Call Us On : 044 4203 2818 / 9751800789
MOBILE COMPUTING
  • Optimal Multicast Capacity and Delay Tradeoffs in MANETs.
  • On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks. 
  • On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks.

CLOUD COMPUTING
  • Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks.
  • Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
  • Privacy Preserving Delegated Access Control in Public Clouds

SECURE COMPUTING
  • Privacy Preserving Data Sharing With Anonymous ID Assignment.
  • Non-Cooperative Location Privacy
  • Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
  • Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
  • An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol

PARALLEL AND DISTRIBUTED SYSTEMS
  • Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
  • SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
  • A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Walid
  • Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
  • Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data

KNOWLEDGE AND DATA ENGINEERING DATA MINING
  • Secure Mining of Association Rules in Horizontally Distributed Databases
  • ELCA: Evaluation for Keyword Search on Probabilistic XML Data
  • Ginix Generalized Inverted Index for Keyword Search
  • Dynamic Query Forms for Database Queries
  • SUSIE Search using services and information extraction
  • Mining Order-Preserving Sub matrices from Data with Repeated Measurements
  • Gmatch Secure and Privacy-Preserving Group Matching in Social Networks
  • Cost-Based Optimization of Service Compositions
  • Sampling Online Social Networks
  • SeDas A Self-Destructing Data System Based on Active Storage Framework
  • A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
  • A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
  • Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
  • Automatic Extraction of Top-k Lists from the Web
  • Constructing a Global Social Service Network for Better Quality of Web Service Discovery
  • Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
  • Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
  • Anonymization of Centralized and Distributed Social Networks by Sequential Clustering

NETWORKING
  • The Target Tracking in Mobile Sensor Networks.
  • Redundancy Management of Multipath Routing for Intrusion Tolerance inHeterogeneous Wireless Sensor Networks
  • Transfer Reliability and Congestion Control Strategies in Opportunistic Networks. A Survey
  • Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks.
  • Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
  • A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
  • Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

IMAGE PROCESSING
  • Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
  • LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
  • Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
  • Visual Object Tracking Based on Local Steering Kernels and Color Histograms
  • Local Directional Number Pattern for Face Analysis Face and Expression Recognition

MOBILE COMPUTING - WIRELESS COMMUNICATIONS
  • Optimal Content Downloading in Vehicular Networks

ENQUIRY

Name
Email-Id
Mobile No
City