SOFTWARE ENGINEERING, 2011
- The Awareness Network, To Whom Should I Display My Actions And, Whose Actions Should I Monitor
- A Comparative Study of Software Model Checkers as Unit Testing Tools
- Developing a Single Model and Test Prioritization Strategies for Event-Driven Software
- Genetic Algorithms for Randomized Unit Testing
- Semi-Proving An Integrated Method for Program Proving, Testing, and Debugging
- Software Module Clustering as a Multi–Objective Search Problem
- Verifying the Evolution of Probability Distributions Governed by a DTMC
- Embedded extended visual cryptography schemes, INFORMATION FORENSICS AND SECURITY, 2011
- Monitoring Service Systems from a Language-Action Perspective, SERVICE COMPUTING, 2011
- A Policy Enforcing Mechanism for Trusted Ad Hoc Networks, SERVICE COMPUTING, 2011
- Vulnerability Analysis in SOA-based Business Processes, SERVICE COMPUTING, 2011
www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 044-28235816
- Effects of Denial of sleep attacks on wireless sensor networks MAC protocols, Vehicular Technology - 2010
- Upper Bounds for Dynamic Memory Allocation, Computers - 2010
- Data Mining Techniques For Dynamically Classifying And Analyzing Library Database, Datamining - 2010
- Analysis of Computational Time of Simple Estimation of Distribution Algorithms, Evolutionary Computation - 2010
- An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, Information Forensics And Security - 2010
- Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos, Multimedia - 2009
- Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions, Neural Networks - 2009
- CHARMY: A Framework for Designing and Verifying Architectural Specifications, Software Engineering - 2009
- Optimized Resource Allocation for Software Release Planning, Software Engineering - 2009
- Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies, Biomedicine - 2009
- Continuous Flow Wireless Data Broadcasting for High Speed Environments, Broadcasting - 2009
- Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary, Communications - 2009
- SAT- Solving Approaches to Context-Aware Enterprise Network Security Management, Communications - 2009
- Collusive piracy prevention in P2P content delivery network, Computers - 2009
- A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment, Distributed Computing - 2009
- EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks, Industrial Informatics - 2009
- SMOCK - A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks, Information Forensics and Security - 2009
- Agent Mining: The Synergy of Agents and Data Mining, Intelligent Systems - 2009
- DAIOS - Efficient Dynamic Web Service Invocation, Internet Computing - 2009
- A Survey of Learning-Based Techniques of Email Spam Filtering, Neural Networks - 2008
- Modeling & Automated Containment of Worms, Secure Computing - 2008
- Using the Conceptual Cohesion of Classes for Fault Prediction in Objectoriented Systems, Software Engineering - 2008
- Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies, Software Systems For Secure Systems - 2008
- Increasing packet delivery in ad hoc on-demand distance vector (aodv) routing protocol, Computer and Communication Engineering - 2008
- High multiplicity scheduling of file transfers with divisible sizes of multiple classes of paths, Consumer Electronics - 2008
- Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments, Data Engineering - 2008
- Online Index Recommendations for High-Dimensional Databases Using Query Workloads, Data Mining - 2008
- BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection, Data Mining - 2008
- Face Recognition for Smart Recognitions, Gesture Recognition - 2008
- Protection of Database Security via Collaborative Inference Detection, Intelligence and Security Informatics - 2008
- Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs, Computer Science & Network Security - 2007
- Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm, Intelligent and Advanced Systems - 2007
- An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net, Machine Learning And Cybernetics - 2007
- A Wireless Distributed Intrusion Detection System and a New Attack Model, Computers and Communications - 2006
- Building Intelligent Shopping Assistants Using Individual Consumer Models, Data mining - 2005
- GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions, Data Mining - 2005
- Mobile Objects and Mobile Agents: The Future of Distributed Computing, Distributed Computing - 2004
- ODAM An Optimized Distributed Association Rule Mining Algorithm, Distributed Systems - 2004
- A Reputation based Trust Model for Peer to Peer E - Commerce Communities, E-Commerce Technology - 2003
- Noise Reduction by Fuzzy Image Filtering, Fuzzy Systems - 2003
- Network Topology against Distributed Denial of Service Attacks DDOS, Information Forensics and Security - 2006
- Personal Authentication Using 3-D Finger Geometry, Information Forensics and Security - 2006
- E-Secure Transactions - Secure Electronic Data Interchange over Internet, Internet Computing - 2005
- Face Recognition using Laplacian Faces, Pattern Analysis and Machine Intelligence - 2005
- Online Handwritten Script Recognition, Pattern Analysis and Machine Intelligence - 2004
- Modeling Peer-Peer File Sharing Systems, Web Intelligence - 2003
- Unified Network Monitoring For Web Technology, Web Technology - 2003
- Personal Identification Based On Iris Texture Analysis, 2003
- Location-Aided Routing (LAR) in Mobile Ad Hoc Networks, Wireless Networks - 2000
- Location based Service Routing, 2005
- A Multi-Layered and Multi-Faceted Framework for Mining Evolving Web Click Streams
- Coupling based metrics for measuring the quality of a software
- Demonstration of Secure Sockets Layer Protocol Working and Implementation
- Information Retrieval from Web Search using Keyword Spices
- Security in large Mediator Protocols
- SybilGuard Defending Against Sybil Attacks via Social Networks
- User Authentication based on Human Typing Pattern with Artificial Neural Networks and Support Vector Machine
- Towards Multimodal Interfaces for Intrusion Detection, Computer Networks
- Distributed Data Mining in Credit Card Fraud Detection, Datamining & Intelligent Systems
- E Logistics for Warehouse Management – Implementation of Authenticated and Dynamic Logistics Support System & Management, Innovative Computing
- Secured Password Based Protocol For Downloading A Private Key, Network and Distributed System
- A Software Defect Report and Tracking System in an Intranet, Software Maintenance and Reengineering
www.ncct.in, ncctchennai@gmail.com, 98411 93224, 93801 02891, 044-28235816