1 |
SECURING PRIVACY ASSISTANCE FOR PROTECTING LOCATION BASED QUERIES USING ENHANCED SYMM..
M. Indhumathi,B. Sakthivel
|
1-6 |
|
2 |
EFFICIENT NOVEL TECHNIQUE FOR AUTHENTICATION IN MOBILE AND PREVALENT COMPUTING
B.Krishnaveni,K.Katyayani
|
7-10 |
|
3 |
EFFICIENT EXECUTION OF PERL SCRIPTS ON HADOOP CLUSTER
Raghavendra Ajeagaonkar,Prashant Bangar,Karmjeet Saroj, Saurabh Mali, Dr. Prashant Kumbharkar
|
11-15 |
|
4 |
IMPLEMENTATION OF HIGH SPEED MULTIPLIER USING VEDIC MATHEMATICS
N.Bhargav Reddy,K. Wasimakram
|
16-22 |
|
5 |
LARGE-SCALE DATA PROCESSING PLATFORM BASED ON A PEER-TO-PEER PLATFORM
G. Madhavi,M.N.Bhaskhar
|
23-25 |
|
6 |
FINDING THE SHORTEST WAY IN LIVE TRAFFIC RANGE
M.N.Raghavendra,Malaneelam Bhaskar,D.Anithamma
|
26-30 |
|
7 |
A NOVEL ARCHITECTURE TO EXECUTE SIMULTANEOUS AND CONCURRENT OPERATION ON ENCRYPTED CL..
G. Padma
|
31-34 |
|
8 |
A PRIVACY-PRESERVING ACCESS CONTROL WITH ROBUST DATA AUTHENTICITY FOR CLOUD GROUP
P. Sathya,S.Gopinath,Dr. P. Kuppusamy
|
35-40 |
|
9 |
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING
S.Poongodi,P.Murugan,Dr.P.Kuppusamy
|
41-43 |
|
10 |
A STUDY ON MAC PROTOCOLS FOR WIRELESS AD HOC NETWORK
S.Mythili,Dr.N.Rajendran
|
44-48 |
|
11 |
EFFICIENT RANKING ON ENTITY GRAPHS WITH PERSONALIZED RELATIONSHIPS
Polepalli Venkatesh,Dr.M.V.Siva Prasad,P.Sandeep
|
49-54 |
|
12 |
IMAGE ENCRYPTION AND RETRIEVAL IN CHAOTIC MAP BASED IMAGE SECURITY WITH TAMPER DETECTION
Vimali G,Prof.M. Senbagavalli
|
55-58 |
|
13 |
DETECTING MALICIOUS PACKET DROPPING IN WIRELESS AD HOC NETWORKS BY USING HOMOMORPHIC ..
Mekala Rajesh,Nirmala Bai. K.S
|
59-63 |
|
14 |
ALERT AGGREGATION BASED PATTERN CLASSIFIER FOR EFFECTIVE NETWORK INTRUSION DETECTION ..
D. Ramakanth,S. Kusuma
|
64-68 |
|
15 |
IMPROVING THE LOADABILITY LIMITS OF POWER SYSTEM USING FACTS DEVICE PLACED AT AN OPTI..
Mrs.A.Saranya,Mr.M.Ramesh,Mr.D.Rajkumar
|
69-73 |
|
16 |
A SURVEY ON VM CONSOLIDATION FOR ENERGY EFFICIENT GREEN CLOUD COMPUTING
Hemanandhini.I.G,Ranjani.C
|
74-79 |
|
17 |
A SURVEY ON DATA REDUCTION TECHNIQUES FOR EFFICIENT BUG TRIAGE PROCESS
Shanthipriya.D,Deepa.K
|
80-82 |
|
18 |
A SURVEY ON MICROCONTROLLER BASED INTELLIGENT IRRIGATION SYSTEM
R. Kowsalya,M. Karthigha
|
83-86 |
|
19 |
FINDING ISOLATED REPAIRING POINT USING WIRELESS SENSOR NETWORKS FOR STRUCTURAL HEALTH..
Meenakshi Dhanalakshmi.M,Karthigha.M
|
87-91 |
|
20 |
A SURVEY ON TECHNIQUES AVAILABLE IN BANK SECURITY
Sandhiya Ravikumar,Jeyapriya Arthanareeswaran
|
92-94 |
|