S. No |
Paper Title |
Paper ID |
Download |
01. |
A Proactive Approach to Check the Health of Network
Zarina Begum,Sayeed Yasin
|
IJDCST/01/V-3/I-7/01 |
|
02. |
Integrating Social Network with Cloud for Allocating and Sharing Infrastructure Resources
Shaik Faheemunnisa Begum,Sayeed Yasin
|
IJDCST/01/V-3/I-7/02 |
|
03. |
Authenticating Anonymously of Data Stored in Clouds with Dispersed Security Mechanism
Shaik Shabeena,I.Tabitha
|
IJDCST/01/V-3/I-7/03 |
|
04. |
A Secured CP-ABE Based Retrieval Method for Ad Hoc Disruption- Tolerant Military Networks
Mohammad Shabnam,V.Padmaja,Mr.Sayeed Yasin
|
IJDCST/01/V-3/I-7/04 |
|
05. |
Anonymous Search using Multi-Keyword Ranked on Encrypted Cloud Data
Shaik Jasmine,Lavanya,Sayeed Yasin
|
IJDCST/01/V-3/I-7/05 |
|
06. |
Dipping Cost of Cloud Bandwidth using Prediction-Based System
Shaik Sharmila,V.Padmaja,Sayeed Yasin
|
IJDCST/01/V-3/I-7/06 |
|
07. |
Enhanced Algorithms in Association rule mining
Sampath Kumar Kommineni,Dr S.N.Tirumala Rao
|
IJDCST/01/V-3/I-7/10 |
|
08. |
Dupian:Duplicate Code Analyzer using Ontology Editor
Rayavarapu Veeranjaneyulu,Singaraju Srinivasulu
|
IJDCST/01/V-3/I-7/12 |
|
09. |
Summarization and Classification for document using Concept and Context Similarity Analysis
Sandhya. Ekkurthi,Chilakalapudi Meher Babu
|
IJDCST/01/V-3/I-7/14 |
|
10. |
Improved One-to-Many Data Linkages Using Clustering Tree
Ch.Sabitha,Dr.S.Sai Satyanarayana Reddy
|
IJDCST/01/V-3/I-7/16 |
|
11. |
Performing Preserving Privacy Multi Keyword Ranked Search on Encrypted Cloud Data
Dileep Nidamanuri,MD Amanatulla
|
IJDCST/01/V-3/I-7/18 |
|