S. No |
Paper Title |
Paper ID |
Download |
01. |
Cloud Auditing Techniques for Integrity Constraints in Cloud Computing
Srilakshmi Aluri,Sasidevi Puppala,P.Radha Krishna
|
IJDCST/01/V-1/I-7/01 |
|
02. |
Cloud Computing Services on Provisioning Cost Approach
K.Ramamohan Rao,Mr.Hari Krishna.Deevi |
IJDCST/01/V-1/I-7/02 |
|
03. |
Dynamic Clustering Analysis over Web Logs
Nurunnisa Shaik,U.Tulasi,S.Phani Praveen |
IJDCST/01/V-1/I-7/03 |
|
04. |
Routing Scheme in Energy efficient based Protocols for Wireless Sensor NetworksChiranjeevi Rampilla,Pallikonda Anil Kumar |
IJDCST/01/V-1/I-7/04 |
|
05. |
Dynamic State Testing of Web 2.0 ApplicationsK V Nagarjuna Krishna,A.Ramana Lakshmi |
IJDCST/01/V-1/I-7/05 |
|
06. |
Cooperative Communication Based on Power Consumption Control in MANETSUpasarthi Babu Rao,Shaik Mohammad Rafi |
IJDCST/01/V-1/I-7/08 |
|
07. |
Efficient Data Searching Using Forward SearchNeelamraju Gunja,R. Vasantha |
IJDCST/01/V-1/I-7/09 |
|
08. |
Optimized Data Aggregations using Secondary IndexesSailaja Darsi,K.Kiran Kumar |
IJDCST/01/V-1/I-7/10 |
|
09. |
Preventing the Leakage of the Local Information from Global Eavesdropper in Sensor NetworksSk.Afroz Basha,MA.Baseer |
IJDCST/01/V-1/I-7/12 |
|
10. |
Automatic Test Generation in Dynamic Web ApplicationsG.Navyasree,P.Radha Krishna |
IJDCST/01/V-1/I-7/13 |
|
11. |
Fuzzy Driven Range Queries over Extended Boolean RetrievalsM VVNS Narayana,IMV Krishna |
IJDCST/01/V-1/I-7/20 |
|
12. |
Implementation of Secure Cloud Storage Systems with Erasure CodeSuresh Boppana,Nageswara Rao Pambala,Suresh Suravarapu |
IJDCST/01/V-1/I-7/21 |
|
13. |
Natural Language Processing and Machine Learning Techniques for Identifying Disease-Treatment RelationsPraneeth Mareedu,S.Phani Praveen,U.Tulasi |
IJDCST/01/V-1/I-7/45 |
|
14. |
An Enhancement of HASBE Scheme Setting up Access Control with Hierarchical Identity based Encryption in Cloud ComputingCh V V Narasimha Raju,P Amarendra Reddy |
IJDCST/01/V-1/I-7/32 |
|
15. |
Accountability for Data Sharing in a CloudM.Ravi Teja,K.Praveen Kumar |
IJDCST/01/V-1/I-7/31 |
|
16. |
A Secure Key Server based Data Storage and forwarding in CloudA.Shalini,SreeRama Srikanth |
IJDCST/01/V-1/I-7/30 |
|
17. |
Classification of ECG Heart beats using Dynamic Time WarpingK.Sandhya,K.VijayKumar |
IJDCST/01/V-1/I-7/46 |
|
18. |
Perspective of Homogenous Motion Reincarnation Based on Artificial IntelligenceMallela.SivaNagaraju,B.Srinivasa Rao,V.Sowjanya,V.Siva Parvathi |
IJDCST/01/V-1/I-7/40 |
|
19. |
State of Art Algorithm for High Dimensional Data using SlicingVuyyuru Asha,M.Sailaja,V.Siva Parvathi |
IJDCST/01/V-1/I-7/47 |
|
20. |
Adaptive Monitoring Solution Satisfy User Profiles for Targeted Online Data DeliveryRathna Kumari Kilari,Y.Surekha,G.Lalitha Kumari,V.Sowjanya |
IJDCST/01/V-1/I-7/48 |
|
21. |
Color Interest Points for Dynamic Stream Object CategorizationTalari Keerthi,CH.Chandra Mohan |
IJDCST/01/V-1/I-7/50 |
|
22. |
Supporting Hierarchical Queries using Organized Search HistoriesVijaya sri Bhimavarapu,J.Rama Devi |
IJDCST/01/V-1/I-7/51 |
|
23. |
Certificate Revocation Using Threshold Based Approach in ManetsKondeti.Shalini(M.tech),D.Swapna M.tech(P.HD) |
IJDCST/01/V-1/I-7/70 |
|
24. |
Human Visual System Model for Data Spatial temporal adaption of Data Hiding methodsP.lavanya(M.tech),Ratna Jyothi |
IJDCST/01/V-1/I-7/71 |
|
25. |
Security Considerations in Manets using Cryptography PrimitivesAparna Nimmagadda(M.tech),A.Ramana Lakshmi |
IJDCST/01/V-1/I-7/72 |
|
26. |
Sequential and Trajectory Patterns Hole-Up Using Polynomial Sanitization AlgorithmB.Venkateswara Rao,N.V.Ramana Gupta |
IJDCST/01/V-1/I-7/73 |
|
27. |
Security in Multiple Codes Using Distributed Depsky SystemJ.Madan Mohan,Bandla Srinivasa Rao |
IJDCST/01/V-1/I-7/90 |
|
28. |
Dynamic Security Considerations in Multi CloudsJyothi Cholleti,Lavanya Thota,A.Sandhya |
IJDCST/01/V-1/I-7/91 |
|
29. |
CBIR and SBIR System Based on the Free Hand Shake SketchTelukutla Chakravarthi,Mrs.K.Naga Divya |
IJDCST/01/V-1/I-7/110 |
|
30. |
Enhanced Multi Attribute Fuzzy Search over XML DataRamya Talasila,D.SreeLakshmi |
IJDCST/01/V-1/I-7/93 |
|