Who We Are
Open Source
JAVA
DotNet
Matlab
VLSI
Bulk Download
Java
Dotnet
VLSI
Matlab
Login / Register
Open Source Dotnet Project Titles
A Data Fusion Technique for Wireless Ranging Performance Improvement
A Distributed And Scalable Routing Table Manager For The Next Generation Of IP Routers
A Geometric Deployment and Routing Scheme for Directional Wireless Mesh Networks
A Mechanism Design Approach to Resource Procurement in Cloud Computing
A Methodology for Extracting Standing Human Bodies From Single Images
A New Color Filter Array With Optimal Properties for Noiseless and Noisy Color Image Acquisition
A New Model For Dissemination Of XML Content
A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding
A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patt
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
A Study on False Channel Condition Reporting Attacks in Wireless Networks
A System for Automatic Notification and Severity Estimation of Automotive Accidents
A System to Filter Unwanted Messages from OSN User Walls
A Web Search Engine-Based Approach to Measure Semantic Similarity between Words
Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless
Adaptive Provisioning of Human Expertise in Service-oriented Systems
ALBA-R Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks
An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
An Empirical Performance Evaluation of Relational Keyword Search Systems
An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
ARTIFICIAL INTELLIGENCE NETWORK LOAD BALANCING USING ANT COLONY OPTIMIZATION
Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical System
BRACER A Distributed Broadcast Protocol in Multi-Hop Cognitive Radio Ad Hoc Networks
Bridging Socially-Enhanced Virtual Communities
Capacity of Hybrid Wireless Mesh Networks with Random APs
Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks
Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using
Cloud-Based Multimedia Content Protection System
Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization
Combining Haar Feature And Skin Color Based Classifiers For Face
COMIC Cost Optimization for Internet Content Multihoming
Congestion Aware Routing in Nonlinear Elastic Optical Networks
Continuous and Transparent User Identity Verification for Secure Internet Services
Continuous Neighbor Discovery in Asynchronous Sensor Networks
Credit Card Fraud Detection Using Hidden Markov Models
Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks
Cryptographically safe serverclient protocol
Data integrity proofs in cloud storage
Data Leakage Detection
Data-Driven Composition for Service-Oriented Situational Web Applications
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation
Demand Bidding Program and Its Application in Hotel Energy Management
Designing an Architecture for Monitoring Patients at Home Ontologies and Web Services for Clinical
Detection and Rectification of Distorted Fingerprints
Digital Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paint
Discovery of Ranking Fraud for Mobile Apps
Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
EAACK—A Secure Intrusion-Detection System for MANETs
Edge Detection in Images with Wavelet Transform
Effective Key Management in Dynamic Wireless Sensor Network
Efficient 2-D Grayscale Morphological Transformations With Arbitraly Flat Structuring Elements
Efficient broad casting Coverage in Mobile Ad Hoc Networks
Efficient Computation of Range Aggregates against uncertain location based queries
Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case
Efficient Top-k Retrieval on Massive Data
Efficient Two-Server Password-Only Authenticated Key Exchange
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Enabling Smart Cloud Services Through Remote Sensing An Internet of Everything Enabler
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
Estimation of Defects Based On Defect Decay Model ED3M
Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploring Application-Level Semantics for Data Compression
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
Extracting Spread-Spectrum Hidden Data from Digital Media
Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication
Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision
GDCluster A General Decentralized Clustering Algorithm
Generating Summary Risk Scores for Mobile Applications
Hardware enhanced association rule mining with Hashing and Pipelining
HBA Distributed Metadata Management for Large Cluster-Based Storage System
Hiding Messages in the Noise of a Picture
Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
Image Processing for Edge Detection
Image Recognition with Neural Networks
Importance of Coherence Protocols with Network Applications on Multicore Processors
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
Integration of Sound Signature in Graphical Password Authentication System
Introducing Replaceability into Web Service Composition
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
Joint Beamforming, Power and Channel Allocation in Multi-User and Multi-Channel Underlay MISO Cognitive
Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular Networks
Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
Localized Sensor Area Coverage With Low Communication Overhead
Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography
Malware Propagation in Large-Scale Networks
Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks
Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm
Monitoring Service Systems from a Language-Action Perspective
Multicast Capacity in MANET with Infrastructure Support
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks
Network Resource Allocation for Users With Multiple Connections Fairness and Stability
Neural Network Based Face Detection
Neural Network for Recognition of Handwritten and Digits
Neural Network for Unicode Optical Character Recognition
One Size Does Not Fit All Towards User- And Query-Dependent Ranking For Web Databases
Online Index Recommendations for High-Dimensional Databases Using Query Workloads
Optimal Content Downloading in Vehicular Networks
Optimal service pricing for a cloud cache
Optimizing Multi-Top-k Queries over Uncertain Data Streams
Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High-Capacity App
Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter
Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
Personalized Ontology Model for Web Information Gathering
PMSE A Personalized Mobile Search Engine
Privacy Preserving Policy Based Content Sharing in Public Clouds
Privacy-Preserving Detection of Sensitive Data Exposure
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Probability-Based Prediction and Sleep Scheduling for Energy-Efficient Target Tracking in Sensor Net
PSMPA Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Dist
PSR A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
Publishing Search Logs – A Comparative Study of Privacy Guarantees
Quality of Service Provision in Cloud-based Storage System for Multimedia Delivery
Rank-Based Similarity Search Reducing the Dimensional Dependence
Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
Real-Time Big Data Analytical Architecture for Remote Sensing Application
Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Flow Watermarking
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encry
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
Scalable Learning of Collective Behavior
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
Secure Mining of Association Rules in Horizontally Distributed Databases
Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
Security Analysis of Handover Key Management in 4G LTESAE Networks
Self-Reconfigurable Wireless Mesh Networks
Single Image Super-Resolution Based on Gradient Profile Sharpness
SOS A Distributed Mobile Q&A System Based On Social Networks
SPOC A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
SSD A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity
Steganography for Hiding Data in Wave Audio Files
T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence
Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
The Awareness Networks To Whom Should I Display My Actions And, Whose Actions
The Geometric Efficient Matching Algorithm for Firewalls
The World in a Nutshell Concise Range Queries
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
Trustworthy Computing Under Resource Constraints With The Down Policy
Uniform Embedding for Efficient JPEG Steganography
Video Dissemination over Hybrid Cellular and Ad Hoc Networks
Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light
Vision Processing for Real-time 3-D Data Acquisition Based on Coded Structured Light
Watermarking Relational Databases Using Optimization Based Techniques
Web Image Re-Ranking Using Query-Specific Semantic Signatures
Windows Management Instrumentation (WMI) Implementation
Workflow Mining Discovering Process Models from Event Logs