| Image Compression and De-compression | 
| Publishing Search Logs | 
| Fast Detection Of Mobile Replica Node Attacks | 
| A Fault-Tolerant Token Based Atomic Broadcast Algorithm | 
| Mobile Gadgeteer | 
| RITAS: Services For Randomized Intrusion Tolerance | 
| Intranet Chatting | 
| Mobile Sampling of Sensor Field Data | 
| Data Leakage Detection | 
| Multi-Lingual Website | 
      
        |  | 
| Improving Utilization Of Infrastructure Clouds | 
| Digital Encryption System | 
| Virtual Office Management | 
| Personal Authentication Based On Iris Recognition | 
| Wireless  Health Care System | 
| Extended XML Tree Pattern Matching | 
| Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing | 
| Pre-paid Recharging System on Banking | 
| Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks | 
| Project Metrics | 
| Nymble: Blocking Misbehaving Users in Anonymizing Networks | 
| Mobile Video Archive | 
| Ensuring Data Storage Security in Cloud Computing | 
| Secure Data Transmission | 
| Online Rental House Web Portal | 
      
        |  | 
| Modeling and Detection of Camouflaging Worm | 
| Lending Tree | 
| Automation Of Analysis And Development Management | 
| Intranet Mailing System | 
| Staying Connected in a Mobile Healthcare System | 
| Voyage Management | 
| Company Information Tracking System | 
| Tanrox Work Force | 
| ERP System | 
| JOpenIT | 
| IRC Chat Client | 
| Credit Card Management System | 
| E-Tutor Online Jobs | 
| Control Theoretic Approach to Distributed Optimal Configuration of 802.11 WLANs | 
| Web Enabled Automated Manufacturing System | 
| SPAF: Stateless FSA-based Packet Filters | 
| Ranking Spatial Data by Quality Preferences | 
| Web Blossom Bazzar | 
| Implementation and Validating Environmental and Health | 
| Distributed Transaction Proxy | 
| SMS Based Mobile Banking with  Security | 
| Mobility Management Approaches for Mobile IP Networks | 
| File Security System | 
| IT Project and Process Management | 
| Mobile Banking System | 
| Online University | 
| Multihoming Route Control | 
| Multiple Routing Configurations for Fast IP Network Recovery | 
| Card Management System | 
| Company Security Reporting System | 
| Mindtech Bug And Component Systems | 
| Inter Bank Fund Transfer in Distributed Network | 
| Bandwidth Recycling | 
| District Collector | 
        |  | 
| On-Line Help Desk | 
| Online Recruitment System | 
| Orkut Using Java | 
| E -Crime File Management System | 
| Ezee Mail System | 
| Intrusion Detection System | 
| Online Crime file Management | 
| M-banking | 
| Control-Theoretic Approach To Distributed Optimal Configuration | 
| Exam Suite | 
| Autonomous Deployment Of Heterogeneous Mobile Sensors | 
| Enterprise Fleet Management System | 
| Mobile Location Alarm | 
| Script Identification Through Temporal Sequence Of The Strokes | 
| Virtual Router Using Destination-Sequenced Distance Vector | 
| Issue Tracker | 
| Contract Labor Management System | 
| Automated Ballot Vote | 
| Dynamic Time Slot Partitioning For Multimedia Transmission In Two-Hop Cellular Networks | 
| Mobile Invoice | 
| Multi User Chat System | 
| Effective Audio Video Transfer Using Real Time Protocol | 
| Citizen Card System | 
| Doctor Online | 
| Mobi-Thesaurus | 
| Effective Scheduling In Infrastructure-Based Cognitive Radio Networks | 
| Mobile Phone Tracking | 
| Remote PC Administration Using J2ME | 
| MACA | 
| Mobile Electronic Program Guide | 
| Ship Store System | 
| Mobiminder: Location Based Reminder on Mobiles | 
| Steganography In Audio Files | 
| Java Memory Model | 
| Online Real Estate Property Management | 
| Cooperative Clustering Protocol For Energy Saving Of Mobile Devices | 
| Cross-Layer Optimization For Multimedia Transport Over Multicode CDMA Networks | 
| Friend Mapper on Mobiles | 
| Noise Reduction By Fuzzy Image Filtering | 
| Load Shedding In Mobile Systems With Mobiqual | 
| Optimal Channel Access Management with QoS Support for Cognitive Vehicular Networks | 
| Mobi Travel Guide | 
| VAS for Hand Held Device | 
| Text Encryption And Decryption | 
| Remote Administration using Mobile | 
| Mobility Management Schemes Based On Pointer Forwarding For Wireless Mesh Networks | 
| Global Tracker | 
| Efficient Location Training Protocols For Heterogeneous Sensor And Actor Networks | 
| E-Cops | 
| Adaptive Location-Oriented Content Delivery In Delay-Sensitive Pervasive Applications | 
| Stealthy Attacks In Wireless Ad Hoc Networks | 
| Image Processing Editor | 
| Resilient Online Coverage For Surveillance Applications | 
| MultiAuctioneer Progressive Auction For Dynamic Spectrum Access | 
| Minimum Bandwidth Reservations For Periodic Streams In Wireless Real Time Systems | 
| Mobile i Broker | 
| Light-Weight Multi-Document Summarization Based On Two-Pass Re Ranking | 
| Medical Image Compression | 
| Natural Image Segmentation Based On Tree Equipartition | 
| Barcode Generation | 
| Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients | 
| Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks | 
| Efficient Location Training Protocols for Heterogeneous Sensor and Actor Networks | 
| Data Delivery Properties of Human Contact Networks | 
| Design and Performance Analysis of Mobility Management | 
| Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries | 
| Twitter Client For Android Based Smart Phone | 
| Real-Time Detection Of Clone Attacks | 
| Continuous Monitoring Of Distance-Based Range Queries | 
| Marine Operations And Management System |