S. No |
Paper Title |
Paper ID |
Download |
01. |
Reducing Multiple Failures using Routing Configurations for Network Recovery
K Bhargav, B.N Kartheek
|
IJDCST/01/V-1/I-3/012 |
|
02. |
Link Life Time Estimation in Peer-to- Peer Networks for Performance Optimization
K.Sai Vikas, B.N Kartheek |
IJDCST/01/V-1/I-3/013 |
|
03. |
Top-K Spatial Preferences Based On Quality Features
R.JAYAMMA |
IJDCST/01/V-1/I-3/014 |
|
04. |
An Approach Towards Multi View Based Document ClusteringR.Goutham,M.Srinivas |
IJDCST/01/V-1/I-3/09 |
|
05. |
An Effective Approach For Measuring Semantic Resemblance Using Web Search EngineK.V.Rama Murthy,M.Srinivasa Rao |
IJDCST/01/V-1/I-3/10 |
|
06. |
Discovering Appliance-Level Semantics For Information CompressionAbdul Haleem,Sri Lavanya Sajja |
IJDCST/01/V-1/I-3/011 |
|
07. |
Microsoft Share Point based On TechNetMr Kishore Reddy.Thummala |
IJDCST/01/V-1/I-3/021 |
|
08 |
Privacy Preserving on Micro data using Tree Based AlgorithmMr Kishore Reddy.Thummala |
IJDCST/01/V-1/I-3/022 |
|
9. |
Association Rule Mining Based on Apriori AlgorithmPotu Narayana |
IJDCST/01/V-1/I-3/031 |
|
10. |
Optimized Dynamic results using Hub RankMr Kishore Reddy.Thummala |
IJDCST/01/V-1/I-3/032 |
|
11. |
A User Authentication Protocol for Credit Card Security in Online Usage Using OpassMythry Vuyyuru,L.Srikanth |
IJDCST/01/V-1/I-3/01 |
|
12. |
Density Based Multifeature Background Subtraction Using Support Vector MachineG.Saivamsidhar,Smt S.J.R.K PadminiValli |
IJDCST/01/V-1/I-3/03 |
|
13. |
Tamper Proof JAR Client for Distributed Accountability for Data Sharing in the CloudS.Jaya Prakash,Dr K.Subramanyam,U.D.S.V. Prasadss |
IJDCST/01/V-1/I-3/033 |
|
14. |
An Efficient Safe Routing For Forged Data In Wireless Sensor NetworksN.Gopinath,Jyothsna Bandreddi |
IJDCST/01/V-1/I-3/024 |
|
15. |
A Tree Based E-Mail Abstraction Scheme For Spam DetectionU.D.S.V. Prasad,Dr K.Subramanyam,S.Jaya Prakash |
IJDCST/01/V-1/I-3/037 |
|
16. |
Fuzzy Logic Based Control of Hybrid Power System Distribution GenerationDr.G.Kameswrarao, K.Balavinod |
IJDCST/01/V-1/I-3/015 |
|
17. |
Optimized Multi-Clouds using Shamir SharesD.Mounica , Mrs Ch.Radhika Rani |
IJDCST/01/V-1/I-3/040 |
|
18. |
Bloom Filters Driven Hybrid Query Propagation Schemes in Unstructured P2P NetworksL.Yuvana, Dr. Khalim Amjad Meerja |
IJDCST/01/V-1/I-3/041 |
|
19. |
DDoS Counter Measures Based on Snort’s detection systemS.Manjari , Mr K.Raja Sekhar |
IJDCST/01/V-1/I-3/042 |
|
20. |
Cloud Outsourcing Solutions for Tackling Malicious Mobile ActivitiesB.Pavani,DR.Sanakkayala Satyanarayana |
IJDCST/01/V-1/I-3/043 |
|
21. |
Data Privacy Preserving using Random GroupingE.Rudrani, Mr K.Raja Sekhar |
IJDCST/01/V-1/I-3/047 |
|
22. |
A New Clustering Technique based on User Search HistoriesDr.J.K.R Sastry, M.V.B.T Santhi, S.Pavani Snigdha |
IJDCST/01/V-1/I-3/044 |
|
23. |
Classification of Activities in Social MediaNareshBabu.K, B.Prashant |
IJDCST/01/V-1/I-3/053 |
|
24. |
Efficiently Providing Security in Wireless Sensor NetworksK.Lakshmi Prasuna,Padavala Sai Prasad |
IJDCST/01/V-1/I-3/052 |
|
25. |
Efficiently Managing Firewall Conflicting PoliciesK.Raghavendra Swamy,B.Prashant |
IJDCST/01/V-1/I-3/051 |
|
26. |
Enhanced Data Protection in Cloud through Encryption AlgorithmsSunil Kumar Mangi , G. Guru kesava das |
IJDCST/01/V-1/I-3/055 |
|
27. |
Securitising to Personal Health Records in Cloud ComputingDurga Vangapandu, T.Padmajas |
IJDCST/01/V-1/I-3/054 |
|