View Papers For All
May 2019 (Volume 5 / Issue 5)
Volume 5 / Issue 1
BEST KEYWORD COVER SEARCH
Authors: CH DAKSHAYANI1, N.NAVEEN2
A MODEL PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHRING SYSTEM
Authors: B MURALI1,.KARUNAKAR REDDY2
Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts
Authors: K ARUNA SUDHA1, S.SURESH2
Volume 5 / Issue 2
Approach for Continuous and Transparent User Identity Verification for Secure Internet Services
Authors: U RAVI, P.NAGESWARARAO
TECHNIQUE FOR SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
Authors: V NAVEENA, B.RAM MOHAN REDDY
Improved Dyscale with Heterogeneous Multi-Core Processors to Attain Fairness Guarentees
Authors: K.Sindhu, V.Shanmugapriya
Volume 5 / Issue 3
Ranking based framework for identifying the deceit applications in mobile
Authors: M. Karthika, M. Preetha
An Efficient Approach For Processing Bigdata with Incremental and Iterative Mapreduce using R
Authors: Shaik Moinuddin Ahmed
AN OPTIMISTIC APPROACH FOR CLASSIFICATION OF TEXTURE USING FEATURE SET
Authors: Denzina Eric. N,Pankaja. K
Volume 5 / Issue 4
AN EFFECTIVE COMBINATION OF SIFT AND PCA ALGORITHM TO IDENTIFY PANCHROMATIC IMAGE FALSIFICATION
Authors: P. Ganga Pavan
Circular Slot Antenna with Coaxial Feed for LTE Application.
Authors: Sowmiya S,