1 |
AREA & DELAY EFFICIENT ADDERS FOR ARITHMETIC APPLICATIONS USING QCA
PADIGALA SRINIVASARAO,K.VENKANNA
|
1-4 |
|
2 |
CLOUD-ASSISTED CONTENT SHARING NETWORKS ON ATTRIBUTE-BASED ACCESS TO SCALABLE MEDIA
Nunna Saraawathi,Santhi Priya
|
5-10 |
|
3 |
Design and Implementation of Decimal Matrix Code for Correcting Cell Upsets in Memories
ATHUNURU BHUPALAREDDY,VENKANNA KOTA
|
11-16 |
|
4 |
Horizontally Distributed Databases for Secure Mining of Association Rules
MadhaviLatha,DhulipallaRamya Krishna
|
17-21 |
|
5 |
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Anusha Jaliparthi,CH. Ravindra Reddy
|
22-25 |
|
6 |
Performance of sheltered IC for exposure of Security Hacking Attacks by using Scan Ba..
K.RAMESH,M.PURNASEKHAR
|
26-30 |
|
7 |
Plan and Implementation of BIST for ISCAS-85 c432 Combinational Circuit
G.Lakshmi Divya,N.Praveen Kumar
|
31-35 |
|
8 |
A Novel Approach to Discover User Search Goals Using Feedback Sessions
KONAPARTHI CHANDRAKALAVATHI,K.VENKATESWARARAO
|
36-40 |
|
9 |
Meta Cloud: Private Cloud as a Service
MIRIYALA PULLARAO,K.VENKATESWARARAO
|
41-44 |
|
10 |
Reversible Logic Gates: Less Dissipation Of Heat And Low Power Consumption
M.VENKATESWARA RAO,D.DAYAKAR RAO
|
45-48 |
|
11 |
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Mul..
Dodda Sunith,Dr.A.Nagaraju,Dr. G.Narsimha
|
49-53 |
|
12 |
Propose and Execution of Decimal Matrix Code for Correcting Cell Upsets in Memories
S.RAMESH BABU,T.BABU RAO
|
54-59 |
|
13 |
Hiding Of Encrypted Information Using Stochastic Diffusion
Manibharathi. B,Rizvana.M,Srinivasan. R
|
60-63 |
|
14 |
Humanizing Queries for Large Scale Image Search
G. CHAKRAPANI,M.VENKATESH NAIK
|
64-66 |
|
15 |
Collaborative Node Multi Level Hybrid Security Scheme for Intrusion Detection in MANETS
Katnekaluva Rajendra Babu,P. Namratha
|
71-74 |
|
16 |
Distributed Virtual Switch based Attack Detection and Countermeasure Selection for VM's
T. PUSHPAVATHI,D. ANUSHA
|
66-70 |
|
17 |
Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption
T.Preetham,PollankiKusuma
|
71-75 |
|