BASED ON CHAOTIC SEQUENCE AND PLAIN TEXT | Nil | IEEE |
433 | IEEE | C# DOTNET | A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONS | Nil | IEEE |
434 | IEEE | C# DOTNET | ANOMALY DETECTION VIA ONLINE OVERSAMPLING PRINCIPAL COMPONENT ANALYSIS | Nil | IEEE |
435 | IEEE | C# DOTNET | MINING USER QUERIES WITH MARKOV CHAINS: APPLICATION TO ONLINE IMAGE RETRIEVAL | Nil | IEEE |
436 | IEEE | C# DOTNET | SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION | Nil | IEEE |
437 | IEEE | C# DOTNET | DISTORTION-AWARE SCALABLE VIDEO STREAMING TO MULTINETWORK CLIENTS | Nil | IEEE |
438 | IEEE | C# DOTNET | EDITING TEXT WITH IMAGE STEGANOGRAPHY | Nil | IEEE |
439 | IEEE | C# DOTNET | FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS | Nil | IEEE |
440 | IEEE | C# DOTNET | PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM | Nil | IEEE |
441 | IEEE | C# DOTNET | PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE CLOUD | Nil | IEEE |
442 | IEEE | C# DOTNET | PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS | Nil | IEEE |
443 | IEEE | C# DOTNET | SMART LAB AUTOMATION SYSTEM USING FINGER PRINT | Nil | IEEE |
444 | IEEE | C# DOTNET | RRWùA ROBUST AND REVERSIBLE WATERMARKING TECHNIQUE FOR RELATIONAL DATA | Nil | IEEE |
445 | IEEE | C# DOTNET | EFFICIENT TWO-SERVER PASSWORD-ONLY AUTHENTICATED KEY EXCHANGE PROTOCOL | Nil | IEEE |
446 | IEEE | C# DOTNET | DATA HIDING IN AUDIO FILES | Nil | IEEE |
447 | IEEE | C# DOTNET | RUMOR RIDING: ANONYMIZING UNSTRUCTURED PEER-TO-PEER SYSTEMS | Nil | IEEE |
448 | IEEE | C# DOTNET | AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS | Nil | IEEE |
449 | IEEE | C# DOTNET | THREE û DIMENSIONAL PASSOWRD FOR AUTHENTICATION MECHANISM | Nil | IEEE |
450 | IEEE | C# DOTNET | IMPROVING ENERGY SAVING AND RELIABILITY IN ADVANCED NETWORKS | Nil | IEEE |
451 | IEEE | C# DOTNET | DYNAMIC SIGNATURE VERIFICATION | Nil | IEEE |
452 | IEEE | C# DOTNET | A GEOMETRIC APPROACH TO IMPROVING ACTIVE PACKET LOSS MEASUREMENT | Nil | IEEE |
453 | IEEE | C# DOTNET | SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING | Nil | IEEE |
454 | IEEE | C# DOTNET | PARALLEL DATA PROCESSING IN SECURE NETWORK | Nil | IEEE |
455 | IEEE | C# DOTNET | FRAME EXTRACTION AND PROCESS IN VIDEO CLIPS | Nil | IEEE |
456 | IEEE | C# DOTNET | SLICING: A NEW APPROACH FOR PRIVACY PRESERVING DATA PUBLISHING | Nil | IEEE |
457 | IEEE | C# DOTNET | CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION | Nil | IEEE |
458 | IEEE | C# DOTNET | DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS | Nil | IEEE |
459 | IEEE | C# DOTNET | MITIGATING ROUTING MISBEHAVIOR IN DISRUPTION TOLERANT NETWORKS | Nil | IEEE |
460 | IEEE | C# DOTNET | SECURE DEDUPLICATION WITH EFFICIENT AND RELIABLE CONVERGENT KEY MANAGEMENT | Nil | IEEE |
461 | IEEE | C# DOTNET | A SECURE PAYMENT SCHEME WITH LOW COMMUNICATION FOR MULTIHOP WIRELESS NETWORKS | Nil | IEEE |
462 | IEEE | C# DOTNET | DETECTION AND REMOVAL OF CRACKS AND IN IMAGES | Nil | IEEE |
463 | IEEE | C# DOTNET | SERVICE-CENTRIC FRAMEWORK FOR A DIGITAL GOVERNMENT APPLICATION | Nil | IEEE |
464 | IEEE | C# DOTNET | A DISTRIBUTED AND SCALABLE TIME SLOT ALLOCATION PROTOCOL FOR WIRELESS SENSOR NETWORKS | Nil | IEEE |
465 | IEEE | C# DOTNET | KNOWLEDGE & CLICK BASED AUTHENTICATION | Nil | IEEE |
466 | IEEE | C# DOTNET | ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD | Nil | IEEE |
467 | IEEE | C# DOTNET | A MACHINE LEARNING APPROACH FOR IDENTIFYING DISEASE-TREATMENT RELATIONS IN SHORT TEXTS | Nil | IEEE |
468 | IEEE | C# DOTNET | MESSAGE AUTHENTICATION IN COMPUTATIONALLY CONSTRAINED ENVIRONMENTS | Nil | IEEE |
469 | IEEE | C# DOTNET | ORGANIZING USER SEARCH HISTORIES | Nil | IEEE |
470 | IEEE | C# DOTNET | INFORMATION-THEORETIC OUTLIER DETECTION FOR LARGE-SCALE CATEGORICAL DATA | Nil | IEEE |
471 | IEEE | C# DOTNET | A TRAFFIC ENGINEERING APPROACH FOR PLACEMENT AND SELECTION OF NETWORK SERVICES | Nil | IEEE |
472 | IEEE | C# DOTNET | FACE SHAPE RECOVERY FROM BRIGHTNESS IMAGES | Nil | IEEE |
473 | IEEE | C# DOTNET | MITIGATING ROUTING MISBEHAVIOR IN DISRUPTION TOLERANT NETWORKS | Nil | IEEE |
474 | IEEE | C# DOTNET | SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION | Nil | IEEE |
475 | IEEE | C# DOTNET | MULTI USER CHATTING | Nil | IEEE |
476 | IEEE | C# DOTNET | CONTENT-BASED SEARCH AND RETRIEVAL | Nil | IEEE |
477 | WEB TECHNOLOGY | DOTNET | ONLINE CONSULTANCY MAINTENANCE SYSTEM | Nil | Application |
478 | WEB TECHNOLOGY | DOTNET | USER BROWSING BEHAVIOR ANALYSIS | Nil | Application |
479 | WEB TECHNOLOGY | DOTNET | PROJECT STATUS PROCESSING SYSTEM | Nil | Application |
480 | WEB TECHNOLOGY | DOTNET | WEB BASED MEDICAL CLAIM PROCESSING SYSTEM | Nil | Application |
481 | WEB TECHNOLOGY | DOTNET | WEB BASED FURNITURE ORDERING SYSTEM | Nil | Application |
482 | WEB TECHNOLOGY | DOTNET | WEB BASED PHOTO STUDIO AUTOMATION | Nil | Application |
483 | WEB TECHNOLOGY | DOTNET | CHECK POST MONITORING SYSTEM | Nil | Application |
484 | WEB TECHNOLOGY | DOTNET | ONLINE HEALTHCARE SYSTEM | Nil | Application |
485 | WEB TECHNOLOGY | DOTNET | ONLINE MOBILE SHOP | Nil | Application |
486 | WEB TECHNOLOGY | DOTNET | WEB BASED MARRIAGE PLANNER | Nil | Application |
487 | WEB TECHNOLOGY | DOTNET | ONLINE SHOPPING | Nil | Application |
488 | WEB TECHNOLOGY | DOTNET | ONLINE COUNSELLING SYSTEM | Nil | Application |
489 | WEB TECHNOLOGY | DOTNET | DEVELOPMENT OF WEB BASED ALUMNI OF COLLEGE | Nil | Application |
490 | WEB TECHNOLOGY | DOTNET | DRIVING SCHOOL MANAGEMENT SYSTEM | Nil | Application |
491 | WEB TECHNOLOGY | DOTNET | E-POLLING | Nil | Application |
492 | WEB TECHNOLOGY | DOTNET | WEB MAIL FILTER | Nil | Application |
493 | WEB TECHNOLOGY | DOTNET | E-CIRCULAR SYSETEM | Nil | Application |
494 | WEB TECHNOLOGY | DOTNET | E-AUCTION PLAN USING CRYPTOGRAPHY-PRODUCT BASED | Nil | Application |
495 | WEB TECHNOLOGY | DOTNET | ONLINE SOCIAL NETWORKING | Nil | Application |
496 | WEB TECHNOLOGY | DOTNET | ONLINE NEWS EDITING AND BROADCASTING | Nil | Application |
497 | WEB TECHNOLOGY | DOTNET | DIVERSITY SYSTEM FOR WEB APPLICATION | Nil | Application |
498 | WEB TECHNOLOGY | DOTNET | AUTOMATIC QUOTATION GENERATOR | Nil | Application |
499 | WEB TECHNOLOGY | DOTNET | PROXY FIREWALL INTERNET MONITORING | Nil | Application |
500 | WEB TECHNOLOGY | DOTNET | E BANKING SYSTEM | Nil | Application |
501 | WEB TECHNOLOGY | DOTNET | COLLABORATIVE FILTERING ON MOVIES | Nil | Application |
502 | WEB TECHNOLOGY | DOTNET | ONLINE BOOKS READING | Nil | Application |
503 | WEB TECHNOLOGY | DOTNET | ONLINE LICENSE APPLICATION | Nil | Application |
504 | WEB TECHNOLOGY | DOTNET | ONLINE PASSPORT REGISTRATION | Nil | Application |
505 | WEB TECHNOLOGY | DOTNET | ONLINE VISA REGISTRATION | Nil | Application |
506 | WEB TECHNOLOGY | DOTNET | A WEB BASED APPROACH FOR HR GROUP IN RECRUITMENT PROCESS SYSTEM | Nil | Application |
507 | WEB TECHNOLOGY | DOTNET | ONLINE EYE BANKING SYSTEM | Nil | Application |
508 | WEB TECHNOLOGY | DOTNET | WEB BASED EMPLOYEE MANAGEMENT | Nil | Application |
509 | WEB TECHNOLOGY | DOTNET | BOUNDLESS STORAGE AND SEARCHING SYSTEM | Nil | Application |
510 | WEB TECHNOLOGY | DOTNET | AIRCRAFT PRODUCTION MANAGEMENT SYSTEM | Nil | Application |
511 | WEB TECHNOLOGY | DOTNET | CAR RENTAL SYSTEM | Nil | Application |
512 | WEB TECHNOLOGY | DOTNET | CENTRALIZED HOTEL MANAGEMENT | Nil | Application |
513 | WEB TECHNOLOGY | DOTNET | CREATIVE THINKING AND BRAINSTORMING | Nil | Application |
514 | WEB TECHNOLOGY | DOTNET | CRIME FILE MANAGEMENT SYSTEM | Nil | Application |
515 | WEB TECHNOLOGY | DOTNET | DEFECT TRACKING SYSTEM | Nil | Application |
516 | WEB TECHNOLOGY | DOTNET | E-AUCTION PLAN | Nil | Application |
517 | WEB TECHNOLOGY | DOTNET | HOSPITAL MANAGEMENT SYSTEM | Nil | Application |
518 | WEB TECHNOLOGY | DOTNET | ONLINE AIRLINE RESERVATION SYSTEM | Nil | Application |
519 | WEB TECHNOLOGY | DOTNET | ONLINE LOCKER SAFETY SYSTEM | Nil | Application |
520 | WEB TECHNOLOGY | DOTNET | ONLINE MEDICAL SHOP MANAGEMENT | Nil | Application |
521 | WEB TECHNOLOGY | DOTNET | ONLINE MOBILE PHONE SHOP | Nil | Application |
522 | WEB TECHNOLOGY | DOTNET | PERSONAL HOME PAGE BUILDER | Nil | Application |
523 | WEB TECHNOLOGY | DOTNET | PIZZA ORDERING SYSTEM | Nil | Application |
524 | WEB TECHNOLOGY | DOTNET | SAPIENT E-LEARNING | Nil | Application |
525 | WEB TECHNOLOGY | DOTNET | WEB BASED TEXTILE MANAGEMENT | Nil | Application |
526 | WEB TECHNOLOGY | DOTNET | WEB BASED LAPTOP ENDORSEMENT | Nil | Application |
527 | WEB TECHNOLOGY | DOTNET | WEB BASED FURNITURE AUTOMATION | Nil | Application |
528 | WEB TECHNOLOGY | DOTNET | WEB BASED MEDICAL CLAIM PROCESSING SYSTEM | Nil | Application |
529 | WEB TECHNOLOGY | DOTNET | WEB BASED BLOOD BANK MANAGEMENT | Nil | Application |
530 | WEB TECHNOLOGY | DOTNET | ONLINE CABLE TV PAYMENT | Nil | Application |
531 | WEB TECHNOLOGY | DOTNET | CREDIT CARD FRAUD DETECTION | Nil | Application |
532 | WEB TECHNOLOGY | DOTNET | JOB CARD BASED VEHICLE SERVICE MANAGEMENT SYSTEM | Nil | Application |
533 | WEB TECHNOLOGY | DOTNET | ARTIFICIAL INTELLIGENCE BASED VIRTUAL EXAM CONTROLLER | Nil | Application |
534 | WEB TECHNOLOGY | DOTNET | CLIENT SERVER BASED LIVE MEETING | Nil | Application |
535 | WEB TECHNOLOGY | DOTNET | WEB BASED LEARNER AND TRAINER | Nil | Application |
536 | WEB TECHNOLOGY | DOTNET | REAL-ESTATE AUTOMATION | Nil | Application |
537 | WEB TECHNOLOGY | DOTNET | LOGIN TO LOGOUT AUTHENTICATION FOR ONLINE TRANSACTIONS | Nil | Application |
538 | WEB TECHNOLOGY | DOTNET | MULTI PURPOSE CENTRALIZED ID CARD | Nil | Application |
539 | WEB TECHNOLOGY | DOTNET | ONLINE EVALUATION AND RESULT PRODUCTION SYSTEM | Nil | Application |
540 | WEB TECHNOLOGY | DOTNET | COLLEGE WEB PORTAL | Nil | Application |
541 | WEB TECHNOLOGY | DOTNET | ONLINE GIFT SHOP | Nil | Application |
542 | WEB TECHNOLOGY | DOTNET | GLOBAL FUND MANAGEMENT | Nil | Application |
543 | WEB TECHNOLOGY | DOTNET | CAR CARE(service) | Nil | Application |
544 | WEB TECHNOLOGY | DOTNET | VIVAHA CHAMBER(marriage) | Nil | Application |
545 | WEB TECHNOLOGY | DOTNET | E PROCUREMENT SYSTEM | Nil | Application |
546 | WEB TECHNOLOGY | DOTNET | GLOBAL SQL EDITOR | Nil | Application |
547 | WEB TECHNOLOGY | DOTNET | HELP DESK FOR TICKET MANAGEMENT | Nil | Application |
548 | WEB TECHNOLOGY | DOTNET | ONLINE TAX INFORMATION SYSTEM | Nil | Application |
549 | WEB TECHNOLOGY | DOTNET | SPEED CASH MAINTENANCE | Nil | Application |
550 | WEB TECHNOLOGY | DOTNET | TOURIST MANAGEMENT SYSTEM | Nil | Application |
551 | WEB TECHNOLOGY | DOTNET | ONLINE BUS TICKET BOOKING | Nil | Application |
552 | WEB TECHNOLOGY | DOTNET | MULTIPLE PASSWORD AUTHENTICATION USING ASP.NET | Nil | Application |
553 | WEB TECHNOLOGY | DOTNET | MAIL SERVER DEVELOPMENT | Nil | Application |
554 | WEB TECHNOLOGY | DOTNET | OPTIMIZING AGRICULTURAL DATA | Nil | Application |
555 | WEB TECHNOLOGY | DOTNET | ONLINE PHOTO ALBUM | Nil | Application |
556 | WEB TECHNOLOGY | DOTNET | WEB TRAFFIC ANALYZER | Nil | Application |
557 | WEB TECHNOLOGY | DOTNET | VEHICLE INSURANCE MANAGEMENT SYSTEM | Nil | Application |
558 | WEB TECHNOLOGY | DOTNET | WEB BASED MACHINE LEARNING APPROACH FOR IDENTIFYING | Nil | Application |
559 | WEB TECHNOLOGY | DOTNET | DISEASE-TREATMENT | Nil | Application |
560 | WEB TECHNOLOGY | DOTNET | DETECTION OF PHISHING WEBSITES | Nil | Application |
561 | WEB TECHNOLOGY | DOTNET | AVOIDING DATA REDUNDANCY USING XML | Nil | Application |
562 | WEB TECHNOLOGY | DOTNET | ASSET MANAGEMENT | Nil | Application |
563 | WEB TECHNOLOGY | DOTNET | SMART START FOR KIDS(kids activity drawing) | Nil | Application |
564 | WEB TECHNOLOGY | DOTNET | TIME ZONE(clock show room) | Nil | Application |
565 | WEB TECHNOLOGY | DOTNET | GEOGRAPHIC WEB SEARCH ENGINE | Nil | Application |
566 | WEB TECHNOLOGY | DOTNET | NEW APPROACH FOR PRIVACY PRESERVING DATA PUBLISHING | Nil | Application |
567 | WEB TECHNOLOGY | DOTNET | IDENTIFYING MISBEHAVIOR USER IN WEBSITE | Nil | Application |
568 | WEB TECHNOLOGY | DOTNET | WEB BASED PLACEMENT CELL | Nil | Application |
569 | WEB TECHNOLOGY | DOTNET | ONLINE BIKE SHOW ROOM | Nil | Application |
570 | WEB TECHNOLOGY | DOTNET | SPA TREATS(parlour) | Nil | Application |
571 | WEB TECHNOLOGY | DOTNET | ONLINE SHOPPING HANDICRAFTS & JWELLERY | Nil | Application |
572 | WEB TECHNOLOGY | DOTNET | ONLINE TREKKING UPDATE SYSTEM | Nil | Application |
573 | WEB TECHNOLOGY | DOTNET | WEB BASED CAFETERIA ORDERING SYSTEM | Nil | Application |
574 | WEB TECHNOLOGY | DOTNET | WEB ORGANIC SUPPLY | Nil | Application |
575 | WEB TECHNOLOGY | DOTNET | E-GAS AGENCY AUTOMATION | Nil | Application |
576 | WEB TECHNOLOGY | DOTNET | ONLINE APTITUDE TEST SYSTEM | Nil | Application |
577 | WEB TECHNOLOGY | DOTNET | VEHICLE REGISTRATION AND LICENSE SYSTEM | Nil | Application |
578 | WEB TECHNOLOGY | DOTNET | PREVENTION OF DATA LEAKERS IN SPARTIAL DOMAIN | IEEE | IEEE |
579 | WEB TECHNOLOGY | DOTNET | INFORMATION-THEORETIC OUTLIER DETECTION FOR LARGE-SCALE CATEGORICAL DATA | IEEE | IEEE |
580 | WEB TECHNOLOGY | DOTNET | ORGANIZING USER SEARCH HISTORIES | IEEE | IEEE |
581 | WEB TECHNOLOGY | DOTNET | A MACHINE LEARNING APPROACH FOR IDENTIFYING DISEASE-TREATMENT RELATIONS IN SHORT TEXTS | IEEE | IEEE |
582 | WEB TECHNOLOGY | DOTNET | SERVICE-CENTRIC FRAMEWORK FOR A DIGITAL GOVERNMENT APPLICATION | IEEE | IEEE |
583 | WEB TECHNOLOGY | DOTNET | DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS | IEEE | IEEE |
584 | WEB TECHNOLOGY | DOTNET | CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION | IEEE | IEEE |
585 | WEB TECHNOLOGY | DOTNET | SLICING: A NEW APPROACH FOR PRIVACY PRESERVING DATA PUBLISHING | IEEE | IEEE |
586 | WEB TECHNOLOGY | DOTNET | SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING | IEEE | IEEE |
587 | WEB TECHNOLOGY | DOTNET | PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM | IEEE | IEEE |
588 | WEB TECHNOLOGY | DOTNET | FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS | IEEE | IEEE |
589 | WEB TECHNOLOGY | DOTNET | MINING USER QUERIES WITH MARKOV CHAINS: APPLICATION TO ONLINE IMAGE RETRIEVAL | IEEE | IEEE |
590 | WEB TECHNOLOGY | DOTNET | A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONS | IEEE | IEEE |
591 | WEB TECHNOLOGY | DOTNET | ANOMALY DETECTION VIA ONLINE OVERSAMPLING PRINCIPAL COMPONENT ANALYSIS | IEEE | IEEE |
592 | WEB TECHNOLOGY | DOTNET | A SECURE DATA SELF-DESTRUCTING SCHEME IN CLOUD COMPUTING | IEEE | IEEE |
593 | APPLICATION | PHP | CUSTOMER RELATIONSHIP MANAGEMENT | Nil | APPLICATION |
594 | APPLICATION | PHP | WEB BASED REAL ESTATE MANAGEMENT SYSTEM | Nil | APPLICATION |
595 | APPLICATION | PHP | VIRTUAL JOB PORTAL | Nil | APPLICATION |
596 | APPLICATION | PHP | BLOOD BANK ORGANIZATION | Nil | APPLICATION |
597 | APPLICATION | PHP | SHOPPING CART USING CRYPTOGRAPHY | Nil | APPLICATION |
598 | APPLICATION | PHP | E-CLINIC | Nil | APPLICATION |
599 | APPLICATION | PHP | E-TOURISM | Nil | APPLICATION |
600 | APPLICATION | PHP | ONLINE TENDER ALLOCATION | Nil | APPLICATION |
601 | APPLICATION | PHP | TWO SERVER PASSWORD AUTHENTICATION | Nil | APPLICATION |
602 | APPLICATION | PHP | SHOPPING CART | Nil | APPLICATION |
603 | APPLICATION | PHP | CLASSIFIEDS | Nil | APPLICATION |
604 | APPLICATION | PHP | STUDENT INDUSTRIA INTERNSHIP WEB PORTAL | Nil | APPLICATION |
605 | APPLICATION | PHP | DIGITAL LIBRARY SYSTEM | Nil | APPLICATION |
606 | APPLICATION | PHP | STUDENT ATTENDANCE MAINTENANCE SYSTEM | Nil | APPLICATION |
607 | APPLICATION | PHP | SOCIAL NETWORKING | Nil | APPLICATION |
608 | APPLICATION | PHP | ONLINE JEWELLERY STORE | Nil | APPLICATION |
609 | APPLICATION | PHP | POWER BILL MONITORING SYSTEM | Nil | APPLICATION |
610 | APPLICATION | PHP | CREDIT CARD FRAUD DETECTION | Nil | APPLICATION |
611 | APPLICATION | PHP | WEB BASED MACHINE LEARNING APPROACH FOR IDENTIFYING DISEASE-TREATMENT | Nil | APPLICATION |
612 | APPLICATION | PHP | WEB USAGE MINING | Nil | APPLICATION |
613 | APPLICATION | PHP | MAIL TRACKING | Nil | APPLICATION |
614 | APPLICATION | PHP | MY SMART PRICE | Nil | APPLICATION |
615 | APPLICATION | PHP | FOOD PANDA | Nil | APPLICATION |
616 | APPLICATION | PHP | AUTOMATIC CERTIFICATE GENERATION | Nil | APPLICATION |
617 | APPLICATION | PHP | OOTACUMAND MITHOIÆS INTRANET POTLET | Nil | APPLICATION |
618 | APPLICATION | PHP | ONLINE FROZEN FOOD WEB PORTAL DEVELOPMENT | Nil | APPLICATION |
619 | APPLICATION | PHP | WEB PORTAL FOR AGRICULTURE PRODUCT | Nil | APPLICATION |
620 | APPLICATION | PHP | TIME SHEET MANAGEMENT | Nil | APPLICATION |
621 | APPLICATION | PHP | ONLINE BOOK SHOP | Nil | APPLICATION |
622 | APPLICATION | PHP | ONLINE LAPTOP SALES | Nil | APPLICATION |
623 | APPLICATION | PHP | ONLINE COUNSELING SYSTEM | Nil | APPLICATION |
624 | APPLICATION | PHP | ONLINE EYE TEST | Nil | APPLICATION |
625 | APPLICATION | PHP | ONLINE COLLEGE ADMISSION SYSTEM | Nil | APPLICATION |
626 | APPLICATION | PHP | ONLINE VEHICLE WORK SHOP | Nil | APPLICATION |
627 | APPLICATION | PHP | HOTEL BOKING AND RESERVATION | Nil | APPLICATION |
628 | APPLICATION | PHP | ENHANCING VIRTUAL INTRANET SERVER PERFORMANCE IN OFFLINE AND ONLINE MODE | Nil | APPLICATION |
629 | APPLICATION | PHP | EVENT MANAGEMENT FOR COLLEGE | Nil | APPLICATION |
630 | APPLICATION | PHP | CIBIL REGISTRY | Nil | APPLICATION |
631 | APPLICATION | PHP | ACADEMIC SEARCH ENGINE | Nil | APPLICATION |
632 | APPLICATION | PHP | ASSET MANAGEMENT SYSTEM ( HOSPITALS ECG) | Nil | APPLICATION |
633 | APPLICATION | PHP | BUSINESS PROCESS AUTOMATION | Nil | APPLICATION |
634 | APPLICATION | PHP | DOCUMENT MANAGEMENT SYSTEM | Nil | APPLICATION |
635 | APPLICATION | PHP | EMPLOYEE PERFORMANCE AND REWARDING | Nil | APPLICATION |
636 | APPLICATION | PHP | EXAMINATION HALL ALLOTMENT PORTAL | Nil | APPLICATION |
637 | APPLICATION | PHP | LOGISTICS AUTOMATION SYSTEM | Nil | APPLICATION |
638 | APPLICATION | PHP | TELE MARKETING AND CRM | Nil | APPLICATION |
639 | APPLICATION | PHP | TRUST MANAGEMENT | Nil | APPLICATION |
640 | APPLICATION | PHP | CLINICAL LABORATORY MANAGEMENT SYSTEM | Nil | APPLICATION |
641 | APPLICATION | PHP | CITY BUS MANAGEMENT SYSTEM | Nil | APPLICATION |
642 | APPLICATION | PHP | TRAVEL AND TOURISM MANAGEMENT | Nil | APPLICATION |
643 | APPLICATION | PHP | SEARCH ENGINE FOR ALUMNI OF THE COLLEGE | Nil | APPLICATION |
644 | APPLICATION | PHP | WEB BASED MEETING SCHEDULER | Nil | APPLICATION |
645 | APPLICATION | PHP | LIVE NEWS PORTAL | Nil | APPLICATION |
646 | APPLICATION | PHP | ONLINE HOME REMEDY | Nil | APPLICATION |
647 | APPLICATION | PHP | TECHNO TASK | Nil | APPLICATION |
648 | APPLICATION | PHP | AUTOMATIC VISITING CARD GENERATION | Nil | APPLICATION |
649 | APPLICATION | ANDROID | ANDROID APP FOR BLIND PEOPLE | Nil | APPLICATION |
650 | APPLICATION | ANDROID | DROIDDETECTOR: ANDROIDMALWARECHARACTERIZATIONANDDETECTION USINGDEEPLEARNING | Nil | APPLICATION |
651 | APPLICATION | ANDROID | ANDROID APPLICATION FOR CALL TAXI BOOKING | Nil | APPLICATION |
652 | APPLICATION | ANDROID | LOCATION TRACKING USING MAP | Nil | APPLICATION |
653 | APPLICATION | ANDROID | SMART CITY TRAVELER | Nil | APPLICATION |
654 | APPLICATION | ANDROID | CAR RENTAL SYSTEM IN ANDROID | Nil | APPLICATION |
655 | APPLICATION | ANDROID | WIRELESS MONITORING OF ENDOGENOUS AND EXOGENOUS BIOMOLECULES ON AN ANDROIDTM INTERFACE | Nil | APPLICATION |
656 | APPLICATION | ANDROID | SECURITY IN CLOUDCOMPUTING-BASED MOBILE HEALTH | Nil | APPLICATION |
657 | APPLICATION | ANDROID | COLLEGE INFO SHARING USING ANDROID | Nil | APPLICATION |
658 | APPLICATION | ANDROID | ANDROID BASED DOCTOR APPOINTMENT FIXING | Nil | APPLICATION |
659 | APPLICATION | ANDROID | ANDROID BASED PUBLIC LIBRARY BOOKING APP | Nil | APPLICATION |
660 | APPLICATION | ANDROID | PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR SOCIAL NETWORKS | Nil | APPLICATION |
661 | APPLICATION | ANDROID | DESIGNING A SECURE EXAM MANAGEMENT SYSTEM (SEMS) FOR M-LEARNING ENVIRONMENTS | Nil | APPLICATION |
662 | APPLICATION | ANDROID | AUTHENTICATION OF SMARTPHONE USERS USING BEHAVIORAL BIOMETRICS | Nil | APPLICATION |
663 | APPLICATION | ANDROID | CONTEXT-BASED ACCESS CONTROL SYSTEMS FOR MOBILE DEVICES | Nil | APPLICATION |
664 | APPLICATION | ANDROID | A PRIVACY-PRESERVING FRAMEWORK FOR MANAGING MOBILE AD REQUESTS AND BILLING INFORMATION | Nil | APPLICATION |
665 | APPLICATION | ANDROID | EFFICIENT NOTIFICATION OF MEETING POINTS FOR MOVING GROUPS VIA INDEPENDENT SAFE REGIONS | Nil | APPLICATION |
666 | APPLICATION | ANDROID | REAL-TIME CITY-SCALE TAXI RIDESHARING | Nil | APPLICATION |
667 | APPLICATION | ANDROID | AUTHENTICATING LOCATION-BASED SKYLINE QUERIES IN ARBITRARY SUBSPACES | Nil | APPLICATION |
668 | APPLICATION | ANDROID | EASY SMS: A PROTOCOL FOR END-TO-END SECURE TRANSMISSION OF SMS | Nil | APPLICATION |
669 | APPLICATION | ANDROID | PRIVACY-PRESERVING OPTIMAL MEETING LOCATION DETERMINATION ON MOBILE DEVICES | Nil | APPLICATION |
670 | APPLICATION | ANDROID | DYNAMIC AUTHENTICATION WITH SENSORY INFORMATION FOR THE ACCESS CONTROL SYSTEMS | Nil | APPLICATION |
671 | APPLICATION | ANDROID | FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS | Nil | APPLICATION |
672 | APPLICATION | ANDROID | HOW LONG TO WAIT? PREDICTING BUS ARRIVAL TIME WITH MOBILE PHONE BASED PARTICIPATORY SENSING | Nil | APPLICATION |
673 | APPLICATION | ANDROID | PRE BOOKING FOR CAR PARKING SPACE IN A SHOPPING MALL | Nil | APPLICATION |
674 | APPLICATION | ANDROID | SAFE DRIVING USING MOBILE PHONES | Nil | APPLICATION |
675 | APPLICATION | ANDROID | ANDROID BASED PC CONTROL SYSTEM | Nil | APPLICATION |
676 | APPLICATION | ANDROID | CAR POOLING | Nil | APPLICATION |
677 | APPLICATION | ANDROID | STUDENT ATTENDANCE MANAGEMENT SYSTEM USING ANDROID | Nil | APPLICATION |
678 | APPLICATION | ANDROID | WIFI CHAT | Nil | APPLICATION |
679 | APPLICATION | ANDROID | REMOTE PATIENT MONITORING | Nil | APPLICATION |
680 | APPLICATION | ANDROID | COMPUTER AIDED EMERGENCY SERVICE SYSTEM | Nil | APPLICATION |
681 | APPLICATION | ANDROID | BUSINESS CARD MANAGER | Nil | APPLICATION |
682 | APPLICATION | ANDROID | EVENT MANAGEMENT SYSTEM | Nil | APPLICATION |
683 | APPLICATION | ANDROID | FOOD FEAST | Nil | APPLICATION |
684 | APPLICATION | ANDROID | GROCERIES CONSORTIUM SCHEME | Nil | APPLICATION |
685 | APPLICATION | ANDROID | HEALTH CARE PLUS | Nil | APPLICATION |
686 | APPLICATION | ANDROID | INSTITUTE ERP SYSTEM | Nil | APPLICATION |
687 | APPLICATION | ANDROID | COLLEGE MAP NAVIGATOR | Nil | APPLICATION |
688 | APPLICATION | ANDROID | MOBILE TRACKING USING ANDROID | Nil | APPLICATION |
689 | APPLICATION | ANDROID | ANDROID APP FOR NEW BORN BABY CARE | Nil | APPLICATION |
690 | APPLICATION | ANDROID | ANDROID BASED DOCTOR APPOINTMENT FIXING | Nil | APPLICATION |
691 | APPLICATION | ANDROID | ANDROID APPS FOR PREGNANT WOMENS | Nil | APPLICATION |
692 | APPLICATION | ANDROID | ANDROID APP FOR PREMIUM CALCULATOR | Nil | APPLICATION |
693 | APPLICATION | ANDROID | REMOTE PATIENT MONITORING SYSTEM | Nil | APPLICATION |
694 | APPLICATION | ANDROID | TAB BOOK | Nil | APPLICATION |
695 | APPLICATION | ANDROID | AN ANDROID BASED EFFICIENT SPEECH SYNTHESIS TECHNIQUE | Nil | APPLICATION |
696 | NETWORKING | JAVA | TA-UPDATE: AN ADAPTIVE UPDATE SCHEME WITH TREE-STRUCTURED TRANSMISSION IN ERASURE-CODED STORAGE SYSTEMS | 2018 | IEEE |
697 | NETWORKING | JAVA | EFFICIENT PERFORMANCE-CENTRIC BANDWIDTH ALLOCATION WITH FAIRNESS TRADEOFF | 2018 | IEEE |
698 | NETWORKING | JAVA | LIST-SCHEDULING VERSUS CLUSTER-SCHEDULING | 2018 | IEEE |
699 | NETWORKING | JAVA | SECURE KEY AGREEMENT AND KEY PROTECTION FOR MOBILE DEVICE USER AUTHENTICATION | 2018 | IEEE |
700 | NETWORKING | JAVA | TRANSACTIONAL BEHAVIOR VERIFICATION IN BUSINESS PROCESS AS A SERVICE CONFIGURATION | 2018 | IEEE |
701 | NETWORKING | JAVA | A DELAYED CONTAINER ORGANIZATION APPROACH TO IMPROVE RESTORE SPEED FOR DEDUPLICATION SYSTEMS | 2019 | IEEE |
702 | NETWORKING | JAVA | EFFICIENT FILE SEARCH IN DELAY TOLERANT NETWORKS WITH SOCIAL CONTENT AND CONTACT AWARENESS | 2019 | IEEE |
703 | NETWORKING | JAVA | NEIGHBOR DISCOVERY IN WIRELESS NETWORKS WITH MULTIPACKET RECEPTION | 2017 | IEEE |
704 | NETWORKING | JAVA | AN ENERGY-EFFICIENT AND DELAY-AWARE WIRELESS COMPUTING SYSTEM FOR INDUSTRIAL WIRELESS SENSOR NETWORK | 2017 | IEEE |
705 | NETWORKING | JAVA | MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING | 2016 | IEEE |
706 | NETWORKING | JAVA | LIGHTWEIGHT PRIVACY-PRESERVING AND SECURE COMMUNICATION PROTOCOL FOR HYBRID AD HOC WIRELESS NETWORKS | 2016 | IEEE |
707 | NETWORKING | JAVA | A QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL FOR HYBRID WIRELESS NETWORKS | 2016 | IEEE |
708 | NETWORKING | JAVA | FAULT TOLERANCE MANAGEMENT IN CLOUD COMPUTING: A SYSTEM-LEVEL PERSPECTIVE | 2016 | IEEE |
709 | NETWORKING | JAVA | RELAY SELECTION FOR GEOGRAPHICAL FORWARDING IN SLEEP-WAKE CYCLING WIRELESS SENSOR NETWORKS | 2016 | IEEE |
710 | NETWORKING | JAVA | A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURE DATA FORWARDING | 2016 | IEEE |
711 | NETWORKING | JAVA | RCDA: RECOVERABLE CONCEALED DATA AGGREGATION FOR DATA INTEGRITY IN WIRELESS SENSOR NETWORKS | 2016 | IEEE |
712 | NETWORKING | JAVA | TOPOLOGY ENHANCEMENTS IN WIRELESS MULTIHOP NETWORKS: A TOP-DOWN APPROACH | 2016 | IEEE |
713 | NETWORKING | JAVA | SLEEP SCHEDULING FOR CRITICAL EVENT MONITORING IN WIRELESS SENSOR NETWORKS | 2016 | IEEE |
714 | DATA MINING | JAVA | SDE: A NOVEL CLUSTERING FRAMEWORK BASED ON SPARSITY-DENSITY ENTROPY | 2018 | IEEE |
715 | DATA MINING | JAVA | A TWO-PHASE ALGORITHM FOR DIFFERENTIALLY PRIVATE FREQUENT SUBGRAPH MINING | 2018 | IEEE |
716 | DATA MINING | JAVA | DIFFERENTIALLY PRIVATE DISTRIBUTED ONLINE LEARNING | 2018 | IEEE |
717 | DATA MINING | JAVA | USER VITALITY RANKING AND PREDICTION IN SOCIAL NETWORKING SERVICES: A DYNAMIC NETWORK PERSPECTIVE | 2018 | IEEE |
718 | DATA MINING | JAVA | ENHANCING BINARY CLASSIFICATION BY MODELING UNCERTAIN BOUNDARY IN THREE-WAY DECISIONS | 2018 | IEEE |
719 | DATA MINING | JAVA | CROWDSOURCED COVERAGE AS A SERVICE: TWO-LEVEL COMPOSITION OF SENSOR CLOUD SERVICES | 2017 | IEEE |
720 | DATA MINING | JAVA | HIERARCHICAL MULTI-CLUE MODELLING FOR POI POPULARITY PREDICTION WITH HETEROGENEOUS TOURIST INFORMATION | 2017 | IEEE |
721 | DATA MINING | JAVA | FINDING OPTIMAL SKYLINE PRODUCT COMBINATIONS UNDER PRICE PROMOTION | 2017 | IEEE |
722 | DATA MINING | JAVA | HETEROGENEOUS ARCHITECTURES FOR BIG DATA BATCH PROCESSING IN MAPREDUCE PARADIGM | 2019 | IEEE |
723 | DATA MINING | JAVA | ON SCALABLE AND ROBUST TRUTH DISCOVERY IN BIG DATA SOCIAL MEDIA SENSING APPLICATIONS | 2019 | IEEE |
724 | DATA MINING | JAVA | LARS: AN EFFICIENT AND SCALABLE LOCATION-AWARE RECOMMENDER SYSTEM | 2019 | IEEE |
725 | DATA MINING | JAVA | USING PERSONALIZATION TO IMPROVE XML RETRIEVAL | 2019 | IEEE |
726 | DATA MINING | JAVA | TOP-K QUERY RESULT COMPLETENESS VERIFICATION IN TIERED SENSOR NETWORKS | 2016 | IEEE |
727 | DATA MINING | JAVA | A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSN USER WALLS | 2016 | IEEE |
728 | DATA MINING | JAVA | A METHODOLOGY FOR DIRECT AND INDIRECT DISCRIMINATION PREVENTION IN DATA MINING | 2016 | IEEE |
729 | DATA MINING | JAVA | A PROBABILISTIC SCHEME FOR KEYWORD-BASED INCREMENTAL QUERYCONSTRUCTION | 2015 | IEEE |
730 | DATA MINING | JAVA | EVALUATING PATH QUERIES OVER FREQUENTLY UPDATED ROUTE COLLECTIONS | 2015 | IEEE |
731 | MOBILE COMPUTING | JAVA | MULTI-CLIENT FILE DOWNLOAD TIME REDUCTION FROM CLOUD/FOG STORAGE SERVERS | 2018 | IEEE |
732 | MOBILE COMPUTING | JAVA | BANDWIDTH-SATISFIED AND CODING-AWARE MULTICAST PROTOCOL IN MANETS | 2018 | IEEE |
733 | MOBILE COMPUTING | JAVA | NODE-BASED SERVICE-BALANCED SCHEDULING FOR PROVABLY GUARANTEED THROUGHPUT AND EVACUATION TIME PERFORMANCE | 2018 | IEEE |
734 | MOBILE COMPUTING | JAVA | PRIVACY-PRESERVING CROWD-SOURCED STATISTICAL DATA PUBLISHING WITH AN UNTRUSTED SERVER | 2018 | IEEE |
735 | MOBILE COMPUTING | JAVA | PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS | 2018 | IEEE |
736 | MOBILE COMPUTING | JAVA | TO STAY OR TO SWITCH: MULTIUSER MULTI-CHANNEL DYNAMIC ACCESS | 2019 | IEEE |
737 | MOBILE COMPUTING | JAVA | COOPERATIVE LOAD BALANCING AND DYNAMIC CHANNEL ALLOCATION FOR CLUSTER-BASED MOBILE AD HOC NETWORKS | 2016 | IEEE |
738 | MOBILE COMPUTING | JAVA | A PRIVACY-PRESERVING ATTRIBUTE-BASED AUTHENTICATION SYSTEM FOR MOBILE HEALTH NETWORKS | 2016 | IEEE |
739 | MOBILE COMPUTING | JAVA | A QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL FOR HYBRID WIRELESS NETWORKS | 2016 | IEEE |
740 | MOBILE COMPUTING | JAVA | ENERGY-EFFICIENT RELIABLE ROUTING CONSIDERING RESIDUAL ENERGY IN WIRELESS AD HOC NETWORKS | 2016 | IEEE |
741 | MOBILE COMPUTING | JAVA | SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS | 2016 | IEEE |
742 | MOBILE COMPUTING | JAVA | DISCOVERY AND VERIFICATION OF NEIGHBOR POSITIONS IN MOBILE AD HOC NETWORKS | 2016 | IEEE |
743 | MOBILE COMPUTING | JAVA | VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS | 2016 | IEEE |
744 | MOBILE COMPUTING | JAVA | HANDLING SELFISHNESS IN REPLICA ALLOCATION OVER A MOBILE AD HOC NETWORK | 2016 | IEEE |
745 | NETWORK SECURITY | JAVA | SECURE INDUCTIVE-COUPLED NEAR FIELD COMMUNICATION AT PHYSICAL LAYER | 2018 | IEEE |
746 | NETWORK SECURITY | JAVA | SECRET GROUP-KEY GENERATION AT PHYSICAL LAYER FOR MULTI-ANTENNA MESH TOPOLOGY | 2018 | IEEE |
747 | NETWORK SECURITY | JAVA | BOUNDARIES AS AN ENHANCEMENT TECHNIQUE FOR PHYSICAL LAYER SECURITY | 2018 | IEEE |
748 | NETWORK SECURITY | JAVA | INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANALYTICS AND TWITTER METADATA | 2018 | IEEE |
749 | NETWORK SECURITY | JAVA | WIRELESS COMMUNICATIONS UNDER BROADBAND REACTIVE JAMMING ATTACKS | 2018 | IEEE |
750 | NETWORK SECURITY | JAVA | PROFILING ONLINE SOCIAL BEHAVIORS FOR COMPROMISED ACCOUNT DETECTION | 2016 | IEEE |
751 | NETWORK SECURITY | JAVA | SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF COLLUSION ATTACKS | 2016 | IEEE |
752 | NETWORK SECURITY | JAVA | A HYBRID SCHEME OF PUBLIC-KEY ENCRYPTION AND SOMEWHAT HOMOMORPHIC ENCRYPTION | 2016 | IEEE |
753 | NETWORK SECURITY | JAVA | MARLIN: MITIGATING CODE REUSE ATTACKS USING CODE RANDOMIZATION | 2015 | IEEE |
754 | NETWORK SECURITY | JAVA | TIME-DELAYED BROADCASTING FOR DEFEATING INSIDE JAMMERS | 2015 | IEEE |
755 | NETWORK SECURITY | JAVA | A LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS | 2015 | IEEE |
756 | NETWORK SECURITY | JAVA | MIO: ENHANCING WIRELESS COMMUNICATIONS SECURITY THROUGH PHYSICAL LAYER MULTIPLE INTER-SYMBOL OBFUSCATION | 2015 | IEEE |
757 | NETWORK SECURITY | JAVA | HOP-BY-HOP MESSAGE AUTHENTICATION AND SOURCE PRIVACY IN WIRELESS SENSOR NETWORKS | 2015 | IEEE |
758 | NETWORK SECURITY | JAVA | OPTIMAL PROBABILISTIC ENCRYPTION FOR SECURE DETECTION IN WIRELESS SENSOR NETWORKS | 2014 | IEEE |
759 | NETWORK SECURITY | JAVA | A LIGHTWEIGHT ENCRYPTION SCHEME FOR NETWORK-CODED MOBILE ADHOC NETWORKS | 2014 | IEEE |
760 | NETWORK SECURITY | JAVA | SYBIL BELIEF: A SEMI-SUPERVISED LEARNING APPROACH FOR STRUCTURE- BASED SYBIL DETECTION | 2014 | IEEE |
761 | NETWORK SECURITY | JAVA | A SECURE PAYMENT SCHEME WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTI HOP WIRELESS NETWORKS | 2014 | IEEE |
762 | NETWORK SECURITY | JAVA | SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS | 2014 | IEEE |
763 | CLOUD COMPUTING | JAVA | DROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY | 2018 | IEEE |
764 | CLOUD COMPUTING | JAVA | PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA STORAGE IN THE CLOUD | 2018 | IEEE |
765 | CLOUD COMPUTING | JAVA | A FAULT-TOLERANT FRAMEWORK FOR ASYNCHRONOUS ITERATIVE COMPUTATIONS IN CLOUD ENVIRONMENTS | 2018 | IEEE |
766 | CLOUD COMPUTING | JAVA | A SCALABLE DATA CHUNK SIMILARITY BASED COMPRESSION APPROACH FOR EFFICIENT BIG SENSING DATA PROCESSING ON CLOUD | 2018 | IEEE |
767 | CLOUD COMPUTING | JAVA | SELF-ADJUSTING SLOT CONFIGURATIONS FOR HOMOGENEOUS AND HETEROGENEOUS HADOOP CLUSTERS | 2018 | IEEE |
768 | CLOUD COMPUTING | JAVA | OPTIMIZING CLOUD-SERVICE PERFORMANCE: EFFICIENT RESOURCE PROVISIONING VIA OPTIMAL WORKLOAD ALLOCATION | 2017 | IEEE |
769 | CLOUD COMPUTING | JAVA | A MODIFIED HIERARCHICAL ATTRIBUTE-BASED ENCRYPTION ACCESS CONTROL METHOD FOR MOBILE CLOUD COMPUTING | 2017 | IEEE |
770 | CLOUD COMPUTING | JAVA | ENABLING AUTHORIZED ENCRYPTED SEARCH FOR MULTI-AUTHORITY MEDICAL DATABASES | 2017 | IEEE |
771 | CLOUD COMPUTING | JAVA | AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING | 2019 | IEEE |
772 | CLOUD COMPUTING | JAVA | A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION | 2019 | IEEE |
773 | CLOUD COMPUTING | JAVA | ATTRIBUTE-BASED ENCRYPTION WITH EFFICIENT VERIFIABLE OUTSOURCED DECRYPTION | 2016 | IEEE |
774 | CLOUD COMPUTING | JAVA | DROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY | 2016 | IEEE |
775 | CLOUD COMPUTING | JAVA | DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS | 2016 | IEEE |
776 | CLOUD COMPUTING | JAVA | KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE | 2016 | IEEE |
777 | CLOUD COMPUTING | JAVA | KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE | 2016 | IEEE |
778 | CLOUD COMPUTING | JAVA | PRIVACY-PRESERVING OPTIMAL MEETING LOCATION DETERMINATION ON MOBILE DEVICES | 2016 | IEEE |
779 | CLOUD COMPUTING | JAVA | AN EFFICIENT CERTIFICATELESS ENCRYPTION FOR SECURE DATA SHARING IN PUBLIC CLOUDS | 2016 | IEEE |
780 | CLOUD COMPUTING | JAVA | A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURE DATA FORWARDING | 2016 | IEEE |
781 | CLOUD COMPUTING | JAVA | ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD | 2016 | IEEE |
782 | CLOUD COMPUTING | JAVA | ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS | 2016 | IEEE |
783 | CLOUD COMPUTING | JAVA | FOR STORAGE SECURITY IN CLOUD COMPUTING | 2016 | IEEE |
784 | APPLICATION | JAVA | MIDDLEWARE SERVICES FOR DYNAMIC CLUSTERING OF APPLICATION SERVERS | Nil | APPLICATION |
785 | APPLICATION | JAVA | SERIAL COMMUNICATION NETWORK SHARING | Nil | APPLICATION |
786 | APPLICATION | JAVA | ORDERING TRACKING SYSTEM | Nil | APPLICATION |
787 | APPLICATION | JAVA | NETWORK BROWSER IN JAVA | Nil | APPLICATION |
788 | APPLICATION | JAVA | VIRTUAL QUERY BUILDER | Nil | APPLICATION |
789 | APPLICATION | JAVA | STOCK MANAGEMENT CONTROL | Nil | APPLICATION |
790 | APPLICATION | JAVA | SECURE DISTRIBUTED BANKING | Nil | APPLICATION |
791 | APPLICATION | JAVA | ADHOC NETWORK USING LAR PROTOCOL | Nil | APPLICATION |
792 | APPLICATION | JAVA | SINGLE SOURCE SHORTEST PATH ALGORITHM | Nil | APPLICATION |
793 | APPLICATION | JAVA | WEB MINING | Nil | APPLICATION |
794 | APPLICATION | JAVA | JAVA WEB PORT FOR STORAGE SYSTEM | Nil | APPLICATION |
795 | APPLICATION | JAVA | ONLINE LENDING PROCESS | Nil | APPLICATION |
796 | APPLICATION | JAVA | COUNTRYWIDE LICENSE SCHEME | Nil | APPLICATION |
797 | APPLICATION | JAVA | CONSTRAINED NEAREST NEIGHBOUR QUERIES | Nil | APPLICATION |
798 | APPLICATION | JAVA | MAINTAING DATA PRIVACY IN ASSOCIATION RULE MINING | Nil | APPLICATION |
799 | APPLICATION | JAVA | EFFICIENT APPROXIMATE QUERY PROCESSING IN PEER-TO-PEER NETWORKS | Nil | APPLICATION |
800 | APPLICATION | JAVA | DYNAMIC SOFTWARE LOAD BALANCING | Nil | APPLICATION |
801 | APPLICATION | JAVA | FACE RECOGNITION | Nil | APPLICATION |
802 | APPLICATION | JAVA | ONLINE HANDWRITTEN SCRIPT RECOGNITION | Nil | APPLICATION |
803 | APPLICATION | JAVA | AN ACKNOWLEDGMENT BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOR IN MANETS | Nil | APPLICATION |
804 | APPLICATION | JAVA | NETWORK TRAFFIC ANALYZER & CLUSTER CONTROL: | Nil | APPLICATION |
805 | APPLICATION | JAVA | DATA COMMUNICATION & AUTHENTICATION OVER INTRANET | Nil | APPLICATION |
806 | APPLICATION | JAVA | ONLINE SQL ENTERPRISE MANAGER | Nil | APPLICATION |
807 | APPLICATION | JAVA | DISTRIBUTED SERVER MAINTAING FOR THE UNIVERSITY MARK SYSTEM | Nil | APPLICATION |
808 | APPLICATION | JAVA | ONLINE BANKING SECURITY ANALYSIS | Nil | APPLICATION |
809 | APPLICATION | JAVA | INCORPORATED COLLEGE INFORMATION SYSTEM | Nil | APPLICATION |
810 | APPLICATION | JAVA | ONLINE PHARMACY MANAGEMENT SYSTEM | Nil | APPLICATION |
811 | APPLICATION | JAVA | ACCOMPLISHING ALTERNATIVE SERVER IN MOBILE NETWORK | Nil | APPLICATION |
812 | APPLICATION | JAVA | WEB CACHING AND PREFETCHING IN CLIENT-SIDE PROXIES | Nil | APPLICATION |
813 | APPLICATION | JAVA | MANAGEMENT INFORMATION SYSTEM | Nil | APPLICATION |
814 | APPLICATION | JAVA | WIRELESS TRAFFIC VIEWER | Nil | APPLICATION |
815 | APPLICATION | JAVA | PROVABLY SECURE THREE-PARTY AUTHENTICATED QUANTUM KEY DISTRIBUTION PROTOCOLS | Nil | APPLICATION |
816 | APPLICATION | JAVA | PROTECTED DATA TRANSMISSION | Nil | APPLICATION |
817 | APPLICATION | JAVA | PROACTIVE TREE RESCUEMENT | Nil | APPLICATION |
818 | APPLICATION | JAVA | ALLOTMENT OF WORK TIME | Nil | APPLICATION |
819 | APPLICATION | JAVA | RANDOMIZED PROTOCOLS FOR DUPLICATE ELIMINATION IN PEER-TO-PEER STORAGE SYSTEM | Nil | APPLICATION |
820 | APPLICATION | JAVA | A NEW TCP PERSISTENT PACKET RECORDING | Nil | APPLICATION |
821 | APPLICATION | JAVA | TIME MINIMIZATION IN FILE DOWNLOAD | Nil | APPLICATION |
822 | APPLICATION | JAVA | PROJECT MANAGEMENT SYSTEM | Nil | APPLICATION |
823 | APPLICATION | JAVA | LOAD DISTRIBUTION TO SERVERS | Nil | APPLICATION |
824 | APPLICATION | JAVA | ON SELFISH ROUTING IN INTERNET LIKE ENVIRONMENT | Nil | APPLICATION |
825 | APPLICATION | JAVA | WEB REPORT ORGANIZATION METHOD | Nil | APPLICATION |
826 | APPLICATION | JAVA | SELLING PRODUCTS THROUGH ONLINE WEB SHARING | Nil | APPLICATION |
827 | APPLICATION | JAVA | PHOTO SHARING | Nil | APPLICATION |
828 | APPLICATION | JAVA | A MEASUREMENT-BASED ANALYSIS OF MULTIHOMING | Nil | APPLICATION |
829 | APPLICATION | JAVA | ONLINE TENDER PROCESS | Nil | APPLICATION |
830 | APPLICATION | JAVA | ONLINE INSURANCE MANAGEMENT SYSTEM | Nil | APPLICATION |
831 | APPLICATION | JAVA | ONLINE JOB PORTAL MANAGEMENT SYSTEM | Nil | APPLICATION |
832 | APPLICATION | JAVA | BUISNESS MANAGEMENT SYSTEM | Nil | APPLICATION |
833 | APPLICATION | JAVA | ALUMINI ASSOCIATION | Nil | APPLICATION |
834 | APPLICATION | JAVA | ONLINE INSURANCE MANAGEMENT SYSTEM | Nil | APPLICATION |
835 | APPLICATION | JAVA | ONLINE JOB PORTAL MANAGEMENT SYSTEM | Nil | APPLICATION |
836 | APPLICATION | JAVA | HYPOTHETICAL DESCRIPTION OF A COMPLEX ENTITY FOR XML FRAMEWORK | Nil | APPLICATION |
837 | APPLICATION | JAVA | ANALYSIS FOR DETECTION OF WEB APPLICATION VULNERABILITES | Nil | APPLICATION |
838 | APPLICATION | JAVA | TO REDUCE EFFORT FOR TRACKING AND COORDINATION OF PROJECTS | Nil | APPLICATION |
839 | APPLICATION | JAVA | BANKING PROCESS USING MOBILE | Nil | APPLICATION |
840 | APPLICATION | JAVA | A SPECIFICATION-BASED INTRUSION DETECTION SYSTEM TO AODV | Nil | APPLICATION |
841 | APPLICATION | JAVA | NETWORK FORENSICS USING HONEYNETS | Nil | APPLICATION |
842 | APPLICATION | JAVA | MOBILE COMMUNICATION THROUGH WAP GATEWAY | Nil | APPLICATION |
843 | APPLICATION | JAVA | MOBILE TRAFFIC MANAGEMENT OF WIRELESS SENSOR NETWORK | Nil | APPLICATION |
844 | APPLICATION | JAVA | ONLINE FILE MANAGEMENT SYSTEM | Nil | APPLICATION |
845 | APPLICATION | JAVA | DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATION PROTOCOLS FOR DYNAMIC PEER GROUPS | Nil | APPLICATION |
846 | APPLICATION | JAVA | AN ADAPTIVE PROGRAMMING MODEL FOR FAULT-TOLERANT DISTRIBUTED COMPUTING | Nil | APPLICATION |
847 | APPLICATION | JAVA | ALUMINI ASSOCIATION | Nil | APPLICATION |
848 | APPLICATION | JAVA | BANKING PROCESS USING MOBILE | Nil | APPLICATION |
849 | APPLICATION | JAVA | WEB REPORT ORGANIZATION METHOD | Nil | APPLICATION |
850 | APPLICATION | JAVA | JAVA WEB PORT FOR STORAGE SYSTEM | Nil | APPLICATION |
851 | APPLICATION | JAVA | ONLINE LENDING PROCESS | Nil | APPLICATION |
852 | APPLICATION | JAVA | VIRTUAL RING NETWORK USING TCP-RING PROTOCOL | Nil | APPLICATION |
853 | APPLICATION | JAVA | IMPLEMENTING SIP FOR MOBILE APPLICATION & SUPER NETWORKING | Nil | APPLICATION |
854 | APPLICATION | JAVA | PERSONAL AUTHENTICATION USING 3-D FINGER GEOMETRY | Nil | APPLICATION |