Image Compression and De-compression |
Publishing Search Logs |
Fast Detection Of Mobile Replica Node Attacks |
A Fault-Tolerant Token Based Atomic Broadcast Algorithm |
Mobile Gadgeteer |
RITAS: Services For Randomized Intrusion Tolerance |
Intranet Chatting |
Mobile Sampling of Sensor Field Data |
Data Leakage Detection |
Multi-Lingual Website |
|
Improving Utilization Of Infrastructure Clouds |
Digital Encryption System |
Virtual Office Management |
Personal Authentication Based On Iris Recognition |
Wireless Health Care System |
Extended XML Tree Pattern Matching |
Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing |
Pre-paid Recharging System on Banking |
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks |
Project Metrics |
Nymble: Blocking Misbehaving Users in Anonymizing Networks |
Mobile Video Archive |
Ensuring Data Storage Security in Cloud Computing |
Secure Data Transmission |
Online Rental House Web Portal |
|
Modeling and Detection of Camouflaging Worm |
Lending Tree |
Automation Of Analysis And Development Management |
Intranet Mailing System |
Staying Connected in a Mobile Healthcare System |
Voyage Management |
Company Information Tracking System |
Tanrox Work Force |
ERP System |
JOpenIT |
IRC Chat Client |
Credit Card Management System |
E-Tutor Online Jobs |
Control Theoretic Approach to Distributed Optimal Configuration of 802.11 WLANs |
Web Enabled Automated Manufacturing System |
SPAF: Stateless FSA-based Packet Filters |
Ranking Spatial Data by Quality Preferences |
Web Blossom Bazzar |
Implementation and Validating Environmental and Health |
Distributed Transaction Proxy |
SMS Based Mobile Banking with Security |
Mobility Management Approaches for Mobile IP Networks |
File Security System |
IT Project and Process Management |
Mobile Banking System |
Online University |
Multihoming Route Control |
Multiple Routing Configurations for Fast IP Network Recovery |
Card Management System |
Company Security Reporting System |
Mindtech Bug And Component Systems |
Inter Bank Fund Transfer in Distributed Network |
Bandwidth Recycling |
District Collector |
|
On-Line Help Desk |
Online Recruitment System |
Orkut Using Java |
E -Crime File Management System |
Ezee Mail System |
Intrusion Detection System |
Online Crime file Management |
M-banking |
Control-Theoretic Approach To Distributed Optimal Configuration |
Exam Suite |
Autonomous Deployment Of Heterogeneous Mobile Sensors |
Enterprise Fleet Management System |
Mobile Location Alarm |
Script Identification Through Temporal Sequence Of The Strokes |
Virtual Router Using Destination-Sequenced Distance Vector |
Issue Tracker |
Contract Labor Management System |
Automated Ballot Vote |
Dynamic Time Slot Partitioning For Multimedia Transmission In Two-Hop Cellular Networks |
Mobile Invoice |
Multi User Chat System |
Effective Audio Video Transfer Using Real Time Protocol |
Citizen Card System |
Doctor Online |
Mobi-Thesaurus |
Effective Scheduling In Infrastructure-Based Cognitive Radio Networks |
Mobile Phone Tracking |
Remote PC Administration Using J2ME |
MACA |
Mobile Electronic Program Guide |
Ship Store System |
Mobiminder: Location Based Reminder on Mobiles |
Steganography In Audio Files |
Java Memory Model |
Online Real Estate Property Management |
Cooperative Clustering Protocol For Energy Saving Of Mobile Devices |
Cross-Layer Optimization For Multimedia Transport Over Multicode CDMA Networks |
Friend Mapper on Mobiles |
Noise Reduction By Fuzzy Image Filtering |
Load Shedding In Mobile Systems With Mobiqual |
Optimal Channel Access Management with QoS Support for Cognitive Vehicular Networks |
Mobi Travel Guide |
VAS for Hand Held Device |
Text Encryption And Decryption |
Remote Administration using Mobile |
Mobility Management Schemes Based On Pointer Forwarding For Wireless Mesh Networks |
Global Tracker |
Efficient Location Training Protocols For Heterogeneous Sensor And Actor Networks |
E-Cops |
Adaptive Location-Oriented Content Delivery In Delay-Sensitive Pervasive Applications |
Stealthy Attacks In Wireless Ad Hoc Networks |
Image Processing Editor |
Resilient Online Coverage For Surveillance Applications |
MultiAuctioneer Progressive Auction For Dynamic Spectrum Access |
Minimum Bandwidth Reservations For Periodic Streams In Wireless Real Time Systems |
Mobile i Broker |
Light-Weight Multi-Document Summarization Based On Two-Pass Re Ranking |
Medical Image Compression |
Natural Image Segmentation Based On Tree Equipartition |
Barcode Generation |
Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients |
Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks |
Efficient Location Training Protocols for Heterogeneous Sensor and Actor Networks |
Data Delivery Properties of Human Contact Networks |
Design and Performance Analysis of Mobility Management |
Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries |
Twitter Client For Android Based Smart Phone |
Real-Time Detection Of Clone Attacks |
Continuous Monitoring Of Distance-Based Range Queries |
Marine Operations And Management System |