22.03.2014 Views

List of selected full length papers Paper ID Title - K. K. Wagh ...

List of selected full length papers Paper ID Title - K. K. Wagh ...

List of selected full length papers Paper ID Title - K. K. Wagh ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

134 UTILIZITION OF PEER-TO-PEER FILE SHARING ON GPRS NETWORK<br />

135 SMOIR: Scalable Multipurpose Ontology-based<br />

Information Retrieval system<br />

136 SECURE MUTUAL AUTHENTICATION AND CHEATING PREVENTION TECHNIQUE<br />

FOR REALTIME APPLICATIONS USING<br />

VISUAL CRYPTOGRAPHY<br />

137 Performance Analysis <strong>of</strong> Hierarchical Fault<br />

Tolerance Protocol for Mobile Agent Systems<br />

140 THREAT TO MOBILE BANKING ON iPhone (phishing)<br />

143 Data Mining Techniques To Facilitate The<br />

Integration Of Data In Data Warehouse<br />

144* Implementation <strong>of</strong> Hardware Stack TCP/IP using virtex-2 Pro FPGA<br />

146 Performance Improvement in Signature Detection Engine using Dual Algorithms<br />

150 Saving the World Unsolicited Email Flow<br />

151 A SURVEY OF BLACK HOLE ATTACK AND ITS SOLUTIONS<br />

IN MOBILE ADHOC NETWORKS.<br />

152 Implementation <strong>of</strong> Ethernet Controlled System<br />

157 3D Depth Perception from a Single Still Image<br />

159 WAVELET AND DCT BASED IMAGE AUTHENTICATION AND RECOVERY<br />

160 Reliable and failsafe service selection in dynamic distributed systems<br />

161 SECURITY ARCHITECTURE FOR MOBILE AD HOC<br />

NETWORKS<br />

164 Testing <strong>of</strong> Digital Controllers Using Real-Time Hardware in the Loop Simulation<br />

165 Doppler Estimation in Mobile Fading Channel<br />

168 VIRTUAL ADAPTIVE QUEUE MANAGEMENT (AQM):<br />

MANAGING BOTTLENECK QUEUE FROM NETWORK EDGE<br />

169 Energy Aware Routing Protocol for Wireless Sensor Networks<br />

171 Computational Model for Animation <strong>of</strong> Cloth Like<br />

Object<br />

173 Image Blending Techniques with application to<br />

Image Stitching<br />

175 Image Encryption Using Fusion <strong>of</strong> Image Inversion, Pixel Processing and Block-Based Transformation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!