Escolar Documentos
Profissional Documentos
Cultura Documentos
Domain
Network Network Mobile Computing Network Security Mobile Computing Network Mobile Computing Network Network Security Mobile Computing Network Security Mobile Computing Network Security Mobile Computing Network Network Security Mobile Computing Network Network Security Mobile Computing Network Security Network Mobile Computing Network Security Network Mobile Computing Network Network Security Mobile Computing Network Network Network Security Mobile Computing Network Security Mobile Computing Network Security Network Security Mobile Computing Network Security Mobile Computing Network Security Network Mobile Computing Network Security Mobile Computing Network Security Mobile Computing
Lang/Year
2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/ .Net 2010/Java 2010/Java 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/Java 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net
Beacon-Assisted Spectrum Access with Cooperative Cognitive Transmitter and Receiver Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks Fast Algorithms for Resource Allocation in Wireless Cellular Networks Distributed Algorithms for Minimum Cost Multicast With Network Coding Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast Replication Routing in DTNs: A Resource Allocation Approach A Fitting Report Position Scheme for the Gated IPACT Dynamic Bandwidth Algorithm in EPONs POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority
Mobile Computing Network Network Network Network Network Network Network Network Network
2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net
S.N.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18.
Domain
Mobile Computing Mobile Computing Network Computing Mobile Computing Mobile Computing Distribute Computing Network Computing Mobile Computing Distribute Computing Network Computing Mobile Computing Mobile Computing Mobile Computing Distribute Computing Mobile Computing Secure Computing Network Computing Mobile Computing
Lang/Year 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net
19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47.
Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services Route Stability in MANETs under the Random Direction Mobility Model Secure and Policy-Complaint Source Routing Single-Link Failure Detection in All-Optical Networks Using Spread-Spectrum Watermarking Security The Effectiveness of Checksums for Embedded Control Networks Two Blocking Algorithm on Adaptive Binary Splitting Single and Pair Resolutions for RFID Tag Identification Virus Spread in Networks Capturing Router Congestion and Delay Continuous Monitoring of Spatial Queries in Wireless Broadcast Energy Maps For Mobile Wireless networks coherence Time Versues Spreding Period Energy-Efficient SINR-Based Routing for Multihop Wireless Evaluating the Vulnerability of Network Traffic Using Joint Large Connectivity for Dynamic Random Geometric Graphs Measuring Capacity Bandwidth of Targeted Path Segments Mitigation of Control Channel Jamming Under Node Capture Attacks Mobility Management Approaches for Mobile IP Networks Multiple Routing Configurations for Fast IP Network Recovery Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks SIMPS Using Sociology for Personal Mobility Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing Dynamic Routing with Security Considerations Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos Detecting Malicious Packet Losses On the Security of Route Discovery in MANETs A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment Facial Recognition using multisensor images based on localized kernel eigen spaces
Network Computing Network Computing Mobile Computing Network Computing Network Computing Secure Computing Secure Computing Network Computing Network Computing Network Computing Mobile Computing Mobile Computing Mobile Computing Network Computing Mobile Computing Network Computing Mobile Computing Mobile Computing Network Computing Network Computing Mobile Computing Network Computing Secure Computing Secure Computing Image Processing Distribute Computing Secure Computing Distribute Computing Image Processing
2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/.Net 2009/Java 2009/Java
S.N.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45.
Domain
Network Computing Mobile Computing Mobile Computing Mobile Computing Secure Computing Network Computing Network Computing Network Computing Network Computing Distribute Computing Data Mining Software Engineering Distribute Computing Network Computing Network Computing Multimedia Computing Secure Computing Mobile Computing Image Processing Image Processing Data Mining Mobile Computing Multimedia Network Secure Computing Image Processing Networking Data Mining Mobile Computing Transportation System Data Mining Network Computing Secure Computing Secure Computing Network Computing Network Computing Network Computing Secure Computing Network Computing Data Mining Network Computing Secure Computing Distribute Computing Data Mining Secure Computing
Lang/Year 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/J2EE 2008/.Net 2008/.Net 2008/.Net 2008/Java 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/Java 2008/.Net 2008/Java 2008/Java 2008/.Net 2008/Java 2008/.Net 2008/.Net 2008/Java 2008/.Net 2008/Java 2008/J2EE 2008/Java 2008/J2EE 2008/Java 2008/J2EE 2008/Java Lang/Year Java/2006 Java/2007 Java/2005
S.N.
1. 2. 3.
Domain
Distribute Computing Secure Computing Image Processing
4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 26. 27. 28. 29. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50.
Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks Noise Reduction by Fuzzy Image Filtering Online Handwritten Script Recognition ODAM: An Optimized Distributed Association Rule Mining Algorithm Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks ITP: An Image Transport Protocol for the Internet Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS) Network border patrol: preventing congestion collapse and promoting fairness in the Internet Application of BPCS steganography to wavelet compressed video Neural Networks for Unicode Optical Character Recognition An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Mobile Agents In Distributed Multimedia Database Systems Image Stream Transfer Using Real-Time Transmission Protocol Personal Authentication Using 3-D Finger Geometry Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks A Memory Learning Framework for Effective Image Retrieval Personal Identification Based On Iris Texture Analysis GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions Workflow Mining Discovering Process Models from Event Logs Identification of Humans Using Gait Location Aided Routing In Mobile AD-HOC Networks Neural Network Based Face Detection
Network Computing Image Processing Network Computing Image Processing Image Processing Data Mining Image Processing Network Computing Network Computing Secure Computing Network Computing Secure Computing Image Processing Network Computing Network Computing Network Computing Multimedia Image Processing Image Processing Network Computing Image Processing Image Processing Data Mining Data Mining Image Processing Network Computing Image Processing Network Computing Image Processing Network Computing Image Processing Image Processing Image Processing Image Processing Secure Computing Network Computing Image Processing System Secure Computing Secure Computing Network Computing Network Computing System Network Computing Image Processing Network Computing Image Processing
Java/2005 . Net/2006 Java/2004 Java/2006 Java/2004 Java/2004 Java/2004 Java/2006 Java/2002 J2EE/2007 Java/2004 Java/2004 . Net/2004 Java/2007 Java/2004 Java/2005 Java/2004 Java/2006 Java/2006 . Net/2005 Java/2005 Java/2003 Java/2005 .Net/2004 Java/2004 Java/2004 VC++/2002
Java Java Java Java
VC++ VC++ C# .Net C# .Net C# .Net C# .Net C# .Net VC++ C# .Net Java Java Java Java C# .Net VB, C++ C# .Net