Saturday, August 28, 2010

2008_IEEE_Project_Title_Base_Paper

1. Download Link: Click here to download file

http://rapidshare.com/files/415596690/2008_IEEE_Project_Title_Base_Paper.rar
MD5: 78A5BF827298D399D52529D5BCB8BF59

2009_IEEE_Java_Project_Title_and_Base_Paper

1. Download Link: Click here to download file

http://rapidshare.com/files/415597815/2009_IEEE_Java_Project_Title_and_Base_Paper.rar
MD5: 5177CBEA93EDFD1AE77EE20CC907EBC1

2009_IEEE_Dot_Net_Project_Title_and_Base_Paper

2009_IEEE_Dot_Net_Project_Title_and_Base_Paper

1. Download Link: Click here to download file

http://rapidshare.com/files/415597434/2009_IEEE_Dot_Net_Project_Title_and_Base_Paper.rar
MD5: 359A3A0A4FE5A111579A8E45E7E8C03B

J2EE IEEE 2010

J2EE IEEE

1. Download Link: Click here to download file

http://rapidshare.com/files/415434167/J2EE_IEEE.rar
MD5: 84275D50E8CB43777C1147FAF4123C58

JAVA IEEE 2010

Updated Links by august 2011

JAVA IEEE.part1


1. Download Link: Click here to download file

https://rapidshare.com/files/3257166503/JAVA_IEEE.part1.rar

-------------------------------------------------------------------------------------------------

JAVA IEEE.part2


1. Download Link: Click here to download file

https://rapidshare.com/files/2811484843/JAVA_IEEE.part2.rar

-------------------------------------------------------------------------------------------------

JAVA IEEE.part3

1. Download Link: Click here to download file

https://rapidshare.com/files/3313192544/JAVA_IEEE.part3.rar

-------------------------------------------------------------------------------------------------

DOTNET IEEE 2010

Updated Links by august 2011

DOTNET IEEE.part1

1. Download Link: Click here to download file

https://rapidshare.com/files/3165096908/DOTNET_IEEE.part1.rar


DOTNET IEEE.part2

1. Download Link: Click here to download file
https://rapidshare.com/files/2128958325/DOTNET_IEEE.part2.rar


DOTNET IEEE.part3

1. Download Link: Click here to download file
https://rapidshare.com/files/1470586984/DOTNET_IEEE.part3.rar


DOTNET_IEEE.part4

1. Download Link: Click here to download file
https://rapidshare.com/files/2120170418/DOTNET_IEEE.part4.rar

IEEE 2010

Download Link: Click here to download file

http://rapidshare.com/files/415433541/ieee_2010.rar
MD5: 6AE5CEC0608A51EE4095F0C8FC11CA41

IEEE_2010_PROJECTS_TITLES

1. Download Link: Click here to download file

http://rapidshare.com/files/415572847/IEEE_2010_PROJECTS_TITLES.docx
MD5: CD9F0820441F3CD9C6C45E650730A440

IEEE2008_2009_PROJECTS_TITLES

1. Download Link: Click here to download file

http://rapidshare.com/files/415572839/IEEE2008_2009_PROJECTS_TITLES.docx
MD5: 3C6F9A74794C40FB91EE7D9AB0C030CE

IEEE2007_-_2002_PROJECTS_TITLES

1. Download Link: Click here to download file

http://rapidshare.com/files/415572834/IEEE2007_-_2002_PROJECTS_TITLES.docx
MD5: 7077F2666B8F725376B529258A690D11

ICMCS'2009: International Conference on Multimedia Computing and Systems


Welcome to ICMCS

A leading network and technology consulting firm that has been providing quality services in the Computer Industry since 1983, excelling in a broad knowledge base of Software and Hardware in the ever changing marketplace. ICMCS provides quality and cost-effective Local Area/Wide Area Network (LAN/WAN) integration services. We also provide/design secure Virtual Private Network (VPN) that lets you connect offices, partners and even remote employees without a heavy investment. We offer these services across a comprehensive range of technologies from simple UTP wiring to broadband and beyond. We can help you design and create new networks or evolve and reconfigure existing ones to enhance your business and minimize Server downtime.

We specialize in the following areas:
Custom-built File/SQL/Exchange/E-mail/Terminal/Backup Domain Servers with Microsoft Windows Operating Systems.
Custom-built Workstation with Microsoft Windows Desktop Operating Systems (OS) and Application Software pre-installed.
Server setup/configuration and Workstation setup/authentication.
Cable/DSL Modem/Router - Installation/Setup.
Web Hosting and E-mail Redirect using the Microsoft Windows Internet Information Server (IIS) which allows you to access up-to-date information.
Professional Website design and maintenance for fractional costs.
7-24 On & Off-site support/maintenance/repair Servers/Workstations.
7-24 Virus removal/quarantine/protection and definitions Live Update.
Installation/support of Custom-built Application Software.
On & Off-site (Remote) Data backup and recovery.
Commercial GPS Tracking Systems and related monitoring services for corporate fleet tracking and management
Voice over IP (VOIP) phone system installation
Certified Data and Phone Cabling

www.icmcs.com

Updated Links by august 2011

1. Download Link: Click here to download file

https://rapidshare.com/files/2675273403/ICMCS-2009_proceedings.zip

IWSSIP-2010 Proceedings


IWSSIP was founded by Professor Kalman Fazekas from the Budapest University of Technology and Economics, Budapest, Hungary, who initiated it in June 1994 as a scientific event meant to stir the research in theory, methodology, systems and applications of signal and image processing, and to attract and stimulate young researchers.

IWSSIP 2010
17th International Conference on Systems, Signals and Image Processing
June 17-19, 2010
Rio de Janeiro, Brazil
Link to IWSSIP 2010 web-site
Archived IWSSIP 2010 web-site
General Chair: Aura Conci; Proceedings Chair: Fabiana R. Leta
126 regular papers and 10 invited papers were published on the CD-ROM Proceedings

http://www.iwssip.org/

IWSSIP-2010 Proceedings


Updated Links by august 2011


1. Download Link: Click here to download file

https://rapidshare.com/files/4059698746/IWSSIP-2010_Proceedings.zip



ICITST-2009: The 4th International Conference for Internet Technology and Secured Transactions


ICITST-2009: The 4th International Conference for Internet Technology and Secured Transactions

When: Monday November 9, 2009 - Thursday November 12, 2009 from 9:00am - 6:00pm

Where: London UK

The 4th International Conference for Internet Technology and Secured Transactions (ICITST-2009) is Technical Co-sponsored by IEEE UK/RI Section.

The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forumthat promotes collaborative excellence between academia and industry.

The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2009 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.

All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore.

All the ICITST papers are indexed by DBLP.

Website: http://www.icitst.org

Updated Links by august 2011

1. Download Link

https://rapidshare.com/files/851422033/ICITST-2009_Proceedings.rar


Friday, August 27, 2010

IEEE PROJECTS TITLES Java/2010

Privacy-Conscious Location-Based Queries in Mobile Environments Parallel & Distributed 2010/Java
On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network Parallel & Distributed 2010/Java
Layered Approach Using Conditional Random Fields for Intrusion Detection Secure Computing 2010/ Java
IRM Integrated File Replication and Consistency Maintenance in P2P Systems Parallel & Distributed 2010/Java
Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks Network 2010/Java
Engineering Wireless Mesh Networks Joint Scheduling, Routing, Power Control,and Rate Adaptation Network 2010/Java
Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation Network 2010/Java
Anonymous Query Processing in Road Networks Data Engineering 2010/Java
Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks Secure Computing 2010/Java
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming Parallel & Distributed 2010/Java
Rate Control With Pair wise Intersession Network Coding Network 2010/Java
Equilibrium of Heterogeneous Congestion Control: Optimality and Stability Network 2010/Java
Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks Mobile Computing 2010/Java
Providing Witness Anonymity Under Peer-to-Peer Settings Network Security 2010/Java
On the Performance Bounds of Practical Wireless Network Coding Mobile Computing 2010/Java
Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis Network 2010/Java
VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks Mobile Computing 2010/Java
Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility Network 2010/Java
A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame Theory Network Security 2010/Java
MABS: Multicast Authentication Based on Batch signature Mobile Computing 2010/Java
SigFree: A Signature-Free Buffer Overflow Attack Blocker Network Security 2010/Java
SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments Mobile Computing 2010/Java
Layered Approach Using Conditional Random Fields for Intrusion Detection Network Security 2010/Java
Modeling Power Saving Protocols for Multicast Services in 802.11 Wireless LANs Mobile Computing 2010/Java
A General Framework for Service Availability for Bandwidth- Network 2010/Java
Efficient Connection-Oriented Networks
Secure Data Objects Replication in Data Grid Network Security 2010/Java
DCAR: Distributed Coding-Aware Routing in Wireless Networks Mobile Computing 2010/Java
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications Network 2010/Java
Shifting Inference Control to User Side: Architecture and Protocol Network Security 2010/Java
Optimal Relay Station Placement in Broadband Wireless Access Networks Mobile Computing 2010/Java
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats Network Security 2010/Java
A Parallel Self-Routing Rearrangeable Non-blocking Multi-Photonic Switching Network Network 2010/Java
Energy-Aware Tag Anti-collision Protocols for RFID Systems Mobile Computing 2010/Java
An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature Network Security 2010/Java
A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks Network 2010/Java
Channel Assignment for Multi-hop Cellular Networks: Minimum Delay Mobile Computing 2010/Java
Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks Network 2010/Java
Secure Client-Side ST-DM Watermark Embedding Network Security 2010/Java
Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks Network 2010/Java
TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Network 2010/Java

IEEE PROJECTS TITLES 2010/ .Net

Toward Optimal Network Fault Correction in Externally Managed Overlay Networks Parallel & Distributed 2010/ .Net
Slow Adaptive OFDMA Systems Through Chance Constrained Programming Network 2010/ .Net
Multicast Multi-path Power Efficient Routing in Mobile ADHOC Networks Network Security 2010/ .Net
Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams Mobile Computing 2010/ .Net
Edge Adaptive Image Steganography Based on LSB Matching Revisited Network Security 2010/ .Net
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes Mobile Computing 2010/ .Net
Predictive Network Anomaly Detection and Visualization Network Security 2010/ .Net
Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks Mobile Computing 2010/ .Net
SVD-Based Universal Spatial Domain Image Steganalysis Network Security 2010/ .Net
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks Network Security 2010/ .Net
Power Control and Channel Allocation in Cognitive Radio Networks with Primary Users’ Cooperation Mobile Computing 2010/ .Net
A Survey on the Encryption of Converge cast Traffic with In-Network Processing Network Security 2010/ .Net
Cost Analysis of Short Message Retransmissions Mobile Computing 2010/ .Net
In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm Network Security 2010/ .Net
Multiple RFID Tags Access Algorithm Mobile Computing 2010/ .Net
Step Construction of Visual Cryptography Schemes Network Security 2010/ .Net
Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks Mobile Computing 2010/ .Net
Reversible Image Watermarking Using Interpolation Technique Network Security 2010/ .Net
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements Mobile Computing 2010/ .Net
Beacon-Assisted Spectrum Access with Cooperative Cognitive Transmitter and Receiver Mobile Computing 2010/ .Net
Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks Network 2010/ .Net
S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks Network 2010/ .Net
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks Network 2010/ .Net
Fast Algorithms for Resource Allocation in Wireless Cellular Networks Network 2010/ .Net
Distributed Algorithms for Minimum Cost Multicast With Network Coding Network 2010/ .Net
Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast Network 2010/ .Net
Replication Routing in DTNs: A Resource Allocation Approach Network 2010/ .Net
A Fitting Report Position Scheme for the Gated IPACT Dynamic Bandwidth Algorithm in EPONs Network 2010/ .Net
POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority Network 2010/ .Net
Always Acyclic Distributed Path Computation Network 2010/Java

IEEE PROJECTS TITLES Java/2009

IEEE PROJECTS TITLES Java/2009 YEAR PLATFORM
Agent Mining: The Synergy of Agents and Data Mining - Data Mining Java/2009
Sub ontology-Based Resource Management for Web-Based e-Learning - Data Mining Java/2009
Mitigation of Control Channel Jamming under Node Capture Attacks Java/2009
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Java/2009
Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems - Data Mining Java/2009
Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments Java/2009
Security Analysis of the SASI Protocol Java/2009
Capturing Router Congestion and Delay Java/2009
SIMPS Using Sociology for Personal Mobility Java/2009
Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows Java/2009
Scalable Routing in Cyclic Mobile Networks Java/2009
Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing Java/2009
Monitoring the Application-Layer DDoS Attacks for Popular Websites Java/2009
Multiple Routing Configurations for Fast IP Network Recovery Java/2009
A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions Java/2009
Multipath Dissemination in Regular Mesh Topologies Java/2009
Detecting Malicious Packet Losses Java/2009
Dynamic Routing with Security Considerations Java/2009
Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures Java/2009
The Effectiveness of Checksums for Embedded Control Networks Java/2009
Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks Java/2009

IEEE PROJECTS TITLES .Net/2009

IEEE PROJECTS TITLES .Net/2009 YEAR PLATFORM
A scene-based video watermarking technique using SVMs - Image Processing .Net/2009
Route Stability in MANETs under the Random Direction Mobility Model .Net/2009
On the Security of Route Discovery in MANETs .Net/2009
Dynamics of Multiple-Seller and Multiple Buyer Spectrum Trading in Cognitive Radio Networks A GamenTheoretic Modeling Approach .Net/2009
RandomCast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks .Net/2009
A Gen2 Based RFID Authentication Protocol for Security and Privacy .Net/2009
Greedy Routing with Anti Void Traversal for Wireless Sensor Networks .Net/2009
On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint .Net/2009
Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking .Net/2009
Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period .Net/2009
An Integrated Approach to Sensor Role Selection .Net/2009
A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks .Net/2009
Biased Random Walks in Uniform Wireless Networks .Net/2009
Halting viruses in scale-free networks .Net/2009
The Effectiveness of Checksums for Embedded Control Networks .Net/2009
On Monitoring and Failure Localization in Mesh All-Optical Networks .NET2009
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths .Net/2009
Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling .Net/2009
Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic .Net/2009
Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc Networks .Net/2009
Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise .Net/2009
On Optimal Collusion Strategies For Fingerprinting .NET2009
PRESTO Feedback-Driven Data Management in Sensor Networks .Net/2009
Natural Watermarking spectrum technique for WOA .NET2009
Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images .Net/2009
Spread Spectrum Watermarking Security .NET2009
Secure and Policy-Compliant Source Routing .Net/2009
Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications .Net/2009
Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks .Net/2009
halting viruses in scale-free networks .Net/2009
Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag Identification .Net/2009
Explicit Load Balancing Technique for NGEO Satellite IP Networks With On-Board Processing Capabilities .Net/2009
Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows .Net/2009
Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks .Net/2009
Cell Breathing Techniques for Load Balancing in Wireless LANs .Net/2009
The Effectiveness of Checksums for Embedded Control Networks .Net/2009
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis .Net/2009
HARDWARE ENHANCED ASSOCIATION RULE MINING WITH HASHING AND PIPELINING .Net/2009
HBA Distributed Metadata Management for Large Cluster-Based Storage Systems .Net/2009
Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target.rar .Net/2009
Probabilistic Packet Marking For Large Scale IP Trace Back .Net/2009
Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications .Net/2009
Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services .Net/2009
Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data .Net/2009
Trustworthy Computing under Resource Constraints with the DOWN Policy .Net/2009
Fast Query Point Movement Techniques for Large CBIR Systems .Net/2009
Page Ranking Algorithms: A Survey TOWARD A FUZZY DOMAIN ONTOLOGY EXTRACTION METHOD FOR SEARCH ENGINE .Net/2009
RFID and Wireless Sensor Networks exemplify computationally constrained environments .Net/2009

IEEE PROJECTS TITLES 2008/Java

IEEE PROJECTS TITLES2008/Java YEAR PLATFORM
Minimizing File Downloading Time in Stochastic Peer-To-Peer Networks [Network] 2008/Java
QUIVER: Consistent Object Sharing For Edge Services [Network] 2008/Java
Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing 2008/Java
Geometric Approach to Improving Active Packet Loss Measurement 2008/Java
A Precise Termination Condition of the Probabilistic Packet Marking Algorithm 2008/Java
Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks 2008/Java
Benefit Based Data Caching In Ad Hoc Networks 2008/Java
Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks 2008/Java
Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction 2008/Java
Two Techniques for Fast Computation of Constrained Shortest Paths 2008/Java
Controlling IP Spoofing Through Inter Domain Packet Filters 2008/Java
A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns 2008/Java
Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems 2008/Java
Truth Discovery with Multiple Conflicting Information Providers on Web 2008/Java
Location Based Spatial Query Processing In Wireless Broadcast Environments 2008/Java
Bandwidth Estimation for IEEE 802.11 Based ADHOC Networks 2008/Java
Modeling & Automated Containment of Worms 2008/Java
Security In Large Networks Using Mediator Protocols 2008/Java
An Efficient Association Rule Mining Algorithm In Distributed Databases 2008/Java
BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks 2008/Java
Scalable and Efficient End-To-End Network Topology Inference 2008/Java
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries 2008/Java
Protection of Database Security via Collaborative Inference Detection 2008/Java
Dual-Link Failure Resiliency through Backup Link Mutual Exclusion 2008/Java
Securing User-Controlled Routing Infrastructures 2008/Java
Online Index Recommendations for High-Dimensional Databases Using Query Workloads 2008/Java
Mitigating Performance Degradation in Congested Sensor Networks 2008/Java
Security in Large Networks Using Mediator Protocols 2008/Java
Temporal Partioning of Communication Resources in an Integrated Architecture
Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data
Probabilistic Packet Marking For Large Scale IP Trace Back
Personal Authentication Using 3-D Finger Geometry
Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provisio
Credit Card Fraud Detection Using Hidden Markov Models
Active Queue Management For Fair Resource Allocation In Wireless Networks
A Memory Learning Framework for Effective Image Retrieval

IEEE PROJECTS TITLES 2008/ .Net

S.NO IEEE PROJECTS TITLES YEAR PLATFORM
1 Efficient Routing In Intermittently Connected Mobile Networks: The Multiple Copy Case[Mobile Computing] 2008/ .Net
2 A Distributed and Scalable Routing Table Manager for the Next Generation of IP Routers 2008/ .Net
3 Watermarking Relational Databases Using Optimization Based Techniques 2008/ .Net
4 A New Model for Dissemination of XML Content 2008/ .Net
5 Efficient 2-D Grayscale Morphological Transformations with Arbitraly Flat Structuring Elements 2008/ .Net
6 Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision 2008/ .Net
7 Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks 2008/ .Net
8 Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light 2008/ .Net
9 Probabilistic Packet Marking For Large Scale IP Trace Back 2008/ .Net
10 Estimation of Defects Based On Defect Decay Model: ED3M 2008/ .Net
11 Active Learning Methods for Interactive Image Retrieval 2008/ .Net
12 Orthogonal Data Embedding For Binary Images in Morphological Transforms Domain A High Capacity Approach 2008/ .Net
13 Efficient Resource Allocation For Wireless Multicast 2008/ .Net
14 Localized Sensor Area Coverage With Low Communication Overhead 2008/ .Net
15 Trustworthy Computing Under Resource Constraints With The Down Policy 2008/ .Net
16 Credit Card Fraud Detection Using Hidden Markov Models 2008/ .Net
17 Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data 2008/ .Net
18 HBA Distributed Metadata Management for Large Cluster-Based Storage Systems 2008/ .Net
19 Temporal Portioning of Communication Resources in an Integrated Architecture 2008/ .Net
20 Hardware enhanced association rule mining with Hashing and Pipelining 2008/ .Net
21 A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video 2008/ .Net