1 |
SOCIAL NETWORKS PRIVACY-PRESERVING ON COLLABORATIVE TAGGING AND SPAM FILTER USING NAI..
Karthik.M.P,K. Devaki,K. Srinivasan
|
1-4 |
|
2 |
AREA REDUCTION OF CONSTRUCT ERROR CORRECTION CODES FOR PROTECTING DATA BITS
G.Subramaniam,K.G.Parthiban
|
5-9 |
|
3 |
Automated Breast Ultrasound Using Adaptive Threshold For Multi-Dimensional Tumor Detection
S. Anandhakumar,K. vinothkumar
|
10-18 |
|
4 |
Concealed Data Aggregation For Query Processing In Database-As-A-Service (Das) Model
Sambath Kumar ,G.Gokulakrishnan
|
19-22 |
|
5 |
Authentication of Data Storage using Decentralized Access Control in Clouds
S.Sujatha,P.Saranya
|
23-28 |
|
6 |
RSA BASED COOPERATIVE DATA POSSESSION IN MULTICLOUD
Arun Prasath.D,K. Devaki,K. Srinivasan
|
29-32 |
|
7 |
Virtualized Cloud And Energy Aware Scheduling Using EARH
G.Tharanya,G.Vijayasekaran
|
33-37 |
|
8 |
A Novel Approach Against Collaborative Attacks In Manet
A.Naveena,Dr.K.Ramalinga Reddy
|
38-43 |
|
9 |
3-D Based Sensor Networks Using Sleep Scheduling Algorithm With Energy Efficient Data..
Karthi.R,Mr.G.Sivakumar
|
44-49 |
|
10 |
A Coalitional Game Approach For Packet Delivery In Mobile Ad-hoc Network
V.Rajeswaran,G.Sivakumar
|
50-55 |
|
11 |
A Successful Progress For Hierarchical Routing Proposal Form In Wireless Ad-hoc Netwo..
S.Balamurugan,P.Sathya Sutha
|
56-61 |
|
12 |
Enhanced Cloud Data Security Through Verifiable Cipher Policy Based Encryption
P.Nagarajan ,K.J.Jagdish
|
62-67 |
|
13 |
Enhanced Intelligent Discovery Mechanism to support Mobile Web Search
R.Bharath,P.Sathyasutha
|
68-72 |
|
14 |
A Study on Sinus-Lifting Motion of a Snake Robot With Sequential Optimization of a Hy..
Jothi Prakash .S,G.Vidhya Krishnan
|
73-75 |
|
15 |
Efficient Human Resource Management Through Web Based Analytics
G. Durga devi, R. Abirami,N. Dhanalakshmi
|
76-80 |
|
16 |
Wireless Voice Communication Device Design Using Laser Torch and LDR
R.L. Sindhu,Mr.R.Yuvaraj
|
81-83 |
|
17 |
Energy Efficient for electric power systems sensing applications with the use of perm..
Thenmozhi.P,S.Suresh
|
84-86 |
|
18 |
SECURE DATA PUBLISHING WITH VERIFIABLE DISTANCE MINING POLICY
T. Rajesh,P. Sathiyapriya
|
87-93 |
|
19 |
Security Topology In Wireless Sensor Networks With Routing Optimization
K.Vidhya,C.N.Vanitha
|
94-99 |
|
20 |
Privacy-Preserving Public Auditing For Shared Data Using Elliptic Curve Cryptography ..
S.Rubika,C.Titus
|
100-106 |
|