Get Latest CSE Projects in your Email


Emulating 3G Network Characteristics on WiFi Networks

Mobile applications should work regardless of which type of wireless interface is used, and should be able to conceal unstable connections from the user to improve user experience. Therefore, network testing is important when Continue reading

Balancing Dependability Quality Attributes for Increased Embedded Systems Dependability

Embedded systems are used in many critical applications where a failure can have serious consequences. Therefore, achieving a high level of dependability is an ultimate goal. However, in order to achieve this goal we are in Continue reading

A Tailorable Infrastructure to Enhance Mobile Seamless Learning

The widespread use of mobile devices is leading towards their adoption in the learning process, even if some pedagogical challenges are still not fully addressed when integrating mobile-assisted activities into Continue reading

A Software Suite for Efficient Use of the European Qualifications Framework in Online and Blended Courses

Since introduction of the European qualifications framework (EQF) as one instrument to bridge from learning institutions to competence driven lifelong learning, it remains a challenge for instructors and teachers in Continue reading

A Scientifically Experimental Approach to the Simulation of Designer Activity in the Conceptual Designing of Software Intensive Systems

The success of designing software intensive systems (SISs) may be improved by incorporating experimentation to be part of the design process. This paper presents a scientific approach to Continue reading

Offload Decision Models and the Price of Anarchy in Mobile Cloud Application Ecosystems

With the maturity of technologies, such as HTML5 and JavaScript, and with the increasing popularity of cross-platform frameworks, such as Apache Cordova, mobile cloud computing as a new design paradigm of Continue reading

Provable Security for Crypto-Currencies

The past several years have seen the surprising and rapid rise of Bitcoin and other “crypto-currencies.” These are decentralized peer-to-peer networks that allow users to transmit money, to compose financial instruments, and to Continue reading

Efficient Secure Computation for Real-world Settings and Security Models

Introduction:
Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its Continue reading