computer science seminar or presentation topics
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
05-01-2010, 01:25 PM


I. ETHENOBOTONICAL STUDY
II. AIRBORNE INTERNET
III. ALLAIRE SECURITY WHITE PAPERS SERIES
IV. ALUS AIMS
V. AMD & ATHLON PROCESSORS
VI. AMDB
VII. AN IMPLEMENTATION OF SINGLE SYSTEM IMAGE SERVER
VIII. AN INTELLIGENT MOBILE ROBOTIC SYSTEM
IX. ANALYSIS OF DATA
X. ANALYSIS OF WIRELESS LAN SECURITY
XI. ANIMATION_STUDIO
XII. ANIMATRONICS
XIII. ANTIMATTER
XIV. ANTIVIRUS AND CONTENT SECURITY CLUSTERING SOLUTION
XV. APPLICATION OF SOUND LOCALIZATION FOR ROBOT NAVIGATION
XVI. APPLICATION OF CRYOTREATMENT
XVII. APPLICATION OF NEURAL NETWRORK123
XVIII. APPLICATION OF SOUND LOCALIZATION
XIX. APPLICATION SPECIFIC INTEGRATED CIRCUITS
XX. ARCHITECTURE OF SEARCH ENGINE
XXI. ARM ARCHITECTURE AND APPLICATIONS
XXII. ARTIFICIAL INTELLIGENCE
XXIII. ARTIFICIAL NEURAL NETWORK BASED SYNCHRONOUS MACHINE CONTROL
XXIV. AS400S ACTING AS REMOTE CLUSTER CONTROLLERS
XXV. ASIC
XXVI. ASTERIX “SECURITY
XXVII. ASYNCHRONOUS TRANSFER MODE (ATM)
XXVIII. ATM WITH ON EYE
XXIX. ATM_ASYNCHRONOUS_TRANSFER_MODE
XXX. AUDIO COMPRESSION
XXXI. AUGMENTED REALITY
XXXII. AUGMENTED REALITY
XXXIII. AUTO NIGOCIATION PROTOCOL
XXXIV. AUTOMATED ATTACK MODEL
XXXV. A LIGHTWEIGHT, ROBUST P2P SYSTEM TO HANDLE FLASH CROWDS
XXXVI. A M O E B A12
XXXVII. A PARALLELFILE SYSTEM FOR LINUX CLUSTERS
XXXVIII. A STUDY OF CONSISTENCY MECHANISMS 123...
XXXIX. A STUDY OF CONSISTENCY MECHANISMS IN DISTRIBUTED SYSTEMS; WITH A COMPARISON BETWEEN DISTRIBUTED LOCK MANAGERS AND LEASES
XL. A UNIVERSAL CLIENT FOR DISTRIBUTED
XLI. A_KERNEL “GNUHURD
XLII. ACTIVE_ DIRECTORY_ SERVICES 2000
XLIII. AD HOC NETWORKS
XLIV. AD HOC WLAN SEMINAR REPORT
XLV. ADAPTIVE GRAPHICS
XLVI. ADLET ACTIVE DOCUMENT FOR ADAPTIVE INFORMATION INTEGRATION
XLVII. ADLET FOR INFORMATION INTEGRATION_FILES
XLVIII. ADLET: ACTIVE DOCUMENT FOR ADAPTIVE INFORMATION INTEGRATION
XLIX. ADVANCE DSP
L. ADVANCED FEATURES OF JDBC 3.0
LI. ADVANCED INTELLIGENT NETWORK
LII. ADVANTAGES, LIMITATIONS AND FUTURES SCOPE OF E-LEARNING
LIII. AIN
LIV. AUTOMATED CAR
LV. AUTOMATED_TELLER_MACHINE
LVI. AUTONOMIC COMPUTING
LVII. AUTONOMIC_PERSONEL_COMPUTING
LVIII. AUTONOMOUS COMPUTERS
LIX. AUTONOMUS COMPUTER.NETWORK SECURITY
LX. BASEBAND SYSTEM
LXI. BB_SECURITY_TECHNICAL_WP_EX
LXII. BB_SECURITY_TECHNICAL_WP_EX
LXIII. BE_2 DESIGN OF A CLUSTER LOGICAL VOLUME MANAGER
LXIV. BILINGUAL COMPUTING
LXV. BIOCHIP
LXVI. BIOINFORMATICS
LXVII. BIOINFORMATICS AND ROLE OF SOFTWARE ENGINEERS IN IT
LXVIII. BIOINFORMATICS1
LXIX. BIOLOGICAL BACKGROUND CHROMOSOME
LXX. BIOMASS GASIFICATION
LXXI. CABLE INTERNET ACCESS
LXXII. CAPTCHA
LXXIII. CASCADING STYLE SHEETS
LXXIV. CATCHING HACKERS RED-HANDED ON YOUR WEB SERVER!
LXXV. CCURED “ AN OVERVIEW
LXXVI. CELL PHONE CLONING A NEW TECH CRIME
LXXVII. CELL PHONE CLONING-A NEW TECH CRIME
LXXVIII. CELL PROCESSER
LXXIX. CELL-PHONE JAMMER
LXXX. CELLULAR INTERNET PROTOCOL
LXXXI. CFD PAPER
LXXXII. CG LANGUAGE SPECIFICATION
LXXXIII. CHANNEL PRODUCTION GUIDELINES
LXXXIV. CIRCUITMAKER_STUDENT
LXXXV. CLUSTER COMPUTER
LXXXVI. CLUSTERAPPLICATION OF NEURAL NETWORKS
LXXXVII. CLUSTERING
LXXXVIII. COG “ THE HUMANOID ROBOT
LXXXIX. COGNITIVE COMPUTING
XC. COLLECTION AND IDENTIFICATION
XCI. COMBUSTION STABILITY OF NG IC ENGINE FINAL FILE
XCII. COMMUNICATION METHODS UNDER UNISON
XCIII. COMMUNICATION VIA EYE BLINK - DETECTION AND DURATION ANALYSIS IN
XCIV. COMPARISON OF FILE SYNCHRONIZATION UNDER UNISON AND WINDOWS
XCV. COMPATIBILITY WITH LIBRARY CODES
XCVI. COMPILING & RUNNING TOSSIM
XCVII. COMPONENT ARCHITECTURE
XCVIII. COMPONENT BASED SOFTWARE ENGG
XCIX. COMPONENT-BASED SOFTWARE ENGINEERING
C. COMPUTER FORENSICS
CI. COMPUTER_FORENSICS
CII. COMPUTING MIGRATION
CIII. CONDITIONAL ACCESS SYSTEM
CIV. CONFIGRATTION ALU
CV. CONFIGURATION MANAGEMENT UNDER UNISON
CVI. BIOMEDICAL PACEMAKER
CVII. BIOMETRIC IDENTIFICATION JKJ
CVIII. BIOMETRIC IN SECURITY1
CIX. BIOMETRIC TALHA
CX. BIOMETRICS AN IRIS RECOGNITI ON1
CXI. BIONIC_AGE
CXII. BLITZ-A DIFFERENT APPROACH TO DATA MINING
CXIII. BLUE RAY
CXIV. BLUETOOTH
CXV. BLUEWHALE
CXVI. BLU-RAY
CXVII. BRAIN COMPUTER
CXVIII. BRAIN COMPUTER INTERFACE
CXIX. BREW
CXX. BROAD
CXXI. BROADBAND INTERNET THROUGH POWERLINE
CXXII. BROND BAND
CXXIII. BUILDING HAL
CXXIV. BUILDING_HIGH_PERFORMANCE_ CLUSTERS
CXXV. CONNECTING REMOTE USERS TO YOUR NETWORK WITH WINDOWS SERVER 2003
CXXVI. CONSIDERATIONS FOR AS 400S ACTING AS REMOTE CLUSTER CONTROL
CXXVII. CONSISTENCY MECHANISMS IN DISTRIBUTED SYSTEMS WITH A COMPARISON BETWEEN
CXXVIII. CONSTRUCTION OF SAN
CXXIX. CONTENT ADDRESSABLE MEMORY (CAM)
CXXX. CONTENT MANAGEMENT CONCEPTS
CXXXI. CONTENT MANAGEMENT SYSTEMS AND ABSTRACTION USING XML
CXXXII. CONTENT MANAGEMENT SYSTEMS AND ABSTRACTION USING XML
CXXXIII. CONTINUOUS MEDIA SERVER (YIMA)1
CXXXIV. CORBA
CXXXV. CPAP & BIPAP
CXXXVI. CRIMINAL SENTENCING & INTELLIGENT DECISION SUPPORT
CXXXVII. CROSS HYBRID SOURCE ROUTING PROTOCOL FOR WIRELESS ADHOC NETWORKS
CXXXVIII. CROSS SITE SCRIPTING
CXXXIX. CRUSOE PROCESSOR
CXL. CUBAN COMPUTER NETWORKS AND THEIR IMPACT
CXLI. CWINNOWER ALGORITHM FOR INDING UZZYING DNA MOTIFS
CXLII. CYBERSECURITY
CXLIII. CYBERSECURITY
CXLIV. CYBERSPACE GEOGRAPHY VISUALIZATION_REPORT
CXLV. CYBORG
CXLVI. CYBORG ENGINEERING.
CXLVII. DAMAGE DETECTION BY LESER
CXLVIII. DAMAGE DETECTION BY LESER
CXLIX. DATA COMPRESSION
CL. DIGITAL TIMESTAMPING
CLI. DIGITAL TIMESTAMPING
CLII. DIGITAL VERSATILE DISK
CLIII. DIGITAL WATER MARKING FOR COLOR IMAGES USING DWT AND ITS APPLICATIONS
CLIV. DIGITAL WATERMARKING TECHNOLOGY
CLV. DIGITAL WATERMARKING TECHNOLOGY
CLVI. DIGITAL WATERMARKING TECHNOLOGY
CLVII. DIGITAL_SERVICE_LINE
CLVIII. DIGITAL_VERSATILE_DISK
CLIX. DIGITAL_WATERMARK
CLX. DISORDER IN BRAIN WAVE AND DETECTION USING MICROPROCESSOR8
CLXI. DISORDER IN BRAIN WAVE DETECTING USING MICROPROCESSOR
CLXII. DISTRIBUTATED DATA STRUCTURE AND ALGORITHM
CLXIII. DISTRIBUTED DATA STRUCTURE & ALGOTHIRMS
CLXIV. DISTRIBUTED DATABASE
CLXV. DISTRIBUTED DATABASE
CLXVI. DISTRIBUTED VIRTUAL DISKS
CLXVII. DNA COMPUTERS
CLXVIII. DNS
CLXIX. DOT NET TECHNOLOGY
CLXX. DSL TECHNOLOGY
CLXXI. DUAL CORE
CLXXII. DUAL HTTP
CLXXIII. DYNAMIC DATA DRIVEN APPLCATION SYSTEM
CLXXIV. E COMMERCE SECURITY TOOL KERBEROS
CLXXV. EARTH SIMULATOR A QUICKIE IN ACTION
CLXXVI. E-BOMB
CLXXVII. E-BOMBS
CLXXVIII. ECHO PROTOCOL
CLXXIX. ECOFRIENDLY RAC
CLXXX. ECOFRIENDLY TECHNOLOGY
CLXXXI. ECRM
CLXXXII. ECRM AN INTRODUCTION
CLXXXIII. EFUNDS ID VERIFICATIONS
CLXXXIV. E-LEARNING
CLXXXV. E-LEARNING POLICIES UNDER E- GOVERNANCE
CLXXXVI. ELECTRONIC CRIME
CLXXXVII. ELECTRONIC PAPER
CLXXXVIII. EMBEDDED SYSTEM DESIGN
CLXXXIX. EMBEDDED_LINUX
CXC. EMBRYONICS
CXCI. ENABLING FINGER PRINTS AUTHENTICATIN IN EMBEDDEB SYSTEMS FO
CXCII. ENCRYPTION ALGORITHMS
CXCIII. ENTERPRISE_RESOURCE_PLANNING
CXCIV. ENUM BEB 14
CXCV. ERP & SAP
CXCVI. E-SECURITY
CXCVII. EVOLUTIONARY ALGORITHMS PRINCIPLES, METHODS AND ALGORITHMS
CXCVIII. EXISTING NETWORK SIMULATORS
CXCIX. EXTENDING THE INTERNET INTO SPACE
CC. EXTENSIBLE STYLESHEET LANGUAGE
CCI. EXTREME ULTRAVIOLET LITHOGRAPHY
CCII. EXTREME ULTRAVIOLET LITHOGRAPHY01
CCIII. EXTREME_ULTRA_VIOLET_LITHOGRAPHY.RTF
CCIV. FACE DETECTION AND RECOGNITION
CCV. FACE DETECTION IN NEAR IR SPECTRUM
CCVI. FACE DETECTION IN THE NEAR-IR SPECTRUM
CCVII. DATA HIDDING
CCVIII. A GUIDE TO REMOTE ACCESS AND ACCESSING THE INTERNET
CCIX. A LIGHTWEIGHT, ROBUST P2P SYSTEM TO HANDLE FLASH CROWDS
CCX. A M O E B A12
CCXI. A PARALLELFILE SYSTEM FOR LINUX CLUSTERS
CCXII. A STUDY OF CONSISTENCY MECHANISMS IN DISTRIBUTED SYSTEMS ...
CCXIII. A STUDY OF CONSISTENCY MECHANISMS IN DISTRIBUTED SYSTEMS; WITH A COMPARISON BETWEEN DISTRIBUTED LOCK MANAGERS AND LEASES
CCXIV. A UNIVERSAL CLIENT FOR DISTRIBUTED
CCXV. ACTIVE_ DIRECTORY_ SERVICES 2000
CCXVI. AD HOC NETWORKS
CCXVII. AD HOC WLAN SEMINAR REPORT
CCXVIII. ADAPTIVE GRAPHICS
CCXIX. ADLET ACTIVE DOCUMENT FOR ADAPTIVE INFORMATION INTEGRATION
CCXX. ADLET FOR INFORMATION INTEGRATION_FILES
CCXXI. ADLET: ACTIVE DOCUMENT FOR ADAPTIVE INFORMATION INTEGRATION
CCXXII. ADVANCE DSP
CCXXIII. ADVANCED FEATURES OF JDBC 3.0
CCXXIV. ADVANCED INTELLIGENT NETWORK
CCXXV. ADVANTAGES, LIMITATIONS AND FUTURES SCOPE OF E-LEARNING
CCXXVI. AIN
CCXXVII. AIRBORNE INTERNET
CCXXVIII. ALLAIRE SECURITY WHITE PAPERS SERIES
CCXXIX. ALUS AIMS
CCXXX. AMD & ATHLON PROCESSORS
CCXXXI. AMDB
CCXXXII. AN IMPLEMENTATION OF SINGLE SYSTEM IMAGE SERVER CLUSTER
CCXXXIII. AN INTELLIGENT MOBILE ROBOTIC SYSTEM
CCXXXIV. AN INTRODUCTION TO TCP-IP PROGRAMMING
CCXXXV. ANALYSIS OF DATA
CCXXXVI. ANALYSIS OF WIRELESS LAN SECURITY
CCXXXVII. ANIMATION_STUDIO
CCXXXVIII. ANIMATRONICS
CCXXXIX. ANTIMATTER
CCXL. APPLICATION OF SOUND LOCALIZATION FOR ROBOT NAVIGATION
CCXLI. APPLICATION OF CRYOTREATMENT
CCXLII. APPLICATION OF NEURAL NETWRORK123
CCXLIII. APPLICATION OF SOUND LOCALIZATION
CCXLIV. APPLICATION SPECIFIC INTEGRATED CIRCUITS
CCXLV. ARCHITECTURE OF SEARCH ENGINE
CCXLVI. ARM ARCHITECTURE AND APPLICATIONS
CCXLVII. ARTIFICIAL INTELLIGENCE
CCXLVIII. ARTIFICIAL NEURAL NETWORK BASED SYNCHRONOUS MACHINE CONTROL
CCXLIX. ARTIFICIAL NEURAL NETWORKS
CCL. ASIC
CCLI. ATM WITH ON EYE
CCLII. ATM (ASYNCHRONOUS TRANSFER MODE)
CCLIII. AUDIO COMPRESSION
CCLIV. AUGMENTED REALITY
CCLV. AUTOMATED ATTACK MODEL
CCLVI. AUTOMATED CAR
CCLVII. AUTOMATED_TELLER_MACHINE
CCLVIII. AUTONOMIC_PERSONEL_COMPUTING
CCLIX. AUTONOMOUS COMPUTERS
CCLX. BASEBAND SYSTEM
CCLXI. BB_SECURITY_TECHNICAL_WP_EX
CCLXII. BE_2 DESIGN OF A CLUSTER LOGICAL VOLUME MANAGER
CCLXIII. BILINGUAL COMPUTING
CCLXIV. BIOCHIP
CCLXV. BIOINFORMATICS
CCLXVI. BIOINFORMATICS AND ROLE OF SOFTWARE ENGINEERS IN IT
CCLXVII. BIOLOGICAL BACKGROUND CHROMOSOME
CCLXVIII. BIOMASS GASIFICATION
CCLXIX. BIOMETRIC IDENTIFICATION JKJ
CCLXX. BIOMETRIC IN SECURITY
CCLXXI. BIOMETRIC TALHA
CCLXXII. BIOMETRICS AN IRIS RECOGNITI ON1
CCLXXIII. BIONIC_AGE
CCLXXIV. BLUE RAY
CCLXXV. BLUETOOTH
CCLXXVI. BLUEWHALE
CCLXXVII. BRAIN COMPUTER
CCLXXVIII. BRAIN COMPUTER INTERFACE
CCLXXIX. BREW
CCLXXX. BROAD
CCLXXXI. BROND BAND
CCLXXXII. BUILDING_HIGH_PERFORMANCE_ CLUSTERS
CCLXXXIII. CABLE INTERNET ACCESS
CCLXXXIV. CASCADING STYLE SHEETS(CSS)
CCLXXXV. CCURED “ AN OVERVIEW
CCLXXXVI. CELL PHONE CLONING A NEW TECH CRIME
CCLXXXVII. CELL PROCESSER
CCLXXXVIII. CELL-PHONE JAMMER
CCLXXXIX. CELLULAR INTERNET PROTOCOL
CCXC. CFD PAPER
CCXCI. CG LANGUAGE SPECIFICATION
CCXCII. CHANNEL PRODUCTION GUIDELINES
CCXCIII. CIRCUITMAKER_STUDENT
CCXCIV. CLUSTER COMPUTER
CCXCV. CLUSTERAPPLICATION OF NEURAL NETWORKS
CCXCVI. CLUSTERING
CCXCVII. COG “ THE HUMANOID ROBOT
CCXCVIII. COLLECTION AND IDENTIFICATION
CCXCIX. COMBUSTION STABILITY OF NG IC ENGINE FINAL FILE
CCC. COMMUNICATION METHODS UNDER UNISON
CCCI. COMMUNICATION METHODS UNDER UNISON
CCCII. COMMUNICATION VIA EYE BLINK - DETECTION AND DURATION ANALYSIS IN
CCCIII. COMPARISON OF FILE SYNCHRONIZATION UNDER UNISON AND WINDOWS
CCCIV. COMPATIBILITY WITH LIBRARY CODES
CCCV. COMPATIBILITY WITH LIBRARY CODES
CCCVI. COMPILING & RUNNING TOSSIM
CCCVII. COMPONENT ARCHITECTURE
CCCVIII. COMPONENT BASED SOFTWARE ENGG
CCCIX. COMPONENT-BASED SOFTWARE ENGINEERING
CCCX. COMPUTER_FORENSICS
CCCXI. COMPUTING MIGRATION
CCCXII. CONDITIONAL ACCESS SYSTEM
CCCXIII. CONDITIONAL ACCESS SYSTEM
CCCXIV. CONFIGRATTION ALU
CCCXV. CONFIGURATION MANAGEMENT UNDER UNISON
CCCXVI. CONNECTING REMOTE USERS TO YOUR NETWORK WITH WINDOWS SERVER 2003
CCCXVII. CONSIDERATIONS FOR AS 400S ACTING AS REMOTE CLUSTER CONTROL
CCCXVIII. CONSISTENCY MECHANISMS IN DISTRIBUTED SYSTEMS WITH A COMPARISON BETWEEN
CCCXIX. CONSISTENCY MECHANISMS IN DISTRIBUTED SYSTEMS WITH A COMPARISON BETWEEN
CCCXX. CONSTRUCTION OF SAN
CCCXXI. CONTENT ADDRESSABLE MEMORY (CAM)
CCCXXII. CONTENT MANAGEMENT CONCEPTS
CCCXXIII. CONTENT MANAGEMENT SYSTEMS AND ABSTRACTION USING XML
CCCXXIV. CONTENT MANAGEMENT SYSTEMS AND ABSTRACTION USING XML
CCCXXV. CONTINUOUS MEDIA SERVER (YIMA)1
CCCXXVI. CONTINUOUS MEDIA SERVER YIMA2
CCCXXVII. CONTINUOUS MEDIA SERVER YIMA2
CCCXXVIII. CORBA
CCCXXIX. CPAP & BIPAP
CCCXXX. CRIMINAL SENTENCING & INTELLIGENT DECISION SUPPORT
CCCXXXI. CRIMINAL SENTENCING AND INTELLIGENT DECISION SUPPORT
CCCXXXII. CROSS HYBRID SOURCE ROUTING PROTOCOL FOR WIRELESS ADHOC NETWORKS
CCCXXXIII. CROSS SITE SCRIPTING
CCCXXXIV. CROSS SITE SCRIPTING
CCCXXXV. CRUSOE PROCESSOR
CCCXXXVI. CUBAN COMPUTER NETWORKS AND THEIR IMPACT
CCCXXXVII. CWINNOWER ALGORITHM FOR INDING UZZYING DNA MOTIFS
CCCXXXVIII. CYBERSECURITY
CCCXXXIX. CYBERSPACE GEOGRAPHY VISUALIZATION_REPORT
CCCXL. CYBORG
CCCXLI. CYBORG ENGINEERING.
CCCXLII. DAMAGE DETECTION BY LESER
CCCXLIII. DAMAGE DETECTION BY LESER
CCCXLIV. DATA COMPRESSION
CCCXLV. DATA COMPRESSION
CCCXLVI. DATA COMPRESSION1
CCCXLVII. DATA HIDDING
CCCXLVIII. DATA MINING
CCCXLIX. DATA MINING TECHNIQUE IN REAL WORD
CCCL. DATA MINING USING NEURAL NETWORKS
CCCLI. DATA MINING USING NEURAL NETWORKS
CCCLII. DATA SECURITY
CCCLIII. DATA_CENTER
CCCLIV. DATA_CLUSERING_TECHNIQUES_BEB08
CCCLV. DATA_WAREHOUSE
CCCLVI. DATABASE ENGINE FOR THE .DB4XML.
CCCLVII. DATABASE ENGINE FOR THE .DB4XML.
CCCLVIII. DATABASE HANDLING IN TINYOS
CCCLIX. DATABASE HANDLING IN TINYOS
CCCLX. DECOMPILER
CCCLXI. DENIAL OF SERVICE ATTACKS
CCCLXII. DESERT COOLER1
CCCLXIII. DESIGN OF A CLUSTER LOGICAL VOLUME MANAGER
CCCLXIV. DESIGN OF A CLUSTER LOGICAL VOLUME MANAGER
CCCLXV. DESIGN OF A CLUSTER LOGICAL VOLUME MANAGER
CCCLXVI. DESIGN OF A CLUSTER LOGICAL VOLUME MANAGER
CCCLXVII. DESIGN OF A CLUSTER LOGICAL VOLUME MANAGER
CCCLXVIII. DIFFERENT PROTOCOL USED IN THE NETWORK SIMULATOR
CCCLXIX. DIGITAL IMAGE SEGMENTATION
CCCLXX. DIGITAL SIGNATURE
CCCLXXI. DIGITAL STEGANOGRAPHY
CCCLXXII. DIGITAL TIMESTAMPING
CCCLXXIII. DIGITAL VERSATILE DISK
CCCLXXIV. DIGITAL WATER MARKING FOR COLOR IMAGES USING DWT AND ITS APPLICATIONS
CCCLXXV. DIGITAL WATERMARKING TECHNOLOGY
CCCLXXVI. DIGITAL_SERVICE_LINE
CCCLXXVII. DIGITAL_VERSATILE_DISK
CCCLXXVIII. DIGITAL_WATERMARK
CCCLXXIX. DISORDER IN BRAIN WAVE AND DETECTION USING MICROPROCESSOR8
CCCLXXX. DISTRIBUTATED DATA STRUCTURE AND ALGORITHM
CCCLXXXI. DISTRIBUTED DATA STRUCTURE & ALGOTHIRMS
CCCLXXXII. DISTRIBUTED DATABASE
CCCLXXXIII. DISTRIBUTED VIRTUAL DISKS
CCCLXXXIV. DNA COMPUTERS
CCCLXXXV. DNS
CCCLXXXVI. DOT NET TECHNOLOGY
CCCLXXXVII. DSL TECHNOLOGY
CCCLXXXVIII. DUAL HTTP
CCCLXXXIX. DUAL HTTP
CCCXC. DYNAMIC DATA DRIVEN APPLCATION SYSTEM
CCCXCI. E COMMERCE SECURITY TOOL KERBEROS
CCCXCII. EARTH SIMULATOR A QUICKIE IN ACTION
CCCXCIII. E-BOMBS
CCCXCIV. ECHO PROTOCOL
CCCXCV. ECOFRIENDLY RAC
CCCXCVI. ECOFRIENDLY TECHNOLOGY
CCCXCVII. ECRM
CCCXCVIII. ECRM AN INTRODUCTION
CCCXCIX. EFUNDS ID VERIFICATIONS
CD. E-LEARNING
CDI. E-LEARNING POLICIES UNDER E- GOVERNANCE
CDII. ELECTRONIC CRIME
CDIII. ELECTRONIC PAPER
CDIV. EMBEDDED SYSTEM DESIGN
CDV. EMBEDDED_LINUX
CDVI. EMBRYONICS
CDVII. ENABLING FINGER PRINTS AUTHENTICATIN IN EMBEDDEB SYSTEMS FO
CDVIII. ENCRYPTION ALGORITHMS
CDIX. ENTERPRISE_RESOURCE_PLANNING
CDX. ENUM BEB 14
CDXI. ERP & SAP
CDXII. E-SECURITY
CDXIII. EVOLUTIONARY ALGORITHMS PRINCIPLES, METHODS AND ALGORITHMS
CDXIV. EXISTING NETWORK SIMULATORS
CDXV. EXISTING NETWORK SIMULATORS
CDXVI. EXTENDING THE INTERNET INTO SPACE
CDXVII. EXTENSIBLE STYLESHEET LANGUAGE
CDXVIII. EXTREME ULTRAVIOLET LITHOGRAPHY
CDXIX. EXTREME_ULTRA_VIOLET_LITHOGRAPHY.RTF
CDXX. FACE DETECTION AND RECOGNITION
CDXXI. FACE DETECTION IN NEAR IR SPECTRUM
CDXXII. FACE DETECTION IN THE NEAR-IR SPECTRUM
CDXXIII. FACE RECOGNITATION SYSTEM
CDXXIV. FACE RECONZATION
CDXXV. FACE_RECOGNITION_SYSTEM
CDXXVI. FACEDETECTIONIR
CDXXVII. FENESTRAE MOBILE DATA SERVERÔ
CDXXVIII. FILE ORGANISATION UNDER TINYDB
CDXXIX. FILE SYNCHRONISATION MECHANISM
CDXXX. FILE TRANSFER PROTOCOL
CDXXXI. FIREWIRE (IEEE 1394B)
CDXXXII. FLEX
CDXXXIII. FLUORESCENT_MULTILAYER_DISC
CDXXXIV. FPGA IMPLEMENTATION OF DSP CIRCUIT
CDXXXV. FRAMEWORK FOR PEER-TO-PEER DISTRIBUTED COMPUTING IN A HETEROGENEOUS, DECENTRALIZED ENVIRONMENT
CDXXXVI. FRAMEWORK FOR PEER-TO-PEER DISTRIBUTED COMPUTING IN A HETEROGENEOUS, DECENTRALIZED ENVIRONMENT
CDXXXVII. FREE SPACE LASER COMMUNICATION
CDXXXVIII. FREE SPACE OPTICS (FSO)
CDXXXIX. FUTURE_COMPUTING
CDXL. FUZZY SYSTEMS A NEW TECHNOLOGY
CDXLI. FXP
CDXLII. GATEWAY 4G MOBILE
CDXLIII. GENERAL PACKET RADIO SYSTEM (GPRS)
CDXLIV. GENERALIZED SEARCH TREES FOR DATABASE SYSTEM (GIST)
CDXLV. GENETIC ALGORITHM
CDXLVI. GENETIC ENGG. WEARABLE COMPUTER
CDXLVII. GENETIC_ALGORITHM
CDXLVIII. GIGABIT_ETHERNET
CDXLIX. GNU HURD
CDL. GRID COMPUTING “ INTRODUCTION AND ARCHITECTURE
CDLI. GRID COMPUTING¦
CDLII. GRID COMPUTING-THE ANATOMY
CDLIII. HANDHELD COMPUTER
CDLIV. HARDWARE- OR SOFTWARE-BASED RAID
CDLV. HARDWARE-SOFTWARE
CDLVI. HIGH PERFORMANCE MICROPROCESSOR
CDLVII. HIGH-VOLUME FLY ASH CONCRETE
CDLVIII. HIPPI (HIGH-PERFORMANCE PARALLEL INTERFACE)
CDLIX. HIPPI-SEMINAR1
CDLX. HMETIS
CDLXI. HONEY POT
CDLXII. HYBRID HARD DISK DRIVES
CDLXIII. HYPERSONIC TM SOUND (HSS TM)
CDLXIV. IMDESXC
CDLXV. I-MODE “ BOON TO WIRELESS COMMUNICATION
CDLXVI. IMPLEMENTATION OF E-LEARNING AND WEB BASED QUERY MANAGEMENT
CDLXVII. INCREASING PROCESSOR PERFORMANCE USING
CDLXVIII. INFINIBAND
CDLXIX. INTELLIGENT OPTICAL NETWORK
CDLXX. INTELLIGENT SYSTEMS AND SOFT COMPUTING.
CDLXXI. INTERACTIVE TV
CDLXXII. INTERFACING OFMULTIMEDIA SERVICESWITHMOBILE SERVICE PLATFORM
CDLXXIII. INTERFACING OFMULTIMEDIA SERVICESWITHMOBILE SERVICE PLATFORM
CDLXXIV. INTERFACING OF MULTIMEDIA SERVICES WITH MOBILE SERVICE PLATFORM
CDLXXV. INTERNET COOKIES
CDLXXVI. INTERNET MESSAGE ACCESS PROTOCOL (IMAP)
CDLXXVII. INTERNET PROTOCOL TELEVISION
CDLXXVIII. INTERNET SERVER APPLICATION PROGRAM INTERFACE
CDLXXIX. INTERNET_PROTOTCOL_VERSION6
CDLXXX. INTERPLANETARY NETWROKS
CDLXXXI. INTRA FILE SECURITY
CDLXXXII. INTRODUCTION TO ADO.NET
CDLXXXIII. INTRODUCTION TO ADSL
CDLXXXIV. INTRODUCTION TO NETWORK SECURITY
CDLXXXV. INTRODUCTION TO SECURE SOCKETS LAYER
CDLXXXVI. INTRUSION DETECTION SYSTEM METHODOLOGIES
CDLXXXVII. INTRUSION DETECTION SYSTEM METHODOLOGIES
CDLXXXVIII. INTRUSION DETECTION SYSTEM12
CDLXXXIX. IP OVER ATM: CLASSICAL IP, NHRP, LANE,
CDXC. IRREGULAR APPLICATION
CDXCI. IRREGULAR APPLICATION
CDXCII. ITANIUM 2 PROCESSOR WITH HYPER-THREADING TECHNOLOGY
CDXCIII. ITANIUM_ARCHITECTURE
CDXCIV. J2EE PLATFORM
CDXCV. JABBER ARCHITECTURE
CDXCVI. JABBER ARCHITECTURE TECHNOLOGY AND PROTOCOL
CDXCVII. JABBER ARCHITECTURE TECHNOLOGY AND PROTOCOL
CDXCVIII. JAVA BASED EMBEDDED TECHNOLOGIES
CDXCIX. JAVA RING21
D. JINI THE DISTRIBUTED SYSTEM
DI. JOINT_TEST_ACTION_GROUP
DII. KISMET_THE_HUMANOID_ROBOT
DIII. KIZAMU A SYSTEM FOR SCULPTING DIGITAL CHARACTERS
DIV. KIZAMU A SYSTEM FOR SCULPTING DIGITAL CHARACTERS
DV. LASER 3_D SCANNER
DVI. LASER BASED 3D SCANNER PICTURE AND VIDEO COMPRESSION STANDARDS (JPEG AND MPEG)
DVII. LC-10
DVIII. LEMPEL_ZELV_WELCH_COMPRESSION_ALGORITHM
DIX. LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL
DX. LINUX
DXI. LINUX OPERATING SYSTEM
DXII. LIVE CELLS FOR STORAGE!
DXIII. LIVE LINUX CDROM
DXIV. LIVING MACHINES APPLICATION OF GA TO STUDY EVOLUTIONARY ASPECTS
DXV. LIVING MACHINES APPLICATION OF GA TO STUDY EVOLUTIONARY ASPECTS
DXVI. LOWERING LATENCY IN LINUX
DXVII. LOWERING LATENCY IN LINUX INTRODUCING A PREEMPTIBLE KERNEL
DXVIII. LUSTRE
DXIX. MAGNETIC_RAM
DXX. MAGNETORESISTIVE RANDOM ACCESS MEMORY
DXXI. MAGNETORESISTIVE RANDOM ACCESS MEMORY (MRAM)
DXXII. MANAGING SECURITY ON MOBILE PHONES
DXXIII. MANAGING THE VIRUS THREAT “ COMPUTERWORLD
DXXIV. MEDIUM ACCESS CONTROL
DXXV. MEMORY SHAFTY
DXXVI. MEMORY_CHANNEL_NETWORK_FOR_
DXXVII. MESSAGING AND COMMUNICATION IN NOMADIC RADIO
DXXVIII. MESSAGING SOLUTION “ UNIFIED MESSAGING
DXXIX. MICRONEEDLES A NOVEL APPROACH TO TRANSDERMAL DRUG DELIVERY
DXXX. MICROSOFT .NET
DXXXI. MICROSOFT FOUNDATION CLASS (MFC)
DXXXII. MICROSOFT SPOT
DXXXIII. MICROSOFT_CRYPTOAPI_VERSION_2
DXXXIV. MICROSOFT_DATAACCESS_COMPONENTS
DXXXV. MICROSOFT™S SOFTWARE PROTECTION PLATFORM: INNOVATIONS FOR WINDOWS VISTA„¢ AND WINDOWS SERVER® LONGHORN
DXXXVI. MIDDLE WARE BE36
DXXXVII. MOBILE 2G
DXXXVIII. MOBILE AND CELLULAR COMMUNICATIONS
DXXXIX. MOBILE EVOLUTION
DXL. MOBILE3G
DXLI. MODEL FREE SYSTEM
DXLII. MODELING SPATIAL CROP PRODUCTION A GIS APPROACH
DXLIII. MODULAR ROBOTICS
DXLIV. MPOA, PAR AND I-PNNI
DXLV. MULTI_PLATFORM_COMPUTING
DXLVI. MULTICASTING
DXLVII. MULTIMEDIA HOME PLATFORM
DXLVIII. MULTIMEDIA_MESSEGING_SERVICE
DXLIX. MYSQL (PRONOUNCED'MY-S-Q-L)
DL. NANOTECHNOLOGY
DLI. NASA
DLII. NATURAL LANGUAGE PROCESSING(NLP)
DLIII. NATURAL LANGUAGE PROCESSING
DLIV. NEED FOR CONFIGURABLE ALUS
DLV. NETWORK APPLIANCE - INTERNET ACCESS MANAGEMENT AND SECURITY
DLVI. NETWORK ATTACK AND DEFENSE
DLVII. NETWORK CONVERGENCE AND VOICE OVER IP
DLVIII. NETWORK INSTRUMENTS GIGABIT OBSERVER PRODUCTS
DLIX. NETWORK MANAGEMENT
DLX. NETWORK SECURITY
DLXI. NETWORK SECURITY - A COMPLETE GUIDE TO FIREWALLS
DLXII. NETWORK SECURITY AND CRYPTOGRAPHY
DLXIII. NETWORK SECURITY PRINT
DLXIV. NETWORK SECURITY USING FIREWALLS
DLXV. NETWORK_SECURITY
DLXVI. NETWORK_TOPOLOGIES___ISDN_A
DLXVII. NEURAL “ FUZZY TRAINABLE DYNAMIC
DLXVIII. NEURAL NETWORKS
DLXIX. NEWS & FEATURES STORY MASSIVELY PARALLEL PROCESSING
DLXX. NEWS & FEATURES STORY WIRELESS MARKUP LANGUAGE
DLXXI. NFS SQUARE
DLXXII. NFSP NFS PARALLELIZED
DLXXIII. NMS
DLXXIV. OBJECT-ORIENTED DATABASE SYSTEM.1
DLXXV. OFDM FOR WL MULTIMEDIA COMMUNICATION
DLXXVI. OGG_SOUND_FILE_FORMAT_SPECIFICATION
DLXXVII. ON_THE_FLY_COMPRESSION
DLXXVIII. OPEN RAN
DLXXIX. OPEN SOURCE SOFTWARE
DLXXX. OPTICAL MEMORIES
DLXXXI. OPTICAL PACKET SWITCHING
DLXXXII. ORACLE GRID COMPUTING
DLXXXIII. OVERVIEW OF OPERATING SYSTEM
DLXXXIV. OVERVIEW ON NETWORK SECURITY
DLXXXV. PACKET SNIFFERS
DLXXXVI. PARALLEL DATA STRUCTURE FOR SYMBOLIC COMPUTATION2
DLXXXVII. PARALLELIZING_EVOLUTIONARY_ALGORITHMS
DLXXXVIII. PASSIVE OPTICAL NETWORK (PON)
DLXXXIX. PASSWORD BASED ENCRYPTION
DXC. PEER_2_PEER TECH
DXCI. PEER-TO-PEER NETWORKING
DXCII. PERSONAL ACCESS SYSTEMS
DXCIII. PERVASIVE COMPUTING
DXCIV. PETAL
DXCV. PH CONTROL USING FUZZY LOGIC
DXCVI. PHP HYPERTEXT PRE “ PROCESSOR
DXCVII. PICO SEMINAR NEW
DXCVIII. PIRACY PREVENTION USING HARDWARESECURITY LOCKS
DXCIX. PIRACY PREVENTION USING HARDWARESECURITY LOCKS
DC. PIXELS PER IMAGE AND PIXELS (OR DOTS) PER INCH (DPI) (OR MILLIMETER)
DCI. PIXELS PER IMAGE AND PIXELS (OR DOTS) PER INCH (DPI) (OR MILLIMETER)1
DCII. PIXELS PER IMAGE AND PIXELS (OR DOTS) PER INCH (DPI) (OR MILLIMETER)1
DCIII. PKI - PUBLIC KEY INFRASTRUCTURE
DCIV. PKI - PUBLIC KEY INFRASTRUCTURE
DCV. PLAN , MONITOR AND CONTROL FOR SOFTWARE PROJECT
DCVI. PLAN MONITOR & CONTROL
DCVII. PLAN9
DCVIII. PORTABLE DISTRIBUTED DATA STRUCTURE
DCIX. PROBLEMS IN TRADITIONAL LEARNING SYSTEM & IMPLEMENTATION OF E “LEARNING
DCX. PROCESS MANAGEMENT IN LINUX
DCXI. PROFILE-DRIVEN DATA MANAGEMENT
DCXII. PROTEIN
DCXIII. PROTOCOL SUPPORT FOR
DCXIV. PROTOCOL SUPPORT FOR SECURE DOCUMENT TRANSFER
DCXV. PROXIMITY SENSORS
DCXVI. PSEUDO WIRE EMULATION EDGE-TO-EDGE
DCXVII. PWE3
DCXVIII. Q3D_POSITIONAL_AUDIO
DCXIX. QNX_REAL_TIME_OPERATING_SYSTEM
DCXX. QSNET TECHNOLOGY
DCXXI. QUANTUM COMPUTER
DCXXII. QUANTUM COMPUTING AND COMMUNICATION1
DCXXIII. QUANTUM TELEPORTATION
DCXXIV. QUANTUM_CRYPTOGRAPHY
DCXXV. RAID_FAQ
DCXXVI. RAID_FOR_ENTERPRISE_COMP
DCXXVII. RAID_LEVELS
DCXXVIII. RANDOMIZED ALGORITHM
DCXXIX. RANDOMIZED LOAD BALANCING FOR TREES STRUCTURED COMPUTATIONS
DCXXX. RAW SOCKETS
DCXXXI. RDRAM_SDRAM_PERFORMANCE_COM
DCXXXII. REAL TIME AND EMBEDED SYSTEMS
DCXXXIII. RECENT TRENDS IN DIGITAL COMMUNICATION
DCXXXIV. RECONFIGURABLEFRAMEWORK
DCXXXV. REDUNDANT ARRAY OF INEXPENSIVE DISK
DCXXXVI. RELEASE BETTER SOFTWARE FASTER
DCXXXVII. REMOTE ACCESS CONCEPTS
DCXXXVIII. REMOTE ACCESS METHOD
DCXXXIX. RESOURCE SHARING ON INTERNET
DCXL. RESOURCE SHARING ON INTERNET1
DCXLI. REVERSE ENGINEERING
DCXLII. REVERSE ENGINEERING TECHNIQUES
DCXLIII. RIJNDAEL_CRYTOGRAPHY_ALGO
DCXLIV. ROBOTICS AND ARTIFICIAL INTELLIGENCE
DCXLV. ROBOTICS_USING_NEURAL_NETWORKS
DCXLVI. ROBUST P2P SYSTEM TO HANDLE FLASH CROWDS
DCXLVII. ROLE OF SATELLITE IN MOBILE SYSTEMS
DCXLVIII. ROUTER ARCHITECTURE
DCXLIX. ROUTING PROTOCOLS FOR AD HOC WIRELESS LANS
DCL. RUNTIME TYPE INFORMATION
DCLI. SAN AND NAS
DCLII. SAP
DCLIII. SATAN
DCLIV. SATANSOFTCOPYREPORT
DCLV. SCANNING
DCLVI. SECURE VERIFICATION
DCLVII. SECURE_SOCKETS_LAYER
DCLVIII. SECURING INSTANT MESSAGING
DCLIX. SECURING YOUR WEB SITE FOR BUSINESS
DCLX. SECURITY FEATURES OF LINUX
DCLXI. SECURITY IN THE WAKE OF IPV6
DCLXII. SECURITY SYSTEM USING BIOMETRICS
DCLXIII. SEM_NFS
DCLXIV. SEMINAR ON ELECTRONIC CRIME1
DCLXV. SEMINAR ON UNICODE
DCLXVI. SEMINAR-DHTTP
DCLXVII. SENSOR NETWORKS
DCLXVIII. SERVICES IN PSTN IN REQUESTING
DCLXIX. SILICON DEFENSE - FLASH WORM ANALYSIS
DCLXX. SIMULATING COMPUTER NETWORKS USING CLUSTERS OF PCS
DCLXXI. SIX_SIGMA
DCLXXII. SIXTH SENSE TUTORING SYSTEM
DCLXXIII. SLIDE SHOW
DCLXXIV. SMART CARDS
DCLXXV. SMART SURVEILLANCE: APPLICATIONS, TECHNOLOGIES AND IMPLICATIONS
DCLXXVI. SMART_TECHNOLOGY
DCLXXVII. SMIL
DCLXXVIII. SNIFFERS
DCLXXIX. SOFTWARE COPY PROTECTION SCHEME
DCLXXX. SOFTWARE PROJECT PLANNING AND ESTIMATION
DCLXXXI. SOFTWARE TESTING
DCLXXXII. SOPHOS WHITE PAPER ACTIVE CONTENT FRIEND OR FOE
DCLXXXIII. SPEAKING & LISTINING
DCLXXXIV. SPEECH RECOGNISATION AND ANALTSIS
DCLXXXV. SPINS SECURITY PROTOCOLS FOR SENSOR NETWORKS
DCLXXXVI. SPINS SECURITY PROTOCOLS FOR SENSOR NETWORKS
DCLXXXVII. SPYWARE : THE GHOST IN THE MACHINE
DCLXXXVIII. SSL VPN
DCLXXXIX. STORAGE AREA NETWORK
DCXC. STORAGE AREA NETWORKS (SANS)
DCXCI. STREAM CONTROL
DCXCII. STREAM CONTROL TRANSMISSION PROTOCOL
DCXCIII. STUDENT INFORMATION AND FEES STRUCTURE
DCXCIV. SUBBAND IMAGE SEGMENTATION USING VQ
DCXCV. SUPERVISORY CONTROL
DCXCVI. SYMPATHETIC HAPTICS THE SENSATIONALTOUCH
DCXCVII. SYMPATHETIC HAPTICS THE
DCXCVIII. SYNTHESIS OF ZEOLITES FROM FLY ASH
DCXCIX. SYNTHETIC_HUMAN
DCC. SYSTEM AND NETWORK ATTACKS
DCCI. TECHNICAL IMPLEMENTATION OF ONLINE VOTING SYSTEM
DCCII. TELEIMMERSION
DCCIII. TELEPORTATION WITH BELL STATE MEASUREMENT
DCCIV. TELEROBOTICS
DCCV. TERRAFORMING MARS
DCCVI. TERRAIN NAVIGATION UNDER WATER VEHICLE
DCCVII. TEXTURES SYNTHESIS USING GRAPH CUT
DCCVIII. THE XML QUERY ENGINE FOR NETWORK-BOUND DATA
DCCIX. THE .NET FRAMEWORK AND THE COMMON LANGUAGE RUNTIME
DCCX. THE INTERNET PROTOCOL TELEVISION
DCCXI. THE INTERNET PROTOCOL TELEVISION
DCCXII. THE OPEN SOURCE SOFTWARE MODEL
DCCXIII. THE PHYSIOLOGY OF THE GRID
DCCXIV. THE ROMA PERSONAL METADATA SERVICE
DCCXV. THE WAVELET TRANSFORM
DCCXVI. THE_IDE_RAID_FUTURE
DCCXVII. THERMOELECTRIC TECHNOLOGY
DCCXVIII. THIN CLIENT AND TECHNOLOGY
DCCXIX. THIRD GENERATION (3G) WIRELESS
DCCXX. THREE_DIMENSIONAL_SILICON_CHIP
DCCXXI. TINY DB
DCCXXII. TINY OS “ AN OPERATING SYSTEM FOR SENSOR NETWORKS
DCCXXIII. TINYDB
DCCXXIV. TOPOLOGIES & PROTOCOL
DCCXXV. TRANSACTION_PROCESSING_FACILITY
DCCXXVI. TRENDS IN PC SYSTEM MEMORY
DCCXXVII. TRENDS IN PC SYSTEM MEMORY
DCCXXVIII. TROJAN
DCCXXIX. TRUSTED ENHANCED UBIQUITOUS PAYMENT
DCCXXX. TYPE SAFETY
DCCXXXI. UBIQUITOUS NETWORKS
DCCXXXII. ULTRASONIC METAL WELDING
DCCXXXIII. UNDERSTANDING_RAID
DCCXXXIV. UNICODE
DCCXXXV. UNIFIED MESSAGING
DCCXXXVI. UNISON FILE SYNCHRONIZER
DCCXXXVII. UNIVERSAL SERIAL BUS
DCCXXXVIII. UNIX_SOCKET_PROGRAMMING
DCCXXXIX. UNSLOTTED DEFECTION ROUTING
DCCXL. UPTILINDEX
DCCXLI. USER SPACE DEVICE DRIVERS
DCCXLII. UTILISATION OF WASTE POLYETYLENE
DCCXLIII. VALUE_ADDED_REMOTE_ACCESS
DCCXLIV. VARIABLE GEOMETRY TURBINE
DCCXLV. VDSL(VARY HIGH BIT RATE DIGITAL SUBSCRIBER LOOP)
DCCXLVI. VDSL(VARY HIGH BIT RATE DIGITAL SUBSCRIBER LOOP)
DCCXLVII. VELVET: AN ADAPTIVE HYBRID ARCHITECTURE FOR VERY LARGE VIRTUAL ENVIRONMENTS
DCCXLVIII. VELVET: AN ADAPTIVE HYBRID ARCHITECTURE FOR VERY LARGE VIRTUAL ENVIRONMENTS
DCCXLIX. VERY LARGE SCALE INTEGRATION
DCCL. VHOL
DCCLI. VIDEO_ON_DEMAND
DCCLII. VIOP
DCCLIII. VIRTUAL FILE SYSTEM UNDER LINUX
DCCLIV. VIRTUAL LINUX
DCCLV. VIRTUAL PRIVATE NETWORK
DCCLVI. VIRTUAL REALITY AND HUMAN
DCCLVII. VIRTUAL_REALITY_MODELLING_LANGUAGE
DCCLVIII. VIRUAL TECH.S IN ANIMATION
DCCLIX. VIRUAL_TECHS_IN_ANIMATION
DCCLX. VIRUS LIB
DCCLXI. VIRUS PROGRAMMING
DCCLXII. VISUAL TECHNIQUES IN ANIMATION
DCCLXIII. VITRUAL PRIVATE NETWORK
DCCLXIV. VOICE OVER INTERNET PROTOCOL VERSION-4
DCCLXV. VOICE XML
DCCLXVI. VOIP_WHAT_LIES_BENEATH
DCCLXVII. VORTEX TUBE
DCCLXVIII. VXML
DCCLXIX. WATCHGUARD SERVER LOCK
DCCLXX. WATCHGUARD SERVER LOCK
DCCLXXI. WEB BASED DATABASE ADMINISTRATOR
DCCLXXII. WEB DISTRIBUTED AUTHORING & VERSIONING
DCCLXXIII. WEB SERVICES SEMINAR REPORT
DCCLXXIV. WEB_CACHING
DCCLXXV. WEB_SERVICES
DCCLXXVI. WHAT IS AN ELECTION
DCCLXXVII. WHAT IS MPEG-4
DCCLXXVIII. WHAT_20IS_20BIO_INFORMATICS
DCCLXXIX. WHAT_20IS_20BIO_INFORMATICS
DCCLXXX. WHITE PAPER ENTER PR ISE SECUR I T Y CHAN G IN G NEEDS, E VO L VING RESPONS E
DCCLXXXI. WHITE PAPER ENTER PR ISE SECUR I T Y CHAN G IN G NEEDS, E VO L VING RESPONS E
DCCLXXXII. WHY PROXIES MATTER
DCCLXXXIII. WHY PROXIES MATTER
DCCLXXXIV. WHY SMS IF WE HAVE GPRS
DCCLXXXV. WILL EVER COMPUTER CRY DIGITAL TEARS
DCCLXXXVI. WINDOWS 2000 WHAT TO EXPECT FROM MICROSOFTS NEW OPERATING SYSTEM
DCCLXXXVII. WINDOWS VISTA
DCCLXXXVIII. WINDOWSCE
DCCLXXXIX. WIRELESS INTELLIGENT
DCCXC. WIRELESS APPLICATION PROTOCOL
DCCXCI. WIRELESS M2M SYSTEM ARCHITECTURE FOR DATA ACQUISITION AND CONTROL
DCCXCII. WIRELESS NETWORK SECURITY
DCCXCIII. WIRELESS NETWORKED
DCCXCIV. WIRELESS TOKEN RING PROTOCOL
DCCXCV. WIZARDY, INFIDELITY, FERVOR AND IMPORT OF WI-FI
DCCXCVI. WIZARDY, INFIDELITY, FERVOR AND IMPORT OF WI-FI111
DCCXCVII. WLL_TECHNOLOGY
DCCXCVIII. WORKING OF SEARCH ENGINE
DCCXCIX. X3_IMAGE_SENSOR
DCCC. XFS “ EXTENDED FILESYSTEML
DCCCI. XML
DCCCII. XML SYNTAX AND PARSER
DCCCIII. XML FEATURE AND ITS ROLE IN WEB BROWSER
DCCCIV. XML QUERY OPTIMIZATION
DCCCV. XML-BASED SERVERS- COMMUNICATING MEANINGFUL INFORMATION OVER THE WEB USING XML
DCCCVI. XPEER : XML P2P DATABASE SYSTEM
DCCCVII. XPEER A SELF-ORGANIZING XML P2P DATABASE
DCCCVIII. XQUERY PROCESSING IN NATIX
DCCCIX. XSL (EXTENSIBLE STYLESHEET LANGUAGE)
DCCCX. YIMA2
DCCCXI. ZAPLET 3
DCCCXII. ZEN RESEARCH WHITE PAPER
DCCCXIII. DATA MINING
DCCCXIV. DATA MINING TECHNIQUE IN REAL WORD
DCCCXV. DATA MINING USING NEURAL NETWORKS
DCCCXVI. DATA SECURITY
DCCCXVII. DATA_CENTER
DCCCXVIII. DATA_CLUSERING_TECHNIQUES_BEB08
DCCCXIX. DATA_WAREHOUSE
DCCCXX. DATABASE ENGINE FOR THE .DB4XML.
DCCCXXI. DATABASE HANDLING IN TINYOS
DCCCXXII. DATABASE HANDLING IN TINYOS
DCCCXXIII. DECOMPILER
DCCCXXIV. DENIAL OF SERVICE ATTACKS
DCCCXXV. DESERT COOLER1
DCCCXXVI. DESIGN OF A CLUSTER LOGICAL VOLUME MANAGER
DCCCXXVII. DESIGNING MPEG-4 FACIAL ANIMATION FOR WEB APPLICATION
DCCCXXVIII. DESIGNING MPEG-4 FACIAL ANIMATION FOR WEB APPLICATION
DCCCXXIX. DIFFERENT PROTOCOL USED IN THE NETWORK SIMULATOR
DCCCXXX. DIFFERENT PROTOCOL USED IN THE NETWORK SIMULATOR
DCCCXXXI. DIGITAL IMAGE SEGMENTATION
DCCCXXXII. DIGITAL IMAGE SEGMENTATION
DCCCXXXIII. DIGITAL SIGNATURE
DCCCXXXIV. DIGITAL STEGANOGRAPHY
DCCCXXXV. FACE ON MARS
DCCCXXXVI. FACE RECOGNITATION SYSTEM
DCCCXXXVII. FACE RECONZATION
DCCCXXXVIII. FACE_RECOGNITION_SYSTEM
DCCCXXXIX. FACEDETECTIONIR
DCCCXL. FENESTRAE MOBILE DATA SERVERÔ
DCCCXLI. FILE ORGANISATION UNDER TINYDB
DCCCXLII. FILE SYNCHRONISATION MECHANISM
DCCCXLIII. FILE TRANSFER PROTOCOL
DCCCXLIV. FILE TRANSFER PROTOCOL
DCCCXLV. FILE TRANSFER PROTOCOL
DCCCXLVI. FIREWALLS
DCCCXLVII. FIREWIRE (IEEE 1394B)
DCCCXLVIII. FLEX
DCCCXLIX. FLOATING CAR DATA
DCCCL. FLUORESCENT_MULTILAYER_DISC
DCCCLI. FPGA IMPLEMENTATION OF DSP CIRCUIT
DCCCLII. FRAMEWORK FOR PEER-TO-PEER DISTRIBUTED COMPUTING IN A HETEROGENEOUS, DECENTRALIZED ENVIRONMENT
DCCCLIII. FREE SPACE LASER COMMUNICATION
DCCCLIV. FREE SPACE OPTICS (FSO)
DCCCLV. FUTURE_COMPUTING
DCCCLVI. FUZZY SYSTEMS A NEW TECHNOLOGY
DCCCLVII. FXP
DCCCLVIII. GATEWAY 4G MOBILE
DCCCLIX. GENERAL PACKET RADIO SYSTEM (GPRS)
DCCCLX. GENERAL_PACKET_RADIO_SYSTEM
DCCCLXI. GENERALIZED SEARCH TREES FOR DATABASE SYSTEM (GIST)
DCCCLXII. GENETIC ALGORITHM
DCCCLXIII. GENETIC ALGORITHM
DCCCLXIV. GENETIC ENGG. WEARABLE COMPUTER
DCCCLXV. GENETIC_ALGORITHM
DCCCLXVI. GIGABIT_ETHERNET
DCCCLXVII. GLOBAL POSITIONING SYSTEM
DCCCLXVIII. GLOBAL POSITIONING SYSTEM
DCCCLXIX. GNU HURD
DCCCLXX. GPRS
DCCCLXXI. GRID COMPUTING “ INTRODUCTION AND ARCHITECTURE
DCCCLXXII. GRID COMPUTING¦
DCCCLXXIII. GRID COMPUTING-THE ANATOMY
DCCCLXXIV. HANDHELD COMPUTER
DCCCLXXV. HARDWARE- OR SOFTWARE-BASED RAID
DCCCLXXVI. HASKELL
DCCCLXXVII. HIGH PERFORMANCE MICROPROCESSOR
DCCCLXXVIII. HIGH-VOLUME FLY ASH CONCRETE
DCCCLXXIX. HIGH-VOLUME FLY ASH CONCRETE
DCCCLXXX. HIPPI (HIGH-PERFORMANCE PARALLEL INTERFACE)
DCCCLXXXI. HIPPI-SEMINAR1
DCCCLXXXII. HMETIS
DCCCLXXXIII. HMETIS
DCCCLXXXIV. HOLO AND TOUCHSCREEN
DCCCLXXXV. HOLOGRAPHIC STORAGE(FRONT PAGE)
DCCCLXXXVI. HOLOGRAPHIC VERSATILE DISC
DCCCLXXXVII. INTERFACE FOR METADATA AND XML
DCCCLXXXVIII. INTERFACING OF MULTIMEDIA SERVICES WITH MOBILE SERVICE PLATFORM
DCCCLXXXIX. INTERNET COOKIES
DCCCXC. INTERNET MESSAGE ACCESS PROTOCOL
DCCCXCI. INTERNET PROTOCOL TELEVISION
DCCCXCII. INTERNET SERVER APPLICATION PROGRAM INTERFACE
DCCCXCIII. INTERNET_PROTOTCOL_VERSION6
DCCCXCIV. INTERPLANETARY NETWROKS
DCCCXCV. INTRA FILE SECURITY
DCCCXCVI. INTRA FILE SECURITY
DCCCXCVII. INTRODUCTION TO ADO.NET
DCCCXCVIII. INTRODUCTION TO ADSL
DCCCXCIX. INTRODUCTION TO NETWORK SECURITY
CM. INTRODUCTION TO SECURE SOCKETS LAYER
CMI. INTRUSION DETECTION SYSTEM
CMII. INTRUSION DETECTION SYSTEM
CMIII. INTRUSION DETECTION SYSTEM
CMIV. INTRUSION DETECTION SYSTEM METHODOLOGIES
CMV. INTRUSION DETECTION SYSTEM12
CMVI. IP OVER ATM: CLASSICAL IP, NHRP, LANE,
CMVII. MPOA, PAR AND I-PNNI
CMVIII. IP TELEPHONY GSM INTERWORKING
CMIX. IPV6 AND THE NEXT GENERATION INTERNET”PROTOCOL OVERVIEW
CMX. IRIS DETECTION & RECOGNITION
CMXI. IRREGULAR APPLICATION
CMXII. IRREGULAR APPLICATION
CMXIII. ITANIUM 2 PROCESSOR WITH HYPER-THREADING TECHNOLOGY
CMXIV. ITANIUM_ARCHITECTURE
CMXV. J2EE PLATFORM
CMXVI. JABBER ARCHITECTURE
CMXVII. JABBER ARCHITECTURE TECHNOLOGY AND PROTOCOL
CMXVIII. JAVA BASED EMBEDDED TECHNOLOGIES
CMXIX. JAVA DATABASE CONNECTIVITY_JDBC_COMPUTER
CMXX. JAVA RING21
CMXXI. JINI THE DISTRIBUTED SYSTEM
CMXXII. JOINT_TEST_ACTION_GROUP
CMXXIII. KISMET_THE_HUMANOID_ROBOT
CMXXIV. KIZAMU A SYSTEM FOR SCULPTING DIGITAL CHARACTERS
CMXXV. LASER 3_D SCANNER
CMXXVI. 926. LASER BASED 3D SCANNER PICTURE AND VIDEO COMPRESSION STANDARDS (JPEG AND MPEG)
CMXXVII. LC-10
CMXXVIII. LEMPEL_ZELV_WELCH_COMPRESSION_ALGORITHM
CMXXIX. LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL
CMXXX. LINUX
CMXXXI. LINUX FILESYSTEM HIERARCHY
CMXXXII. LINUX OPEN SOURCE AND UNICODE
CMXXXIII. LINUX OPERATING SYSTEM
CMXXXIV. LIVE CELLS FOR STORAGE!
CMXXXV. LIVE LINUX CDROM
CMXXXVI. HONEY POT
CMXXXVII. HUMANOID ROBOT
CMXXXVIII. HYBRID HARD DISK DRIVES
CMXXXIX. HYBRID HARD DISK DRIVES
CMXL. HYPERSONIC TM SOUND (HSS TM)
CMXLI. IMDESXC
CMXLII. I-MODE “ BOON TO WIRELESS COMMUNICATION
CMXLIII. IMPLEMENTATION OF E-LEARNING AND WEB BASED QUERY MANAGEMENT
CMXLIV. INCREASING PROCESSOR PERFORMANCE USING
CMXLV. INFERNO
CMXLVI. INFINI BAND
CMXLVII. INFINIBAND
CMXLVIII. INTELLIGENT INFORMATION RETRIEVER
CMXLIX. INTELLIGENT OPTICAL NETWORK
CML. INTELLIGENT SYSTEMS AND SOFT COMPUTING.
CMLI. INTERACTIVE TV
CMLII. LIVING MACHINES APPLICATION OF GA TO STUDY EVOLUTIONARY ASPECTS
CMLIII. LOM STANDARD (LEARNING OBJECT MODEL)
CMLIV. LOWERING LATENCY IN LINUX
CMLV. LOWERING LATENCY IN LINUX INTRODUCING A PREEMPTIBLE KERNEL
CMLVI. LUSTRE
CMLVII. MAGNETIC_RAM
CMLVIII. MAGNETORESISTIVE RANDOM ACCESS MEMORY (MRAM)
CMLIX. MANAGING SECURITY ON MOBILE PHONES
CMLX. MANAGING THE VIRUS THREAT “ COMPUTERWORLD
CMLXI. MEDIUM ACCESS CONTROL
CMLXII. MEMORY CHANNEL NETWORK FOR PCI
CMLXIII. MEMORY MANAGEMENT
CMLXIV. MEMORY SAFETY
CMLXV. MEMORY SHAFTY
CMLXVI. MEMORY_CHANNEL_NETWORK_FOR_
CMLXVII. MESSAGE COMMUNICATION THROUGH TCP/IP
CMLXVIII. MESSAGING AND COMMUNICATION IN NOMADIC RADIO
CMLXIX. MESSAGING SOLUTION “ UNIFIED MESSAGING
CMLXX. MICRO AIR VEHICLE
CMLXXI. MICROCONTROLLER BASED WEATHER MONITEROING
CMLXXII. MICRONEEDLES A NOVEL APPROACH TO TRANSDERMAL DRUG DELIVERY
CMLXXIII. MICRONEEDLES A NOVEL APPROACH TO TRANSDERMAL DRUG DELIVERY
CMLXXIV. MICRONEEDLES A NOVEL APPROACH TO TRANSDERMAL DRUG DELIVERY
CMLXXV. MICROSOFT .NET
CMLXXVI. MICROSOFT FOUNDATION CLASS (MFC)
CMLXXVII. MICROSOFT SPOT
CMLXXVIII. MICROSOFT SPOT
CMLXXIX. MICROSOFT SPOT
CMLXXX. MICROSOFT_CRYPTOAPI_VERSION_2
CMLXXXI. MICROSOFT_DATAACCESS_COMPONENTS
CMLXXXII. MICROSOFT™S SOFTWARE PROTECTION PLATFORM: INNOVATIONS FOR WINDOWS VISTA„¢ AND WINDOWS SERVER® LONGHORN
CMLXXXIII. MIDDLE WARE BE36
CMLXXXIV. MOBILE 2G
CMLXXXV. MOBILE AND CELLULAR COMMUNICATIONS
CMLXXXVI. MOBILE EVOLUTION
CMLXXXVII. MOBILE VIRUS
CMLXXXVIII. MOBILE3G
CMLXXXIX. MOBILESERVER
CMXC. MODELING SPATIAL CROP PRODUCTION A GIS APPROACH
CMXCI. MODULAR ROBOTICS
CMXCII. MOJOPAC
CMXCIII. MRAM_WHAT_IS_IT
CMXCIV. MULTI_PLATFORM_COMPUTING
CMXCV. MULTICASTING
CMXCVI. MULTICRITERIA SPATIAL DECISION SUPPORT SYSTEMS
CMXCVII. MULTIMEDIA HOME PLATFORM
CMXCVIII. MULTIMEDIA_MESSEGING_SERVICE
CMXCIX. MYSQL (PRONOUNCED'MY-S-Q-L)
M. NANOROBOTS A GREAT EVOLUTION IN MEDICAL
MI. NANOTECHNOLOGY
MII. NANOTECHNOLOGY IN CANCER TREATMENT
MIII. NASA
MIV. NATURAL LANGUAGE PROCESSING
MV. NEED FOR CONFIGURABLE ALUS
MVI. NETWORK APPLIANCE - INTERNET ACCESS MANAGEMENT AND SECURITY
MVII. NETWORK ATTACK AND DEFENSE
MVIII. NETWORK ATTACK AND DEFENSE
MIX. NETWORK CONVERGENCE AND VOICE OVER IP
MX. NETWORK INSTRUMENTS GIGABIT OBSERVER PRODUCTS
MXI. NETWORK MANAGEMENT
MXII. NETWORK MANAGEMENT SYSTEM
MXIII. NETWORK MONITORING
MXIV. NETWORK MONITORING
MXV. NETWORK SECURITY
MXVI. NETWORK SECURITY - A COMPLETE GUIDE TO FIREWALLS
MXVII. NETWORK SECURITY AND CRYPTOGRAPHY
MXVIII. NETWORK SECURITY PRINT
MXIX. NETWORK SECURITY USING FIREWALLS
MXX. NETWORK_SECURITY
MXXI. NETWORK_TOPOLOGIES___ISDN_A
MXXII. NEURAL “ FUZZY TRAINABLE DYNAMIC
MXXIII. MODEL FREE SYSTEM
MXXIV. NEURAL NETWORKS
MXXV. NEW FEATURES OF JAVA 5
MXXVI. NEWS & FEATURES STORY MASSIVELY PARALLEL PROCESSING
MXXVII. NFS SQUARE
MXXVIII. NFSP NFS PARALLELIZED
MXXIX. NMS
MXXX. OBJECT-ORIENTED DATABASE SYSTEM.1

MXXXI. PARALLEL DATA STRUCTURE FOR SYMBOLIC COMPUTATION2
MXXXII. PARALLELIZING_EVOLUTIONARY_ALGORITHMS
MXXXIII. PASSIVE OPTICAL NETWORK (PON)
MXXXIV. PASSWORD BASED ENCRYPTION
MXXXV. PEER_2_PEER TECH
MXXXVI. PEER-TO-PEER NETWORKING
MXXXVII. PERSONAL ACCESS SYSTEM
MXXXVIII. PERSONAL ACCESS SYSTEM
MXXXIX. PERSONAL ACCESS SYSTEMS
MXL. PERVASIVE COMPUTING
MXLI. PETAL
MXLII. PH CONTROL TECHNIQUE USING FUZZY LOGIC
MXLIII. PH CONTROL USING FUZZY LOGIC
MXLIV. PHP HYPERTEXT PRE “ PROCESSOR
MXLV. PHP - HYPERTEXT PRE “ PROCESSOR
MXLVI. PHP HYPER TEXT PREPROCESSOR
MXLVII. PICO SEMINAR NEW
MXLVIII. PICO TECHNOLOGY
MXLIX. PICO TECHNOLOGY
ML. PIRACY PREVENTION USING HARDWARESECURITY LOCKS
MLI. PIRACY PREVENTION USING HARDWARESECURITY LOCKS
MLII. PIXELS PER IMAGE AND PIXELS (OR DOTS) PER INCH (DPI) (OR MILLIMETER)1
MLIII. PIXELS PER IMAGE AND PIXELS (OR DOTS) PER INCH (DPI) (OR MILLIMETER)1
MLIV. PIXIE DUST
MLV. PKI - PUBLIC KEY INFRASTRUCTURE
MLVI. PLAN , MONITOR AND CONTROL FOR SOFTWARE PROJECT
MLVII. PLAN MONITOR & CONTROL
MLVIII. PLAN9
MLIX. POLYTRONICS
MLX. PORTABLE DISTRIBUTED DATA STRUCTURE
MLXI. POWER TOWER AND PARABOLIC TROUGH TECHNOLOGY: REVIVAL OF HOPE THROUGH MIRRORS
MLXII. PRIVATIZATION OF POWER GENERATION
MLXIII. OFDM FOR WL MULTIMEDIA COMMUNICATION
MLXIV. OGG_SOUND_FILE_FORMAT_SPECIFICATION
MLXV. ON_THE_FLY_COMPRESSION
MLXVI. OPEN RADIO ACCESS NETWORK
MLXVII. OPEN RAN
MLXVIII. OPEN SOURCE SOFTWARE
MLXIX. OPTICAL COMPUTER
MLXX. OPTICAL MEMORIES
MLXXI. OPTICAL MEMORIES
MLXXII. OPTICAL PACKET SWITCHING
MLXXIII. OPTOBIONICS-VISION FOR BLIND
MLXXIV. ORACLE GRID COMPUTING
MLXXV. OVERVIEW OF OPERATING SYSTEM
MLXXVI. PACKET SNIFFERS
MLXXVII. PACKET SNIFFERS1
MLXXVIII. PROBLEMS IN TRADITIONAL LEARNING SYSTEM & IMPLEMENTATION OF E “LEARNING
MLXXIX. PROCESS MANAGEMENT IN LINUX
MLXXX. PROFILE_DRIVEN_DATA_MANAGEMENT
MLXXXI. PROFILE-DRIVEN DATA MANAGEMENT
MLXXXII. PROTEIN
MLXXXIII. PROTOCOL SUPPORT FOR
MLXXXIV. PROTOCOL SUPPORT FOR SECURE DOCUMENT TRANSFER
MLXXXV. PROXIMITY SENSORS
MLXXXVI. PROXIMITY SENSORS
MLXXXVII. PSEUDO WIRE EMULATION EDGE-TO-EDGE
MLXXXVIII. PSEUDO WIRE EMULATION EDGE-TO-EDGE
MLXXXIX. PWE3
MXC. Q3D_POSITIONAL_AUDIO
MXCI. QNX_REAL_TIME_OPERATING_SYSTEM
MXCII. QSNET TECHNOLOGY
MXCIII. QUANTUM COMPUTER
MXCIV. QUANTUM COMPUTING AND COMMUNICATION1
MXCV. QUANTUM TELEPORTATION
MXCVI. QUANTUM_CRYPTOGRAPHY
MXCVII. RAID
MXCVIII. RAID_FAQ
MXCIX. RAID_FOR_ENTERPRISE_COMP
MC. RAID_LEVELS
MCI. RANDOMIZED ALGORITHM
MCII. RANDOMIZED LOAD BALANCING FOR TREES STRUCTURED COMPUTATIONS
MCIII. RAW SOCKETS
MCIV. RDRAM_SDRAM_PERFORMANCE_COM
MCV. REAL TIME AND EMBEDED SYSTEMS
MCVI. REAL TIME DATA-BASE
MCVII. RECENT TRENDS IN DIGITAL COMMUNICATION
MCVIII. RECONFIGURABLEFRAMEWORK
MCIX. REDUNDANT ARRAY OF INEXPENSIVE DISK
MCX. RELEASE BETTER SOFTWARE FASTER
MCXI. REMOTE ACCESS CONCEPTS
MCXII. REMOTE ACCESS METHOD
MCXIII. RESOURCE SHARING ON INTERNET
MCXIV. REVERSE ENGINEERING
MCXV. REVERSE ENGINEERING TECHNIQUES1
MCXVI. RIJNDAEL_CRYTOGRAPHY_ALGO
MCXVII. ROBOTIC TELESURGURY
MCXVIII. ROBOTICS AND ARTIFICIAL INTELLIGENCE
MCXIX. ROBOTICS_USING_NEURAL_NETWORKS
MCXX. ROBUST P2P SYSTEM TO HANDLE FLASH CROWDS
MCXXI. ROLE OF SATELLITE IN MOBILE SYSTEMS
MCXXII. ROLE OF SATELLITE IN MOBILE SYSTEMS
MCXXIII. ROUTER ARCHITECTURE
MCXXIV. ROUTING PROTOCOLS FOR AD HOC WIRELESS LANS
MCXXV. RUNTIME TYPE INFORMATION
MCXXVI. RUNTIME TYPE INFORMATION
MCXXVII. SAN AND NAS
MCXXVIII. SAP
MCXXIX. SAP
MCXXX. SATAN
MCXXXI. SATANSEMINARTRAS
MCXXXII. SATANSOFTCOPYREPORT
MCXXXIII. SCANNING
MCXXXIV. SCORM STANDARD
MCXXXV. SECURE VERIFICATION
MCXXXVI. SECURE_SOCKETS_LAYER
MCXXXVII. SECURING INSTANT MESSAGING
MCXXXVIII. SECURING YOUR WEB SITE FOR BUSINESS
MCXXXIX. SECURITY FEATURES OF LINUX
MCXL. SECURITY IN THE WAKE OF IPV6
MCXLI. SECURITY IN THE WAKE OF IPV6
MCXLII. SECURITY IN WIRELESS DATA NETWORKS
MCXLIII. SECURITY SYSTEM USING BIOMETRICS
MCXLIV. SEM_NFS
MCXLV. SEMINAR ON ELECTRONIC CRIME1
MCXLVI. SEMINAR ON UNICODE
MCXLVII. SEMINAR-DHTTP
MCXLVIII. SENSOR NETWORKS
MCXLIX. SERVICES IN PSTN IN REQUESTING1
MCL. SHIVA - SPACEFLIGHT HOLOGRAPHY INVESTIGATION IN A VIRTUAL APPARATUS
MCLI. SILICON DEFENSE - FLASH WORM ANALYSIS
MCLII. SIMULATING COMPUTER NETWORKS USING CLUSTERS OF PCS
MCLIII. SIX_SIGMA
MCLIV. SIXTH SENSE TUTORING SYSTEM
MCLV. SKYSITE NETWORK
MCLVI. SLIDE SHOW
MCLVII. SMART CARD
MCLVIII. SMART CARDS
MCLIX. SMART CARDS
MCLX. SMART SURVEILLANCE: APPLICATIONS, TECHNOLOGIES AND IMPLICATIONS
MCLXI. SMART_TECHNOLOGY
MCLXII. SMARTPHONE
MCLXIII. SMIL
MCLXIV. SNIFFERS
MCLXV. SOFTWARE COPY PROTECTION SCHEME
MCLXVI. SOFTWARE PROJECT PLANNING AND ESTIMATION
MCLXVII. SOFTWARE TESTING
MCLXVIII. SOPHOS WHITE PAPER ACTIVE CONTENT FRIEND OR FOE
MCLXIX. SPACE COLONY-THE FUTURE COLONY
MCLXX. SPEAKING & LISTINING
MCLXXI. SPEECH RECOGNISATION AND ANALTSIS
MCLXXII. SPINS SECURITY PROTOCOLS FOR SENSOR NETWORKS
MCLXXIII. SPYWARE
MCLXXIV. SPYWARE : THE GHOST IN THE MACHINE
MCLXXV. SSL VPN
MCLXXVI. STORAGE AREA NETWORKS (SANS)
MCLXXVII. STREAM CONTROL
MCLXXVIII. STREAM CONTROL TRANSMISSION PROTOCOL
MCLXXIX. SUBBAND IMAGE SEGMENTATION USING VQ
MCLXXX. SUPERVISORY CONTROL
MCLXXXI. SWARM INTELLEGENCE
MCLXXXII. SWARM INTELLIGENCE
MCLXXXIII. SYMPATHETIC HAPTICS THE SENSATIONALTOUCH
MCLXXXIV. SYMPATHETIC HAPTICS THE
MCLXXXV. SYNTHESIS OF ZEOLITES FROM FLY ASH
MCLXXXVI. SYNTHETIC_HUMAN
MCLXXXVII. SYSTEM AND NETWORK ATTACKS
MCLXXXVIII. TEACHING INNOVATION USING COMPUTERISED AUDIENCE RESPONSE SYSTEM
MCLXXXIX. TECHNICAL IMPLEMENTATION OF ONLINE VOTING SYSTEM
MCXC. TECHNICAL IMPLEMENTATION OF ONLINE VOTING SYSTEM
MCXCI. TELEIMMERSION
MCXCII. TELEPORTATION WITH BELL STATE MEASUREMENT
MCXCIII. TELEROBOTICS
MCXCIV. TELEROBOTICS
MCXCV. TERRAFORMING MARS
MCXCVI. TERRAIN NAVIGATION UNDER WATER VEHICLE
MCXCVII. TEXT TO SPEECH CONVERTER
MCXCVIII. TEXTURES SYNTHESIS USING GRAPH CUT
MCXCIX. TEXTURES SYNTHESIS USING GRAPH CUT
MCC. THE XML QUERY ENGINE FOR NETWORK-BOUND DATA3
MCCI. THE .NET FRAMEWORK AND THE COMMON LANGUAGE RUNTIME
MCCII. THE ANATOMY OF THE GRID
MCCIII. THE INTERNET PROTOCOL TELEVISION
MCCIV. THE INTERNET PROTOCOL TELEVISION
MCCV. THE OPEN SOURCE SOFTWARE MODEL
MCCVI. THE PHYSIOLOGY OF THE GRID
MCCVII. THE ROMA PERSONAL METADATA SERVICES
MCCVIII. THE ROMA PERSONAL METADATA SERVICES
MCCIX. THE ROMA PERSONAL METADATA SERVICES SEMINAR REPORT
MCCX. THE WAVELET TRANSFORM
MCCXI. THE_IDE_RAID_FUTURE
MCCXII. THERMOELECTRIC TECHNOLOGY
MCCXIII. THIN CLIENT AND TECHNOLOGY
MCCXIV. THIRD GENERATION (3G) WIRELESS
MCCXV. THREE_DIMENSIONAL_SILICON_CHIP
MCCXVI. TIMETABLING MARKUP LANGUAGE
MCCXVII. TINY DB
MCCXVIII. TINY OS “ AN OPERATING SYSTEM FOR SENSOR NETWORKS
MCCXIX. TINYDB
MCCXX. TOPOLOGIES & PROTOCOL
MCCXXI. TRANSACTION_PROCESSING_FACILITY
MCCXXII. TRENDS IN PC SYSTEM MEMORY
MCCXXIII. TROJAN
MCCXXIV. TRUSTED ENHANCED UBIQUITOUS PAYMENT
MCCXXV. TYPE SAFETY
MCCXXVI. UBIQUITOUS NETWORKS
MCCXXVII. ULTRASONIC METAL WELDING
MCCXXVIII. UNDERSTANDING_RAID
MCCXXIX. UNICODE
MCCXXX. UNIFIED MESSAGING
MCCXXXI. UNIFIED MESSAGING SYSTEM
MCCXXXII. UNISON FILE SYNCHRONIZER
MCCXXXIII. UNIVERSAL SERIAL BUS
MCCXXXIV. UNIX_SOCKET_PROGRAMMING
MCCXXXV. UNSLOTTED DEFECTION ROUTING
MCCXXXVI. UPTILINDEX
MCCXXXVII. USER SPACE DEVICE DRIVERS
MCCXXXVIII. UTILISATION OF WASTE POLYETYLENE
MCCXXXIX. VALUE_ADDED_REMOTE_ACCESS
MCCXL. VARIABLE GEOMETRY TURBINE
MCCXLI. VDSL(VARY HIGH BIT RATE DIGITAL SUBSCRIBER LOOP)
MCCXLII. VELVET: AN ADAPTIVE HYBRID ARCHITECTURE FOR VERY LARGE VIRTUAL ENVIRONMENTS
MCCXLIII. VERY LARGE SCALE INTEGRATION
MCCXLIV. VHOL
MCCXLV. VIDEO_ON_DEMAND
MCCXLVI. VIOP
MCCXLVII. VIRTUAL FILE SYSTEM UNDER LINUX
MCCXLVIII. VIRTUAL LINUX
MCCXLIX. VIRTUAL OFFICE SEMINAR
MCCL. VIRTUAL PRIVATE NETWORK
MCCLI. VIRTUAL REALITY AND HUMAN
MCCLII. VIRTUAL_REALITY_MODELLING_LANGUAGE
MCCLIII. VIRUAL TECH.S IN ANIMATION
MCCLIV. VIRUS LIB
MCCLV. VIRUS PROGRAMMING
MCCLVI. VISUAL TECHNIQUES IN ANIMATION
MCCLVII. VITRUAL PRIVATE NETWORK
MCCLVIII. VOICE OVER INTERNET PROTOCOL VERSION-4
MCCLIX. VOICE XML
MCCLX. VOIP_WHAT_LIES_BENEATH_FINA
MCCLXI. VORTEX TUBE
MCCLXII. VXML
MCCLXIII. WATCHGUARD SERVER LOCK
MCCLXIV. WEB BASED DATABASE ADMINISTRATOR
MCCLXV. WEB COMPATIBILITY USING ADO.NET
MCCLXVI. WEB COMPATIBILITY USING XML
MCCLXVII. WEB DESIGN QUALITY VERSUS WEB INFORMATION QUALITY
MCCLXVIII. WEB DISTRIBUTED AUTHORING & VERSIONING
MCCLXIX. WEB SERVICES SEMINAR REPORT
MCCLXX. WEB_CACHING
MCCLXXI. WEB_SERVICES_SEMINAR_REPORT
MCCLXXII. WHAT IS AN ELECTION
MCCLXXIII. WHAT IS MPEG-4
MCCLXXIV. WHAT_20IS_20BIO_INFORMATICS
MCCLXXV. WHITE PAPER ENTER PR ISE SECUR I T Y CHAN G IN G NEEDS, E VO L VING RESPONS E
MCCLXXVI. WHY PROXIES MATTER
MCCLXXVII. WHY SMS IF WE HAVE GPRS
MCCLXXVIII. WILL EVER COMPUTER CRY DIGITAL TEARS
MCCLXXIX. WINDOWS 2000 WHAT TO EXPECT FROM MICROSOFTS NEW OPERATING SYSTEM
MCCLXXX. WINDOWS VISTA
MCCLXXXI. WINDOWS VISTA: THE FIRST PC GRAPHICS OS
MCCLXXXII. WINDOWS_XP_SERVICE_PACK1
MCCLXXXIII. WINDOWSCE
MCCLXXXIV. WIRELESS INTELLIGENT
MCCLXXXV. WIRELESS APPLICATION PROTOCOL
MCCLXXXVI. WIRELESS M2M SYSTEM ARCHITECTURE FOR DATA ACQUISITION AND CONTROL
MCCLXXXVII. WIRELESS NETWORK SECURITY
MCCLXXXVIII. WIRELESS NETWORK SECURITY_BEA3
MCCLXXXIX. WIRELESS NETWORKED
MCCXC. WIRELESS TOKEN RING PROTOCOL
MCCXCI. WIRELESS TRANSMISION OF ENERGY SEMINAR REPORT
MCCXCII. WIRELESS TRANSMISSION OF ENERGY
MCCXCIII. WIZARDY, INFIDELITY, FERVOR AND IMPORT OF WI-FI
MCCXCIV. WIZARDY, INFIDELITY, FERVOR AND IMPORT OF WI-FI111
MCCXCV. WLL_TECHNOLOGY
MCCXCVI. WORKING OF SEARCH ENGINE
MCCXCVII. X3_IMAGE_SENSOR
MCCXCVIII. XFS “ EXTENDED FILESYSTEML
MCCXCIX. XML
MCCC. XML SYNTAX AND PARSER
MCCCI. XML FEATURE AND ITS ROLE IN WEB BROWSER
MCCCII. XML QUERY OPTIMIZATION
MCCCIII. XML-BASED SERVERS- COMMUNICATING MEANINGFUL INFORMATION OVER THE WEB USING XML
MCCCIV. XPEER : XML P2P DATABASE SYSTEM
MCCCV. XPEER A SELF-ORGANIZING XML P2P DATABASE
MCCCVI. XQUERY PROCESSING IN NATIX
MCCCVII. XQUERY PROCESSING IN NATIX
MCCCVIII. XSL (EXTENSIBLE STYLESHEET LANGUAGE)
MCCCIX. XSL “ EXTENSIBLE STYLESHEET LANGUAGE
MCCCX. YIMA2
MCCCXI. ZAPLET 3
MCCCXII. ZEN RESEARCH WHITE PAPER
MCCCXIII. MICROSOFT™S SOFTWARE PROTECTION PLATFORM: INNOVATIONS FOR WINDOWS VISTA„¢ AND WINDOWS SERVER® LONGHORN
MCCCXIV. WIZARDY, INFIDELITY, FERVOR AND IMPORT OF WI-FI
MCCCXV. AUNTHENTICATION AND KEY AGGREMENT
MCCCXVI. IMAGE COMPRESSION USING WAVELET TRANSFORM
MCCCXVII. FIELD-PROGRAMMABLE PORT EXTENDER (FPX)
MCCCXVIII. GENETIC PROGRAMMING
MCCCXIX. DIGITAL SUBSCRIBER LINE
MCCCXX. OPEN SOURCE SOFTWARE
MCCCXXI. HANDHELD COMPUTERS
MCCCXXII. SKY MOBILE
MCCCXXIII. PLC BASED AUTOMATIC NEUTRALIZATION OF INDUSTRIAL EFFLUENT
MCCCXXIV. PROCESS SCHEDULING & MANAGING IN MOS
MCCCXXV. HONEY POT
MCCCXXVI. PACKET SNIFFERS
MCCCXXVII. ARCHITECTURE OF SEARCH ENGINE01
MCCCXXVIII. INTRODUCTION TO XML
MCCCXXIX. SEARCH ENGINE OPTIMIZATION
MCCCXXX. SEARCHING THE WORLD WIDE WEB
MCCCXXXI. XML (EXTENSIBLE MARKUP LANGUAGE)
MCCCXXXII. XML
MCCCXXXIII. INTRODUCTION TO E-VOTING
MCCCXXXIV. PLAN MONITOR AND CONTROL FOR SOFTWARE PROJECT
MCCCXXXV. MITOCHONDRIAL DNA AND HUMAN DISEASES
MCCCXXXVI. NANOTECHNOLOGY THE FUTURE UNCASTED
MCCCXXXVII. TOUCH SCREEN MONITOR
MCCCXXXVIII. XML SYNTAX AND PARSER
MCCCXXXIX. SMART DUST
MCCCXL. DTH- DIRECT TO HOME
MCCCXLI. VOICE MORPHING
MCCCXLII. WIMAX EXPANDING WIRELESS BROADBAND
MCCCXLIII. BODY AREA NETWORK
MCCCXLIV. SECURITY IN ATM BY USING BIO-INSTRUMENTATION
MCCCXLV. XML SYNTAX AND PARSER
MCCCXLVI. MITOCHONDRIAL DNA AND HUMAN DISEASES
MCCCXLVII. NANOTECHNOLOGY THE FUTURE UNCASTED
MCCCXLVIII. ONLINE MOCK TEST SI
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#2
16-03-2012, 10:38 AM

to get information about the topic "computer science seminar and presentation topics" full report ppt and related topic refer the link bellow

topicideashow-to-latest-computer-science-seminar and presentation-topics

topicideashow-to-seminar and presentation-topics-for-computer-science--4663

topicideashow-to-computer-science-seminar and presentation-topics-list-a-big-bundle

topicideashow-to-computer-science-seminar and presentation-topics

topicideashow-to-computer-science-seminar and presentation-topics-2012-2011

topicideashow-to-seminar and presentation-topics-for-computer-science-2011-2010
Reply
seminar flower
Super Moderator
******

Posts: 10,120
Joined: Apr 2012
#3
21-06-2012, 02:11 PM

Computer Science Seminar Topics


.doc   Computer Science Seminar Topics.doc (Size: 32 KB / Downloads: 24)

• Security Challenge and Defense in VoIP Infrastructures
• Cache Affinity Scheduling
• Intelligent Software Agents
• Unified Modeling Language (UML)
• Digital Watermarking Applications and Advantages
• Windows DNA
• Multiterabit Networks
• Self-Managing Computing
• Zero Knowledge Protocols and Proof Systems
• Cyber Terrorism
• Development of a Network Packet Sniffer
• Setting up a LAN Using LINUX
• Fiber Distributed Data Interface
• Development of a Feature-Rich Practical “Web Enabled Estate Agent” (WEFA)
• High Altitude Auronautical Platforms
• Universal Mobile Telecommunications System
• Development of Effort Tracker System
• Performance Evaluation of Efficient and Reliable Routing Protocols for Fixed-Power Sensor Networks
• Protein Memory
• A Transport Protocol for Inter-Planet Network
• Embedded Auditors for Intrusion Detection
• Free Space Optics
• Honeypots
• Plastic Memory
• Audio Finger Prints
• Computational Methods for Bankruptcy Prediction
• Artificial Neural Network (ANN)
• GigaByte System Network
• Next Generation Protocol (IPv6)
• Conditional Access System
• Ambient Intelligence
• Expert Systems and Decision Making
• Free Space Laser Communications
• Artificial Neural Network
• Load Balancing in Internet
• .High Performance DSP Architectures
• QNX Real-Time Operating System
• Load Balancing in Parallel Computers
• AC Performance of Nanoelectronics
• Kerberos Authentication Protocol
• Solving System of Linear Equations Using Parallel Processing
• Ovonic Unified Memory
• Optical Burst Switching
• Development of a Web Based Mail Client
• Integer Fast Fourier Transform
• Attacking and Defending MS-SQL Server
• Design and Development of Point Of Sale (POS)
• Holographic Data Storage
• Gene Expression Analysis
• Development of a Network Print Spooler
• Inverse Multiplexing
• Simple Network Management Protocol (SNMP)
• To use the Reflection API of JAVA to Create a Comprehensive Reverse Engineering Tool
• Dynamically Re-configurability Computing
• Out Sourcing – A Professional’s Point of View
• Talking Desktop
• Development of a Safe and Secure Internet Banking System
• Computerized Cloths
• Cable Modem
• Supervisory Control and Data Acquisition (SCDA)
• Multi-Core Architectures
• Development of an Online Auctioning Shop for a Campus/Organization
• Ethernet Passive Optical Network
• Capability Model Maturity (CMM) Programming
• Symbian OS – The Mobile Operating System
• Development of a Product Master Maintenance System (PMM)
• Infinite Dimensional Vector Space
• Mobile Hacking and Cracking
• Using Information Technology for Rural Development
• X-Internet
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Computer Memory Based on the Protein Bacteriorhodopsin seminar projects crazy 16 8,984 06-09-2015, 04:54 PM
Last Post: Larbaski
  vowifi presentation jaseelati 0 198 02-03-2015, 01:29 PM
Last Post: jaseelati
  essay about computer in tamil jaseelati 0 313 26-02-2015, 04:30 PM
Last Post: jaseelati
  latest seminar topics for information technology jaseelati 0 359 23-02-2015, 03:17 PM
Last Post: jaseelati
  seminar topics for information technology with ppt jaseelati 0 316 21-02-2015, 04:16 PM
Last Post: jaseelati
  seminar topics for computer networking with ppt jaseelati 0 278 18-02-2015, 02:37 PM
Last Post: jaseelati
  assembling and disassembling of computer ppt jaseelati 0 264 17-02-2015, 02:51 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 275 13-02-2015, 02:01 PM
Last Post: jaseelati
  computer oriented numerical methods ppt jaseelati 0 231 13-02-2015, 01:15 PM
Last Post: jaseelati
  basic computer knowledge pdf in marathi jaseelati 0 306 11-02-2015, 01:21 PM
Last Post: jaseelati