INTERNATIONAL JOURNAL FOR DEVELOPMENT OF COMPUTER SCIENCE & TECHNOLOGY(Volume-1,Issue-5,May-2013)

S. No Paper Title Paper ID Download
01. Optimized Multi Data Aggregators to Support High Web Traffic Push Servers Mr N.Hari Krishna[MTech],Mr MD.Sirajuddin,MTech IJDCST/01/V-1/I-5/04
02. Analyze Abnormal User Behavior Using Time sensitive Queries Parasa Gayatri,J.Srinivas Rao IJDCST/01/V-1/I-5/16
03. Resolution Database Privacy preserving based Single-Sign-On Solution S.S Dhanvantri Divi,T.Swapna,K.J.Sharma IJDCST/01/V-1/I-5/028
04. Token- Based Congestion Control Method At the Network EdgeR.Papa Rao, D.Usha Rani, S.V Achuta Rao IJDCST/01/V-1/I-5/029
05. Structure Abstraction Schemes for Handling Spam E-MailM.Manoj Kumar, T.Satish, E.V.Sandeep IJDCST/01/V-1/I-5/10
06. Packet Classification Methods to Counter Jamming Attacks in Adhoc NetworksP.Ramesh Kumar,G.Nageswara Rao,P.Rambabu IJDCST/01/V-1/I-5/11
07. MANET Routing Intrusion Preventions using Extended DS TheoryM.Ravi Kishore,M.Venkatesh,K.Sandeep IJDCST/01/V-1/I-5/12
08 Secure MANET Route Discovery FrameworkD.Sowmya,J.Kiran Kumar,M.V.S.S. Nagendranath IJDCST/01/V-1/I-5/13
9. Optimized Mesh Protocol for P2P Content SharingMadhavi Perumbudur,Maganti Venkatesh,G.Nageswara Rao,Maganti Phanindara kumar IJDCST/01/V-1/I-5/14
10. Machine Learning Approach to Handle Fraud BidsD.S.L.Manikanteswari,M.Swathi,M.V.S.S.Nagendranath IJDCST/01/V-1/I-5/15
11. Data Integrity Constraints in Cloud ComputingV.Rakesh Goud, Dr.J.Srinivasa Rao IJDCST/01/V-1/I-5/70
12. Improving Web Image Search using Meta Re-rankersB.Kavitha,N.Sujata IJDCST/01/V-1/I-5/17
13. Guilty Agent Detection by Using Fake Object AllocationKeerthi Pagadala,Martha Sheshikala,D.Rajeswara Rao IJDCST/01/V-1/I-5/18
14. Fault Detection Technique for Dynamic Web ApplicationsD.RajyaLakshmi,L.Abdul Saleem IJDCST/01/V-1/I-5/19
15. Secure Data Storage in Cloud by Using AESK.Nikitha,Gade Swathi IJDCST/01/V-1/I-5/20
16. Detecting Human Facial ExpressionsNagaraja Rao. A,Chiguruwada Haripriya IJDCST/01/V-1/I-5/21
17. Fake objects allocation for data leakage detectionOdela Sandeep Kumar, B.Sunitha Devi IJDCST/01/V-1/I-5/22
18. Testing of web services by using ontologyCh.Sharath,D.Basawaraj IJDCST/01/V-1/I-5/23
19. A Scalable Distributed File System for Cloud ComputingGangam Soumya,Indira Priyadarshini IJDCST/01/V-1/I-5/24
20. Efficient Adaptive Background Subtraction Based on Background Modeling and UpdatingB.Surekha,Thayyaba Khatoon IJDCST/01/V-1/I-5/25
21. Cloud Computing for On-Demand Resource ProvisioningC.H Swapna,N.Sujata Kumari IJDCST/01/V-1/I-5/26
22. An Effective Controlled Strategy of Mobile Broad CastingBala Abhilash Bukka,M.Bhaskar IJDCST/01/V-1/I-5/43
23. Dynamic Updates on Streaming of Dataware Houses Explore TradeoffsS.M Subhani,G.Srinivas Reddy IJDCST/01/V-1/I-5/75
24. Implementation of throughput efficiency of TARF:A Trust-Aware Routing Framework for WSNsSrinivas Rao TPVV,P.Radha Krishna IJDCST/01/V-1/I-5/76
25. SafeQ Protocol to Preserve Privacy and Integrity Sensor NetworksMR Kurapati Venkata Purnachandra Prasad,Raju Chekka IJDCST/01/V-1/I-5/77
26. Recognizing Faces and Human Gestures in Natural Expressions by Considering Computer Vision TechniquesM Ashok Kumar,Dr.R.R.Tewari IJDCST/01/V-1/I-5/80
27. Multi-Layered Cryptosystem Based Secure and Authorized DE Duplication Model in Cloud Storage System: Hybrid CloudD.Srinivas,M.Chandra Sekhar IJDCST/01/V-1/I-5/81