CODE
NO
|
PROJECT
TITLE
|
YEAR
|
TSDNS1
|
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE
SYSTEMS
|
2016
|
TSDNS2
|
A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN
THE CLOUD
|
2016
|
TSDNS3
|
A SEMANTICS-AWARE APPROACH TO THE AUTOMATED NETWORK PROTOCOL
IDENTIFICATION
|
2016
|
TSDNS4
|
COST MINIMIZATION FOR RULE CACHING IN SOFTWARE DEFINED NETWORKING
|
2016
|
TSDNS5
|
TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS
CONTROL SYSTEM IN PUBLIC CLOUD STORAGE
|
2016
|
TSDNS6
|
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCHSUPPORTING CLASSIFIED
SUB-DICTIONARIES OVER ENCRYPTED CLOUD DATA
|
2016
|
TSDNS7
|
ON THE FINGERPRINTING OF SOFTWARE-DEFINED NETWORKS
|
2016
|
TSDNS8
|
ACTIVETRUST: SECURE AND TRUSTABLE ROUTING IN WIRELESS
SENSOR NETWORKS
|
2016
|
TSDNS9
|
CHERRY-PICKING RELIABLE PUF BITS WITH DIFFERENTIAL
SEQUENCE CODING
|
2016
|
TSDNS10
|
EFFICIENT AND ANONYMOUS MOBILE USER AUTHENTICATION
PROTOCOL USING SELF-CERTIFIED PUBLIC KEY CRYPTOGRAPHY FOR MULTI-SERVER
ARCHITECTURES
|
2016
|
TSDNS11
|
FORMAL VERIFICATION OF THE XDAUTH PROTOCOL
|
2016
|
TSDNS12
|
PPM-HDA: PRIVACY-PRESERVING AND MULTIFUNCTIONAL HEALTH
DATA AGGREGATION WITH FAULT TOLERANCE
|
2016
|
TSDNS13
|
A WEB TRAFFIC ANALYSIS ATTACK USING ONLY TIMING
INFORMATION
|
2016
|
TSDNS14
|
STEGANALYSIS FEATURES FOR CONTENT-ADAPTIVE JPEG
STEGANOGRAPHY
|
2016
|
TSDNS15
|
AUDITING A CLOUD PROVIDER’S COMPLIANCE WITH DATA BACKUP
REQUIREMENTS: A GAMETHEORETICAL ANALYSIS
|
2016
|
TSDNS16
|
GENERIC AND EFFICIENT CONSTRUCTIONS OF ATTRIBUTE-BASED
ENCRYPTION WITH VERIFIABLE OUTSOURCED DECRYPTION
|
2016
|
TSDNS17
|
GROUP SECRET KEY GENERATION IN WIRELESS NETWORKS:
ALGORITHMS AND RATE OPTIMIZATION
|
2016
|
TSDNS18
|
ON THE INDIVIDUAL SECRECY CAPACITY REGIONS OF THE GENERAL,
DEGRADED, AND GAUSSIAN MULTI-RECEIVER WIRETAP BROADCAST CHANNEL
|
2016
|
TSDNS19
|
CONTINUOUS AND TRANSPARENT USER IDENTITY VERIFICATION FOR
SECURE INTERNET SERVICES
|
2015
|
TSDNS20
|
PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA
EXPOSURE
|
2015
|
TSDNS21
|
ANONYMOUS TWO-FACTOR AUTHENTICATION IN
DISTRIBUTED SYSTEMS: CERTAIN GOALS ARE BEYOND ATTAINMENT
|
2015
|
TSDNS22
|
MINIMIZING TRANSMISSION COST FOR THIRD-PARTY INFORMATION
EXCHANGE WITH NETWORK CODING
|
2015
|
TSDNS23
|
COST-AWARE SECURE ROUTING (CASER) PROTOCOL DESIGN FOR
WIRELESS SENSOR NETWORKS
|
2015
|
TSDNS24
|
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
|
2015
|
TSDNS25
|
DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR
DETECTING MASQUERADE ATTACKS
|
2015
|
TSDNS26
|
SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR
NETWORKS IN THE PRESENCE OF COLLUSION ATTACKS
|
2015
|
TSDNS27
|
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE
BASED ON HARD AI PROBLEMS
|
2014
|
TSDNS28
|
SECRET KEY GENERATION IN THE TWO-WAY RELAY CHANNEL WITH
ACTIVE ATTACKERS
|
2014
|
TSDNS29
|
KEY MANAGEMENT FOR STATIC WIRELESS SENSOR NETWORKS WITH
NODE ADDING
|
2014
|
TSDNS30
|
SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS:
FILTERING OUT THE ATTACKER’S IMPACT
|
2014
|
TSDNS31
|
DYNAMIC AUTHENTICATION WITH SENSORY INFORMATION FOR THE
ACCESS CONTROL SYSTEMS
|
2014
|
TSDNS32
|
FINGERPRINT COMPRESSION BASED ON SPARSE REPRESENTATION
|
2014
|
TSDNS33
|
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED
WIRELESS SENSOR NETWORKS
|
2014
|
TSDNS34
|
A PROBABILISTIC MISBEHAVIOR DETECTION SCHEME TOWARD
EFFICIENT TRUST ESTABLISHMENT IN DELAY-TOLERANT NETWORKS
|
2014
|
TSDNS35
|
SECURE CONTINUOUS AGGREGATION IN WIRELESS SENSOR NETWORKS
|
2014
|
TSDNS36
|
ENFORCING SECURE AND PRIVACY-PRESERVING INFORMATION
BROKERING IN DISTRIBUTED INFORMATION SHARING
|
2013
|
TSDNS37
|
SORT: A
SELF-ORGANIZING TRUST MODEL FOR PEER-TO-PEER SYSTEMS
|
2013
|
TSDNS38
|
SECURE CONTINUOUS AGGREGATION IN WIRELESS SENSOR NETWORKS
|
2013
|
TSDNS39
|
NETWORK CODING AWARE COOPERATIVE MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS
|
2013
|
TSDNS40
|
A SECURE PAYMENT SCHEME WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTIHOP WIRELESS
NETWORKS
|
2013
|
TSDNS41
|
ENFORCING SECURE AND PRIVACY-PRESERVING INFORMATION BROKERING IN DISTRIBUTED INFORMATION
SHARING
|
2013
|
TSDNS42
|
SPOC: A SECURE AND PRIVACY-PRESERVING OPPORTUNISTIC COMPUTING FRAMEWORK FOR MOBILE-HEALTHCARE
EMERGENCY
|
2013
|
TSDNS43
|
PACKET-HIDING METHODS
FOR PREVENTING SELECTIVE JAMMING ATTACKS
|
2012
|
TSDNS44
|
OPASS: A USER AUTHENTICATION PROTOCOL RESISTANT TO PASSWORD STEALING AND PASSWORD REUSE
ATTACKS
|
2012
|
TSDNS45
|
DESIGN AND IMPLEMENTATION OF TARF:A TRUST-AWARE ROUTING FRAMEWORK FOR WSNS
|
2012
|
TSDNS46
|
DETECTING SPAM ZOMBIES BY MONITORING OUTGOING MESSAGES
|
2012
|
TSDNS47
|
REVISITING DEFENSES AGAINST LARGE-SCALE ONLINE PASSWORD GUESSING ATTACKS
|
2012
|
TSDNS48
|
SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
|
2012
|
TSDNS49
|
PERSUASIVE CUED CLICK-POINTS: DESIGN, IMPLEMENTATION, AND EVALUATION OF AKNOWLEDGE-BASED
AUTHENTICATION MECHANISM
|
2012
|
TSDNS50
|
DOUBLEGUARD: DETECTING INTRUSIONS IN MULTITIER WEB APPLICATIONS
|
2012
|
CODE
NO
|
PROJECT
TITLE
|
YEAR
|
TSDN1
|
CONTENT-AWARE CONCURRENT MULTIPATH TRANSFER FOR HIGH-DEFINITION VIDEO
STREAMING OVER HETEROGENEOUS WIRELESS NETWORKS
|
2016
|
TSDN2
|
DICTIONARY BASED SECURE PROVENANCE COMPRESSION FOR WIRELESS SENSOR
NETWORKS
|
2016
|
TSDN3
|
DISCHARGING THE NETWORK FROM ITS FLOW CONTROL HEADACHES: PACKET DROPS
AND HOL BLOCKING
|
2016
|
TSDN4
|
MOBILITY PREDICTION BASED JOINT STABLE ROUTING AND CHANNEL ASSIGNMENT
FOR MOBILE AD HOC COGNITIVE NETWORKS
|
2016
|
TSDN5
|
SIMULTANEOUSLY GENERATING SECRET AND PRIVATE KEYS
IN A COOPERATIVE PAIRWISE-INDEPENDENT NETWORK
|
2016
|
TSDN6
|
TASK SCHEDULING FOR MAXIMIZING PERFORMANCE
AND RELIABILITY CONSIDERING FAULT RECOVERY
IN HETEROGENEOUS DISTRIBUTED SYSTEMS
|
2016
|
TSDN7
|
TOWARDS DISTRIBUTED OPTIMAL MOVEMENT STRATEGY
FOR DATA GATHERING IN WIRELESS SENSOR NETWORKS
|
2016
|
TSDN8
|
BOOSTING PARALLEL
FILE SYSTEM PERFORMANCE VIA HETEROGENEITY-AWARE SELECTIVE DATA LAYOUT
|
2016
|
TSDN9
|
FAST COMPRESSION
OF LARGE SEMANTIC WEB DATA USING X10
|
2016
|
TSDN10
|
STI-BT: A
SCALABLE TRANSACTIONAL INDEX
|
2016
|
TSDN11
|
GENERAL APPROACH
TO SCALABLE BUFFER POOL MANAGEMENT
|
2016
|
TSDN12
|
IP FAST REROUTING
AND DISJOINT MULTIPATH ROUTING WITH THREE EDGE-INDEPENDENT SPANNING TREES
|
2016
|
TSDN13
|
TAG-ORDERING
POLLING PROTOCOLS IN RFID SYSTEMS
|
2016
|
TSDN14
|
PACKET-LEVEL
NETWORK COMPRESSION: REALIZATION AND SCALING OF THE NETWORK-WIDE BENEFITS
|
2016
|
TSDN15
|
THROUGHPUT AND
DELAY IN HETEROGENEOUS COGNITIVE RADIO NETWORKS WITH COOPERATIVE SECONDARY USERS
|
2015
|
TSDN16
|
MAXIMIZING
NETWORK TOPOLOGY LIFETIME USING MOBILE NODE ROTATION
|
2015
|
TSDN17
|
INCENTIVE-DRIVEN
AND FRESHNESS-AWARE CONTENT DISSEMINATION IN SELFISH OPPORTUNISTIC MOBILE
NETWORKS
|
2015
|
TSDN18
|
AN EFFICIENT DISTRIBUTED TRUST MODEL FOR WIRELESS
SENSOR NETWORKS
|
2015
|
TSDN19
|
A DISTRIBUTED
FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS
WIRELESS SENSOR
NETWORKS
|
2015
|
TSDN20
|
AUTHENTICATED KEY
EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
|
2015
|
TSDN21
|
AN EFFICIENT DISTRIBUTED TRUST MODEL FOR WIRELESS
SENSOR NETWORKS
|
2015
|
TSDN22
|
A DISTRIBUTED
FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS
WIRELESS SENSOR
NETWORKS
|
2015
|
TSDN23
|
PACK:
PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM
|
2014
|
TSDN24
|
DYNAMIC
AUTHENTICATION WITH SENSORY INFORMATION FOR THE ACCESS CONTROL SYSTEMS
|
2014
|
TSDN25
|
SECURE DATA
RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS
|
2014
|
TSDN26
|
RELIABLE
BULK-DATA DISSEMINATION IN DELAY TOLERANT NETWORKS
|
2014
|
TSDN27
|
LIGHTWEIGHT
PRIVACY-PRESERVING AND SECURE COMMUNICATION PROTOCOL FOR HYBRID AD HOC WIRELESS
NETWORKS
|
2014
|
TSDN28
|
NETWORK CODING
AWARE COOPERATIVE MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS
|
2014
|
TSDN29
|
FAST TRANSMISSION
TO REMOTE COOPERATIVE GROUPS: A NEW KEY MANAGEMENT PARADIGM
|
2014
|
TSDN30
|
DISTORTION-AWARE
SCALABLE VIDEO STREAMING TO MULTINETWORK CLIENTS
|
2013
|
TSDN31
|
A DISTRIBUTED
CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS
|
2013
|
TSDN32
|
A HIGHLY SCALABLE
KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS
|
2013
|
TSDN33
|
FAST TRANSMISSION TO REMOTE
COOPERATIVE GROUPS:A NEW KEY MANAGEMENT PARADIGM
|
2013
|
TSDN34
|
COOPERATIVE DEFENSE AGAINST
POLLUTION ATTACKS IN NETWORK CODING USING SPACEMAC
|
2012
|
TSDN35
|
ABNORMALLY MALICIOUS AUTONOMOUS
SYSTEMS AND THEIR INTERNET CONNECTIVITY
|
2012
|
TSDN36
|
MITIGATING ROUTING
MISBEHAVIOR IN DISRUPTION TOLERANT NETWORKS
|
2012
|
TSDN37
|
IMPROVING ENERGY SAVING AND
RELIABILITY IN WIRELESS SENSOR NETWORKS USING A SIMPLE CRT-BASED
PACKET-FORWARDING SOLUTION
|
2012
|
CODE
NO
|
PROJECT
TITLE
|
YEAR
|
TSDD1
|
A SIMPLE MESSAGE-OPTIMAL ALGORITHM FOR RANDOM SAMPLING FROM A DISTRIBUTED STREAM
|
2016
|
TSDD2
|
EFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS
|
2016
|
TSDD3
|
EFFICIENT R-TREE BASED INDEXING SCHEME FOR SERVER-CENTRIC CLOUD STORAGE SYSTEM
|
2016
|
TSDD4
|
HIERARCHICAL SPATIO-TEMPORAL PATTERN DISCOVERY AND PREDICTIVE MODELING
|
2016
|
TSDD5
|
INFERENCE OF REGULAR EXPRESSIONS FOR TEXT EXTRACTION FROM EXAMPLES
|
2016
|
TSDD6
|
KNNVWC: AN EFFICIENT K-NEAREST NEIGHBORS APPROACH BASED ON VARIOUS-WIDTHS CLUSTERING
|
2016
|
TSDD7
|
LOCATION AWARE KEYWORD QUERY SUGGESTION BASED ON DOCUMENT PROXIMITY
|
2016
|
TSDD8
|
MINING HIGH UTILITY PATTERNS IN ONE PHASE WITHOUT GENERATING CANDIDATES
|
2016
|
TSDD9
|
NATERGM: A MODEL FOR EXAMINING THE ROLE OF NODAL ATTRIBUTES IN DYNAMIC SOCIAL MEDIA
NETWORKS
|
2016
|
TSDD10
|
NODE IMMUNIZATION ON LARGE GRAPHS: THEORY AND ALGORITHMS
|
2016
|
TSDD11
|
PRACTICAL APPROXIMATE K NEAREST NEIGHBOR QUERIES WITH LOCATION AND QUERY PRIVACY
|
2016
|
TSDD12
|
PROBABILISTIC STATIC LOAD-BALANCING OF PARALLEL MINING OF FREQUENT SEQUENCES
|
2016
|
TSDD13
|
SEMI-SUPERVISED NONLINEAR DISTANCE METRIC LEARNING VIA FORESTS OF MAX-MARGIN CLUSTER
HIERARCHIES
|
2016
|
TSDD14
|
SENTIMENT EMBEDDINGS WITH APPLICATIONS TO SENTIMENT ANALYSIS
|
2016
|
TSDD15
|
SIMILARITY MEASURE SELECTION FOR CLUSTERING TIME SERIES DATABASES
|
2016
|
TSDD16
|
SURVEY ON ASPECT-LEVEL SENTIMENT ANALYSIS
|
2016
|
TSDD17
|
TASC:TOPIC-ADAPTIVE SENTIMENT CLASSIFICATION ON DYNAMIC TWEETS
|
2016
|
TSDD18
|
TEMPORAL SKELETONIZATION ON SEQUENTIAL DATA: PATTERNS, CATEGORIZATION, AND VISUALIZATION
|
2016
|
TSDD19
|
A SCALABLE DATA CHUNK SIMILARITY BASED COMPRESSION APPROACH FOR EFFICIENT BIG SENSING
DATA PROCESSING ON CLOUD
|
2016
|
TSDD20
|
D-TOSS: A DISTRIBUTED THROWAWAY SPATIAL INDEX STRUCTURE FOR DYNAMIC LOCATION DATA
|
2016
|
TSDD21
|
MINING HEALTH EXAMINATION RECORDS—A GRAPH-BASED APPROACH
|
2016
|
TSDD22
|
MAVE: MULTILEVEL WRAPPER VERIFICATION SYSTEM
|
2016
|
TSDD23
|
PREFIX-ADAPTIVE AND TIME-SENSITIVE PERSONALIZED QUERY AUTO COMPLETION
|
2016
|
TSDD24
|
CONTEXTUAL OPERATION FOR RECOMMENDER SYSTEMS
|
2016
|
TSDD25
|
DISCOVERING THE K REPRESENTATIVE SKYLINE OVER A SLIDING WINDOW
|
2016
|
TSDD26
|
EXPLAINING MISSING ANSWERS TO TOP-K SQL QUERIES
|
2016
|
TSDD27
|
INCREMENTAL EVOLVING DOMAIN ADAPTATION
|
2016
|
TSDD28
|
SET MATCHING MEASURES FOR EXTERNAL CLUSTER VALIDITY
|
2016
|
TSDD29
|
K-SUBSPACES QUANTIZATION FOR APPROXIMATE NEAREST NEIGHBOR SEARCH
|
2016
|
TSDD30
|
ENTROPY OPTIMIZED FEATURE-BASED BAG-OF-WORDS REPRESENTATION FOR INFORMATION RETRIEVAL
|
2016
|
TSDD31
|
ACTIVE LEARNING FOR RANKING THROUGH EXPECTED LOSS OPTIMIZATION
|
2015
|
TSDD32
|
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
|
2015
|
TSDD33
|
LEARNING TO RANK USING USER CLICKS AND VISUAL FEATURES FOR IMAGE RETRIEVAL
|
2015
|
TSDD34
|
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORATIVE
SERVICES
|
2015
|
TSDD35
|
LINQ: A FRAMEWORK FOR LOCATION-AWARE INDEXING AND QUERY PROCESSING
|
2015
|
TSDD36
|
SCALABLE DISTRIBUTED PROCESSING OF K NEAREST NEIGHBOR QUERIES OVER MOVING OBJECTS
|
2015
|
TSDD37
|
RRW—A ROBUST AND REVERSIBLE WATERMARKING TECHNIQUE FOR RELATIONAL DATA
|
2015
|
TSDD38
|
PROGRESSIVE DUPLICATE DETECTION
|
2015
|
TSDD39
|
REVERSE NEAREST NEIGHBORS IN UNSUPERVISED DISTANCE-BASED OUTLIER DETECTION
|
2015
|
TSDD40
|
AUTHENTICATION OF MOVING TOP-K SPATIAL KEYWORD QUERIES
|
2015
|
TSDD41
|
FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE
|
2014
|
TSDD42
|
ACCURACY-CONSTRAINED PRIVACY-PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA
|
2014
|
TSDD43
|
FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS
|
2014
|
TSDD44
|
PRIVACY-PRESERVING AND CONTENT-PROTECTING LOCATION BASED QUERIES
|
2014
|
TSDD45
|
KEYWORD QUERY ROUTING
|
2014
|
TSDD46
|
TRUSTEDDB: A TRUSTED HARDWARE-BASED DATABASE WITH PRIVACY AND DATA CONFIDENTIALITY
|
2014
|
TSDD47
|
A SIMILARITY MEASURE FOR TEXT CLASSIFICATION AND CLUSTERING
|
2014
|
TSDD48
|
COMMTRUST:
COMPUTING MULTI-DIMENSIONAL TRUST BY MINING E-COMMERCE FEEDBACK COMMENTS
|
2014
|
TSDD49
|
EFFICIENT AND EFFECTIVE DUPLICATE DETECTION IN HIERARCHICAL DATA
|
2013
|
TSDD50
|
MINING USER QUERIES WITH MARKOV CHAINS: APPLICATION TO ONLINE
IMAGE RETRIEVAL
|
2013
|
TSDD51
|
A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK
SESSIONS
|
2013
|
TSDD52
|
ANOMALY DETECTION VIA
ONLINE OVERSAMPLING PRINCIPAL COMPONENT ANALYSIS
|
2013
|
TSDD53
|
CREATING EVOLVING USER
BEHAVIOR PROFILES AUTOMATICALLY
|
2012
|
TSDD54
|
SLICING: A NEW APPROACH
FOR PRIVACY PRESERVING DATA PUBLISHING
|
2012
|
TSDD55
|
ORGANIZING USER SEARCH HISTORIES
|
2012
|
TSDD56
|
DOUBLE GUARD: DETECTING INTRUSIONS IN MULTITIER WEB APPLICATIONS
|
2012
|
TSDD57
|
ANOMALY DETECTION VIA ONLINE OVER-SAMPLING PRINCIPAL COMPONENT ANALYSIS
|
2012
|
TSDD58
|
COMBINING TAG AND VALUE SIMILARITY FOR DATA EXTRACTION ANDALIGNMENT
|
2012
|
TSDD59
|
RESILIENT IDENTITY CRIME DETECTION
|
2012
|
CODE
NO
|
PROJECT
TITLE
|
YEAR
|
TSDC1
|
A NOVEL STATISTICAL COST MODEL AND AN ALGORITHM FOR EFFICIENT APPLICATION
OFFLOADING TO CLOUDS
|
2016
|
TSDC2
|
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD
DATA
|
2016
|
TSDC3
|
A SCALABLE DATA CHUNK SIMILARITY BASED COMPRESSION APPROACH FOR
EFFICIENT BIG SENSING DATA PROCESSING ON CLOUD
|
2016
|
TSDC4
|
ATTRIBUTE-BASED ACCESS CONTROL FOR MULTI-AUTHORITY SYSTEMS WITH
CONSTANT SIZE CIPHERTEXT IN CLOUD COMPUTING
|
2016
|
TSDC5
|
FLEXIBLE AND FINE-GRAINED ATTRIBUTE-BASED DATA STORAGE IN CLOUD
COMPUTING
|
2016
|
TSDC6
|
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA
INTEGRITY CHECKING IN PUBLIC CLOUD
|
2016
|
TSDC7
|
PRIVACY PRESERVING RANKED MULTI-KEYWORD SEARCH FOR MULTIPLE DATA
OWNERS IN
CLOUD COMPUTING
|
2016
|
TSDC8
|
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA
TORAGE IN THE CLOUD
|
2016
|
TSDC9
|
F2C: ENABLING FAIR AND FINE-GRAINED RESOURCE SHARING IN MULTI-TENANT IAAS CLOUDS
|
2016
|
TSDC10
|
ENABLING PERSONALIZED SEARCH OVER ENCRYPTED OUTSOURCED DATA WITH EFFICIENCY IMPROVEMENT
|
2016
|
TSDC11
|
A FRAMEWORK OF PRICE BIDDING CONFIGURATIONS FOR RESOURCE USAGE IN CLOUD COMPUTING
|
2016
|
TSDC12
|
EAVESDROPPING PREVENTION FOR NETWORK CODING ENCRYPTED CLOUD STORAGE SYSTEMS
|
2016
|
TSDC13
|
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING
|
2016
|
TSDC14
|
CLOUD CUSTOMER’S HISTORICAL RECORD BASED RESOURCE PRICING
|
2016
|
TSDC15
|
DYNAMIC REQUEST REDIRECTION AND RESOURCE PROVISIONING FOR CLOUD-BASED VIDEO SERVICES UNDER
HETEROGENEOUS ENVIRONMENT
|
2016
|
TSDC16
|
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED
ENCRYPTION
|
2015
|
TSDC17
|
IOPOR: ENABLING PROOF OF RETRIEVABILITY IN CLOUD COMPUTING WITH RESOURCE-CONSTRAINED DEVICES
|
2015
|
TSDC18
|
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE CLOUD
|
2015
|
TSDC19
|
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING
|
2015
|
TSDC20
|
DASCE: DATA SECURITY FOR CLOUD ENVIRONMENT WITH SEMI-TRUSTED THIRD PARTY
|
2015
|
TSDC21
|
PRIVACY-PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE
|
2015
|
TSDC22
|
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORATIVE SERVICES
|
2015
|
TSDC23
|
A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED
DEDUPLICATION
|
2015
|
TSDC24
|
PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM
|
2014
|
TSDC25
|
SECURE DEDUPLICATION WITH EFFICIENT AND RELIABLE CONVERGENT KEY MANAGEMENT
|
2014
|
TSDC26
|
KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE
|
2014
|
TSDC27
|
ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD
|
2014
|
TSDC28
|
PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA
|
2014
|
TSDC29
|
A SECURE DATA SELF-DESTRUCTING SCHEME IN CLOUD COMPUTING
|
2014
|
TSDC30
|
EXPRESSIVE, EFFICIENT, AND REVOCABLE DATA ACCESS CONTROL FOR
MULTI-AUTHORITY CLOUD STORAGE
|
2014
|
TSDC31
|
SCALABLE AND SECURE SHARING OF PERSONAL HEALTH
RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION
|
2013
|
TSDC32
|
TOWARDS OPTIMAL DEPLOYMENT OF CLOUD-ASSISTED
VIDEO DISTRIBUTION SERVICES
|
2013
|
TSDC33
|
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE
CLOUD STORAGE
|
2013
|
TSDC34
|
TOWARD SECURE
MULTIKEYWORD TOP-K RETRIEVAL OVER ENCRYPTED CLOUD DATA
|
2013
|
TSDC35
|
SECURE OVERLAY CLOUD STORAGE WITH ACCESS CONTROL AND ASSURED DELETION
|
2012
|
TSDC36
|
TOWARDS SECURE AND DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTING
|
2012
|
CODE
|
PROJECT TITLE
|
TSD01
|
3D PASSWORD
AUTHENTICATION SYSTEM
|
TSD02
|
A GRAPHICAL PASSWORD
AUTHENTICATION
|
TSD03
|
A NEW SECURITY MODEL
BASED ON FINGER PRINT RECOGNITION FOR DISTRIBUTED SYSTEM
|
TSD04
|
A SYSTEM BASED HEALTH CARE USING NET
|
TSD05
|
A WEB BASED APPROACH FOR HR GROUP IN RECRUITMENT
PROCESS SYSTEM
|
TSD06
|
ACCOUNT INFORMATION
SYSTEM
|
TSD07
|
ADVERTISING AGENCY
|
TSD08
|
AES BASIC CRYPTO CHANNEL
|
TSD09
|
ARTIFICIAL INTELLIGENT
BASED VIRTUAL EXAM CONTROLLER
|
TSD10
|
ASSET MANAGEMENT
|
TSD11
|
ASSOCIATION RULES WITH LIMITED SIDE EFFECTS
|
TSD12
|
AUTHENTICATION USING
QUANTUM KEY IN THREE-PARTY COMMUNICATION
|
TSD13
|
AUTOMATED TOOL SYSTEM
|
TSD14
|
AUTOMATIC COLOR
ENHANCEMENT (ACE)
|
TSD15
|
AUTOMATIC JAVA MEDIA
MANAGER
|
TSD16
|
BACKUP AND RECOVERY SCHEDULER
|
TSD17
|
BLOOD BANK AUTOMATION SYSTEM
|
TSD18
|
BUG TRACKING SYSTEM
|
TSD19
|
BUNK AUTOMATION SYSTEM
|
TSD20
|
CALL CENTER MANAGEMENT
|
TSD21
|
CAMPAIGN INFORMATION SYSTEM
|
TSD22
|
CARGO CHAIN LOCATOR
|
TSD23
|
CHECK POST MONITORING SYSTEM
|
TSD24
|
CHEMICAL MANAGEMENT SYSTEM
|
TSD25
|
CITIZEN MANAGEMENT INFORMATION SYSTEM USING
INTERNET
|
TSD26
|
CLIENT FEEDBACK PORTAL.
|
TSD27
|
COLLABORATIVE PROCESS FOR ACHIEVING NEGOTIATIONS
|
TSD28
|
COLLEGE MANAGEMENT SYSTEM
|
TSD29
|
COMMUNICATION SYSTEM
PROJECT MANAGEMENT
|
TSD30
|
CONGESTION WINDOW CONTROL
|
TSD31
|
CONTENT MANAGEMENT SYSTEM
|
TSD32
|
CONTENT-BASED SEARCH AND
RETRIEVAL
|
TSD33
|
CORPORATE RESOURCE PLANNING.
|
TSD34
|
CREATIVE THINKING AND BRAINSTORMING
|
TSD35
|
CUSTOMER BASE BSNL SERVICING SYSTEM.
|
TSD36
|
CUSTOMER RELATIONSHIP
MANAGEMENT
|
TSD37
|
CUSTOMER SERVICE PORTAL
FOR TOURISUM AND TRAVELS
|
TSD38
|
CYBER DETERMINATION
|
TSD39
|
CYBER EYE
|
TSD40
|
CYBER EYE WITH FINGER
PRINT
|
TSD41
|
DAIRY MANAGEMENT
|
TSD42
|
DATA HIDING IN AUDIO FILES
|
TSD43
|
DATA INTEGRITY PROOFS IN
CLOUD STORAGE
|
TSD44
|
DESIGN AND DEVELOPMENT OF
INSURANCE AGENT’S SAMURAI
|
TSD45
|
DETECTION AND REMOVAL OF
CRACKS IN IMAGES
|
TSD46
|
DEVELOPMENT OF A FEATURE-RICH, PRACTICAL ONLINE
ON-REQUEST COURSES COORDINATION SYSTEM (ORS)
|
TSD47
|
DEVELOPMENT OF A FEATURE-RICH, TRAINING GATEWAY
APPLICATION.
|
TSD48
|
DEVELOPMENT OF A
WAREHOUSE FOR ALUMNI OF COLLEGE
|
TSD49
|
DEVELOPMENT OF A WEB
BASED PRACTICAL RESOURCE MANAGEMENT SYSTEM (RMS)
|
TSD50
|
DEVELOPMENT OF WEB BASED
FILE MANAGEMENT SYSTEM
|
TSD51
|
DIGITAL IMAGE PROCESSING
TECHNOQUES
|
TSD52
|
DISCOVERING WEB ACCESS PATTERNS AND USER PROFILE
EVALUATION
|
TSD53
|
DISPENSARY MANAGEMENT
SYSTEM
|
TSD54
|
DISTRIBUTED DOCUMENTOM
AND WORK SCHEDULER
|
TSD55
|
DOCUMENT MANAGEMENT
VERSIONING
|
TSD56
|
E PROCUREMENT SYSTEM
|
TSD57
|
E-AUCTION PLAN.
|
TSD58
|
E-BANKING TRANSACTION
SYSTEM
|
TSD59
|
E-BANKING TRANSACTIONS SYSTEM WITH PORTAL FOR
BANK OFFICIALS AND CUSTOMERS
|
TSD60
|
EDGE DEDUCTION IN HIGH
RESOLUTION IMAGES USING CANY & SOBAL
|
TSD61
|
EDUCATION MANAGEMENT SYSTEM
|
TSD62
|
EFFECTIVE BOOK STORAGE
|
TSD63
|
EFFICIENT WEB IMPROVEMENT IN P2P DOMAIN.
|
TSD64
|
E-GAS AGENCY AUTOMATION
|
TSD65
|
EMPLOYMENT REGISTRATION
PORTAL SYSTEM
|
TSD66
|
ENTERPRISE NETWORK
CONTROLLER
|
TSD67
|
E-POLLING
|
TSD68
|
ERP FOR CONSTRUCTION
COMPANY
|
TSD69
|
ESTIMATION OF DEFECTS BASED ON DEFECT DECAY
MODEL: ED3M
|
TSD70
|
E-STOCK TRADING.
|
TSD71
|
E-TRAVEL
|
TSD72
|
EXE STARTER & SCHEDULER
|
TSD73
|
FACE RECOGNIZATION FROM
BRIGHTNESS IMAGES
|
TSD74
|
FACTORY MANAGEMENT SYSTEM
|
TSD75
|
FEATURE-RICH, TRAINING
PORTAL APPLICATION
|
TSD76
|
FILE COMPRESSION USING
HUFFMAN CODING
|
TSD77
|
FILE PROTECTION USING
TRIPLEDES ALGORITHM
|
TSD78
|
FILE SECURITY SYSTEM
|
TSD79
|
FILE TRANSFER PROTOCOL
CLIENT
|
TSD80
|
FILTERING AND SELECTING WEB SERVICES WITH
INTERACTIVE COMPOSITION TECHNIQUES
|
TSD81
|
FINGER PRINT BASED
APPLICATION CONTROLLER
|
TSD82
|
FINGER PRINT BASED
ATTENDANCE SYSTEM
|
TSD83
|
FINGER PRINT BASED HOSTEL
ATTENDANCE SYSTEM
|
TSD84
|
FINGER PRINT BASED
LIBRARY MANAGEMENT SYSTEM
|
TSD85
|
FINGERPRINT BASED ATM
|
TSD86
|
FLEXIBLE NETWORK MONITORING TOOL BASED ON DATA
STREAM MANAGEMENT SYSTEM
|
TSD87
|
FRAME EXTRACTION AND
PROCESS IN VIDEOCLIPS
|
TSD88
|
FUEL AUTOMATION SCHEME.
|
TSD89
|
FURNITURE AUTOMATION SYSTEM
|
TSD90
|
GENERIC PROJECT
MANAGEMENT PORTAL
|
TSD91
|
GLOBAL SQL EDITOR
|
TSD92
|
HARDWARE SHOP MAINTENANCE SYSTEM
|
TSD93
|
HIDING TEXT FILE IN AUDIO
FILE USING L-B ENCODING STEGANOGRAPHY
|
TSD94
|
HOSPITAL MANAGEMENT
SYSTEM
|
TSD95
|
HTTP NETWORK CONTROLLER
THROUGH WEB BROWSER
|
TSD96
|
HTTP PROTOCOL SECURITY IN
WINDOWS APPLICATION
|
TSD97
|
HUMAN RESOURCE MANAGEMENT
SYSTEM
|
TSD98
|
IMAGE ENCRYPTION
|
TSD99
|
INBOUND/OUTBOUND SERVICES
|
TSD100
|
INFORMATION SCHEME FOR DEBIT.
|
TSD101
|
INFORMATION SYSTEM ABOUT THE RAILWAY
|
TSD102
|
INFORMATION SYSTEM FOR AUTOMOBILE COMPANY
|
TSD103
|
INSURANCE
AGENT’S SAMURAI.
|
TSD104
|
INTERACTIVE GUIDLINE TO THE VISITOR FOR AN
INSTITUTE.
|
TSD105
|
INTERACTIVE INFORMATION USING WEB BASED WAP.
|
TSD106
|
INTERACTIVE TRAINING SYSTEM.
|
TSD107
|
INTERNET CAFÉ AUTOMATION
|
TSD108
|
INTRANET MAIL SERVER
|
TSD109
|
INTRANET MULTI CLIENT
CHATTING
|
TSD110
|
INTRANET NAVIGATION
SYSTEM
|
TSD111
|
INVENTORY CONTROL
MANAGEMENT
|
TSD112
|
JOB PORTALS BASE ON ONLINE EXAM.
|
TSD113
|
JOB PORTFOLIO APPLICATION.
|
TSD114
|
KNIT TECH MANAGEMENT
SYSTEM
|
TSD115
|
KNOWLEDGE BASE CHANNEL
|
TSD116
|
LAPTOP ENDORSEMENT
|
TSD117
|
LIBRARY MANAGEMENT SYSTEM
|
TSD118
|
LICENSE PROVIDER FOR
SOFTWARE PRODUCTS AND PROJECTS
|
TSD119
|
MACHINERY MANAGEMENT
SYSTEM
|
TSD120
|
MAIL SERVER DEVELOPMENT.
|
TSD121
|
Maintenance of goods
tranportaton details
|
TSD122
|
MANAGEMENT INFORMATION SYSTEM
|
TSD123
|
MANAGEMENT OF DEALERSHIP INFORMATION
|
TSD124
|
MANAGING THE LABOUR PROFILE
|
TSD125
|
MANAGING THE RENTAL OF A TASK
|
TSD126
|
MEDICAL MANAGEMENT SYSTEM
|
TSD127
|
MEDICAL STAFF MANAGEMENT
SYSTEM
|
TSD128
|
MEDICAL TRANSCRIPTION
|
TSD129
|
MINIMIZED ROAMING IN
MOBILE AD-HOC NETWORKS USING DISTRIBUTED DATABASE
|
TSD130
|
MISUSE DETECTION SYSTEM
|
TSD131
|
MOBILE INVENTORY SYSTEM
|
TSD132
|
MONITORING MASTER DATA FOR AN ENTERPRISE.
|
TSD133
|
MULTI PURPOSE centralized
ID CARD
|
TSD134
|
MULTI USER CHATTING
|
TSD135
|
MULTIDESTINATION FILE TRANSFER PROTOCAL.
|
TSD136
|
MULTIPLE WATERMARKING
|
TSD137
|
MULTIPROTOCOL WEB BROWSER
|
TSD138
|
MUSICAL STORE MAINTENANCE
MANAGEMENT
|
TSD139
|
NETWORK BANKING
|
TSD140
|
ONLINE BOOK SHOP MANAGEMENT SYSTEM
|
TSD141
|
ONLINE BUG TRACKING AND CUSTOMER SUPPORT
SYSTEM
|
TSD142
|
ONLINE BUS TICKET RESERVATION
|
TSD143
|
ONLINE VOTING SYSTEM
|
TSD144
|
ONLINE BOOK AUCTION
|
TSD145
|
ONLINE CALL LOGGING AND
CUSTOMER SUPPORT SYETM
|
TSD146
|
ONLINE DATA BASE MAINTANACE
|
TSD147
|
ONLINE DISCUSS-FORM
|
TSD148
|
ONLINE GAMING PORTAL.
|
TSD149
|
ONLINE HEALTHCARE SYSTEM
|
TSD150
|
ONLINE INTERNET FORUM
|
TSD151
|
ONLINE JEWELLERY PROCESS
|
TSD152
|
ONLINE MATRIMONIAL SYSTEM
|
TSD153
|
ONLINE MOBILE SHOP
|
TSD154
|
ONLINE NETWORK BANKING
|
TSD155
|
ONLINE PASSPORT
REGISTRATION
|
TSD156
|
ONLINE POLL SERVICE
|
TSD157
|
ONLINE QUIZ
|
TSD158
|
ONLINE SERVICE PROVIDER
FOR TELEPHONIC GROUPS
|
TSD159
|
ONLINE SHOPPING USING WEB
SERVICES
|
TSD160
|
ONLINE SURVEY SYSTEM
|
TSD161
|
ONLINE VOTING
|
TSD162
|
ONLINESHOP FOR SURGICAL
PRODUCTS
|
TSD163
|
OPTICAL MANAGEMENT SYSTEM
|
TSD164
|
ORDER PROCESSING SYSTEM
|
TSD165
|
ORDERWISE DETAILS MAINTANANCE OF TEXTILE UNIT
|
TSD166
|
PARCEL SERVICE MANAGEMENT.
|
TSD167
|
PASSEDOUT STUDENTS MANGEMENT DETAILS.
|
TSD168
|
PAYROLL INFORMATION
SYSTEM
|
TSD169
|
PC RENTAL SYSTEM
|
TSD170
|
PC STATION SYSTEM
|
TSD171
|
PLACEMENT CELL OF THE COLLEGE.
|
TSD172
|
POLLING SYSTEM WITH
BIOMETRICS AUTHENTICATION
|
TSD173
|
PREDICTING MISSING ITEMS IN SHOPPING CARTS
|
TSD174
|
PRODUCTION TRANSACTION SYSTEM
|
TSD175
|
QOS IN WIRELESS NETWORK
|
TSD176
|
QUERY PROCESSING IN PEER
GROUPS
|
TSD177
|
REAL ESTATE & INSURANCE.
|
TSD178
|
REAL ESTATE MANAGEMENT
SYSTEM
|
TSD179
|
REMOTE LOGIN SQL SERVER
|
TSD180
|
RESUME CRUISER FOR LARGE
SCALE ENVIRONMENTS
|
TSD181
|
RFID BASED PASSPORT
VERIFICATION
|
TSD182
|
RFID SECURITY SYSTEM
|
TSD183
|
ROBUST HTML TO DOM
CONVERSION AND APPLICATIONS
|
TSD184
|
SECURE DATA OBJECTS REPLICATION IN DATA GRID
|
TSD185
|
SECURING NETWORK DATAS
OVER DYNAMIC PEER GROUPS
|
TSD186
|
SENDING MAIL USING
ASP.NET
|
TSD187
|
SENDING MAILS USING
VB.NET
|
TSD188
|
SEO – SEARCH ENGINE OPTIMIZATION
|
TSD189
|
SESSION INITIATION
PROTOCOL
|
TSD190
|
SIGNATURE VERIFICATION
USING DIRECTION BASED ALGORITHM
|
TSD191
|
SMART CARD BASED TOLL
GATE SYSTEM
|
TSD192
|
SMART MEDICAL BILLING SYSTEM
|
TSD193
|
SMART TRADE MANAGEMENT
SYSTEM
|
TSD194
|
SOFTWARE QUALITY ANALYSIS
|
TSD195
|
SOFTWARE TOOL FOR EDUCATIONL ADMINISTRATION.
|
TSD196
|
SPIDER ALERTS WEB SERVICES
|
TSD197
|
STOCK ALERT FOR TRADING
SYSTEM
|
TSD198
|
STUDY OF INTERNET MARKETING
|
TSD199
|
SUPERMARK MECHANISM
|
TSD200
|
SUPPLY CHAIN MANAGEMENT
SYSTEM
|
TSD201
|
SUSPICIOUS EMAIL
DETECTION SYSTEM
|
TSD202
|
SYSTEM FOR MONITORING THE ATM NETWORK BY ONLINE
|
TSD203
|
System Optimizer
|
TSD204
|
SYSTEMATIC REMEDY
CONSOLE
|
TSD205
|
TARGET TRACKING IN MOBILE
SENSOR NETWORKS
|
TSD206
|
TAX MANAGEMENT SYSTEM
|
TSD207
|
TAXI TRIP AUTOMATION SYSTEM
|
TSD208
|
TCP-IP BASED PROCESS
MONITOR AND CONTROLLER FOR BOTH LOCAL AND REMOTE MACHINES
|
TSD209
|
TERMINAL EMULATION SYSTEM
FOR TCP/IP NETWORKS
|
TSD210
|
TOURISM
AND TRAVELS TUTOR.
|
TSD211
|
TRAINEE MANAGEMENT SYSTEM
|
TSD212
|
Trainee SUPERVISION
system
|
TSD213
|
UNIVERSITY ADMISSION
SYSTEM
|
TSD214
|
USER BROWSING BEHAVIOR
ANALYSIS
|
TSD215
|
USER FREINDLY AND
EFICIENT MULTITHREADING GDI SYSTEM
|
TSD216
|
USING ASSOCIATION RULES
TO SECURE SENSITIVE INFORMATIONS
|
TSD217
|
VEHICLE DEALERSHIP
MANAGEMENT
|
TSD218
|
VIRTUAL EXAM CONTROLLER
|
TSD219
|
WEB BASED BLOOD BANK
|
TSD220
|
WEB BASED BOOK SUPERSTORE.
|
TSD221
|
WEB BASED CONJUGAL SYSTEM.
|
TSD222
|
WEB BASED MEETING S
CHEDULER
|
TSD223
|
WEB BASED MULTI LEVEL
MARKETING SYSTEM
|
TSD224
|
WEB BASED PLACEMENT CELL
PROCESS OF THE COLLEGE
|
TSD225
|
WEB CONTENT ADMIN TOOL
|
TSD226
|
WEB DOCUMENT MANGEMENT SYSTEM.
|
TSD227
|
WEB MAIL FILTER
|
TSD228
|
XML AGENCY SMART CARD
|
CODE
NO
|
PROJECT
TITLE
|
Year
|
TSNS1
|
RECEIVER-SIDE TCP COUNTERMEASURE TO BUFFERBLOAT
IN WIRELESS ACCESS NETWORKS
|
2016
|
TSNS2
|
ACTIVETRUST: SECURE AND TRUSTABLE
ROUTING IN WIRELESS SENSOR NETWORKS
|
2016
|
TSNS3
|
ROBUST COOPERATIVE SPECTRUM SENSING SCHEDULING OPTIMIZATION IN MULTI-CHANNEL DYNAMIC SPECTRUM
ACCESS NETWORKS
|
2016
|
TSNS4
|
EFFICIENT AND ANONYMOUS MOBILE
USER AUTHENTICATION PROTOCOL USING SELF-CERTIFIED PUBLIC KEY CRYPTOGRAPHY FOR
MULTI-SERVER ARCHITECTURES
|
2016
|
TSNS5
|
TOWARDS DISTRIBUTED
OPTIMAL MOVEMENT STRATEGY FOR DATA GATHERING IN WIRELESS SENSOR NETWORKS
|
2016
|
TSNS6
|
A DISTRIBUTED
FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUSWIRELESS SENSOR
NETWORKS
|
2015
|
TSNS7
|
DATA COLLECTION IN
MULTI-APPLICATION SHARING WIRELESS SENSOR NETWORKS
|
2015
|
TSNS8
|
SECURE DATA AGGREGATION
TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE
OF COLLUSION ATTACKS
|
2015
|
TSNS9
|
SENSOR SCHEDULING FOR
MULTI-MODAL CONFIDENT INFORMATION COVERAGE IN SENSOR NETWORKS
|
2015
|
TSNS10
|
COOPERATIVE STEPWISE
RELAYING AND COMBINING FOR MULTIHOP VEHICULAR WIRELESS COMMUNICATION
|
2015
|
TSNS11
|
A HIERARCHICAL
ACCOUNT-AIDED REPUTATION MANAGEMENT SYSTEM FOR MANETS
|
2015
|
TSNS12
|
COOPERATIVE LOAD
BALANCING AND DYNAMIC CHANNEL ALLOCATION FOR CLUSTER-BASEDMOBILE AD HOC NETWORKS
|
2015
|
TSNS13
|
INTERFERENCE-BASED
TOPOLOGY CONTROL ALGORITHM FOR DELAY-CONSTRAINED MOBILE AD HOC NETWORKS
|
2015
|
TSNS14
|
VEHICLE MOBILITY AND
COMMUNICATION CHANNEL MODELS FOR REALISTIC AND EFFICIENT HIGHWAY VANET
SIMULATION
|
2015
|
TSNS15
|
HIGH-THROUGHPUT
RELIABLE MULTICAST IN MULTI-HOP WIRELESS MESH NETWORKS
|
2015
|
TSNS16
|
PRIVACY-PRESERVING AND
TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS
|
2015
|
TSNS17
|
ENABLING GRASSROOTS
COMMUNICATION: A MEMORY-AIDED BROADCAST MECHANISM FOR A COMMUNITY RADIO SERVICE
ON AN AD HOC DEVICE-TO-DEVICE MOBILE NETWORK
|
2014
|
TSNS18
|
MODELING, EVALUATION
AND DETECTION OF JAMMING ATTACKS IN TIME-CRITICAL WIRELESS APPLICATIONS
|
2014
|
TSNS19
|
LIGHTWEIGHT AND
CONFIDENTIAL DATA DISCOVERY AND DISSEMINATION FOR WIRELESS BODY AREA NETWORKS
|
2014
|
TSNS20
|
DISTRIBUTED DETECTION
IN MOBILE ACCESS WIRELESS SENSOR NETWORKS UNDER BYZANTINE ATTACKS
|
2014
|
TSNS21
|
DELAY AND CAPACITY
ANALYSIS IN MANETS WITH CORRELATED MOBILITY AND F-CAST RELAY
|
2014
|
TSNS22
|
STARS: A STATISTICAL
TRAFFIC PATTERN DISCOVERY SYSTEM FOR MANETS
|
2014
|
TSNS23
|
DYNAMIC PACKET LENGTH
CONTROL INWIRELESS SENSOR NETWORKS
|
2014
|
TSNS24
|
RELAY SELECTION FOR
GEOGRAPHICAL FORWARDING IN SLEEP-WAKE CYCLING WIRELESS SENSOR NETWORKS
|
2013
|
TSNS25
|
1.
EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS
|
2013
|
TSNS26
|
EMAP: EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VEHICULAR AD HOC NETWORKS
|
2013
|
TSNS27
|
SORT: A
SELF-ORGANIZING TRUST MODEL FOR PEER-TO-PEER SYSTEMS
|
2013
|
TSNS28
|
COOPERATIVE
PACKET DELIVERY IN HYBRID WIRELESS MOBILE NETWORKS: A COALITIONAL GAME APPROACH
|
2013
|
TSNS29
|
A SPECTRUM
SWITCHING DELAY-AWARE SCHEDULING ALGORITHM FOR CENTRALIZEDCOGNITIVE RADIO NETWORKS
|
2013
|
TSNS30
|
EVALUATING
IMPLEMENTATION STRATEGIES FOR LOCATION-BASED MULTICAST ADDRESSING
|
2013
|
TSNS31
|
2.
TARGET TRACKING IN WIRELESS SENSOR NETWORKS BASED ON THE COMBINATION OF KF AND
MLE USING DISTANCE MEASUREMENTS
|
2013
|
TSNS32
|
3.
SLEEP SCHEDULING FOR CRITICAL EVENT MONITORING IN WIRELESS SENSOR NETWORKS
|
2013
|
TSNS33
|
A HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS
|
2013
|
TSNS34
|
CHANNEL-AWARE
OPPORTUNISTIC TRANSMISSION SCHEDULING FOR ENERGY-EFFICIENT WIRELESS LINKS
|
2013
|
TSNS35
|
A DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT
DELIVERY NETWORKS
|
2013
|
TSNS36
|
4.
HANDLING SELFISHNESS
IN REPLICA ALLOCATION OVER A MOBILE AD HOC NETWORK
|
2012
|
TSNS37
|
5.
HANDLING SELFISHNESS
IN REPLICA ALLOCATION OVER A MOBILE AD HOC NETWORK
|
2012
|
TSNS38
|
SLEEP SCHEDULING
FOR CRITICAL EVENT MONITORING IN WIRELESS SENSOR NETWORKS
|
2012
|
TSNS39
|
TAM: A TIERED
AUTHENTICATION OF MULTICAST PROTOCOL
FOR AD-HOC NETWORKS
|
2012
|
TSNS40
|
PACKET-HIDING
METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS
|
2012
|
TSNS41
|
ALERT: AN
ANONYMOUS LOCATION-BASED EFFICIENT ROUTING PROTOCOL IN MANETS
|
2012
|
TSNS42
|
SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
|
2012
|
TSNS43
|
6.
STATELESS MULTICAST
PROTOCOL FOR AD HOC NETWORKS
|
2012
|
CODE
NO
|
PROJECT
TITLE
|
YEAR
|
TSML1
|
RAILWAY TRACK CIRCUIT FAULT DIAGNOSIS USING RECURRENT NEURAL NETWORKS
|
2016
|
TSML2
|
AGING FACE RECOGNITION: A HIERARCHICAL LEARNING MODEL BASED ON LOCAL PATTERNS SELECTION
|
2016
|
TSML3
|
CLASSIFICATION OF PHANTOM FINGER, HAND, WRIST AND ELBOW VOLUNTARY GESTURES IN
TRANSHUMERALAMPUTEES WITH SEMG
|
2016
|
TSML4
|
CONTRAST SENSITIVITY OF THE WAVELET, DUAL TREE COMPLEX WAVELET, CURVELET, AND
STEERABLEPYRAMID TRANSFORMS
|
2016
|
TSML5
|
THE CAMERA MOUSE: VISUAL TRACKING OF BODY FEATURES TO PROVIDE COMPUTER ACCESS FOR
PEOPLEWITH SEVERE DISABILITIES
|
2016
|
TSML6
|
CEREBRE: A NOVEL METHOD FOR VERY HIGH ACCURACY EVENT-RELATED POTENTIAL
BIOMETRICIDENTIFICATION
|
2016
|
TSML7
|
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR, ILLUMINATION, AND POSE
|
2015
|
TSML8
|
IMPACT OF QUALITY-BASED FUSION TECHNIQUES FOR VIDEO-BASED IRIS RECOGNITION AT A
DISTANCE
|
2015
|
TSML9
|
JOINT FEATURE LEARNING FOR FACE RECOGNITION
|
2015
|
TSML10
|
LEARNING COMPACT FEATURE DESCRIPTOR AND ADAPTIVE MATCHING FRAMEWORK FOR FACE
RECOGNITION
|
2015
|
TSML11
|
NEUTRAL FACE CLASSIFICATION USING PERSONALIZED APPEARANCE MODELS FOR FAST AND ROBUST
EMOTION DETECTION
|
2015
|
TSML12
|
A VISUAL MODEL-BASED PERCEPTUAL IMAGE HASH FOR CONTENT AUTHENTICATION
|
2015
|
TSML13
|
ABANDONED OBJECT DETECTION VIA TEMPORAL CONSISTENCY MODELING AND BACK-TRACING
VERIFICATION FOR VISUAL SURVEILLANCE
|
2015
|
TSML14
|
AN EFFICIENT HOS-BASED GAIT AUTHENTICATION OF ACCELEROMETER DATA
|
2015
|
TSML15
|
ATTACK OF MECHANICAL REPLICAS: LIVENESS DETECTION WITH EYE MOVEMENTS
|
2015
|
TSML16
|
ATTRIBUTE-BASED ENCRYPTION WITH EFFICIENT VERIFIABLE OUTSOURCED DECRYPTION
|
2015
|
TSML17
|
CRACKING MORE PASSWORD HASHES WITH PATTERNS
|
2015
|
TSML18
|
ATTENTIVE MONITORING OF MULTIPLE VIDEO STREAMS DRIVEN BY A BAYESIAN FORAGING STRATEGY
|
2015
|
TSML19
|
ONLINE KERNEL SLOW FEATURE ANALYSIS FOR TEMPORAL VIDEO SEGMENTATION AND TRACKING
|
2015
|
TSML20
|
REMOVING CAMERA SHAKE VIA WEIGHTED FOURIER BURST ACCUMULATION
|
2015
|
TSML21
|
ROBUST VIDEO OBJECT COSEGMENTATION
|
2015
|
TSML22
|
HYBRID SCHEME OF PUBLIC-KEY ENCRYPTION AND SOMEWHAT HOMOMORPHIC ENCRYPTION
|
2015
|
TSML23
|
PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE
|
2015
|
TSML24
|
COMMON FEATURE DISCRIMINANT ANALYSISFOR MATCHING INFRARED FACE IMAGESTO OPTICAL FACE
IMAGES
|
2014
|
TSML25
|
REAL WEB COMMUNITY BASED AUTOMATIC IMAGE ANNOTATION
|
2014
|
TSML26
|
LBP-BASED EDGE-TEXTURE FEATURES FOR OBJECT RECOGNITION
|
2014
|
TSML27
|
AUTOMATIC TUBERCULOSIS SCREENING USING CHEST RADIOGRAPHS
|
2014
|
TSML28
|
GABOR ORDINAL MEASURES FOR FACE RECOGNITION
|
2014
|
TSML29
|
MINING WEAKLY LABELED WEB FACIAL IMAGES FOR SEARCH-BASED FACE ANNOTATION
|
2014
|
TSML30
|
PROPERTY ANALYSIS OF XOR-BASED VISUALCRYPTOGRAPHY
|
2014
|
TSML31
|
CONTRAST ENHANCEMENT USING DOMINANT BRIGHTNESS LEVEL ANALYSIS AND ADAPTIVE INTENSITY
TRANSFORMATION FOR REMOTE SENSING IMAGES
|
2013
|
TSML32
|
ROBUST FACIAL EXPRESSION RECOGNITION VIA SPARSE REPRESENTATION AND MULTIPLE GABOR
FILTERS
|
2013
|
TSML33
|
FAST SIFT DESIGN FOR REAL-TIME VISUAL FEATURE EXTRACTION
|
2013
|
TSML34
|
HETEROGENEOUS FACE RECOGNITION USING KERNEL PROTOTYPE SIMILARITIES
|
2013
|
TSML35
|
USAGE OF COLOR AND TEXTURE FEATURES FOR NATURAL IMAGE INDEXING AND RETRIEVAL
|
2013
|
TSML36
|
MODIFIED APPROACHES ON FACE RECOGNITION BY USING MULTISENSORY IMAGE
|
2013
|
TSML37
|
BIOMETRICS AND FACE RECOGNITION TECHNIQUES
|
2013
|
TSML38
|
ROBUST FACIAL EXPRESSION RECOGNITION VIA SPARSE REPRESENTATION AND MULTIPLE
GABOR FILTERS
|
2013
|
TSML39
|
AUTOMATIC LICENSE PLATE RECOGNITION (ALPR): A STATE-OF-THE-ART REVIEW
|
2013
|
TSML40
|
CONTEXT-DEPENDENT LOGO MATCHING AND RECOGNITION
|
2013
|
TSML41
|
CONTRAST ENHANCEMENT USING DOMINANT BRIGHTNESS LEVEL ANALYSIS FOR REMOTE SENSING IMAGES
|
2013
|
TSML42
|
CLASSIFIER MODEL FOR
IRIS PLANT USING FEED FORWARD NEURAL NETWORK
|
2013
|
TSML43
|
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES
BYRESERVING ROOM BEFORE ENCRYPTION
|
2013
|
TSML44
|
NATURALNESS PRESERVED ENHANCEMENT ALGORITHM FOR
NON-UNIFORM ILLUMINATION IMAGES
|
2013
|
TSML45
|
WAVELET BASED ECG STEGANOGRAPHY FOR PROTECTING
PATIENT CONFIDENTIAL INFORMATION IN POINT-OF-CARE SYSTEMS
|
2013
|
TSML46
|
TOWARD A UNIFIED COLOR SPACE FOR PERCEPTION-BASED
IMAGE PROCESSING
|
2013
|
TSML47
|
LOCAL DIRECTIONAL NUMBER PATTERN FOR FACE ANALYSIS: FACE AND EXPRESSION RECOGNITION
|
2013
|
TSML48
|
CLASSIFICATION OF HEART DISEASE USING ARTIFICIAL NEURAL NETWORK AND FEATURE SUBSET
SELECTION
|
2013`
|
TSML49
|
NONLOCALLY CENTRALIZED SPARSE REPRESENTATION FOR IMAGE RESTORATION
|
2013
|
TSML50
|
SINGLE IMAGE DEHAZING BY MULTI-SCALE FUSION
|
2013
|
TSML51
|
OPTICAL WATERMARKING TECHNOLOGY FOR PROTECTING PORTRAIT RIGHTS OF THREE DIMENSIONAL
SHAPED REAL OBJECTS USING ONE-DIMENSIONAL HIGH-FREQUENCY PATTERNS
|
2013
|
TSML52
|
BLOOD GROUP DETERMINATION BASED ON IMMUNOGLOBULIN AND SALIVA CONTENT
|
2013
|
TSML53
|
PARTIAL FACE RECOGNITION: ALIGNMENT-FREE APPROACH
|
2013
|
TSML54
|
A FUZZY OPTIMIZATION TECHNIQUE FOR THE PREDICTION OF CORONARY HEART DISEASE
USING DECISION TREE
|
2013
|
TSML55
|
VEHICLE DETECTION AND TRAFFIC ASSESSMENT USING IMAGES
|
2013
|
TSML56
|
AUTOMATIC SEGMENTATION OF BRAIN TUMOUR FROM MULTIPLE IMAGES OF BRAIN MRI
|
2013
|
CODE
|
PROJECT TITLE
|
Year
|
TSAN1
|
ALTERDROID: DIFFERENTIAL FAULT ANALYSIS OF OBFUSCATED SMARTPHONE MALWARE
|
2016
|
TSAN2
|
DROIDDETECTOR: ANDROIDMALWARECHARACTERIZATIONANDDETECTION
USINGDEEPLEARNING
|
2016
|
TSAN3
|
SBVLC: SECURE BARCODE-BASED VISIBLE LIGHT COMMUNICATION FOR SMARTPHONES
|
2016
|
TSAN4
|
SEMANTICSLAM: USING ENVIRONMENT LANDMARKS FOR UNSUPERVISED INDOOR
LOCALIZATION
|
2016
|
TSAN5
|
THE SLEEPY BIRD CATCHES MORE WORMS: REVISITING ENERGY EFfiCIENT NEIGHBOR
DISCOVERY
|
2016
|
TSAN6
|
SMARTPHOTO: A RESOURCE-AWARE CROWDSOURCING APPROACH FOR IMAGE SENSING
WITH SMARTPHONES
|
2016
|
TSAN7
|
WIRELESS MONITORING OF ENDOGENOUS AND EXOGENOUS BIOMOLECULES ON AN
ANDROIDTM INTERFACE
|
2016
|
TSAN8
|
SECURITY IN CLOUDCOMPUTING-BASED
MOBILE HEALTH
|
2016
|
TSAN9
|
RETHINKING PERMISSION ENFORCEMENT MECHANISM ON
MOBILE SYSTEMS
|
2016
|
TSAN10
|
PROXIES FOR SHORTEST PATH AND DISTANCE QUERIES
|
2016
|
TSAN11
|
ONE-ROUND PRIVACY-PRESERVING MEETING LOCATION
DETERMINATION FOR SMARTPHONE APPLICATIONS
|
2016
|
TSAN12
|
INVERTED LINEAR QUADTREE: EFFICIENT TOP K SPATIAL
KEYWORD SEARCH
|
2016
|
TSAN13
|
PRIVACY PROTECTION FOR PREVENTING DATA
OVER-COLLECTION IN SMART CITY
|
2016
|
TSAN14
|
PASSBYOP: BRING YOUR OWN PICTURE FOR SECURING
GRAPHICAL PASSWORDS
|
2016
|
TSAN15
|
PRIVACY-PRESERVING LOCATION SHARING SERVICES FOR
SOCIAL NETWORKS
|
2016
|
TSAN16
|
DESIGNING A SECURE EXAM MANAGEMENT SYSTEM (SEMS)
FOR M-LEARNING ENVIRONMENTS
|
2016
|
TSAN17
|
AUTHENTICATION OF SMARTPHONE USERS USING
BEHAVIORAL BIOMETRICS
|
2016
|
TSAN18
|
UNDERSTANDING SMARTPHONE SENSOR AND APP DATA FOR
ENHANCING THE SECURITY OF SECRET QUESTIONS
|
2016
|
TSAN19
|
CONTEXT-BASED ACCESS CONTROL SYSTEMS FOR MOBILE
DEVICES
|
2015
|
TSAN20
|
A PRIVACY-PRESERVING FRAMEWORK FOR MANAGING
MOBILE AD REQUESTS AND BILLING INFORMATION
|
2015
|
TSAN21
|
EFFICIENT NOTIFICATION OF MEETING POINTS FOR
MOVING GROUPS VIA INDEPENDENT SAFE REGIONS
|
2015
|
TSAN22
|
REAL-TIME CITY-SCALE TAXI RIDESHARING
|
2015
|
TSAN23
|
AUTHENTICATING LOCATION-BASED SKYLINE QUERIES IN
ARBITRARY SUBSPACES
|
2015
|
TSAN24
|
EFFECTIVE RISK COMMUNICATION FOR ANDROID APPS
|
2015
|
TSAN25
|
THE PLACES OF OUR LIVES: VISITING PATTERNS AND
AUTOMATIC LABELING FROM LONGITUDINAL SMARTPHONE DATA
|
2015
|
TSAN26
|
EASY SMS: A PROTOCOL FOR END-TO-END SECURE
TRANSMISSION OF SMS
|
2015
|
TSAN27
|
MODELING ENERGY CONSUMPTION OF DATA TRANSMISSION
OVER WI-FI
|
2015
|
TSAN28
|
PRIVACY-PRESERVING OPTIMAL MEETING LOCATION
DETERMINATION ON MOBILE DEVICES
|
2015
|
TSAN29
|
DYNAMIC AUTHENTICATION WITH SENSORY INFORMATION
FOR THE ACCESS CONTROL SYSTEMS
|
2014
|
TSAN30
|
FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS
|
2014
|
TSAN31
|
HOW LONG TO WAIT? PREDICTING BUS ARRIVAL TIME
WITH MOBILE PHONE BASED PARTICIPATORY SENSING
|
2014
|
TSAN32
|
PRE BOOKING FOR CAR PARKING SPACE IN A SHOPPING
MALL
|
2014
|
TSAN33
|
SAFE DRIVING USING MOBILE PHONES
|
2014
|
TSAN34
|
T-DRIVE: ENHANCING DRIVING DIRECTIONS WITH
TAXI DRIVERS’ INTELLIGENCE
|
2014
|
TSAN35
|
CAR POOLING
|
NON IEEE
|
TSAN36
|
STUDENT ATTENDANCE MANAGEMENT SYSTEM USING
ANDROID
|
NON IEEE
|
TSAN37
|
WIFI CHAT
|
NON IEEE
|
TSAN38
|
REMOTE PATIENT MONITORING
|
NON IEEE
|
TSAN39
|
COMPUTER AIDED EMERGENCY SERVICE SYSTEM
|
NON IEEE
|
TSAN40
|
BUSINESS CARD MANAGER
|
NON IEEE
|
TSAN41
|
EVENT MANAGEMENT SYSTEM
|
NON IEEE
|
TSAN42
|
FOOD FEAST
|
NON IEEE
|
TSAN43
|
GROCERIES CONSORTIUM
SCHEME
|
NON IEEE
|
TSAN44
|
HEALTH CARE PLUS
|
NON IEEE
|
TSAN45
|
INSTITUTE ERP SYSTEM
|
NON IEEE
|
TSAN46
|
COLLEGE MAP NAVIGATOR
|
NON IEEE
|
TSAN47
|
MOBILE TRACKING USING ANDROID
|
NON IEEE
|
TSAN48
|
ANDROID APP FOR NEW BORN BABY CARE
|
NON IEEE
|
TSAN49
|
ANDROID BASED DOCTOR APPOINTMENT FIXING
|
NON IEEE
|
TSAN50
|
ANDROID APPS FOR PREGNANT WOMENS
|
NON IEEE
|
TSAN51
|
ANDROID APP FOR PREMIUM CALCULATOR
|
NON IEEE
|
TSAN52
|
REMOTE PATIENT MONITORING SYSTEM
|
NON IEEE
|
TSAN53
|
TAB BOOK
|
NON IEEE
|
TSAN54
|
AN ANDROID BASED EFFICIENT SPEECH SYNTHESIS
TECHNIQUE
|
NON IEEE
|
CODEo:p>
|
PROJECT TITLE
|
TSJVA1
|
MIDDLEWARE SERVICES FOR DYNAMIC CLUSTERING OF
APPLICATION SERVERS
|
TSJVA2
|
SERIAL COMMUNICATION
NETWORK SHARING
|
TSJVA3
|
ORDERING TRACKING SYSTEM
|
TSJVA4
|
NETWORK BROWSER IN JAVA
|
TSJVA5
|
VIRTUAL QUERY BUILDER
|
TSJVA6
|
STOCK MANAGEMENT CONTROL
|
TSJVA7
|
SECURE DISTRIBUTED
BANKING
|
TSJVA8
|
ADHOC NETWORK USING LAR PROTOCOL
|
TSJVA9
|
SINGLE SOURCE SHORTEST
PATH ALGORITHM
|
TSJVA10
|
WEB MINING
|
TSJVA11
|
JAVA WEB PORT FOR STORAGE SYSTEM
|
TSJVA12
|
ONLINE LENDING PROCESS
|
TSJVA13
|
COUNTRYWIDE LICENSE SCHEME
|
TSJVA14
|
CONSTRAINED NEAREST NEIGHBOUR QUERIES
|
TSJVA15
|
MAINTAING DATA PRIVACY IN ASSOCIATION RULE MINING
|
TSJVA16
|
EFFICIENT APPROXIMATE
QUERY PROCESSING IN PEER-TO-PEER NETWORKS
|
TSJVA17
|
DYNAMIC SOFTWARE LOAD BALANCING
|
TSJVA18
|
FACE RECOGNITION
|
TSJVA19
|
ONLINE HANDWRITTEN SCRIPT RECOGNITION
|
TSJVA20
|
AN ACKNOWLEDGMENT BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOR
IN MANETS
|
TSJVA21
|
NETWORK TRAFFIC ANALYZER
& CLUSTER CONTROL:
|
TSJVA22
|
DATA COMMUNICATION &
AUTHENTICATION OVER INTRANET
|
TSJVA23
|
ONLINE SQL ENTERPRISE
MANAGER
|
TSJVA24
|
DISTRIBUTED SERVER MAINTAING FOR THE UNIVERSITY MARK SYSTEM
|
TSJVA25
|
ONLINE BANKING SECURITY ANALYSIS
|
TSJVA26
|
INCORPORATED COLLEGE INFORMATION SYSTEM
|
TSJVA27
|
ONLINE PHARMACY MANAGEMENT SYSTEM
|
TSJVA28
|
ACCOMPLISHING ALTERNATIVE SERVER IN MOBILE NETWORK
|
TSJVA29
|
WEB CACHING AND
PREFETCHING IN CLIENT-SIDE PROXIES
|
TSJVA30
|
MANAGEMENT INFORMATION
SYSTEM
|
TSJVA31
|
WIRELESS TRAFFIC VIEWER
|
TSJVA32
|
PROVABLY SECURE THREE-PARTY AUTHENTICATED QUANTUM KEY DISTRIBUTION
PROTOCOLS
|
TSJVA33
|
PROTECTED DATA
TRANSMISSION
|
TSJVA34
|
PROACTIVE TREE
RESCUEMENT
|
TSJVA35
|
ALLOTMENT OF WORK TIME
|
TSJVA36
|
RANDOMIZED PROTOCOLS FOR
DUPLICATE ELIMINATION IN PEER-TO-PEER STORAGE SYSTEM
|
TSJVA37
|
A NEW TCP PERSISTENT
PACKET RECORDING
|
TSJVA38
|
TIME MINIMIZATION IN
FILE DOWNLOAD
|
TSJVA39
|
PROJECT MANAGEMENT
SYSTEM
|
TSJVA40
|
LOAD DISTRIBUTION TO
SERVERS
|
TSJVA41
|
ON SELFISH ROUTING IN INTERNET
LIKE ENVIRONMENT
|
TSJVA42
|
WEB REPORT ORGANIZATION METHOD
|
TSJVA43
|
SELLING PRODUCTS THROUGH ONLINE WEB SHARING
|
TSJVA44
|
PHOTO SHARING
|
TSJVA45
|
A MEASUREMENT-BASED ANALYSIS OF MULTIHOMING
|
TSJVA46
|
ONLINE TENDER PROCESS
|
TSJVA47
|
ONLINE INSURANCE MANAGEMENT SYSTEM
|
TSJVA48
|
ONLINE JOB PORTAL MANAGEMENT SYSTEM
|
TSJVA49
|
BUISNESS MANAGEMENT SYSTEM
|
TSJVA50
|
ALUMINI ASSOCIATION
|
TSJVA51
|
ONLINE INSURANCE MANAGEMENT SYSTEM
|
TSJVA52
|
ONLINE JOB PORTAL MANAGEMENT SYSTEM
|
TSJVA53
|
HYPOTHETICAL DESCRIPTION OF A COMPLEX ENTITY FOR XML FRAMEWORK
|
TSJVA54
|
ANALYSIS FOR DETECTION OF WEB APPLICATION VULNERABILITES
|
TSJVA55
|
TO REDUCE EFFORT FOR TRACKING AND COORDINATION OF PROJECTS
|
TSJVA56
|
BANKING PROCESS USING MOBILE
|
TSJVA57
|
A SPECIFICATION-BASED
INTRUSION DETECTION SYSTEM TO AODV
|
TSJVA58
|
NETWORK FORENSICS USING HONEYNETS
|
TSJVA59
|
MOBILE COMMUNICATION
THROUGH WAP GATEWAY
|
TSJVA60
|
MOBILE TRAFFIC MANAGEMENT
OF WIRELESS SENSOR NETWORK
|
TSJVA61
|
ONLINE FILE MANAGEMENT SYSTEM
|
TSJVA62
|
DISTRIBUTED COLLABORATIVE
KEY AGREEMENT AND AUTHENTICATION PROTOCOLS FOR DYNAMIC PEER
GROUPS
|
TSJVA63
|
AN ADAPTIVE PROGRAMMING MODEL FOR
FAULT-TOLERANT DISTRIBUTED COMPUTING
|
TSJVA64
|
ALUMINI ASSOCIATION
|
TSJVA65
|
BANKING PROCESS USING MOBILE
|
TSJVA66
|
WEB REPORT ORGANIZATION METHOD
|
TSJVA67
|
JAVA WEB PORT FOR STORAGE SYSTEM
|
TSJVA68
|
ONLINE LENDING PROCESS
|
TSJVA69
|
VIRTUAL RING NETWORK
USING TCP-RING PROTOCOL
|
TSJVA70
|
IMPLEMENTING SIP FOR
MOBILE APPLICATION & SUPER NETWORKING
|
TSJVA71
|
PPERSONAL AUTHENTICATION
USING 3-D FINGER GEOMETRY
|