S.No |
Contents |
1 |
IMPROVE VOID ROUTING COORDINATE FOR WIRELESS SENSOR NETWORKS USING QUALITY OF SERVICES
Authors : G.RAMYAJAYANTHI, R.MOHANASUNDARAM M.E.,
|
2 |
KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications
Authors : S.Priya, A.T.Ravi
|
3 |
INTEGRATING THE K-OUT-OF-N COMPUTING FRAMEWORK FOR ENERGY EFFICIENT AND FAULT TOLERANT IN MOBI-CLOUD
Authors : P.Sugeertha, P.Umarani,
|
4 |
Privacy-Preserving Public Auditing for Multiple Cloud Service Providers
Authors : S.Indhumathi, K.Mahalakshmi
|
5 |
Enhanced and Energy Efficient Ring Routing Protocol for WSN with Cluster Head and Mobile Sink Node
Authors : K.Kayalvizhi, P.Umarani
|
6 |
RIGHT-PROTECTED DATA PUBLISHING WITH PROVABLE DISTANCE-BASED MINING
Authors : K.Manikam, A.T.Ravi
|
7 |
Monitoring and Prevention of Stealthy Denial of Service Strategy in Cloud Computing
Authors : S.Priyanka, S.Vimalananthi
|
8 |
Secure Image Encryption Algorithm Based on Genetic Operators
Authors : B.Nagarajan, P.Manju
|
9 |
Privacy Policy Inference of User-Uploaded Contents on Social Networking Sites With Parental Control
Authors : S.Vinothkumar, S.Vimalananthi
|
10 |
STUDY ON VARIOUS TECHNIQUES OF TEXT MINING
Authors : M.Arvindhan, S.Prasanna
|
11 |
TIME-DELAYED BROADCASTING FOR DEFEATING INSIDE JAMMERS
Authors : Sooraj K Mohan, P Mallika, Dr.S.Rajalakshmi
|
12 |
GD CLUSTER: A GENERAL DECENTRALIZED CLUSTERING ALGORITHM
Authors : Sreejith P S, T.Sreenivasan, Dr.S.Rajalakshmi
|
13 |
PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE
Authors : Muhammed Mansoor P.M, T.SEENIVASAN, S.RAJALAKSHMI
|
14 |
Effective Wireless Ad-hoc routing communication using APU
Authors : Kavitha.S, K.Loheswaran
|
15 |
AN EFFICIENT FEATURE DISCOVERY AND TERM CLASSIFICATION USING SVM ALGORITHM
Authors : Nisha Ranjani.S, Karthikeyan.K
|
16 |
Threshold Based Energy Efficient Data Transmission inWireless Sensor Network
Authors : M.Sasikala Devi
|
17 |
An Efficient Keyword Searching Based On Hierarchical Index By Using Cluster Management
Authors : DITTU T.CHRISTYANA, K.LOHESWARAN
|
18 |
QUERYING DATA IN WEB DATABASE USING AGGREGATE ESTIMATION WITH E-LEFT DEEP TREE ALGORITHM
Authors : D.suganthi, S.VIMALANANTHI
|
19 |
IMPROVING SELECTIVE CSP FRAMEWORK FOR CLOUD SERVICE USING MULTIFACTORY ANALYSIS MODEL
Authors : A.Revathi, K.Mahalakshmi
|
20 |
PRIVACY PRESERVING WITH ANONYMOUS AUTHENTICATION FOR CLOUD COMPUTING ENVIRONMENT
Authors : S.Thiyagarajan, D.NAMACHIVAYAM
|
21 |
A PUBLIC KEY CRYPTO SYSTEM AND SOME WHAT ENCRYPTION USING PALLIER ALGORITHM
Authors : S.Suriyaa, V.Ramya
|
22 |
Improve Cooperative Load Balancing And Dynamic Channel Allocation For Routing with Cluster Based Moblie Ad hoc Network
Authors : K.Sathiya priya, R.Mohana Sundaram M.E
|
23 |
DISCOVERING FREQUENT ITEM SET USING CONFABULATION-INSPIRED ASSOCIATION RULE MINING
Authors : T. Malathi, Dr. T. Senthil Prakash, P.V. Jothi Kantham
|
24 |
Enhancement of Storage Security and Privacy for Big Data Process using Hybrid Cloud Process
Authors : P. PRAVEEN KUMAR, J. GOKUL RAJ
|
25 |
EFFICIENT JAMMING AWARE TRAFFIC DISTRIBUTION FOR MULTIPLE PATH ROUTING USING PORTFOLIO SELECTION
Authors : B. SATHIYAPRIYA, K.ASHOK KUMAR, M. SAKTHIVEL
|
26 |
Privacy Ensured Information Leakage Control Framework for Cloud Service Providers
Authors : K. Arun, Dr. T. Senthil Prakash,S. Senthilnathan
|