S. No |
Paper Title |
Paper ID |
Download |
01. |
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise
K.Subhash Bhagavan,Kirankumar.P, M.V.S Nagendranath |
IJDCST/01/V-1/I-1/01 |
|
02. |
Accumulating Bin rank Scaling Productive Authority Based Search
K.Manasa,T.V.Sai Krishna |
IJDCST/01/V-1/I-1/02 |
|
03. |
An Adaptive File Replication Scheme in p2p SystemTummala Bindu Madhavi,G.Venkata Krishna |
IJDCST/01/V-1/I-1/03 |
|
04. |
Detecting Duplicates in Public Network Using SignaturesJ.Sravanthi,G.Kalyani |
IJDCST/01/V-1/I-1/04 |
|
05. |
Event Dissemination Protocol for SNS inspired P2P GamesG.Devi Vasudha Rani,D.Varun Prasad |
IJDCST/01/V-1/I-1/05 |
|
06. |
Fabric Defect Detection Using Image AnalysisSrinadh unnava,Kirankumar jetti,MVSS Nagendranath |
IJDCST/01/V-1/I-1/06 |
|