1 |
HSC17472 |
Scalable Spatio Temporal Query Processing for Location-aware Services |
APPLICATION |
JAVA |
2 |
HSC17503 |
Student Size Square |
APPLICATION |
JAVA |
3 |
HSC17J411 |
Wavelet Huffman Comparison |
APPLICATION |
JAVA |
4 |
HSC17J412 |
Network Border Protocol |
APPLICATION |
JAVA |
5 |
HSC17J413 |
Toward Privacy Preserving and collusion Resistance |
APPLICATION |
JAVA |
6 |
HSC17J414 |
Discovery and verification of neighbor positions in mobile Networks |
APPLICATION |
JAVA |
7 |
HSC17J415 |
Mobile Relay configuration in Data intensive Wireless Sensor N/W |
APPLICATION |
JAVA |
8 |
HSC17J416 |
Secure Mining of Associated rule in Horizontally Distributed Databases |
APPLICATION |
JAVA |
9 |
HSC17J417 |
Toward Reliable Data Delivery for highly Dynamic Mobile Network |
APPLICATION |
JAVA |
10 |
HSC17J419 |
Privacy and Integrity Preserving Range Queries in Sensor Networks |
APPLICATION |
JAVA |
11 |
HSC17J420 |
Anomaly Discovery and Resolution using Firewall Policy |
APPLICATION |
JAVA |
12 |
HSC17J421 |
Network Intrusion Detection and Counter Measure Selection in Virtual N/W |
APPLICATION |
JAVA |
13 |
HSC17J422 |
Detecting Spam Zanbiar By Monitoring Outgoing Messages |
APPLICATION |
JAVA |
14 |
HSC17J423 |
Analysis of a Pool Management Scheme for Cloud Computing |
APPLICATION |
JAVA |
15 |
HSC17J424 |
Cloud MOV: Cloud Based Mobile Social TV |
APPLICATION |
JAVA |
16 |
HSC17J425 |
A Probalistic Misbehaviour Detection |
APPLICATION |
JAVA |
17 |
HSC17J426 |
EAACK- A Secure Intrusion Detection System For Manets |
APPLICATION |
JAVA |
18 |
HSC17J427 |
Palm Print Classification By Global Features |
APPLICATION |
JAVA |
19 |
HSC17J428 |
Warning Bird - A Near Real Time Application |
APPLICATION |
JAVA |
20 |
HSC17J429 |
Predictable Mobile Routing For Spacecraft Network |
APPLICATION |
JAVA |
21 |
HSC17J430 |
Clustering Sentence Level Text Using Novel Fuzzy |
APPLICATION |
JAVA |
22 |
HSC17J431 |
Dynamic Audit Service for Outsourced Storages in Cloud |
APPLICATION |
JAVA |
23 |
HSC17J432 |
Enabling dynamic data and indirect mutual trust for cloud computing storage systems |
APPLICATION |
JAVA |
24 |
HSC17J433 |
A Parabolic Routing Protocol with Assured Delivery Rate in Wireless Sensor Network |
APPLICATION |
JAVA |
25 |
HSC17J434 |
Two Tales Privacy in Online Social Networks |
APPLICATION |
JAVA |
26 |
HSC17J435 |
m-Privacy for Collaborative Data Publishing |
APPLICATION |
JAVA |
27 |
HSC17J436 |
Secure and Privacy- Aware Searching in Peer-to-Peer Networks |
APPLICATION |
JAVA |
28 |
HSC17J437 |
Citizen Card System |
APPLICATION |
JAVA |
29 |
HSC17J438 |
Data Hiding A Motion Vectors Of Compressed Video |
APPLICATION |
JAVA |
30 |
HSC17J439 |
Time Table Generation |
APPLICATION |
JAVA |
31 |
HSC17J440 |
License Plate Character Recognition Feature Extraction System |
APPLICATION |
JAVA |
32 |
HSC17J441 |
Fault Node Recovery Algorithm for a Wireless Sensor Network |
APPLICATION |
JAVA |
33 |
HSC17J442 |
FEC Decoding Based on the BP Algorithm in LTE and Wi MAX Systems |
APPLICATION |
JAVA |
34 |
HSC17J443 |
Efficient Relevance Feedback for CBIR |
APPLICATION |
JAVA |
35 |
HSC17J444 |
Heterogeneous Wireless Sensor Networks |
APPLICATION |
JAVA |
36 |
HSC17J445 |
Steganography Using Syndrome-Trellis Codes |
APPLICATION |
JAVA |
37 |
HSC17J446 |
Ontology Based Business Process Customization |
APPLICATION |
JAVA |
38 |
HSC17J447 |
Intrusion detection An Energy efficient approach |
APPLICATION |
JAVA |
39 |
HSC17J448 |
Interworked Fixed and Mobile Networks |
APPLICATION |
JAVA |
40 |
HSC17J449 |
Data Hiding And Selective Embedding |
APPLICATION |
JAVA |
41 |
HSC17J450 |
Data Hiding in Motion Vectors of Compressed Video |
APPLICATION |
JAVA |
42 |
HSC17J451 |
Embedded Extended Visual Cryptography Schemes |
APPLICATION |
JAVA |
43 |
HSC17J452 |
Location-Based Spatial Query Processing |
APPLICATION |
JAVA |
44 |
HSC17J453 |
Nymble Blocking Misbehaving Users in Anonymizing Networks |
APPLICATION |
JAVA |
45 |
HSC17J454 |
Design of p-Cycles for Full Node Protection |
APPLICATION |
JAVA |
46 |
HSC17J455 |
Multicast and Broadcast Service |
APPLICATION |
JAVA |
47 |
HSC17J456 |
Selective Data Stream Blocking Mechanism for Networks |
APPLICATION |
JAVA |
48 |
HSC17J457 |
Wireless Broadcast Networks Stability and Utility Maximization |
APPLICATION |
JAVA |
49 |
HSC17J458 |
Edge-based Bilateral Filter for Restoring Real Noisy Image |
APPLICATION |
JAVA |
50 |
HSC17J459 |
Mobility Management Scheme |
APPLICATION |
JAVA |
51 |
HSC17J460 |
Fast Query Point Movement |
APPLICATION |
JAVA |
52 |
HSC17J461 |
Grid Application Reliability using Communicating |
APPLICATION |
JAVA |
53 |
HSC17J462 |
Peer-to-Peer Networks |
APPLICATION |
JAVA |
54 |
HSC17J463 |
Geographical Routing With Location Service |
APPLICATION |
JAVA |
55 |
HSC17J464 |
Multiprocessor Cooperation |
APPLICATION |
JAVA |
56 |
HSC17J465 |
Image Retrieval System Using Sketches |
APPLICATION |
JAVA |
57 |
HSC17J466 |
Mobile Shop Using Cart System |
APPLICATION |
JAVA |
58 |
HSC17J467 |
Furniture Shop Management System |
APPLICATION |
JAVA |
59 |
HSC17J468 |
Server and Clients Node Capture Attacks |
APPLICATION |
JAVA |
60 |
HSC17J469 |
Low-Complexity Iris Coding and Recognition Based on Directionlets |
APPLICATION |
JAVA |
61 |
HSC17J470 |
Multi Scale Segmentation |
APPLICATION |
JAVA |
62 |
HSC17J471 |
Public Key Validation For DNS Security Extensions |
APPLICATION |
JAVA |
63 |
HSC17J473 |
Hacker Tracking System Using Honeypot |
APPLICATION |
JAVA |
64 |
HSC17J474 |
Optimal Distributed Malware Defense in Mobile Networks |
APPLICATION |
JAVA |
65 |
HSC17J475 |
Statistical Traffic Pattern Discovery System |
APPLICATION |
JAVA |
66 |
HSC17J476 |
Secure Data Retrieval for Decentralized Disruption |
APPLICATION |
JAVA |
67 |
HSC17J477 |
Efficient and Privacy-Aware Data Aggregation |
APPLICATION |
JAVA |
68 |
HSC17J478 |
Scalable Distributed Service Integrity Attestation |
APPLICATION |
JAVA |
69 |
HSC17J479 |
Context-Aware Energy Enhancements |
APPLICATION |
JAVA |
70 |
HSC17J480 |
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks |
APPLICATION |
JAVA |
71 |
HSC17J481 |
Building Confidential and Efficient Query Services |
APPLICATION |
JAVA |
72 |
HSC17J482 |
Revocable Data Access Control for Multi-Authority Cloud Storage |
APPLICATION |
JAVA |
73 |
HSC17J483 |
Towards Differential Query Services in Cost-Efficient Clouds |
APPLICATION |
JAVA |
74 |
HSC17J484 |
VANET-Based Secure and Privacy-Preserving Navigation |
APPLICATION |
JAVA |
75 |
HSC17J485 |
Facilitating Document Annotation Using Content and Querying Value |
APPLICATION |
JAVA |
76 |
HSC17J486 |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage |
APPLICATION |
JAVA |
77 |
HSC17J487 |
Public Service Transportation |
APPLICATION |
JAVA |
78 |
HSC17J488 |
Secure Fine Payment For Traffic Violations |
APPLICATION |
JAVA |
79 |
HSC17J489 |
Automatic Test Packet Generation |
APPLICATION |
JAVA |
80 |
HSC17J490 |
Boundary Cutting for Packet Classification |
APPLICATION |
JAVA |
81 |
HSC17J491 |
Cost Effective Resource Allocation of Overlay Routing Relay Nodes |
APPLICATION |
JAVA |
82 |
HSC17J492 |
Secure Distribution of Information Exchange |
APPLICATION |
JAVA |
83 |
HSC17J493 |
Active Source Routing Protocol For Mobile Networks |
APPLICATION |
JAVA |
84 |
HSC17J494 |
Error Tracking System |
APPLICATION |
JAVA |
85 |
HSC17J495 |
Client-Server Protocol Implementation |
APPLICATION |
JAVA |
86 |
HSC17J496 |
Efficient Key Management For Threshold-Multi Signature In Distributed System |
APPLICATION |
JAVA |
87 |
HSC17J497 |
Modeling and Automated Containment of Worms |
APPLICATION |
JAVA |
88 |
HSC17J498 |
Security in Large Networks Using Mediator Protocols |
APPLICATION |
JAVA |
89 |
HSC17J499 |
Secured Distributed Key Management for Threshold-Multisignature using Cryptography |
APPLICATION |
JAVA |
90 |
HSC17J500 |
Authentication Protocols for Dynamic Peer Groups |
APPLICATION |
JAVA |
91 |
HSC17J501 |
Boutique Management System |
APPLICATION |
JAVA |
92 |
HSC17J502 |
Petrol Bunk Management System |
APPLICATION |
JAVA |
93 |
HSC17J504 |
Automatically Mining Facets for Queries from Their Search Results |
APPLICATION |
JAVA |
94 |
HSC17J505 |
Credit Card Fraud Detection Using Hidden Markov Model |
APPLICATION |
JAVA |
95 |
HSC17J506 |
Cross-Platform Identification of Anonymous Identical Users |
APPLICATION |
JAVA |
96 |
HSC17J507 |
Dual-Server Public-Key Encryption With Keyword Search |
APPLICATION |
JAVA |
97 |
HSC17J508 |
Panda Public Auditing for Shared Data with Efficient User Revocation |
APPLICATION |
JAVA |
98 |
HSC17J509 |
Person Reidentification With Reference Descriptor |
APPLICATION |
JAVA |
99 |
HSC17J510 |
Shadow Attacks based on Password Reuses A Quantitative Empirical Analysis |
APPLICATION |
JAVA |
100 |
HSC17J511 |
STAMP Enabling Privacy-Preserving Location Proofs for Mobile Users |
APPLICATION |
JAVA |
101 |
HSC17J512 |
On-Screen Enlistment of Intramural Proceedings in Universities |
APPLICATION |
JAVA |
102 |
HSC17J513 |
e-Based Voting System Using Aadhar Card Data |
APPLICATION |
JAVA |