Topic 2005-06 Infiniband on Demand Secure Routing Protocol Resilient To
Total Page:16
File Type:pdf, Size:1020Kb
Topic 2005-06 Infiniband On demand secure routing protocol resilient to byzantine failures Adhoc Network Routing (Unmodified Simulation Models) LDAP(load Balanced light weight directory accessed protocol) Biometrics Sensor Network : An Overview Cellular Digital Packet data n/w Cross layring in mobile adhoc network design Group Communication in mobile adhoc network design Predistibution Security Computer clothing Fuzzy Image processing Uncheatable grid computing Data Replication in data gred Distributed Data based mang. System for data grid Fault Injection for verifying testability at the VHDL level EVDO - 3rd generation wireless high speed data Light weight Efficient Application Protocol Mobile Agent Middleware for Mobile computing Desiging ATM Internet Work Wireless LAN (New Archiecture) Autonomic computing Embedded linux VANET ( Vechicular Adhoc Network) Window CE operating System Topic Kazaa Application service RFID( Radio Frequency Identification) Search Engine Technology Intrusion prevention System) Jini (Network Technology ) JMX( Java Mangement Extension) Automated worm fingerprinting Flash Mob Computing WLAN security IRC (internet Relay Chat) Wireless Networking Computer forensics Efficient memory mang. for message passing Concurrecy Flash Memory Economic based resource sheduling for Grid Computing Object Detection over videos Holographic Memory visual Techniques in animation A Centralised load balancer Multimedia Streaming Protocol Packet Sniffer's Celluar Digital Packet Data Network Adhoc wireless network security besed on generics secure object Mount Rainier Virtual Keyboard Ethical Hacking Intel Centrino Mobile technology Optical wireless communication Web Content Management Topic Intrusion Detection systems Network Storage Digital Signature Intel Virualization Technology Smart Anttena Human powerd computing Virtual Private Network Anoto Technology Ultrawide Band Technology Blu Ray Disc Electronic Paper Authentication Against Dishonest Users in mobile Adhoc n/w UML 2.0 Distributed Firewall Architecutre system support for bandwidth management & application Web Spoofing Intellectual Nanotechnology business case models based upon WIMAX Public Key Infrastructure & certification A Taxonomy of wireless micro sensor network GPRS system Engg. Sun Solaris A secure incentive protocol against selfishness in mobile adhoc n/w Jiro Technology A distributed Architecure for knowledge based Interactive Robots Semantic search Engine Remote method Invocation Raw Socket Sonet Synchronous optical Network. Soft computing JMS( Java message Service) 4th Generation Mobile Network Fault Tolerance in distributed system Tablet PC Health Care's e-mail Sensor Network Serial ATA (SATA ) Mini ITX Meteor Burst Communication Digital Subscriber Line Technology Speech Application Language Tag Tele Immersion Unified Authentication 2007-08 Software Define Radio Camera Mouse Holographic Data Storage I-Mode technology Service Oriented Architecture Wibree Quad Core Processor Java Cryptography Architecture MUDPY Ontology Diamond Eye Artifical Passengar Data Sharing & Quering for Peer to Peer Data Mang. System FlexiNet Realtree Data Mining Technologies and Appplications for 21st Century Rate Distortion Optimized Image Compression Using Wedgets Service Quality Measurement for IPV6 Inter-Network Analysis of Database Workloads on modern processors Protecting Network Servers Peimeter Based Communicentric Acess Control System Z-Wave Technology Wi-Max Time Wraped Network Emulation E-Infrastructure Security Temporal Key Integrity Protocol Distributed Denial of Service Attack Class Baesd Prioritized Control In linux Bitlocker : Drive Encryption X Query KIZAMU: A System for Sculpting Digital Character Noise Reduction in Digital Signal processing Pervasive Computing Injecting Traffic Attacks in Wireless Mobile Adhoc Flooding Schemes in Wireless Mobile Adhoc Network An Efficient Anonymous Comm. Protocol for Peer to Peer Application over MANET Design & Evaluation of unified Cellular & Adhoc Network Mobile Phone Based Adhoc Network Preventing Resource Exhaustion attack in Mobile Adhoc Network Distributed Trust Establishment Scheme for Adhoc Networks An Online Detection & Control System for Cellular SMS Spam Enabling Superpages in linux Kernal Secure Comm. Data Collection in Mobile Sensor Network Road Traffic Monitoring by satellite Multimedia Broadcast Multicast Service Effective Data Mining Using Neural Network Image Mining Advanced Selection And Immunisation of N/W Based Security Threats Night Vision Technology Distributed Authentication and Key Agreement Information Plane for Distributed Services Pastwatch Proof Carreing Code for Mobile Code Security On Line Handwriting Recognition Using HMM Smart Bomb Sentence Generation Using Neural Network Forensic Animation Aritifical Neural Network in Library Code Blue Vehicular Adhoc Networking Holographic Versatile disc Wireless Markup Language Symfony - Web Application Framework for PHP 5.0 JavaFX Script Java Hibernate GNU/HURD Aspect Oriented Programming Cellular Intercepation Eyegaze Communication System Secure Mobile Agent HillTOP Algorithm HALO (High Altitude Long Operation) X 3 Image Sensor Sim Application Toolkit Efficient Algorithm for Association Mining in Large Databases Voice XML CAPTCHA Push to Talk Design Quality With Design Robustuness Handgesture Recognisition Using Cyber Glove Tiger Server Government Open System Inetrconnection Profile Multiprotocol label Switching (MPLS) Optical Burst Switching GSM AND GPRS Security Castalia - WSN Wireless Sensor Network Web Ontology Language Signcryption Roma Metadata Mobile Device in and out of the classroom Solar Power Satellite Data Management in Sensor Network Cyborg Identity Management Multimedia Data Mining Face Detection & Recognition Acess Gateway Wibro I-SCSI Distributed Access Management in multimedia IDC A BIOS Alternative Wisenet Project Oxygen Phishing Managing Copyrights in Open Network VSAT Collective Intelligence Unified Messaging System Session Initiation Protocol Internet Protocol Multimedia Subsystem MIME(Multipurpose Internet Mail Extensions) Phase Change Memory Speech Synthesis Petal Distributed Virtual Disk Real Time Spatial Data Rendering Algorithm for Soft Shadows Habitat Monitoring Text to Speech Conversion Money Transfer Through Mobile 64 Bit Computing IP Multimedia Subsyatem Internet 2 Daknet BSNL Connecting India Cybereconomy Desktop Streaming : A New Approach in Technical Support Multidimensional Approach to Internet Security 2008-09 Title MINDS - Minnesota Intrusion Detection System Packet Telephony Advanced Military Radar System Teleportation ATM With an Eye DirectX10 Disk proxy JXTA a Networking Envt Cyber Crime Cardspace Aritifical Eye Cortex A 8.0 processor Bandwidth Distribution Server Lazer Communication Wearable Computer STRUT - Framework(MVC) Thermography WLTS Protocol Voice Morphing Earth Simulator Kickstart Security Honeypot Human Computer Interaction in Science Fiction Movies Shape Information Phase Congruency for CBTR Region Based Technology for Object Recognition Mobile Agent Applications Preventation of Cooperative Blackhole Attack in MANET Digital Rights Management Innovation in Notebook Technology Proof Carrying code for mobile code security Web 3.0 Microsoft Surface Virtual Reality Modelling Language Microsoft Silver Lights 802.21 ARM 9.0 Google Chrome Cooperative linux Roadrunner Supercomputer Cellular IP Rootkit Dynamic Signature Verification Using Store Based Method NFS ( Near Field Communication) DDCISS(Data over cable service interface specification) Megaco Robotic Storage Pervasive Computing Web Prefetching Under Water Wireless Modems Patterns of Mobile Interaction Robocode I-DEN( i-0270) Agent Oriented S/W Engineering HIPPI Protocol SiLC Protocol Single Sign on Land Mine Detection Fault Tolerent Arctiecture for Internet Robot using Mobile agent Apache Struts SAM ( Scientific Archieve Management ) Satellite Boradband Access Pixie Dust Intelligent Navigation System Multicast Algo for Multichannel Wireless Mesh Network Bluegene Technology Bayesian Network Richer File System Metadata using Link and attributes SPINS- Security Ptotocols for Sensor Networks Dynamic Operating System for Sensor Networks Active Disk File System : A Distributed Scalable File System Apple IPhone Intellegent Prefetching Multicore CPU HLA Agent WIDEN Wireband Integratted Dispatch Enchanced Network MIDP 2.0 Really Simple Sydication MIDIet Mitigating Congestion in Wireless Sensor Network Security in Wireless Sensor Network Making TCP/IP Viable for Wireless Sensor Networks Location & Mobility of Mobile Phones in Sensors Networks Resilient Packet Ring Technology NFC K_nfb Reader Forensic Analysis for Network Security Voice Portals Position Based Routing Skinny Client Control Protocol Extensible Binding Language Google ANDROID OS An Agent Based Sytem for Capturing & Indexing S/W design Analysis Intelligent Software Agents Tiger SHARC Processor Aeronotical Communication Content Based Image Retrivel Using Relevance Feedback RSA Algorithm for data security Integrated Terminal Weather System linux Device Driver Unified Correlated Archiecture for Intrusion Detection Design & Archiecture of Atom processor UMTS Mobile Protocol Intel EP80579 Processor for Advance Embedded System RADTACTION Freenet GPU in Parallel Processing Signaling System Number 7 Crusoe Processor Lontalk Protocol DCCP Messaging Over IP SELinux Title MPEG-21 CAGIS Multiagent Architecture Compenent Multimedia over ATM Network Ismell Technology Z-RAM Vispro Envt. Information Warefare Infrared