17-04-2011, 08:00 AM
1. Modeling & Automated Containment of Worms
2. Computation Efficient Multicast Key Distribution
3. A wireless Intrusion detection system and a new attack model
4. An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
5. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
6. Novel Secure Communication Protocol for Ad Hoc networks
7. Image Transformation using Grid
8. Selective Encryption of Still Image
9. Spatio Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
10. Re-Ordering Of Packets Using Retransmission Timer
11. QUIVER Consistent Object Sharing For Edge Services
12. Peer to Peer Messaging System
13. Dynamic Load Balancing in Distributed Systems in the Presence of Delays : A Regeneration Theory Approach
14. Distributed cache updating for the Dynamic source routing protocol
15. Gradient Vector Force - A new External Force for Snakes
16. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
17. Securing User-Controlled Routing Infrastructures
18. Controlling IP Spoofing Through Inter Domain Packet Filters
19. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
20. Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups
21. Mitigating Performance Degradation in Congested Sensor Networks
22. A Geometric Approach to Improving Active Packet Loss Measurement
23. Incremental deployment service of Hop by hop multicast routing protocol
24. ATM Networks and Intelligent Packet Filtering
25. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
26. Truth Discovery with multiple Conflicting Information Providers on web
27. Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
28. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
29. A New, Efficiet Coordinated Checkpointing Protocol combined with Selective Sender - Based Message Logging
30. Face Recognition Using Laplacianfaces
31. Dynamic Load Balancing in Distributed Systems in the presence of delays A regeneration theory Approach