Ieee 2011 java &. Net in coimbatore - Coimbatore

Thursday, 6 October 2011

Item details

City: Coimbatore, Tamil Nadu
Offer type: Sell
Price: Rs 5,000


Contact name kannan
Phone 9865889000

Item description

J1Online Intrusion Alert Aggregation with Generative Data Stream Modeling.
J2Anomaly Detection in Network Traffic Based on Statistical Inference and Stable Modeling
J3Towards Situational Awareness of Large-Scale Botnet Probing Events
J4Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
J5On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks
J6Self-Organizing Feature Maps for User-to-Root and Remote-to Local Network Intrusion Detection on the KDD Cup 1999 Dataset
J7Architecting a Secure Enterprise Data Sharing.
J8Construction P2P firewall HTTP-Botnet defense mechanism
J9A Hierarchical Hybrid Structure for Botnet Control and Command.
J10A Competitive Study of Cryptography Techniques over Block Cipher.
J11Analysis on Credit Card Fraud Detection Methods.
J12Intrusion detection An Energy efficient approach
J13Data Leakage Detection
J14An Optimal Data Hiding Scheme With Tree-Based Parity Check
J15Computational Perceptual Features for Texture Representation and Retrieval
J16Subspace-Based Striping Noise Reduction in Hyper-spectral Images
J17An Efficient Edge-based Bilateral Filter for Restoring Real Noisy Image
J18Multiple exposure fusion for high dynamic range image acquisition
J19Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
J20Embedded Extended Visual Cryptography Schemes
J22Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
J23Sketch4Match – Content-based Image Retrieval System Using Sketches.
J24Interval ckMeans An Algorithm for Clustering Symbolic Data.
J25Clustering with Multi-Viewpoint based Similarity Measure.
J26Resource management using dynamical load prediction and multiprocessor cooperation
J27Model-Based Identification of Dominant Congested Links
J28Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
J29Delay Analysis and Optimality of Scheduling Policies for Multi-hop Wireless Networks
J30Interference-Aware Routing in Wireless Multi-hop Networks
J31On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents
J32Mobile Sampling of Sensor Field Data Using Controlled Broadcast
J33Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks
J34Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization
J35A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows
J36On Demand Check Pointing for Grid Application Reliability using Communicating Process Model.
J37Design of p-Cycles for Full Node Protection in WDM Mesh Networks
J38Dynamic Channel Allocation for wireless zone-based Multicast and Broadcast Service
J39Channel Allocation in Wireless Data Center Networks
J40A foundation for stochastic bandwidth estimation of networks with random service
J41A new approach for FEC decoding based on the BP algorithm in LTE and Wi-MAX systems
J42Simplified algorithm on network shortest path problem
J43An Improved Shortest Path Bridging Protocol for Ethernet Backbone Network
J44A Simple and Fast Algorithm for Restricted Shortest Path Problem
J45Load-Balanced Shortest-Path-Based Routing Without Traffic Splitting in Hose Model
J46Voronoi-based continuous query processing for mobile users

Geographical Routing With Location Service in Intermittently Connected MANETs
J48An Efficient Paging Scheme for Terminal Mobility using Personal Mobility Management Information in Inter worked Fixed and Mobile Networks
J49Selective Data Stream Blocking Mechanism for Networks
J50Optimal Bandwidth Assignment for Multiple-Description-Coded Video
J51Load Shedding in Mobile Systems with MobiQual
J52Seeking Quality of Web Service Composition in a Semantic Dimension.
J53QoS-Aware Web Service Recommendation by Collaborative Filtering.
J54Ontology Based Business Process Customization for Composite Web Services
J55Analysis of quality of object oriented systems using object oriented metrics
J56Denial of Service Attacks in Wireless Networks: The Case of Jammers

J57Nymble- Blocking Misbehaving Users in Anonymizing Networks
J58Modeling and Detection of Camouflaging Worm
J59Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
J60Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
J61CloudFlex Seamless Scaling of Enterprise Applications into the Cloud
J62Effective Navigation of Query Results Based on Concept Hierarchies
J63Throughput Optimization in Mobile Backbone Networks.
J64Caching Strategies Based on Information Density
J65Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
J66Selfish Overlay Network Creation and Maintenance.
J67SPAF: Stateless FSA-based Packet Filters.