Id-based encryption schemes computing the digits of the mathematical Pi. SONET / SDH communication quantum mechanical algorithms for hidden subgroups and related problems Persistent data structures and software watermarking. Web Security Identity-based encryption Compiler Optimization: Some Recent Trends Web Service Standards for data mining.
Id-based encryption schemes computing the digits of the mathematical Pi. SONET / SDH communication quantum mechanical algorithms for hidden subgroups and related problems Persistent data structures and software watermarking. Web Security Identity-based encryption Compiler Optimization: Some Recent Trends Web Service Standards for data mining.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online from Scribd
Id-based encryption schemes computing the digits of the mathematical Pi. SONET / SDH communication quantum mechanical algorithms for hidden subgroups and related problems Persistent data structures and software watermarking. Web Security Identity-based encryption Compiler Optimization: Some Recent Trends Web Service Standards for data mining.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online from Scribd
E-Commerce and Digital Signatures SONET/SDH Communication Particle Swarm Optimization Multi Protocol Level Switching Virtual Private Network Voice over IP Quantum mechanical algorithms for hidden subgroups and related problems Persistent Data Structures Software Watermarking The challenges of software reliability & modeling Web Security Identity-based encryption Compiler Optimization: Some Recent Trends Web Service Standards for Data Mining Natural Language Generation Geometry in Sensor Networks Trustworthy Computing Software Metrics Infinite Games Automata over Infinite Words Dual Core Processor : Architectural Features Digital Video Encoding Formats Delay Tolerant Routing Quorum Systems Information Extraction Named Entity Recognition XML Query Languages Geometry in Sensor Networks Linear Time encoding/decoding of ordinary tree and hypertree Semantic Web Multicore Processors and their Architectures IPv6 Electronic Money: Underlying Mathematical Techniques RTOS for Mobile Devices Virtual Reality Cache Coherence Problem Parameterized Complexity Mathematical Programming Some topics in Digital Geometry Core Sets in Computational Geometry Some variants of mathematical programming Code Transformation Noisy text processing using machine learning methods Mobile electronic payments Secure data communication based on quantum effects Infinite Automata and Formal Verification Side Channel Attacks and its' counter measure for Block Cipher Primes are of two kinds: probable and provable Are Mersenne primes only an obsession? Time Contract Algorithms Data communication in current and future wireless networks Parametric searching â what it is and how to make it practical Geometric applications in Sensor networks Packing and covering Cache efficient algorithms Facility location and clustering Some variants of mathematical programming Model Checking Decision diagrams in VLSI CAD Mobile Agents Distributed File Systems Emotional Agents: Computing Models of Emotions Real Time Operating Systems Recent Trends Information Extraction Named Entity Recognition XML Query Languages Stochastic Scheduling Intrusion detection in wireless networks Ultra Wideband Networking Routing protocols in wireless sensor networks Clustering techniques in complex network Object Type System Code Transformation Noisy text processing using machine learning methods Low Level Object Oriented Languages Stochastic Scheduling Intrusion detection in wireless networks Image steganography Routing protocols in wireless sensor networks Clustering techniques in complex network Object Type System Grammar Induction Localization in Sensor Networks Reversible logic ciruits: design and test issues Digital Watermarking Program Verification Quantum Cryptography Quantum Cryptanalysis Simulation of entanglement with communication for distributed Problem solving. Dual Core Processor : Architectural Features Digital Video Encoding Formats Delay Tolerant Routing Quorum Systems Mobile electronic payments Secure data communication based on quantum effects Algorithms for networking Infinite Automata and Formal Verification Side Channel Attacks and its' counter measure for Block Cipher Salient aspects of the architecture of the Itanium CPU Using the combination lemma: Proving upper bounds on the Combinatorial complexity of unions. Proving lower bounds using Holevo's result. Recommender System Towards Object Oriented Design using Verilog HDL Real Time Operating Systems Web services The spyware nightmare: The problems and possible solutions 2005 Platform Architecture 3G Cellular Telephone network Epsilon nets and transversal of hypergraphs Geometric Discrepancy LP-Based Approximation Algorithms Game theoretic issues in algorithms Computational Journalism Machine Transliteration Monolingual and Cross language information retrieval Intelligent Tutoring Systems Intelligent information Fusion Statistical Machine Translation Median Graphs and its Applications (in Computer Science) Logarithmic Keying Metabolic Networks Trust in Mobile and Wireless Networks Wavelets and its applications (in Computer Science) Web Query Log Analysis Ontology Servers New Trends in Visual Cryptography Dynamic Software Management in Mobile Computing Systems Brain Computer Interfaces Incremental Tensor Analysis: Applications Semantic Text Similarity Platform Independent Enhanced Media Player Neural networks and fuzzy logic in unmanned aircraft ANN based character recognizer for mobile devices to help visually challenged" Internet In Space Image Augmented Inertial Navigation System Efficient Resource Scheduling In Data Grid Imouse Intelligent transportation system using genetic algorithm for shortest driving t ime Hiding sensative rule using distortion technique The Friend Locator Adaptive steganograp A wireless technology for Young generation Facial Analysis Between Age Groups Using Distance Matrices Double talk detector using echo path estimate Inconspicuous threats to Mobile Computing security Establishment of emergency, portable, bidirectional Gait as a biometric for human recognition Emulation of peer to peer botnets PGP encryption technology Generic visual perception processor Nanotechnology Assembler Design And Nano-Communication MANETS: Mobile Adhoc Networks Liquid Crystal on Silicon Display (LCOS) Jini - advanced set of network protocols Computer memory based on the protein bacterio-rhodopsin CSS and DeCSS Multimedia Broadcast Multicast Service (MBMS) Extreme Programming (XP) Holographic Versatile Disc Zero Knowledge proofs Bimolecular Computers SPINS -Security Protocol For Sensor Network Context Disambiguation On Web Search Results Surface Computer Andriod OS Xen Ware Blue Gene Self Defending networks Cognition & Perception Network Attached Storages 4G & 5G PCI DSS security module AS2 protocol for file transfers PGP encryption technology openGPG encryption Spyware Quantum Computing Blue - Ray Disc Robotics RFID MANET WAP DNA Computing in security 4g Wireless Systems HomeRF- localized wireless technology optimized for the home environment Internet Searching Zigbee Java Management Extensions (JMX) - component framework for building intelligent network Earth Simulator- Fastest Supercomputer Home Networking TouchFLO Technology Tracking and Positioning of Mobiles in Telecommunication 3D Volume Storage Optical Networking and Dense Wavelength Division Multiplexing Software-Defined Radio Space-time adaptive processing Secure File Transfer (use PGP, deflate or nay encryption method) A Secure GateWay SPINS -Security Protocol For Sensor Network Generic visual perception processor Nanotechnology Assembler Design And Nano-Communication Tele-Immersion Liquid Crystal on Silicon Display (LCOS) Jini - advanced set of network protocols Computer memory based on the protein bacterio-rhodopsin CSS and DeCSS Multimedia Broadcast Multicast Service (MBMS) Extreme Programming (XP) Holographic Versatile Disc Zero Knowledge proofs Bimolecular Computers Context Disambiguation On Web Search Results Touch Screen Technology Surface Computer Face Recognition Technology 4G Wireless Systems A BASIC TOUCH-SENSOR SCREEN SYSTEM Artificial Eye Animatronics Automatic Teller Machine Aircars Adding interlligence to ineternet using satellite ADSL Aeronautical Communications Agent oriented programing Animatronics Augmented reality Autonomic Computing Bicmos technology BIOCHIPS Biomagnetism Biometric technology BLUE RAY Boiler Instrumentation Brain-Computer Interface Bluetooth Based Smart Sensor Networks BIBS CDMA Wireless Data Transmitter Cellonics Technology Cellular Positioning ZIGBEE Cruise Control Devices Crusoe Processor