Você está na página 1de 31

1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24.

25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39.

Brain Gate Palm Vein Technology Sniffer for detecting lost mobiles 5 Pen PC Technology iDEN Hi-Fi Packet Sniffers Brain Chips Phishing Pill Camera Blue Brain Mobile Phone Cloning Nano Cars Into The Robotics Mind-Reading Computer Intelligent Speed Adaptation GSM Based Vehicle Theft Control System Global Wireless E-Voting Green Cloud Digital Jewelry Biometric Voting System 3D Television 3D password Voice Browser Gi-Fi Graphical Password Authentication 4G Broadband Finger Tracking In Real Time Human Computer Interaction Eye Movement-Based Human Computer Interaction Techniques Ethical Hacking E-Cash Payment System Cyborgs Brain Fingerprinting Biometrics in SECURE e-transaction X- Internet Surface Computer Secure ATM by Image Processing Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol Wibree Telepresence

40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78.

System in Package Smart Memories Slammer Worm Sensitive Skin Pixie Dust Linux Kernel 2.6 Lamp Technology Humanoid Robot HTAM Haptic Technology Elastic Quotas Diamond chip Digital Rights Management A Plan For No Spam BEOWULF Cluster Digital Scent Technology Distributed Interactive Virtual Environment Dynamic TCP Connection Elapsing CAPTCHA Virtual Retinal Display Wireless LAN Security Chameleon Chip Haptics Intelligent RAM iSCSI Linux Kernel 2.6 3D Searching Biological Computers Rain Technology Real Time Application Interface GPS HALO BitTorrent Compositional Adaptation Rover Technology Self Defending Networks Semantic Web Computer Intelligence Application Cooperative Linux

79. 80. 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. 111. 112. 113. 114. 115. 116. 117.

Longhorn Mesh Radio Parallel Virtual Machine Linux Virtual Server Location Independent Naming PHANToM Multiprotocol Label Switching Next Generation Secure Computing Base NGSCB Reconfigurable computing Sky X Technology Smart Client Application Development using .NET Spawning Networks SPCS Speed protocol processors Strata flash Memory Swarm Intelligence The Callpaper Concept IP spoofing Internet Access via Cable TV Network Face Recognition Technology FireWire Param 10000 The Deep Web Virtual Campus VoiceXML Wireless USB Refactoring On-line Analytical Processing (OLAP) Pivot Vector Space Approach in Audio-Video Mixing MPEG-7 Adding Intelligence to Internet Silverlight DNA chips Remote Administration Trojan's Thermography AJAX Alternative Models Of Computation Amorphous Computing and Swarm Intelligence

118. 119. 120. 121. 122. 123. 124. 125. 126. 127. 128. 129. 130. 131. 132. 133. 134. 135. 136. 137. 138. 139. 140. 141. 142. 143. 144. 145. 146. 147. 148. 149. 150. 151. 152. 153. 154. 155. 156.

Windows DNA Laptop Computer Intelligent Software Agents Self-Managing Computing Hurd Intel Centrino Mobile Technology MPEG Video Compression Survivable Networks Systems Self Organizing Maps Mobile IP Iris Scanning LWIP Unified Modeling Language (UML) Nanorobotics Dual Core Processor Cisco IOS Firewall Socket Programming SAM 10 Gigabit Ethernet Tripwire Ubiquitous Networking Unicode And Multilingual Computing XML Encryption Y2K38 VoCable Touch Screens Tempest and Echelon Synthetic Aperture Radar System Unlicensed Mobile Access IDS IDC SATRACK Asynchronous Chips Low Power UART Design for Serial Data Communication SPECT Satellite Radio Light emitting polymers Sensors on 3D Digitization Robotic Surgery

157. 158. 159. 160. 161. 162. 163. 164. 165. 166. 167. 168. 169. 170. 171. 172. 173. 174. 175. 176. 177. 178. 179. 180. 181. 182. 183. 184. 185. 186. 187. 188. 189. 190. 191. 192. 193. 194. 195.

Buffer overflow attack : A potential problem and its Implications Smart card Quantum Information Technology Money Pad, The Future Wallet HVAC Terrestrial Trunked Radio Swarm intelligence & traffic Safety Facility Layout Design using Genetic Algorithm Human Computer Interface HPJava Gaming Consoles Fluorescent Multi-layer Disc Futex Extreme Programming (XP) Earth Simulator Compact peripheral component interconnect corDECT Wireless in Local Loop System Motes Modular Computing MiniDisc system Migration From GSM Network To GPRS M-Commerce C# IP Telephony RPR Broad Band Over Power Line Rapid Prototyping Dashboard Code Division Duplexing Delay Tolerant Networking EDGE Holographic Data Storage Integer Fast Fourier Transform NRAM Orthogonal Frequency Division Multiplplexing Ovonic Unified Memory Pervasive Computing RAID Real Time Systems with Linux/RTAI

196. 197. 198. 199. 200. 201. 202. 203. 204. 205. 206. 207. 208. 209. 210. 211. 212. 213. 214. 215. 216. 217. 218. 219. 220. 221. 222. 223. 224. 225. 226. 227. 228. 229. 230. 231. 232. 233. 234.

Real-Time Obstacle Avoidance Symbian OS Teleportation Turbo Codes Utility Fog Cluster Computing Wireless Application Protocol Light Tree Smart Pixel Arrays Project Oxygen Wearable Bio-Sensors Mobile Virtual Reality Service QoS in Cellular Networks Based on MPT Wireless Fidelity Voice morphing Radio Frequency Light Sources Speed Detection of moving vehicle using speed cameras Optical Packet Switching Network Storage Area Networks Smart Note Taker Crusoe Processor Optical Satellite Communication Optical packet switch architectures Optical Switching FRAM Virtual Private Network Clockless Chip Layer 3 Switching IMode Blue Gene Access gateways Computer Forensics Direct Memory Access Crusoe Digital Subscriber Line Computer Memory Based on the Protein Bacterio-rhodopsin DNA Based Computing Free Space Optics Freenet

235. 236. 237. 238. 239. 240. 241. 242. 243. 244. 245. 246. 247. 248. 249. 250. 251. 252. 253. 254. 255. 256. 257. 258. 259. 260. 261. 262. 263. 264. 265. 266. 267. 268. 269. 270. 271. 272. 273.

Fiber Distributed Data Interface Dynamic Virtual Private Network Introduction to the Internet Protocols Graphic processing Unit High Altitude Aeronautical Platforms Aspect-oriented programming (Aop) Intel MMX Technology Hyper-Threading technology IMAX Brain-Computer Interface InfiniBand Multicast Inverse Multiplexing Blue Tooth Holographic Memory Jini Technology Bio-metrics Magnetic Random Access Memory Intrution Detection System Multiterabit Networks Neural Networks And Their Applications Quantum Computers Small Computer System Interface OpenRAN Quadrics Interconnection Network Plan 9 Operating System Structured Cabling Quantum Cryptography Speech Application Language Tags Real- Time Systems and Real- Time Operating Systems Parallel Computing In India Steganography Virtual LAN Technology Artificial Neural Network (ANN) Tele-immersion VHDL Blue Eyes Voice Over Internet Protocol The Tiger SHARC processor

274. 275. 276. 277. 278. 279. 280. 281. 282. 283. 284. 285. 286. 287. 288. 289. 290. 291. 292. 293. 294. 295. 296. 297. 298. 299. 300. 301. 302. 303. 304. 305. 306. 307. 308. 309. 310. 311. 312.

Autonomic Computing Wearable Computers Voice Portals Tamper Resistance CGI Programming DRM Software Radio Firewalls Handheld Computers Modems and ISDN Optical Free Space Communication Planar Separators Wireless Internet DVD Technology MPEG-4 Facial Animation Internet Telephony Policy in INDIA PON Topologies Smart Cards Surround Systems TCPA / Palladium Trustworthy Computing Sense-Response Applications Optical Computer Graph Separators Extended Mark Up Language Cellular Communications Virtual Instrumentation Voice Quality Cable Modems Dynamic Memory Allocation Optical Mouse Generic Framing Procedure Dynamic Cache Management Technique Ethernet Passive Optical Network Synchronous Optical Networking Development of the Intenet Design and Analysis of Algoritms Infinite Dimensional Vector Space Instant Messaging Optical Fibre Cable

313. 314. 315. 316. 317. 318. 319. 320. 321. 322. 323. 324. 325. 326. 327. 328. 329. 330. 331. 332. 333. 334. 335. 336. 337. 338. 339. 340. 341. 342. 343. 344. 345. 346. 347. 348. 349. 350. 351.

GSM Ambiophonics Palladium Computer Viruses Third Generation Object Oriented Concepts Night Vision Technology TCP/ IP Dynamic Synchronous Transfer Mode Integrated Voice and Data Java Servlets Smart Quill Spam Assassin Stereoscopic Imaging Zigbee Ultra-Wideband Home Networking Internet Protocol Television Bacterio-Rhodopsin Memory Blade Servers Digital Cinema Holographic Versatile Disc Itanium Processor Local Multipoint Distribution Service Network Attached Storage Night Vision Technology Opera (web browser) Parasitic Computing Performance Testing Java Ring RD RAM GSM Security And Encryption Fast Convergence Algorithms for Active Noise Controlin Vehicles 3G vs WiFi Data Security in Local Network using Distributed Firewalls Computerized Paper Evaluation using Neural Network Bluetooth Based Smart Sensor Networks Laser Communications Multiple Domain Orientation

352. 353. 354. 355. 356. 357. 358. 359. 360. 361. 362. 363. 364. 365. 366. 367. 368. 369. 370. 371. 372. 373. 374. 375. 376. 377. 378. 379. 380. 381. 382. 383. 384. 385. 386. 387. 388. 389. 390.

Industrial Applications using Neural Networks Implementation Of Zoom FFT Image Processing Virtual keyboard Transient Stability Assessment using Neural Networks Tracking and Positioning of Mobiles in Telecommunication Timing Attacks on Implementations Prototype System Design for Telemedicine Optical Networking and Dense Wavelength Division Multiplexing Optical Burst Switching Image Processing & Compression Cyberterrorism Ipv6 - The Next Generation Protocol Driving Optical Network Evolution Cellular Neural Network Radio Network Controller Digital Audio Broadcasting Significance of real-time transport Protocol in VOIP Space Mouse Resilient Packet Ring Technology Wireless Networked Digital Devices Design of 2-D Filters using a Parallel Processor Architecture Hyper Transport Technology CorDECT Storage Area Network High Performance DSP Architectures Smart Dust MANET Biometrics Based Authentication Software-Defined Radio Digital Video Editing D-Blast Aeronautical Communication Gigabit Ethernet Wisenet Digital Light Processing Free Space Laser Communications Millipede AC Performance Of Nanoelectronics

391. 392. 393. 394. 395. 396. 397. 398. 399. 400. 401. 402. 403. 404.

4G Wireless Systems Blu Ray Disc Smart Fabrics Daknet Conditional Access System SyncML High Performance DSP Architectures Short Message Service (SMS) MANET Worldwide Inter operatibility for Microwave Access 64-Bit Computing Bio-Molecular Computing

Tracking and Positioning of Mobiles in Telecommunication

Palmprint Authentication Application 3. Security in Mobile Database Systems 4. Multicasting in Ad Hoc Networks 5. Brain Finger Printing 6. Future of the internet 7. Computer vision 8. Raising Technologies 9. Open-Rar 10. Intrusion Detection System 11. Taxonomy of S/w Testing Tools 12. Power of Grid Computing 13. HomeRF- localized wireless technology optimized forthe home environment 14. Wireless Application Protocol 15. Computational Methods for Bankruptcy Prediction 16. Honey Pots 17. Next Generation Protocol (IPv6) 18. Peer 2 Peer Web Services 19. Embedded Auditors for Intrusion Detection 20. Recognition of VoIP Speech 21. Assisted GPS 22. Multiterabit Networks 23. Bio-metrics 24. Radio Network Controller for 3G mobile and wireless network devices 25. Software model checking 26. Fiber Optic technology 27. Algorithms and Computation Theories 28. Graphic processing Unit 29. Domotics 30. Cell Phones beyond Call & Sms 31. C Sharp (C#) 32. Image Water Marking 33. Intrution Detection System

34. Real-time Transport Protocol (RTP) 35. Digital photography & music 36. Fusion Memory 37. M Commerce 38. Wireless Technologies (bluetooth, 802.11x, IRDA) 39. Mobile Commerce 40. Load Balancing in Internet 41. Intel MMX Technology 42. VPN Server 43. Earth Simulator- Fastest Supercomputer 44. DNA Based computer 45. Expert Systems and decision making 46. S/w Testing Tools 47. Recent Trends in Cryptography 48. Technologies and successful applications for direct and multihop ad hoc networks 49. Zornbie Computers 50. Wireless Network Devices and digital convergence 51. Aspect-oriented programming (Aop) 52. Real Time Speech Translation 53. New Age Graphics 54. New Dimension of Data Security using Neural Networks and Numerical Functions 55. Diskless Network storage Controller 56. 4G- Wireless 57. Routing In Mobile Ad Hoc Networks 58. ATM Virtual connections 59. Voice Portals 60. NVSRAM- Non Volatile Static RAM 61. High Altitude Aeronautical Platforms 62. Artificial Intelligence and Neural Networks 63. Printed Memory Technology 64. Advanced Mobile Presence Technology 65. Future Programming Techniques and Concepts 66. 3D Internet 67. DART 68. Magnetic Random Access Memory 69. High Capacity Flash Chips 70. IRIS Recognization 71. Load Balancing in Parallel Computers 72. Agent Based Systems and Applications 73. Embedded web server for remote access 74. Mobile Tele Communication 75. Biometrics Authentication systems 76. Embedded web server for remote access 77. Adhoc Networks 78. Advanced Processors 79. Probabilistic I/o Automata 80. Mobile ad hoc network (MANET) 81. Near Filed Communication (NFC)

82. Rising Technology GIES 83. VQ In Converging Telephony And Ip Networks 84. Privacy Preserving Data Mining 85. Pocket Doctor 86. Java Card 87. News Groups 88. Fuzzified Computer-Automated Crane Control System 89. Infini band 90. UMA (Unlicensed Mobile Access) 91. Mind Reading Phones 92. Auto-pilot for IT systems 93. Blade Servers 94. Botnet Security Threats 95. Proactive computing 96. Information Extraction modes & techniques 97. The SAT (SIM Application Toolkit) 98. WBM(Web based mobile) 99. Nonvolatile Flash Memory 100. Self Healing Computers 101. GSM Security And Encryption 102. Embedded systems 103. Signal Integrity Fundamentals for Digital Design 104. i Planet 105. Digital Watermarking Applications and Advantages 106. HCI (Human Computer Interaction ) in software applications 107. Information or Data Visualizing Techniques
405. 406. 407. 408. 409. 410. 411. 412. 413. 414. 415. 416. 417. 418. 419. 420. 421. 422. 423.
SPINS -Security Protocol For Sensor Network(33) Generic visual perception processor Nanotechnology Assembler Design And Nano-Communication Tele-Immersion(34) Liquid Crystal on Silicon Display (LCOS) Jini - advanced set of network protocols Computer memory based on the protein bacterio-rhodopsin CSS and DeCSS -(1) Multimedia Broadcast Multicast Service (MBMS) Extreme Programming (XP) Holographic Versatile Disc Zero Knowledge proofs -(6) Bimolecular Computers Context Disambiguation On Web Search Results Touch Screen Technology(35) Surface Computer Face Recognition Technology DNA Computing in security 4g Wireless Systems

424. 425. 426. 427. 428. 429. 430. 431. 432. 433. 434. 435.

Spyware and Trojan horses-(2) Zigbee Java Management Extensions (JMX) - component framework for building intelligent Quantum cryptography -(5) Home Networking Steganography and digital watermarking TouchFLO Technology NESSUS * -(4) 3D Volume Storage Optical Networking and Dense Wavelength Division Multiplexing Software-Defined Radio Space-time adaptive processing

network

436. 437. 438. 439. 440.

Intelligence at voice-recognition systems Compiler theory & Rover technology Self defending networks Future programming techniques and concepts Glass computer memory for reduced cost of medical imaging Computerized Paper Evaluation Using Neural Network Sixthsense technology Versatile inspection software for use on 64-bit computer systems The Callpaper Concept Data Security In Local Network Using Distributed Firewalls Anonymous network access or privacy Low-cost Industrial fanless embedded PC spawning networks Money pad,the future wallet Compact USB data acquisition modules Desktop 3D Printer Google App engine Advanced Micro Peripherals Rich internet applications 3D Digital NanoCompass Parallel processing, and need for better parallel algorithms Compare technology 10 years back and now iWall - an Intelligent Public Display Context management strategies in wireless networks Wireless Markup Language

multimedia-oriented web based instructional system Porting Device Drivers For The Solaris ~ Steganography - The art of hiding information VHDL (VHSIC Hardware Description Language) Global Positioning System~

441. 442. 443. 444. 445. 446. 447. 448. 449. 450. 451. 452. 453. 454. 455. 456. 457. 458. 459. 460. 461. 462. 463. 464. 465. 466.

Magnetic RAM Embedded computers SSL-TLS -(7) Quad core Module technology Micro Total analysis systems Plasma Displays~ Computerized Paper Evaluation Using Neural Network Mesh Based Geometric data processing DNA Computing~ Multiple Domain Orientation Digital Rights Management -(8) Multimedia Broadcasting via Satellite USB Tape Drives UMA (Unlicensed Mobile Access) Virtual Reality~ Embedded Configurable Operating system Cluster computing Digital cash -(11) PLAN 9 Operating system Brain computer interface & systems Digital Imaging~ Wearable computers Data Mining concepts & Models Captchas -(9) Computer forensics Quantum computing

LOC technology (Lab On a Chip) Advanced Design repository systems Security of Open-Source Software -(10) Wireless Markup Language B-ISDN Reference Model Agent OS(12) iSCSI-Future of Network Storage PolyBot - Modular, self-reconfigurable robots AMD Processors(13) Bluetooth Based Smart Sensor Networks multimedia-oriented web based instructional BioComputers(14) Ubiquitous computing Microcontroller Based Power Theft Identification Computer Forensics(15) Microcontroller Based Automation Quantum teleportation

Curl: A Gentle Slope Language For The Web(16) Grid Data Farm for Petascale Vertical Cavity Surface Emitting Laser Dna Computing In Security(17) Bio Telemetry Digital Visual Interface Embedded Linux(18) Management Information System Teleportation Ext3 Filesystem(19) Radio Astronomy Security threats in the World Wide Web Facial Recognition System(20) Visual Neuro Prosthetics Multiple client's communication Fluorescent Multilayer Optical Data Storage(21) Wearable computers DNA Based computer Graphical Processing Unit(22) The MBMS Integrating Structural Design and Formal Methods in RealTime System Design GRASSHOPPER Operating System(23) Firewalls ARM Processor Security Issues In GRID COMPUTING (24) Aspect oriented programming REAL TIME OPERATING SYSTEM HAVi: Home Audio Video Interoperability(25) Voice Portals SALT (Speech Application Language Tags) HomeRF(26) Narrow Band and Broad Band ISDN Autonomic Computing iSCSI: The future of Network Storage(27) Hyper-Threading Technology Trusted Network Connect (TNC) Specifications The Mbone And Multicasting(28) Sand Box Technology Wi-Fi Hotspots MANETS: Mobile Adhoc Networks(29) Embedded Technology Tape Drive Technologies - LTO (linear tape open) & SDLTS (Super Digital Linear Tape)

o o o o o o o o o o o o o o o o o o o o o o o o o o o
NRAM

Agent Based Computing(30) Personal Satellite assistant Systems Data Mining & Data Warehousing OpenGL-application programming interface(31) NEW STORAGE STRATEGY = Disk -Disk -Tape Back up Micro Hard disk Drives

Optical Disc Data Security(32) Turbo Codes Pluggable Authentication Modules (Pam)(36) Symbian eXtensible Bindings Language (XBL) Parallel Computing In Remote Sensing Data Processing(37) Stealth Virus Clockless Chip Samba Fileserver(38) Intelligent RAM : IRAM Genetic Programming Search Images By Appearance(39) Fire walls Virtual Keyboards Secure Socket Layer (SSL)(40) Access gateways DNA Computing Symbian OS(41) Trends in Mobiles & PC's Blue Ray - Future of DVD's Uniprocessor Virtual Memory Without TLBS(42) Cross Platform Component Object Model SUNSPOT (wireless sensor network) Virtual P.C.(43) Wearable computers Cryogenic Processor

Wearable Computers(44) SIP DNA Based Computing Wi-Fi (802.11b) (45) High Performance DSP Architectures Java Cryptography Architecture (JCA) Future of Satellite Communication(46)

Tablet PC Image compression 4G Wireless Technology(47) Choreography Mobile agent MPEG-7 (48) Curl: A Gentle Slope Language For The Web Genetic programming High Speed Data In Mobile Networks(49) JIRO Technology Future of business Computing Packet Interception(50) Internet Telephony Agile Software development Crusoe Processors(51) Peer to peer Networking Clustering Augmented Reality(52) Encrypted Text chat Using Bluetooth Ovonic Unified Memory Serial ATA (SATA)(53) Flexible CRT Displays Cake PHPs Night Vision Technology(54) Automated Vehicle Detection System Robocode RAID(55) Java Messaging Service (JMS) Mobile Library Management MANET:-The Art of Networking without a Network(56) Online software Distribution Smart Office Virtual Network Computing(57) Emergency Health Care System Mail server Management Ruby on Rails RoR(58) Storage Farms Unified Communication Session Initiation Protocol (SIP)(59) Distributed database management system Content Management Authentication and Key Agreement (AKA)(60) Server side Java

Clinical Data Management IDMA - Future of Wireless Technology(61) GABOR Wavelet Molecular Keypad Lock Elliptical Curve Cryptography(62) Parallel Computations Software Engineering Advances Computerized Paper Evaluation using Neural Network(63) Transient Stability Assessment using Neural Networks Network security - Trends & Methods Data over Cable System (DOCSIS)(64) Internet Cryptopraphy DataBase Migration Co-operative LINUX(65) Split Range Syncronisation MIMO Virtualization Technology(66) The Architecture of a Moletronics Computer Data Security in Local Network using Distributed Firewalls 3D-DOCTOR (67) Optical networking Micro Mouse Fluorescent Multilayer Disc (FMD)(68) Near Filed Communication (NFC) Quantum Computers Datagram Congestion Control Protocol (DCCP)(69) Encrypted Hard disks Power Line Networking Watermarking Digital Audio(70) Nano Ring Memory Split Range Synchronisation

o o o o o o o o o o o o

Holographic Versatile Disc(71) Grid Computing Java Class Loader Unbiquitos Smart Homes ZFS File system(72) Form Processing Site Search Engine Struts Integration Orthogonal Frequency Division Multiplplexing(73) Search Engine Optimisation Stereoscopic Projection Systems Virtual Reality Visualisation

o o o o o o o o o o o o o

Surface-conduction Electron-emitter Display (SED)(74) Network Accelerators Mobile Infrastructure Management Voice Roaming Autonomic Computing(75) Mobile Casts Dual Energy X-ray Absorptiometry Third Generation Biometric Technology(76) Synchronous Optical Networking Jiro - Java-based technology Elliptical curve cryptography (ECC) Multiple Domain Orientation

Serial Attached SCSI (77) X-Internet Bandwidth estimation in broadband access networks Virtual worlds come to life Native Command Queuing (NCQ) (78) Evolutionary Programming Backup and Recovery planning Main memory databases Light Pen(79) HAVi: Home Audio Video Interoperability Mining the Web: Searching, Integration and Discovery Mobile Paradigm MAC address(80) Java Cryptography Architecture (JCA) Techniques for analysis, verification, validation of digital systems Computational Photography TETRA-Terrestrial Enhanced Trunked Radio(81) Trends in Compiler Construction Public Key Encryption And Digital Signature Data Management in Sensor Networks Global System for Mobiles(82) Epsilon nets and transversal of hypergraphs Basic Gnu Emacs Computational neuroscience Internet Networking Personal Mass Media - Blogging, Syndication, Podcasting, and Vidcasting

Real Time Operating Systems OpenTV (OPTV) Introduction to LaTeX Algorithms for networking Recognition of VoIP Speech Nonvolatile Flash Memory Algorithms and Computation Theories Probabilistic I/o Automata Future Programming Techniques and Concepts Advanced Processors Peer 2 Peer Web Services Information Extraction modes & techniques Signal Integrity Fundamentals for Digital Design Computer vision Software model checking WBM(Web based mobile) Future of the internet Technologies and successful applications for direct and multihop ad hoc networks Digital photography & music Embedded web server for remote access VQ In Converging Telephony And Ip Networks Proactive computing Voice Portals Auto-pilot for IT systems Fuzzified Computer-Automated Crane Control System GSM Security And Encryption Wireless Application Protocol New Age Graphics Real Time Speech Translation 3D Internet New Dimension of Data Security using Neural Networks Functions HomeRF- localized wireless technology optimized for environment NVSRAM- Non Volatile Static RAM Fusion Memory Earth Simulator- Fastest Supercomputer Graphic processing Unit Open-Rar High Altitude Aeronautical Platforms Aspect-oriented programming (Aop) the home and Numerical

Intel MMX Technology Voice Over Internet Protocol Internet Searching Wireless Technologies (bluetooth, 802.11x, IRDA) Tracking and Positioning of Mobiles in Telecommunication DNA Based computer ATM Virtual connections Botnet Security Threats VPN Server Advanced Mobile Presence Technology Power of Grid Computing Embedded web server for remote access Bio-metrics Magnetic Random Access Memory Intrution Detection System Multiterabit Networks Printed Memory Technology High Capacity Flash Chips Self Healing Computers Mind Reading Phones Blade Servers Near Filed Communication (NFC) UMA (Unlicensed Mobile Access) Assisted GPS Diskless Network storage Controller DIGITAL HUBBUB Agile Software development HCI (Human Computer Interaction ) in software applications Embedded systems Infini band The SAT (SIM Application Toolkit) Computer forensics Multiterabit networks Virtual Key boards Micro trends in Server Technology FLEX 2 AJAX DAta Mining Extreme programming Software synthesis for embedded systems Small Computer System Interface Advanced Airlines baggage management systems The TIGER SHARC Processor

Laptop security using biometric sensors Multicasing REINS (Real Estate Information Network Systems) Integrated Digital Enhanced Network(i-DEN) Symfony (web application framework) WiFiber Direct Memory Access Infini bridge Cyberware 3D Object Extraction Using GIS Database Page Stealer Process 3D Printers Web Services in Gridcomputing Qubit PC CD Based Firewall Decision diagrams in VLSI CAD Bandwidth Aggregator Atomic CPU Fluorescent Multilayer Optical Data Storage Email-Service & Webhosting Virtual Integration SMART Programming Object Relational Mapping ASpect Oriented Programmin Steganography and digital watermarking Verifying Infinite State Systems New Generation Of Chips Precision Image Search Evolotion of bluetooth Nanocrystal Memory Devices Ultra Wideband Networking Studying in a "Virtual University AppleTalk Combinatorial Optimization Quantum Software And Quantum Computer Development Metadata application profile XML Query Languages AMD Processors Digital Video Encoding Formats 3-D Assembly Of Magnetic And Semiconducting Nanoparticles Service oriented Architectures Enterprise Service Bus Phase Change Memory Technology

Object Oriented Design using Verilog HDL WiBro Zero Knowledge proofs 3-D Chip Stacking Technique Integrating Structural Design and Formal Methods in RealTime System Design Glass Glue The Interactive Classroom Embedded Computing Wireless Internet Quadrics Interconnection Networks Home Automation using Handspring PDA

o o o o o o o o o o o o o o o o o o o o o o o o o o

Extreme Programming The TIGER SHARC Processor CoCoon Quantum dot lasers Firewalls Steganography - The art of hiding information Infini Bridge Symfony- web application framework for PHP5 projects Hybrid ARQ Genetic programming Intrusion Detection System Multiterabit networks WiFiber Planning And Synthesis Based On Workflows Orthogonal Frequency Division Multiple Access (OFDMA) Small Computer System Interface MiWi Wireless Protocol Fixed Mobile Convergence Waterproof Wireless Mouse Phase Change memory Kerberos Wireless Payment System Spam Assassin MST in telecommunication networks Embedded Viavoice(R) Technology Object Oriented Type Systems

Scalable streaming media system Navigating the Internet Cryptography and complexity dns Software defenses against malicious code Admission/Overload Control of Web Servers

Structured peer-to-peer overlay networks Wireless Metal Detection System Magnetic Resonance Imaging Worldwide Interoperatibility for Microwave Access (WiMAX) Parallel Computing In India 64 BIT Computing Data Security in Local Network using Distributed Firewalls Resilient Packet Ring Technology Membrane computing Probabilistic data set generation Scalable streaming media system Atomic Scale Memory At A Silicon Surface Perpendicular Recording Next Generation Internet (NGI) Further advanced network initiatives Program Transformations For Verifying Protocols

OS Virtualisation Dermal nanotech Display Architectures for media processing Data Integrity in SANS Frameworks for web Applications Chat Server SQL Server Integration HD Graphics Biologically Inspired Intelligent Computer Leased like mail Back Up Augmented Reality Storage Networking Digital Subscriber Line Web Server Zetaflops Computing Antivirus Protection Towards Photorealism Mobile Data Protection System Orthogonal frequency Division Multiplexing (OFDM) Fire Wall Bluetooth Based Smart Sensor Networks Novel routing protocols for wireless sensor networks Cluster computing Stereoscopic Imaging

Free Space OpticsProbabilistic Process Algebra


Managing Data with emerging technologies Tabling And Lazy Evaluation For Efficient Evaluation Flash-OFDM: An Approach for All-IP Wireless Networking Real-Time Computing and Communication SPICE Simulation and Signal Integrity Principles for High Performance Digital Designs Microsoft passport Internet2 Security considerations in deploying wireless LANs (W-LANS) and GSM/UMTS RESTful Web Services Natural language processing Web Services in Office Environment QoS for Multimedia in Wireless Networks Introspective networks METS - Metadata Encoding and Transmission Standard Pivot Vector Space Approach in Audio-Video Mixing Performance analysis of multi-tiered software and hardware servers A Radio Controlled Video Vehicle design Proactive computing RSS Feeds Brainwave Technology High Link Capacities for 4G: Aspects of MIMO Signal Processing Wireless Network Planning Models: a comparative study for 2G, 3G, and beyond Affective Computing Chip design for tolerance of process variation Scale-free topology in information networks Visual Information Technology Model Checking Multi-Threaded Java Programs Weblogging Cyberspace Classroom Design And Optimization By Incremental Computation web knowledge processing data center planning and design Impacts of contention on locking Generic Framing Procedure Trustworthy Computing Automated Remote Data Logger Small Computer System Interface Computerized Paper Evaluation using Neural Network iSCSI-Future of Network Storage 10 GIGABIT ETHERNET IP Telephony Adding Intelligence to Internet

Digital Multimedia Broadcasting (DMB) Ext3 Filesystem Interactive television Architectural or compiler-level low-power techniques Java Servlets Internet Distributed Computing (Idc) SALT- Speech Application Language Tags Boot Sector Programming Timing Attacks on Implementations Prototype System Design for Telemedicine Natural Language Processing Parallel and Distributed Computation Optical Burst Switching Border Security Using Wireless Integrated Network Sensors (WINS) GSM Security and Encryption Quantum cryptography Image Processing & Compression DELAY tolerant networks Membrane Keyboard Cybernetics Facility Layout Design using Genetic Algorithm Design of 2-D Filters using a Parallel Processor Architecture

o o o o o o o o o o o o o o o o o o o o o

Dynamically Reconfigurable Computing Industrial Applications using Neural Networks Optical Camoflague Causes of Failure in Web Applications Wireless Networked Digital Devices Software Agents OmniPeek Overview Cognitive Machines Machine Descriptions for Retargetable Compilation Methods of Machine Translation (MT) Computational Biology In-lining and Identification of duplicate code Thermomechanical Data Storage Programming Languages, Compilers, Data Flow Analysis Tracking Dynamic Data Verfication of Asynchronously communicating web services Admission/Overload Control of Web Servers Socket Programming Adding Intelligence to Internet Low Power UART Design for Serial Data Communication Compact peripheral component interconnect

o o o o o o o

Light Tree Terrestrial Trunked Radio Smart Note Taker Networking via Message-Passing Data Security in Local Network using Distributed Firewalls Significance of real-time transport Protocol in VOIP New generations of mobile networks

Asynchronous timing analysis Performance analysis of multi-tiered software and hardware servers Array Liveness Analysis Forensic Analysis for Network Security Reconfigurable computing Distributed Denial of Service Attacks Cryptographic protocols SALT ( Speech Application Language Tags) Computer-supported Modeling and Reasoning Security Engineering Web Crawling Automated Generation of Attack Signatures control monitoring on difrent muchine with the help of computer
Speech Technology

Ubuntu-Linux for Human Beings Google Earth Daknet Radio propagation modeling The Mbone And Multicasting Record pair classification techniques Dynamic Cache Management Technique PON Topologies Implementation Of Zoom FFT Adding Intelligence to Internet Compiler techniques for multimedia codes on general-purpose architectures Pluggable Authentication Modules (Pam) Content Scrambling System Pine and IMP - a New Web-Based Email Program Intrution Detection System 3D optical Data Storage Technology Modern Brain-Computer Interface Remote OS Deployment Multi Energy Based X-Ray Baggage Inspection System Aspect-oriented programming (Aop) Magneto resistive Random Access Memory (MRAM) CAS (Conditional Access System)

Orthogonal Frequency Division Multiplplexing Voice over Internet Protocol (VoIP) Self Protecting Servers The IKE protocol Privacy and security of low-powered devices (rfid) Distributed Hash Tables Cryptography: Human-Centric Protocols Re-architecting & Internet Protocols Network Security and its Principles Cryptography Application "Arms race" in malware Popular Security Protocols Future use of biometric technology for security and authentication Homeland security application Natural Language Resources for Information Extraction Meaning Based Multilingual Search Engine Embedded Visual C++ Synchronization Problems and their classification Aspect mining from Object Oriented Code Limits of silicon technology Symbolic vs. Computational view of security protocols Benefits of Parallel and Distributed Computing 4g Wireless Systems Peer-to-Peer Wireless Networks AS2 protocol for file transfers Client/server-based programming for Pocket PCs Detecting Jamming attacks in Wireless Networks High Speed Uplink Packet Access (HSUPA) Re-coding of the system for Mobile Devices and Internet Wireless Application Protocol ATM Virtual Connections DNA Computing in Security Data Compression with Huffman Algorithms 0wn the Internet OpenGPG encryption Randomized Algorithms and Networking Hardware Plastic Displays Proxy-Based Internet Services Trends in SiGE BiCMOS Technology Low Power, Low Noise and High-Speed VLSI Circuits Using Quantum MOS Technology SRAM Sense Amplifiers Web addresses in non-Latin scripts Network Security, The Hirschmann Way

Java rings Style Translation for Human Motion Internet access 'a human right' ? Energy Recovery VLSI Design Compilation issues in Object Oriented Programming Languages 'Next generation' wi-fi Pattern-based intrusion detection CMOS Analog Circuits for Wireless Communications Programmable Interconnect Fabrics Verifying infinite state systems Video screens hit paper magazines Web Browser Security Digital Preservation Cellonics Technology TETRA-TErrestrial Trunked Radio Virtual Network Computing Adaptive query processing/optimization Video game: Call of Duty: Modern Warfare 2 Migrating legacy devices to Ethernet Dynamic spectrum management (DSM) Industrial Connectivity: Passive Product Technology Reconstruction of Solid Models from Oriented Point Sets Holographic Storage Technologies Glassfish Wireless Printing Apple iPad What makes CSS so powerful? Multi-Wafer Virtual Probe Android mobiles Program transformations for verifying protocols Microarchitecture Level Power Management Cloud Computing GSM Security And Encryption Metering net traffic BT's super-fast broadband network Cross Lingual Meaning Based Search Distributed Visualization of Geometric Algorithms Windows 7 - The new OPerating System Semantic Web Google Android- Mobile OS from Google Fourth-Generation Broadband Rise of internet social networking Ubuntu-Linux for Human Beings

Vorbis Data over Cable System (DOCSIS) Secure multiparty computations without computers Simultaneous Multithreading Digital Visual Interface

Você também pode gostar