S. No |
Paper Title |
Paper ID |
Download |
01. |
Optimized Multi Data Aggregators to Support High Web Traffic Push Servers
Mr N.Hari Krishna[MTech],Mr MD.Sirajuddin,MTech
|
IJDCST/01/V-1/I-5/04 |
|
02. |
Analyze Abnormal User Behavior Using Time sensitive Queries
Parasa Gayatri,J.Srinivas Rao |
IJDCST/01/V-1/I-5/16 |
|
03. |
Resolution Database Privacy preserving based Single-Sign-On Solution
S.S Dhanvantri Divi,T.Swapna,K.J.Sharma |
IJDCST/01/V-1/I-5/028 |
|
04. |
Token- Based Congestion Control Method At the Network EdgeR.Papa Rao, D.Usha Rani, S.V Achuta Rao |
IJDCST/01/V-1/I-5/029 |
|
05. |
Structure Abstraction Schemes for Handling Spam E-MailM.Manoj Kumar, T.Satish, E.V.Sandeep |
IJDCST/01/V-1/I-5/10 |
|
06. |
Packet Classification Methods to Counter Jamming Attacks in Adhoc NetworksP.Ramesh Kumar,G.Nageswara Rao,P.Rambabu |
IJDCST/01/V-1/I-5/11 |
|
07. |
MANET Routing Intrusion Preventions using Extended DS TheoryM.Ravi Kishore,M.Venkatesh,K.Sandeep |
IJDCST/01/V-1/I-5/12 |
|
08 |
Secure MANET Route Discovery FrameworkD.Sowmya,J.Kiran Kumar,M.V.S.S. Nagendranath |
IJDCST/01/V-1/I-5/13 |
|
9. |
Optimized Mesh Protocol for P2P Content SharingMadhavi Perumbudur,Maganti Venkatesh,G.Nageswara Rao,Maganti Phanindara kumar |
IJDCST/01/V-1/I-5/14 |
|
10. |
Machine Learning Approach to Handle Fraud BidsD.S.L.Manikanteswari,M.Swathi,M.V.S.S.Nagendranath |
IJDCST/01/V-1/I-5/15 |
|
11. |
Data Integrity Constraints in Cloud ComputingV.Rakesh Goud, Dr.J.Srinivasa Rao |
IJDCST/01/V-1/I-5/70 |
|
12. |
Improving Web Image Search using Meta Re-rankersB.Kavitha,N.Sujata |
IJDCST/01/V-1/I-5/17 |
|
13. |
Guilty Agent Detection by Using Fake Object AllocationKeerthi Pagadala,Martha Sheshikala,D.Rajeswara Rao |
IJDCST/01/V-1/I-5/18 |
|
14. |
Fault Detection Technique for Dynamic Web ApplicationsD.RajyaLakshmi,L.Abdul Saleem |
IJDCST/01/V-1/I-5/19 |
|
15. |
Secure Data Storage in Cloud by Using AESK.Nikitha,Gade Swathi |
IJDCST/01/V-1/I-5/20 |
|
16. |
Detecting Human Facial ExpressionsNagaraja Rao. A,Chiguruwada Haripriya |
IJDCST/01/V-1/I-5/21 |
|
17. |
Fake objects allocation for data leakage detectionOdela Sandeep Kumar, B.Sunitha Devi |
IJDCST/01/V-1/I-5/22 |
|
18. |
Testing of web services by using ontologyCh.Sharath,D.Basawaraj |
IJDCST/01/V-1/I-5/23 |
|
19. |
A Scalable Distributed File System for Cloud ComputingGangam Soumya,Indira Priyadarshini |
IJDCST/01/V-1/I-5/24 |
|
20. |
Efficient Adaptive Background Subtraction Based on Background Modeling and UpdatingB.Surekha,Thayyaba Khatoon |
IJDCST/01/V-1/I-5/25 |
|
21. |
Cloud Computing for On-Demand Resource ProvisioningC.H Swapna,N.Sujata Kumari |
IJDCST/01/V-1/I-5/26 |
|
22. |
An Effective Controlled Strategy of Mobile Broad CastingBala Abhilash Bukka,M.Bhaskar |
IJDCST/01/V-1/I-5/43 |
|
23. |
Dynamic Updates on Streaming of Dataware Houses Explore TradeoffsS.M Subhani,G.Srinivas Reddy |
IJDCST/01/V-1/I-5/75 |
|
24. |
Implementation of throughput efficiency of TARF:A Trust-Aware Routing Framework for WSNsSrinivas Rao TPVV,P.Radha Krishna |
IJDCST/01/V-1/I-5/76 |
|
25. |
SafeQ Protocol to Preserve Privacy and Integrity Sensor NetworksMR Kurapati Venkata Purnachandra Prasad,Raju Chekka |
IJDCST/01/V-1/I-5/77 |
|
26. |
Recognizing Faces and Human Gestures in Natural Expressions by Considering Computer Vision TechniquesM Ashok Kumar,Dr.R.R.Tewari |
IJDCST/01/V-1/I-5/80 |
|
27. |
Multi-Layered Cryptosystem Based Secure and Authorized DE Duplication Model in Cloud Storage System: Hybrid CloudD.Srinivas,M.Chandra Sekhar |
IJDCST/01/V-1/I-5/81 |
|