S. No |
Paper Title |
Paper ID |
Download |
01. |
Optimized Aggregate Queries Based On Holistic FunctionsS.Usha Rani,Dr J.Srinivas |
IJDCST/01/V-1/I-6/15 |
 |
02. |
Incremental Query Processing Based on Top K-Results
S.Durga Malleswari,K.Kriran Kumar |
IJDCST/01/V-1/I-6/16 |
 |
03. |
Analysis Of Avalanche Effect In Asymmetric Cryptosystem Using NTRU & RSA
D.Ganga Raju, Kalla Kiran |
IJDCST/01/V-1/I-6/10 |
 |
04. |
Web Information Collection Using Personalized Ontology ModelMohana Prasad.Mendu, Kalla Kiran |
IJDCST/01/V-1/I-6/11 |
 |
05. |
Plenum based Location Services in Wireless Sensor NetworksReddi.Narasimha Murthy, Viswaprasad Kasetti |
IJDCST/01/V-1/I-6/12 |
 |
06. |
The Document Clustering based on the Visual Features Using Visual Features Using Crossover and MutationM.Ashok Kumar,M.Tech,V.D.Phani kumar,Y.Sandeep |
IJDCST/01/V-1/I-6/19 |
 |
07. |
Load re Balancing in cloud using Signature Load Manage ManagementShaik Shakeela,P.Radha Krishna |
IJDCST/01/V-1/I-6/41 |
 |
08 |
Optimized Clustering Process for Dynamic Data DocumentsP.Raja Sekhar,J.Srinivas |
IJDCST/01/V-1/I-6/42 |
 |
9. |
Data Extraction Based on Multi Dimensional Data Attributes Using Top-K ResultsP.Santhi,K.Kiran Kumar |
IJDCST/01/V-1/I-6/43 |
 |
10. |
Optimized Cost based approach for Cloud Cache Using OCRPMuntaj Begum Shaik,K.Rama Krishnaiah |
IJDCST/01/V-1/I-6/45 |
 |
11. |
Information Extraction Based Stanford Dependencies Using Relational DatabasesM.Suryanagamani,K.Kiran Kumar |
IJDCST/01/V-1/I-6/46 |
 |
12. |
Ranked Search Result Authentication on Secure Cloud DataJyothsna Rentapalli,P.Radha Krishna |
IJDCST/01/V-1/I-6/47 |
 |
13. |
Reliable Data Stream Based SNMP PerformanceLamu Rajini,P.Radha Krishna |
IJDCST/01/V-1/I-6/48 |
 |
14. |
Enable Public Audit ability for Secure Cloud StorageLeela Poornima,D.Hari Krishna |
IJDCST/01/V-1/I-6/49 |
 |
15. |
Using State-of the-art Algorithm Fast and Efficient Search over Encrypted DataP.Swapna,D.Hari Krishna |
IJDCST/01/V-1/I-6/50 |
 |
16. |
An Elicitation Technique for Handling Data Malicious ActivityT V Krishna Chowdary,A.Sudhir Babu |
IJDCST/01/V-1/I-6/40 |
 |
17. |
Load Rebalancing Using Peers in CloudsT.Rupa Anusha,S.Siva Sankar Rao |
IJDCST/01/V-1/I-6/81 |
 |
18. |
Defending Attacks against Anonymous Network TorYASHODHA SRAVANI,SIVA SANKAR |
IJDCST/01/V-1/I-6/82 |
 |
19. |
Secure Collaborative Integrity Verification in Multiple CloudsSyed Noor Mohammad,Swathi Tehah Y |
IJDCST/01/V-1/I-6/83 |
 |
20. |
Microdata Publishing by Privacy Preserving using Generalization and BucketizationSuraj Prakash Yadav,T Padmaja |
IJDCST/01/V-1/I-6/84 |
 |
21. |
An Efficient Approach for Ranking Based Fuzzy Keyword Searching in XML datasanthoshi Matha, B Rakesh |
IJDCST/01/V-1/I-6/85 |
 |
22. |
Scalable Consistency in Replication Caching Strategy for Hybrid peer to peer NetworksPradhosh Chandra Patnaik,K Vidya |
IJDCST/01/V-1/I-6/86 |
 |
23. |
Scalable Behavior of Grouped Object DynamicallyManasa Rao, D.Sujatha |
IJDCST/01/V-1/I-6/87 |
 |
24. |
An Efficient Security Aspect of Three Level Systems for Data AuthenticationSahila Khan,Sumathi Rondla |
IJDCST/01/V-1/I-6/88 |
 |
25. |
Hazard Extenuation for Mobile Ad hoc Networks Routing AttacksA L K Bilahari,G Varalakshmi |
IJDCST/01/V-1/I-6/89 |
 |
26. |
Continuous Query Processing using Load Balanced Space PartitionsSuraj Prakash Yadav,T Padmaja |
IJDCST/01/V-1/I-6/80 |
 |
27. |
Fine Tune Updates on Data Streaming Using False Tolerant EDFK.Chaitanya Kumar, Dr J.Srinivas Rao |
IJDCST/01/V-1/I-6/39 |
 |
28. |
Tuple Research Processing for Data PublicationsBalaraju Kongonu, Dr J.Srinivas Rao |
IJDCST/01/V-1/I-6/44 |
 |
29. |
Securing Cloud using Third Party Threaded IDSMadagani Rajeswari,Madhu babu Janjanam |
IJDCST/01/V-1/I-6/90 |
 |
30. |
Detecting of Spammers and Content PromotersK.Ramamohan Rao,Mr.Hari Krishna.Deevi |
IJDCST/01/V-1/I-6/100 |
 |
31. |
Data Mining and Association Rule Mining A SurveySrinivasa Rao Kongarana |
IJDCST/01/V-1/I-6/101 |
 |
32. |
In Cloud Security Mechanism Approach for Auditing in Deduplication SystemK.Venkatesh Sharma,T.Sukanya,M.Chandra Sekhar |
IJDCST/01/V-1/I-6/103 |
 |