INTERNATIONAL JOURNAL FOR DEVELOPMENT OF COMPUTER SCIENCE & TECHNOLOGY(Volumn-1,Issue-7,July-Aug-2013)

S. No Paper Title Paper ID Download
01. Cloud Auditing Techniques for Integrity Constraints in Cloud Computing Srilakshmi Aluri,Sasidevi Puppala,P.Radha Krishna IJDCST/01/V-1/I-7/01
02. Cloud Computing Services on Provisioning Cost Approach K.Ramamohan Rao,Mr.Hari Krishna.Deevi IJDCST/01/V-1/I-7/02
03. Dynamic Clustering Analysis over Web Logs Nurunnisa Shaik,U.Tulasi,S.Phani Praveen IJDCST/01/V-1/I-7/03
04. Routing Scheme in Energy efficient based Protocols for Wireless Sensor NetworksChiranjeevi Rampilla,Pallikonda Anil Kumar IJDCST/01/V-1/I-7/04
05. Dynamic State Testing of Web 2.0 ApplicationsK V Nagarjuna Krishna,A.Ramana Lakshmi IJDCST/01/V-1/I-7/05
06. Cooperative Communication Based on Power Consumption Control in MANETSUpasarthi Babu Rao,Shaik Mohammad Rafi IJDCST/01/V-1/I-7/08
07. Efficient Data Searching Using Forward SearchNeelamraju Gunja,R. Vasantha IJDCST/01/V-1/I-7/09
08. Optimized Data Aggregations using Secondary IndexesSailaja Darsi,K.Kiran Kumar IJDCST/01/V-1/I-7/10
09. Preventing the Leakage of the Local Information from Global Eavesdropper in Sensor NetworksSk.Afroz Basha,MA.Baseer IJDCST/01/V-1/I-7/12
10. Automatic Test Generation in Dynamic Web ApplicationsG.Navyasree,P.Radha Krishna IJDCST/01/V-1/I-7/13
11. Fuzzy Driven Range Queries over Extended Boolean RetrievalsM VVNS Narayana,IMV Krishna IJDCST/01/V-1/I-7/20
12. Implementation of Secure Cloud Storage Systems with Erasure CodeSuresh Boppana,Nageswara Rao Pambala,Suresh Suravarapu IJDCST/01/V-1/I-7/21
13. Natural Language Processing and Machine Learning Techniques for Identifying Disease-Treatment RelationsPraneeth Mareedu,S.Phani Praveen,U.Tulasi IJDCST/01/V-1/I-7/45
14. An Enhancement of HASBE Scheme Setting up Access Control with Hierarchical Identity based Encryption in Cloud ComputingCh V V Narasimha Raju,P Amarendra Reddy IJDCST/01/V-1/I-7/32
15. Accountability for Data Sharing in a CloudM.Ravi Teja,K.Praveen Kumar IJDCST/01/V-1/I-7/31
16. A Secure Key Server based Data Storage and forwarding in CloudA.Shalini,SreeRama Srikanth IJDCST/01/V-1/I-7/30
17. Classification of ECG Heart beats using Dynamic Time WarpingK.Sandhya,K.VijayKumar IJDCST/01/V-1/I-7/46
18. Perspective of Homogenous Motion Reincarnation Based on Artificial IntelligenceMallela.SivaNagaraju,B.Srinivasa Rao,V.Sowjanya,V.Siva Parvathi IJDCST/01/V-1/I-7/40
19. State of Art Algorithm for High Dimensional Data using SlicingVuyyuru Asha,M.Sailaja,V.Siva Parvathi IJDCST/01/V-1/I-7/47
20. Adaptive Monitoring Solution Satisfy User Profiles for Targeted Online Data DeliveryRathna Kumari Kilari,Y.Surekha,G.Lalitha Kumari,V.Sowjanya IJDCST/01/V-1/I-7/48
21. Color Interest Points for Dynamic Stream Object CategorizationTalari Keerthi,CH.Chandra Mohan IJDCST/01/V-1/I-7/50
22. Supporting Hierarchical Queries using Organized Search HistoriesVijaya sri Bhimavarapu,J.Rama Devi IJDCST/01/V-1/I-7/51
23. Certificate Revocation Using Threshold Based Approach in ManetsKondeti.Shalini(M.tech),D.Swapna M.tech(P.HD) IJDCST/01/V-1/I-7/70
24. Human Visual System Model for Data Spatial temporal adaption of Data Hiding methodsP.lavanya(M.tech),Ratna Jyothi IJDCST/01/V-1/I-7/71
25. Security Considerations in Manets using Cryptography PrimitivesAparna Nimmagadda(M.tech),A.Ramana Lakshmi IJDCST/01/V-1/I-7/72
26. Sequential and Trajectory Patterns Hole-Up Using Polynomial Sanitization AlgorithmB.Venkateswara Rao,N.V.Ramana Gupta IJDCST/01/V-1/I-7/73
27. Security in Multiple Codes Using Distributed Depsky SystemJ.Madan Mohan,Bandla Srinivasa Rao IJDCST/01/V-1/I-7/90
28. Dynamic Security Considerations in Multi CloudsJyothi Cholleti,Lavanya Thota,A.Sandhya IJDCST/01/V-1/I-7/91
29. CBIR and SBIR System Based on the Free Hand Shake SketchTelukutla Chakravarthi,Mrs.K.Naga Divya IJDCST/01/V-1/I-7/110
30. Enhanced Multi Attribute Fuzzy Search over XML DataRamya Talasila,D.SreeLakshmi IJDCST/01/V-1/I-7/93