SNO Project Title Domain Year VEBEK: Virtual Energy-Based Encryption and 1 Mobile Computing 2010 Keying for Wireless Sensor Networks Conditional Shortest Path Routing in Delay 2 Networking 2010 Tolerant Networks Efficient and Robust Detection of Duplicate Circuits and Systems for Video 3 2010 Videos in a Large Database Technology Knowledge and 4 Data Leakage Detection 2010 Data Engineering A Study for Important Criteria of Feature Knowledge and 5 2010 Selection in Text Categorization Data Engineering 6 Inference From Aging Information Nural Networks 2010 Dynamic Authentication for Cross-Realm SOA- 7 Service Computing 2010 Business Processor 8 AI and Opinion Mining Intelligent Systems 2010 Achieving Secure, Scalable, and Fine-grained 9 Cloud Computing 2010 Data Access Control in Cloud Computing Privacy-Preserving Public Auditing for Data 10 Cloud Computing 2010 Storage Security in Cloud Computing A Gen2-Based RFID Authentication Protocol for 11 Mobile Computing 2009 Security and Privacy 12 A Tabu Search Algorithm for Cluster Building Mobile Computing 2009 Biased Random Walks in Uniform Wireless 13 Mobile Computing 2009 Networks Cell Breathing Techniques for Load Balancing in 14 Mobile Computing 2009 Wireless LANs 15 Energy Maps for Mobile Wireless Networks Mobile Computing 2009 Greedy Routing with Anti-Void Traversal 16 Mobile Computing 2009 Wireless Sensor NWS Information Content-Based Sensor Selection 17 and Transmission Power Adjustment for Mobile Computing 2009 Collaborative Target Signaling for Multimedia conferencing in Stand- 18 Mobile Computing 2009 Alone Mobile Ad Hoc Networks Analysis of Shortest Path Routing for Large 19 Networking 2009 Multi-Hop Wireless Networks Explicit Load Balancing Technique for NGEO 20 Satellite IP Networks with On-Board Processing Networking 2009 Capabilities Random Cast An Energy Efficient 21 Communication Scheme for Mobile Ad Hoc Networking 2009 Networks Resequencing Analysis Stop-and-Wait ARQ for 22 Networking 2009 Parallel Multi-Channel Communication 23 Resource Allocation in OFDMA Wireless Networking 2009 24 Secure and Policy-Complaint Source Routing Networking 2009 25 Histogram-Based Global Load Balancing in Networking 2009 Structured Peer-to-Peer Systems A Trace-Driven Approach to Evaluate the 26 Scalability of P2P-Based Video-on-Demand Networking 2009 Service A Parameterized Approach to Spam-Resilient 27 Networking 2009 Link Analysis of the Web Measuring Capacity Bandwidth of Targeted Path 28 Networking 2009 Segments Effective Collaboration with Information Sharing 29 Networking 2009 in Virtual Universities Network-Coding-Based Signal Recovery for 30 Networking 2009 Efficient Scheduling in Wireless Network Enforcing Minimum-Cost Multicast Routing 31 Parallel And Distributed System 2009 Against Selfish Information Flows Movement-Assisted Connectivity Restoration In 32 Parallel And Distributed System 2009 Wireless Sensor and Actor Networks Variability and Reproducibility in Software Knowledge and Data 33 Engineering A Study of Four Companies that 2009 Engineering Developed the Same System Design and Evaluation of the iMed Intelligent 34 Data Mining 2009 medical Search Engine 35 Distributional Features for Text Categorization Data Mining 2009 Design of a robust and secure digital signature 36 scheme for image authentication over wireless Network Securities 2009 channel Enhanced Security for Online Exams Using 37 Network Securities 2009 Group Cryptography Internet and Online Information Privacy: An 38 Network Securities 2009 Exploratory Study of Preteens and Early Teens A Secure Mobile Healthcare System using 39 Network Securities 2009 Trust-Based Multicast Scheme Gradient Estimation Using Wide Support 40 Image Processing 2009 Operators Continuous Glass Patterns for Painterly 41 Image Processin9 2009 Rendering Automated Bidding for Media Services at the 42 MultiMedia 2009 Edge of a Content Delivery Network 43 Benefit Based Data Caching in Ad Hoc Networks Mobile Computing 2008 Location Based Spatial Query Processing in 44 Mobile Computing 2008 Wireless Broadcast Environments Characterizing Unstructured Overlay Topologies 45 Networking 2008 in p2p file sharing systems 46 Efficient Broadcasting Using Network Coding Networking 2008 On the Computational Complexity and 47 Networking 2008 Effectiveness of N-Hub Shortest-Path Routing Probabilistic Packet Marking for Large-Scale IP 48 Networking 2008 Traceback Securing User Controlled Routing 49 Networking 2008 Infrastructures Statistical techniques for detecting Traffic 50 Networking 2008 Anomalies Through Packet Header Data 51 Incentive based scheduling for market like Parallel and Distributed 2008 Computational Grids Systems A Web Usage Mining Framework for Mining Knowledge and Data 52 2008 Evolving User Profiles in Dynamic Web Sites Engineering An Efficient Clustering Scheme to Exploit Knowledge and Data 53 2008 hierarchical data in Network Traffic Analysis Engineering On the Design of Distributed Object Placement Knowledge and Data 54 and Load Balancing Strategies in Large-Scale 2008 Engineering Networked Multimedia Storage Systems Semantic Ideation Learning for Agent- Based E- Knowledge and Data 55 2008 Brainstorming-2008 Engineering An efficient time-bound hierarchically key Dependable and Secure 56 2008 Management Scheme for Secure Broadcasting Computing CREDIT CARD Fraud Detection Using Dependable and Secure 57 2008 Hidden Markov Model Computing Security Requirements Engineering: A 58 Software Engineering 2008 Framework for Representation and Analysis