You are on page 1of 5

Id-based encryption schemes

computing the digits of the mathematical Pi


E-Commerce and Digital Signatures
SONET/SDH Communication
Particle Swarm Optimization
Multi Protocol Level Switching Virtual Private Network
Voice over IP
Quantum mechanical algorithms for hidden subgroups and related problems
Persistent Data Structures
Software Watermarking
The challenges of software reliability & modeling
Web Security
Identity-based encryption
Compiler Optimization:
Some Recent Trends
Web Service Standards for Data Mining
Natural Language Generation
Geometry in Sensor Networks
Trustworthy Computing
Software Metrics
Infinite Games
Automata over Infinite Words
Dual Core Processor : Architectural Features
Digital Video Encoding Formats
Delay Tolerant Routing
Quorum Systems
Information Extraction
Named Entity Recognition
XML Query Languages
Geometry in Sensor Networks
Linear Time encoding/decoding of ordinary tree and hypertree
Semantic Web
Multicore Processors and their Architectures
IPv6
Electronic Money:
Underlying Mathematical Techniques
RTOS for Mobile Devices
Virtual Reality
Cache Coherence Problem
Parameterized Complexity
Mathematical Programming
Some topics in Digital Geometry
Core Sets in Computational Geometry
Some variants of mathematical programming
Code Transformation
Noisy text processing using machine learning methods
Mobile electronic payments
Secure data communication based on quantum effects
Infinite Automata and Formal Verification
Side Channel Attacks and its' counter measure for Block Cipher
Primes are of two kinds: probable and provable
Are Mersenne primes only an obsession?
Time Contract Algorithms
Data communication in current and future wireless networks
Parametric searching â what it is and how to make it practical
Geometric applications in Sensor networks
Packing and covering
Cache efficient algorithms
Facility location and clustering
Some variants of mathematical programming
Model Checking
Decision diagrams in VLSI CAD
Mobile Agents
Distributed File Systems
Emotional Agents: Computing Models of Emotions
Real Time Operating Systems Recent Trends
Information Extraction
Named Entity Recognition
XML Query Languages
Stochastic Scheduling
Intrusion detection in wireless networks
Ultra Wideband Networking
Routing protocols in wireless sensor networks
Clustering techniques in complex network
Object Type System
Code Transformation
Noisy text processing using machine learning methods
Low Level Object Oriented Languages
Stochastic Scheduling
Intrusion detection in wireless networks
Image steganography
Routing protocols in wireless sensor networks
Clustering techniques in complex network
Object Type System
Grammar Induction
Localization in Sensor Networks
Reversible logic ciruits: design and test issues
Digital Watermarking
Program Verification
Quantum Cryptography
Quantum Cryptanalysis
Simulation of entanglement with communication for distributed Problem solving.
Dual Core Processor : Architectural Features
Digital Video Encoding Formats
Delay Tolerant Routing
Quorum Systems
Mobile electronic payments
Secure data communication based on quantum effects
Algorithms for networking
Infinite Automata and Formal Verification
Side Channel Attacks and its' counter measure for Block Cipher
Salient aspects of the architecture of the Itanium CPU
Using the combination lemma: Proving upper bounds on the
Combinatorial complexity of unions.
Proving lower bounds using Holevo's result.
Recommender System
Towards Object Oriented Design using Verilog HDL
Real Time Operating Systems
Web services
The spyware nightmare: The problems and possible solutions 2005
Platform Architecture
3G Cellular Telephone network
Epsilon nets and transversal of hypergraphs
Geometric Discrepancy
LP-Based Approximation Algorithms
Game theoretic issues in algorithms
Computational Journalism
Machine Transliteration
Monolingual and Cross language information retrieval
Intelligent Tutoring Systems
Intelligent information Fusion
Statistical Machine Translation
Median Graphs and its Applications (in Computer Science)
Logarithmic Keying
Metabolic Networks
Trust in Mobile and Wireless Networks
Wavelets and its applications (in Computer Science)
Web Query Log Analysis
Ontology Servers
New Trends in Visual Cryptography
Dynamic Software Management in Mobile Computing Systems
Brain Computer Interfaces
Incremental Tensor Analysis: Applications
Semantic Text Similarity
Platform Independent Enhanced Media Player
Neural networks and fuzzy logic in unmanned aircraft
ANN based character recognizer for mobile devices to help visually challenged"
Internet In Space
Image Augmented Inertial Navigation System
Efficient Resource Scheduling In Data Grid
Imouse
Intelligent transportation system using genetic algorithm for shortest driving t
ime
Hiding sensative rule using distortion technique
The Friend Locator
Adaptive steganograp
A wireless technology for Young generation
Facial Analysis Between Age Groups Using Distance Matrices
Double talk detector using echo path estimate
Inconspicuous threats to Mobile Computing security
Establishment of emergency, portable, bidirectional
Gait as a biometric for human recognition
Emulation of peer to peer botnets
PGP encryption technology
Generic visual perception processor
Nanotechnology Assembler Design And Nano-Communication
MANETS: Mobile Adhoc Networks
Liquid Crystal on Silicon Display (LCOS)
Jini - advanced set of network protocols
Computer memory based on the protein bacterio-rhodopsin
CSS and DeCSS
Multimedia Broadcast Multicast Service (MBMS)
Extreme Programming (XP)
Holographic Versatile Disc
Zero Knowledge proofs
Bimolecular Computers
SPINS -Security Protocol For Sensor Network
Context Disambiguation On Web Search Results
Surface Computer
Andriod OS
Xen Ware
Blue Gene
Self Defending networks
Cognition & Perception
Network Attached Storages
4G & 5G
PCI DSS security module
AS2 protocol for file transfers
PGP encryption technology
openGPG encryption
Spyware
Quantum Computing
Blue - Ray Disc
Robotics
RFID
MANET
WAP
DNA Computing in security
4g Wireless Systems
HomeRF- localized wireless technology optimized for the home environment
Internet Searching
Zigbee
Java Management Extensions (JMX) - component framework for building intelligent
network
Earth Simulator- Fastest Supercomputer
Home Networking
TouchFLO Technology
Tracking and Positioning of Mobiles in Telecommunication
3D Volume Storage
Optical Networking and Dense Wavelength Division Multiplexing
Software-Defined Radio
Space-time adaptive processing
Secure File Transfer (use PGP, deflate or nay encryption method)
A Secure GateWay
SPINS -Security Protocol For Sensor Network
Generic visual perception processor
Nanotechnology Assembler Design And Nano-Communication
Tele-Immersion
Liquid Crystal on Silicon Display (LCOS)
Jini - advanced set of network protocols
Computer memory based on the protein bacterio-rhodopsin
CSS and DeCSS
Multimedia Broadcast Multicast Service (MBMS)
Extreme Programming (XP)
Holographic Versatile Disc
Zero Knowledge proofs
Bimolecular Computers
Context Disambiguation On Web Search Results
Touch Screen Technology
Surface Computer
Face Recognition Technology
4G Wireless Systems
A BASIC TOUCH-SENSOR SCREEN SYSTEM
Artificial Eye
Animatronics
Automatic Teller Machine
Aircars
Adding interlligence to ineternet using satellite
ADSL
Aeronautical Communications
Agent oriented programing
Animatronics
Augmented reality
Autonomic Computing
Bicmos technology
BIOCHIPS
Biomagnetism
Biometric technology
BLUE RAY
Boiler Instrumentation
Brain-Computer Interface
Bluetooth Based Smart Sensor Networks
BIBS
CDMA Wireless Data Transmitter
Cellonics Technology
Cellular Positioning
ZIGBEE
Cruise Control Devices
Crusoe Processor

You might also like