S. No |
Paper Title |
Paper ID |
Download |
01. |
Optimized Aggregate Queries Based On Holistic FunctionsS.Usha Rani,Dr J.Srinivas |
IJDCST/01/V-1/I-6/15 |
|
02. |
Incremental Query Processing Based on Top K-Results
S.Durga Malleswari,K.Kriran Kumar |
IJDCST/01/V-1/I-6/16 |
|
03. |
Analysis Of Avalanche Effect In Asymmetric Cryptosystem Using NTRU & RSA
D.Ganga Raju, Kalla Kiran |
IJDCST/01/V-1/I-6/10 |
|
04. |
Web Information Collection Using Personalized Ontology ModelMohana Prasad.Mendu, Kalla Kiran |
IJDCST/01/V-1/I-6/11 |
|
05. |
Plenum based Location Services in Wireless Sensor NetworksReddi.Narasimha Murthy, Viswaprasad Kasetti |
IJDCST/01/V-1/I-6/12 |
|
06. |
The Document Clustering based on the Visual Features Using Visual Features Using Crossover and MutationM.Ashok Kumar,M.Tech,V.D.Phani kumar,Y.Sandeep |
IJDCST/01/V-1/I-6/19 |
|
07. |
Load re Balancing in cloud using Signature Load Manage ManagementShaik Shakeela,P.Radha Krishna |
IJDCST/01/V-1/I-6/41 |
|
08 |
Optimized Clustering Process for Dynamic Data DocumentsP.Raja Sekhar,J.Srinivas |
IJDCST/01/V-1/I-6/42 |
|
9. |
Data Extraction Based on Multi Dimensional Data Attributes Using Top-K ResultsP.Santhi,K.Kiran Kumar |
IJDCST/01/V-1/I-6/43 |
|
10. |
Optimized Cost based approach for Cloud Cache Using OCRPMuntaj Begum Shaik,K.Rama Krishnaiah |
IJDCST/01/V-1/I-6/45 |
|
11. |
Information Extraction Based Stanford Dependencies Using Relational DatabasesM.Suryanagamani,K.Kiran Kumar |
IJDCST/01/V-1/I-6/46 |
|
12. |
Ranked Search Result Authentication on Secure Cloud DataJyothsna Rentapalli,P.Radha Krishna |
IJDCST/01/V-1/I-6/47 |
|
13. |
Reliable Data Stream Based SNMP PerformanceLamu Rajini,P.Radha Krishna |
IJDCST/01/V-1/I-6/48 |
|
14. |
Enable Public Audit ability for Secure Cloud StorageLeela Poornima,D.Hari Krishna |
IJDCST/01/V-1/I-6/49 |
|
15. |
Using State-of the-art Algorithm Fast and Efficient Search over Encrypted DataP.Swapna,D.Hari Krishna |
IJDCST/01/V-1/I-6/50 |
|
16. |
An Elicitation Technique for Handling Data Malicious ActivityT V Krishna Chowdary,A.Sudhir Babu |
IJDCST/01/V-1/I-6/40 |
|
17. |
Load Rebalancing Using Peers in CloudsT.Rupa Anusha,S.Siva Sankar Rao |
IJDCST/01/V-1/I-6/81 |
|
18. |
Defending Attacks against Anonymous Network TorYASHODHA SRAVANI,SIVA SANKAR |
IJDCST/01/V-1/I-6/82 |
|
19. |
Secure Collaborative Integrity Verification in Multiple CloudsSyed Noor Mohammad,Swathi Tehah Y |
IJDCST/01/V-1/I-6/83 |
|
20. |
Microdata Publishing by Privacy Preserving using Generalization and BucketizationSuraj Prakash Yadav,T Padmaja |
IJDCST/01/V-1/I-6/84 |
|
21. |
An Efficient Approach for Ranking Based Fuzzy Keyword Searching in XML datasanthoshi Matha, B Rakesh |
IJDCST/01/V-1/I-6/85 |
|
22. |
Scalable Consistency in Replication Caching Strategy for Hybrid peer to peer NetworksPradhosh Chandra Patnaik,K Vidya |
IJDCST/01/V-1/I-6/86 |
|
23. |
Scalable Behavior of Grouped Object DynamicallyManasa Rao, D.Sujatha |
IJDCST/01/V-1/I-6/87 |
|
24. |
An Efficient Security Aspect of Three Level Systems for Data AuthenticationSahila Khan,Sumathi Rondla |
IJDCST/01/V-1/I-6/88 |
|
25. |
Hazard Extenuation for Mobile Ad hoc Networks Routing AttacksA L K Bilahari,G Varalakshmi |
IJDCST/01/V-1/I-6/89 |
|
26. |
Continuous Query Processing using Load Balanced Space PartitionsSuraj Prakash Yadav,T Padmaja |
IJDCST/01/V-1/I-6/80 |
|
27. |
Fine Tune Updates on Data Streaming Using False Tolerant EDFK.Chaitanya Kumar, Dr J.Srinivas Rao |
IJDCST/01/V-1/I-6/39 |
|
28. |
Tuple Research Processing for Data PublicationsBalaraju Kongonu, Dr J.Srinivas Rao |
IJDCST/01/V-1/I-6/44 |
|
29. |
Securing Cloud using Third Party Threaded IDSMadagani Rajeswari,Madhu babu Janjanam |
IJDCST/01/V-1/I-6/90 |
|
30. |
Detecting of Spammers and Content PromotersK.Ramamohan Rao,Mr.Hari Krishna.Deevi |
IJDCST/01/V-1/I-6/100 |
|
31. |
Data Mining and Association Rule Mining A SurveySrinivasa Rao Kongarana |
IJDCST/01/V-1/I-6/101 |
|
32. |
In Cloud Security Mechanism Approach for Auditing in Deduplication SystemK.Venkatesh Sharma,T.Sukanya,M.Chandra Sekhar |
IJDCST/01/V-1/I-6/103 |
|