All Issues

November 2014 (Volume 11/ Issue 6)/ Issues 6

S.No Paper Title No. Pages Download
1 AREA & DELAY EFFICIENT ADDERS FOR ARITHMETIC APPLICATIONS USING QCA
PADIGALA SRINIVASARAO,K.VENKANNA
1-4 Click Here
2 CLOUD-ASSISTED CONTENT SHARING NETWORKS ON ATTRIBUTE-BASED ACCESS TO SCALABLE MEDIA
Nunna Saraawathi,Santhi Priya
5-10 Click Here
3 Design and Implementation of Decimal Matrix Code for Correcting Cell Upsets in Memories
ATHUNURU BHUPALAREDDY,VENKANNA KOTA
11-16 Click Here
4 Horizontally Distributed Databases for Secure Mining of Association Rules
MadhaviLatha,DhulipallaRamya Krishna
17-21 Click Here
5 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Anusha Jaliparthi,CH. Ravindra Reddy
22-25 Click Here
6 Performance of sheltered IC for exposure of Security Hacking Attacks by using Scan Ba..
K.RAMESH,M.PURNASEKHAR
26-30 Click Here
7 Plan and Implementation of BIST for ISCAS-85 c432 Combinational Circuit
G.Lakshmi Divya,N.Praveen Kumar
31-35 Click Here
8 A Novel Approach to Discover User Search Goals Using Feedback Sessions
KONAPARTHI CHANDRAKALAVATHI,K.VENKATESWARARAO
36-40 Click Here
9 Meta Cloud: Private Cloud as a Service
MIRIYALA PULLARAO,K.VENKATESWARARAO
41-44 Click Here
10 Reversible Logic Gates: Less Dissipation Of Heat And Low Power Consumption
M.VENKATESWARA RAO,D.DAYAKAR RAO
45-48 Click Here
11 Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Mul..
Dodda Sunith,Dr.A.Nagaraju,Dr. G.Narsimha
49-53 Click Here
12 Propose and Execution of Decimal Matrix Code for Correcting Cell Upsets in Memories
S.RAMESH BABU,T.BABU RAO
54-59 Click Here
13 Hiding Of Encrypted Information Using Stochastic Diffusion
Manibharathi. B,Rizvana.M,Srinivasan. R
60-63 Click Here
14 Humanizing Queries for Large Scale Image Search
G. CHAKRAPANI,M.VENKATESH NAIK
64-66 Click Here
15 Collaborative Node Multi Level Hybrid Security Scheme for Intrusion Detection in MANETS
Katnekaluva Rajendra Babu,P. Namratha
71-74 Click Here
16 Distributed Virtual Switch based Attack Detection and Countermeasure Selection for VM's
T. PUSHPAVATHI,D. ANUSHA
66-70 Click Here
17 Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption
T.Preetham,PollankiKusuma
71-75 Click Here

Institutional Affiliates

Indexing Affiliates

Leave a Comment