Você está na página 1de 3

2012 JAVA /.

NET PROJECTS
SNO
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18.

TITLE
Cashing in on the Cache in the Cloud Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage pCloud: A Distributed System for Practical PIR Adding Temporal Constraints to XML Schema Clustering with Multiviewpoint-Based Similarity Measure Combining Tag and Value Similarity for Data Extraction and Alignment Coupled Behavior Analysis with Applications Data Mining for XML Query-Answering Support Document Clustering in Correlation Similarity Measure Space Efficient and Effective Duplicate Detection in Hierarchical Data Efficient Extended Boolean Retrieval Efficient Fuzzy Type-Ahead Search in XML Data Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching Organizing User Search Histories Publishing Search LogsA Comparative Study of Privacy Guarantees Slicing: A New Approach for Privacy Preserving Data Publishing A Blur-Robust Descriptor with Applications to Face Recognition Automatic Image Equalization and Contrast Enhancement Contact: 0863-6532699 9966032699

DOMAI N
CC CC CC DM DM DM DM DM DM DM DM DM DM DM DM DM IP IP

Technolo gy
.NET .NET .NET .NET JAVA .NET .NET .NET .NET .NET .NET JAVA JAVA .NET .NET JAVA JAVA .NET

Email: liotechprojects@gmail.com

Using Gaussian Mixture Modeling 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. Handwritten Chinese Text Recognition by Integrating Multiple Contexts Moderated Group Authoring System for Campus-Wide Workgroups Optimization-Based Distributed Algorithms for Mobile Data Gathering in Wireless Sensor Networks A Hybrid Approach to Private Record Matching A Trapdoor Hash-Based Mechanism for Stream Authentication Double Guard: Detecting Intrusions in Multitier Web Applications Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Ensuring Distributed Accountability for Data Sharing in the Cloud On Privacy of Encrypted Speech Communications Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism Privacy-Preserving Enforcement of Spatially Aware RBAC Revisiting Defenses against Large-Scale Online Password Guessing Attacks Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming IP MC MC NS NS NS NS NS NS NS JAVA JAVA JAVA .NET JAVA JAVA .NET JAVA .NET .NET

29. 30. 31. 32.

NS NS NS NS

.NET .NET .NET .NET

33.

NW

JAVA

Contact: 0863-6532699 9966032699

Email: liotechprojects@gmail.com

34. 35. 36. 37. 38. 39. 40. 41. 42.

BGP Churn Evolution: A Perspective From the Core Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters Distributed Packet Buffers for High-Bandwidth Switches and Routers Efficient Error Estimating Coding: Feasibility and Applications Footprint: Detecting Sybil Attacks in Urban Vehicular Networks Insights on Media Streaming Progress Using Bit TorrentLike Protocols for On-Demand Streaming MeasuRouting: A Framework for Routing Assisted Traffic Monitoring On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

NW NW NW NW NW NW NW NW NW

JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA

Contact: 0863-6532699 9966032699

Email: liotechprojects@gmail.com

Você também pode gostar