IEEE 2012 Java and .Net Titles
1. A Novel Data Embedding Method Using Adaptive Pixel Pair
Matching
|
2. A Probabilistic Model of Visual Cryptography Scheme With
Dynamic Group
|
3. A Secure Intrusion detection system against DDOS attack in
Wireless Mobile Ad-hoc Networks
|
4. Active Visual Segmentation
|
5. AMPLE An Adaptive Traffic Engineering System Based on Virtual
Routing Topologies
|
6. An Efficient Adaptive Deadlock-Free Routing Algorithm for
Torus Networks
|
7. Characterizing the Efficacy of the NRL Network Pump in
Mitigating Covert Timing Channels
|
8. Cooperative download in vehicular environments
|
9. Defenses Against Large Scale Online Password Guessing Attacks
by using Persuasive click Points
|
10. Design and Implementation of TARF A Trust-Aware Routing
Framework for WSNs
|
11. Discovering Characterizations of the Behavior of Anomalous
Sub-populations
|
12. Efficient Audit Service Outsourcing for Data Integrity in
Clouds
|
13. Ensuring Distributed Accountability for Data Sharing in the
Cloud
|
14. Fast Matrix Embedding by Matrix Extending
|
15. FireCol A Collaborative Protection Network for the Detection
of Flooding DDoS Attacks
|
16. Learn to Personalized Image Search from the Photo Sharing
Websites
|
17. Load Balancing Multipath Switching System with Flow Slice
|
18. Network Assisted Mobile Computing with Optimal Uplink Query
Processing
|
19. Outsourced Similarity Search on Metric Data Assets
|
20. Privacy- and Integrity-Preserving Range Queries in Sensor
Networks
|
21. Query Planning for Continuous Aggregation Queries over a
Network of Data Aggregators
|
22. Ranking Model Adaptation for Domain-Specific Search
|
23. Risk-Aware Mitigation for MANET Routing Attacks
|
24. Scalable and Secure Sharing of Personal Health Records in
Cloud Computing using Attribute-based Encryption
|
25. Semi supervised Biased Maximum Margin Analysis for Interactive
Image Retrieval
|
26. SPOC A Secure and Privacy preserving Opportunistic Computing
Framework for Mobile Healthcare Emergency
|
27. The Three-Tier Security Scheme in Wireless Sensor Networks
with Mobile Sinks
|
28. Topology Control in Mobile Ad Hoc Networks with Cooperative
Communications
|
29. Towards Accurate Mobile Sensor Network Localization in Noisy
Environments
|
30. View-invariant action recognition based on Artificial Neural
Networks
|
31. Fast Data Collection in Tree-Based Wireless Sensor Networks
|
32. Packet-Hiding Methods for Preventing Selective Jamming Attacks
|
33. Distributed Throughput Maximization in Wireless Networks via
Random Power Allocation
|
34. Automatic Reconfiguration for Large-Scale Reliable Storage
Systems
|
35. A New Cell Counting Based Attack Against Tor
|
No comments:
Post a Comment