Escolar Documentos
Profissional Documentos
Cultura Documentos
S.NO. LSJ120 1 LSJ120 2 LSJ120 3 LSJ120 4 LSJ120 5 LSJ120 6 LSJ120 7 LSJ120 8 LSJ120 9 LSJ121 0 LSJ121 1 LSJ121 2 LSJ121 3 LSJ121 4 LSJ121 5 LSJ121 6 LSJ121 7 LSJ121 8 LSJ121 9 LSJ122 0 Project Title A Network Coding Equivalent Content Distribution Scheme For Efficient Peer To Peer Interactive Vod Streaming An Optimizing Overlay Topologies For Search In Unstructed Peer To Peer Networks Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences Cloud Data Production for Masses Clustering With Multi View Point Based Similarity Measure Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage Distributed Packet Buffers For High Band Width Switches & Routers Efficient Fuzzy Type A Head Search In Xml Data Fast Data Collection in Tree-Based Wireless Sensor Networks. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks Game-Theoretic Pricing for Video Streaming in Mobile Networks Hand Written Chinese Text Recognition By Integrating Multiple Contexts In Tags We Trust: Trust modeling in social tagging of multimedia content Learn to Personalized Image Search from the Photo Sharing Websites
MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS
DOMINE Parallel & Distributed Systems Parallel & Distributed Systems Knowledge & Data Engineering Cloud Computing Knowledge & Data Engineering Parallel & Distributed Systems Parallel & Distributed Systems Knowledge & Data Engineering Mobile Computing Parallel & Distributed Systems Mobile Computing Pattern Analysis & Machine Intelligence Signal Processing Multimedia Knowledge & Data Engineering Secure Computing Knowledge & Data Engineering Networking Secure Computing Knowledge & Data Engineering
TEC H JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA
Online Modeling of Proactive Moderation System for Auction Fraud Detection Organizing User Search Histories Packet Loss Control Using Tokens at the Network Edge Packet-Hiding Methods for Preventing Selective Jamming Attacks Ranking Model Adaptation for Domain-Specific Search