INTERNATIONAL JOURNAL FOR DEVELOPMENT OF COMPUTER SCIENCE & TECHNOLOGY(Volume-1,Issue-6,June-2013)

S. No Paper Title Paper ID Download
01. Optimized Aggregate Queries Based On Holistic FunctionsS.Usha Rani,Dr J.Srinivas IJDCST/01/V-1/I-6/15
02. Incremental Query Processing Based on Top K-Results S.Durga Malleswari,K.Kriran Kumar IJDCST/01/V-1/I-6/16
03. Analysis Of Avalanche Effect In Asymmetric Cryptosystem Using NTRU & RSA D.Ganga Raju, Kalla Kiran IJDCST/01/V-1/I-6/10
04. Web Information Collection Using Personalized Ontology ModelMohana Prasad.Mendu, Kalla Kiran IJDCST/01/V-1/I-6/11
05. Plenum based Location Services in Wireless Sensor NetworksReddi.Narasimha Murthy, Viswaprasad Kasetti IJDCST/01/V-1/I-6/12
06. The Document Clustering based on the Visual Features Using Visual Features Using Crossover and MutationM.Ashok Kumar,M.Tech,V.D.Phani kumar,Y.Sandeep IJDCST/01/V-1/I-6/19
07. Load re Balancing in cloud using Signature Load Manage ManagementShaik Shakeela,P.Radha Krishna IJDCST/01/V-1/I-6/41
08 Optimized Clustering Process for Dynamic Data DocumentsP.Raja Sekhar,J.Srinivas IJDCST/01/V-1/I-6/42
9. Data Extraction Based on Multi Dimensional Data Attributes Using Top-K ResultsP.Santhi,K.Kiran Kumar IJDCST/01/V-1/I-6/43
10. Optimized Cost based approach for Cloud Cache Using OCRPMuntaj Begum Shaik,K.Rama Krishnaiah IJDCST/01/V-1/I-6/45
11. Information Extraction Based Stanford Dependencies Using Relational DatabasesM.Suryanagamani,K.Kiran Kumar IJDCST/01/V-1/I-6/46
12. Ranked Search Result Authentication on Secure Cloud DataJyothsna Rentapalli,P.Radha Krishna IJDCST/01/V-1/I-6/47
13. Reliable Data Stream Based SNMP PerformanceLamu Rajini,P.Radha Krishna IJDCST/01/V-1/I-6/48
14. Enable Public Audit ability for Secure Cloud StorageLeela Poornima,D.Hari Krishna IJDCST/01/V-1/I-6/49
15. Using State-of the-art Algorithm Fast and Efficient Search over Encrypted DataP.Swapna,D.Hari Krishna IJDCST/01/V-1/I-6/50
16. An Elicitation Technique for Handling Data Malicious ActivityT V Krishna Chowdary,A.Sudhir Babu IJDCST/01/V-1/I-6/40
17. Load Rebalancing Using Peers in CloudsT.Rupa Anusha,S.Siva Sankar Rao IJDCST/01/V-1/I-6/81
18. Defending Attacks against Anonymous Network TorYASHODHA SRAVANI,SIVA SANKAR IJDCST/01/V-1/I-6/82
19. Secure Collaborative Integrity Verification in Multiple CloudsSyed Noor Mohammad,Swathi Tehah Y IJDCST/01/V-1/I-6/83
20. Microdata Publishing by Privacy Preserving using Generalization and BucketizationSuraj Prakash Yadav,T Padmaja IJDCST/01/V-1/I-6/84
21. An Efficient Approach for Ranking Based Fuzzy Keyword Searching in XML datasanthoshi Matha, B Rakesh IJDCST/01/V-1/I-6/85
22. Scalable Consistency in Replication Caching Strategy for Hybrid peer to peer NetworksPradhosh Chandra Patnaik,K Vidya IJDCST/01/V-1/I-6/86
23. Scalable Behavior of Grouped Object DynamicallyManasa Rao, D.Sujatha IJDCST/01/V-1/I-6/87
24. An Efficient Security Aspect of Three Level Systems for Data AuthenticationSahila Khan,Sumathi Rondla IJDCST/01/V-1/I-6/88
25. Hazard Extenuation for Mobile Ad hoc Networks Routing AttacksA L K Bilahari,G Varalakshmi IJDCST/01/V-1/I-6/89
26. Continuous Query Processing using Load Balanced Space PartitionsSuraj Prakash Yadav,T Padmaja IJDCST/01/V-1/I-6/80
27. Fine Tune Updates on Data Streaming Using False Tolerant EDFK.Chaitanya Kumar, Dr J.Srinivas Rao IJDCST/01/V-1/I-6/39
28. Tuple Research Processing for Data PublicationsBalaraju Kongonu, Dr J.Srinivas Rao IJDCST/01/V-1/I-6/44
29. Securing Cloud using Third Party Threaded IDSMadagani Rajeswari,Madhu babu Janjanam IJDCST/01/V-1/I-6/90
30. Detecting of Spammers and Content PromotersK.Ramamohan Rao,Mr.Hari Krishna.Deevi IJDCST/01/V-1/I-6/100
31. Data Mining and Association Rule Mining A SurveySrinivasa Rao Kongarana IJDCST/01/V-1/I-6/101
32. In Cloud Security Mechanism Approach for Auditing in Deduplication SystemK.Venkatesh Sharma,T.Sukanya,M.Chandra Sekhar IJDCST/01/V-1/I-6/103