Beruflich Dokumente
Kultur Dokumente
19. Mining Web Graphs for Recommendations 20. Organizing User Search Histories 21. Publishing Search LogsA Comparative Study of Privacy Guarantees 22. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators 23. ROAD: A New Spatial Object Search Framework for Road Networks 24. Scalable Learning of Collective Behavior 25. Slicing: A New Approach for Privacy Preserving Data Publishing 26. Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings
NETWORKING:
30. A New Cell-Counting-Based Attack Against Tor 31. Optimal Source-Based Filtering of Malicious Traffic 32. TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS 33. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
SECURE COMPUTING:
34. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network 35. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs 36. ES-MPICH2: A Message Passing Interface with Enhanced Security Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 NO: 45, KAMARAJ SALAI, THATTANCHAVADY, PUDUCHERRY -9. LANDMARK: OPP. TO THATTANCHAVADY INDUSTRIAL ESTATE Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
37. On the Security and Efficiency of Content Distribution via Network Coding 38. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework forMobileHealthcare Emergency 39. Revisiting Defenses against Large-Scale Online Password Guessing Attacks
IMAGE PROCESSING:
40. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 41. A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group 42. Active Visual Segmentation 43. Image Segmentation Based on the Poincar Map Method 44. K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER 45. Multiple Exposure Fusion for High Dynamic Range Image Acquisition 46. Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 47. Smile Detection by Boosting Pixel Differences 48. View-invariant action recognition based on Artificial Neural Networks 49. A Novel Anti phishing framework based on visual cryptography
MOBILE COMPUTING:
50. Cooperative Download in Vehicular Environments 51. Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 52. Network Assisted Mobile Computing with Optimal Uplink Query Processing 53. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper 54. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 NO: 45, KAMARAJ SALAI, THATTANCHAVADY, PUDUCHERRY -9. LANDMARK: OPP. TO THATTANCHAVADY INDUSTRIAL ESTATE Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com
JOURNAL PUBLICATIONS / CONFERENCE PUBLICATIONS* REVIEW DOCUMENTS AND PPTS 100% LIVE EXPLANATION PROJECT ASSIGNMENTS VIVA-VOCE QUESTIONS & ANSWERS VALID TRAINEE CERTIFICATION 100% PLACEMENT SUPPORT Own Projects are also welcomed.
Contact: R.JAYAPRAKASH BE,MBA,M.Tech., Mobile: (0)9952649690 NO: 45, KAMARAJ SALAI, THATTANCHAVADY, PUDUCHERRY -9. LANDMARK: OPP. TO THATTANCHAVADY INDUSTRIAL ESTATE Web: www.jpinfotech.org | Blog: www.jpinfotech.blogspot.com | Email: jpinfotechprojects@gmail.com