INTERNATIONAL JOURNAL FOR DEVELOPMENT OF COMPUTER SCIENCE & TECHNOLOGY(Volumn-1,Issue-3,March-2013)

S. No Paper Title Paper ID Download
01. Reducing Multiple Failures using Routing Configurations for Network Recovery K Bhargav, B.N Kartheek IJDCST/01/V-1/I-3/012
02. Link Life Time Estimation in Peer-to- Peer Networks for Performance Optimization K.Sai Vikas, B.N Kartheek IJDCST/01/V-1/I-3/013
03. Top-K Spatial Preferences Based On Quality Features R.JAYAMMA IJDCST/01/V-1/I-3/014
04. An Approach Towards Multi View Based Document ClusteringR.Goutham,M.Srinivas IJDCST/01/V-1/I-3/09
05. An Effective Approach For Measuring Semantic Resemblance Using Web Search EngineK.V.Rama Murthy,M.Srinivasa Rao IJDCST/01/V-1/I-3/10
06. Discovering Appliance-Level Semantics For Information CompressionAbdul Haleem,Sri Lavanya Sajja IJDCST/01/V-1/I-3/011
07. Microsoft Share Point based On TechNetMr Kishore Reddy.Thummala IJDCST/01/V-1/I-3/021
08 Privacy Preserving on Micro data using Tree Based AlgorithmMr Kishore Reddy.Thummala IJDCST/01/V-1/I-3/022
9. Association Rule Mining Based on Apriori AlgorithmPotu Narayana IJDCST/01/V-1/I-3/031
10. Optimized Dynamic results using Hub RankMr Kishore Reddy.Thummala IJDCST/01/V-1/I-3/032
11. A User Authentication Protocol for Credit Card Security in Online Usage Using OpassMythry Vuyyuru,L.Srikanth IJDCST/01/V-1/I-3/01
12. Density Based Multifeature Background Subtraction Using Support Vector MachineG.Saivamsidhar,Smt S.J.R.K PadminiValli IJDCST/01/V-1/I-3/03
13. Tamper Proof JAR Client for Distributed Accountability for Data Sharing in the CloudS.Jaya Prakash,Dr K.Subramanyam,U.D.S.V. Prasadss IJDCST/01/V-1/I-3/033
14. An Efficient Safe Routing For Forged Data In Wireless Sensor NetworksN.Gopinath,Jyothsna Bandreddi IJDCST/01/V-1/I-3/024
15. A Tree Based E-Mail Abstraction Scheme For Spam DetectionU.D.S.V. Prasad,Dr K.Subramanyam,S.Jaya Prakash IJDCST/01/V-1/I-3/037
16. Fuzzy Logic Based Control of Hybrid Power System Distribution GenerationDr.G.Kameswrarao, K.Balavinod IJDCST/01/V-1/I-3/015
17. Optimized Multi-Clouds using Shamir SharesD.Mounica , Mrs Ch.Radhika Rani IJDCST/01/V-1/I-3/040
18. Bloom Filters Driven Hybrid Query Propagation Schemes in Unstructured P2P NetworksL.Yuvana, Dr. Khalim Amjad Meerja IJDCST/01/V-1/I-3/041
19. DDoS Counter Measures Based on Snort’s detection systemS.Manjari , Mr K.Raja Sekhar IJDCST/01/V-1/I-3/042
20. Cloud Outsourcing Solutions for Tackling Malicious Mobile ActivitiesB.Pavani,DR.Sanakkayala Satyanarayana IJDCST/01/V-1/I-3/043
21. Data Privacy Preserving using Random GroupingE.Rudrani, Mr K.Raja Sekhar IJDCST/01/V-1/I-3/047
22. A New Clustering Technique based on User Search HistoriesDr.J.K.R Sastry, M.V.B.T Santhi, S.Pavani Snigdha IJDCST/01/V-1/I-3/044
23. Classification of Activities in Social MediaNareshBabu.K, B.Prashant IJDCST/01/V-1/I-3/053
24. Efficiently Providing Security in Wireless Sensor NetworksK.Lakshmi Prasuna,Padavala Sai Prasad IJDCST/01/V-1/I-3/052
25. Efficiently Managing Firewall Conflicting PoliciesK.Raghavendra Swamy,B.Prashant IJDCST/01/V-1/I-3/051
26. Enhanced Data Protection in Cloud through Encryption AlgorithmsSunil Kumar Mangi , G. Guru kesava das IJDCST/01/V-1/I-3/055
27. Securitising to Personal Health Records in Cloud ComputingDurga Vangapandu, T.Padmajas IJDCST/01/V-1/I-3/054