INTERNATIONAL JOURNAL FOR DEVELOPMENT OF COMPUTER SCIENCE & TECHNOLOGY(Volumn-3,Issue-8,Dec-2015)

S. No Paper Title Paper ID Download
01. A Trusted Framework on Energy Efficient Routing protocol in unsecured WSN SaidaRao Kolli,Mangamma Dharavatu IJDCST/01/V-3/I-8/02
02. An improved PDR (Packet Delivery Ratio) Defined Routing Protocol in low-power and lossy networks Gurram Srinivasarao,Mangamma Dharavatu IJDCST/01/V-3/I-8/03
03. Assisting Document Annotation based on Content and Querying Value Pasupuleti Maneesha,Sayeed Yasin IJDCST/01/V-3/I-8/04
04. An Optimization model for Sharing Visual Secrets in Single Image Saikumar Yerramsetti,S.V.C.Gupta IJDCST/01/V-3/I-8/05
05. Mobile-Access of Health Data supported by Cloud with Attribute-based Encryption and Auditability Surekha Lathen Leburi,Trivikram Rao IJDCST/01/V-3/I-8/06
06. Assuring Integrity of Scalable Distributed Services for Software-as-a-Service Clouds Vijay Chand Medapati,Trivikram Rao IJDCST/01/V-3/I-8/07
07. Efficient data Embedding by using jpeg Steganography A.E.Bagirathnath Varma,M.Swapna IJDCST/01/V-3/I-8/08
08. Efficient Web page recommendation Mining Process for Content and Semantic approaches P.Sandeep Kumar,Veena Trivedi IJDCST/01/V-3/I-8/10
09. Delaunay Overlays for P2P Streaming Services K.Naga Rajeswari,J.Venkat krishna IJDCST/01/V-3/I-8/12
10. Content and Querying Value for New Document Annotation Alibasha Shaik,Md Imran IJDCST/01/V-3/I-8/14
11. A Mobile Application on Voice and Message Sending Services Using Wireless Networks V.Anusha,J.Ratna kumar IJDCST/01/V-3/I-8/16
12. Supporting Weak Image Annotations for Similar Facial Image Retrievals G.Naga Mani,M.Pravarsha,Dr.V.Anandam IJDCST/01/V-3/I-8/17
13. A Study on Trustee-Based Backup Authentication Model in Social Networks Shaik Nazia,G.Minni,Sayeed Yasin IJDCST/01/V-3/I-8/18
14. A Novel Approach to Control Multiparty Access for Online Social Networks Kota Anasuya Priyamvada,Sayeed Yaseen IJDCST/01/V-3/I-8/19