Volume 11 Issue 3 – November 2014
Sl. No. | Paper Title | Authors | Download Paper |
1 | Propose and Implementation of BIST for Combinational Circuit | Myneedi Prasannanjaneyulu, K.Venkanna | Download Paper |
2 | Fixed Angle of Rotation Using CORDIC Designs | K.Vinod Kumar, K.Venkanna | Download Paper |
3 | A Novel On-Chip Permutation Network design for Multiprocessor System On-Chip | Jagadeesh Vemula, K RaviBabu | Download Paper |
4 | A Novel Approach for Designing and Implementation of Cross-Domain Cooperative Firewall | Y.CHANDRAKALA, A. KIRAN KUMAR | Download Paper |
5 | MAMMOGRAM IMAGE SEGMENTATION-A SHORT SURVEY | S.Chidambaranathan | Download Paper |
6 | Secure Patient-Centric PHRs management in Cloud computing using ABE | G.Hima bindu, Shaik Mahaboob Basha | Download Paper |
7 | An outline of Adaptive Mobile Video Streaming and well-organized Social Video Sharing in the Clouds | JANNU SIVA JYOTHI, G.V RAMANA | Download Paper |
8 | A Novel Approach to resourceful Management of Resources in Cloud Computing Using VMs | ALLU MUTHA REDDY, Shaik Mahaboob Basha | Download Paper |
9 | A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks | BHARAT.VEERLA, SREERAMA MURTHY | Download Paper |
10 | Privacy- and Integrity-Preserving Range Queries in Sensor Networks | CHATLA.LEELA SHANKAR, G.V RAMANA | Download Paper |
11 | A Novel System to Filter Unessential Messages From OSN User Wall | MEDA SRINU, B.Prudhvi | Download Paper |
12 | Combining Cryptographic Primitives to avoid overcrowding Attacks in Wireless Networks | MULAGIRI.GOPINATH, CH.RAVINDRA REDDY | Download Paper |
13 | MULTI-USER ACCESS CONTROL IN OSN | K.Madhuri, CH.Mastan Rao | Download Paper |
14 | MC: A Novel Technique to Solve Vendor Lock Problem in Hybrid & Public Cloud | L.Venkata Lakshmi, K.Venkataramaiah | Download Paper |
15 | A Novel Design of 2-D Finite Impulse Response Filters with Reduced Memory Footprint | V.SRAVYA TEJA, D.HEMA | Download Paper |
16 | A Novel Effective Technique to Design Identify Malicious Nodes in MANET | D.Lavanya, K.Venkataramaiah | Download Paper |
17 | Cipher Text-Policy Attribute based Encryption for Secure Data Retrieval in Disruption-Tolerant Military Networks (DTN) | K. Kalaiselvi, B.Kabilarasan | Download Paper |
18 | ON MODELING OF CAMOUFLAGING WORM | Tulasi Nagulancha, Lalitha Kurma | Download Paper |
19 | A Novel Access Control Scheme for Sharing Scalable Media for Content Sharing Networks | NAGARAJU TANNEERU, M.SREERAMA MURTHY | Download Paper |
20 | A novel Idea to facilitate Effective User Navigation through Restructuring the Website | VARDHIBOINA JYOTHI, B.PRUDHVI | Download Paper |
21 | A Novel Load Balancing Model to Improve Te Efficiency of Cloud Computing | Mandapatisandhya Rani, M.Sreerama Murthy | Download Paper |
22 | A Novel Method of Public Auditing with Privacy preserving for Secure Cloud Storage | Ananda Rao Medanki, G.V Ramana | Download Paper |
23 | Random Query Formulation for Database Queries | G.N.V.Kusuma Sravani, M.Sreerama Murthy | Download Paper |
24 | Incentive Framework for Cellular Traffic Offloading In DTN | Kanitha.V, Neeraja. A, Srinivasan. R | Download Paper |
25 | Secure Mining of Association Rules in Horizontally Distributed Databases using Fast Distributed Mining | Vasanthakumar. P, Jayasudha. R, Srinivasan. R | Download Paper |
26 | Anomaly Detection via Online Oversampling Principal Component Analysis | R.Sundara Nagaraj, C.Anitha,K.K.Kavitha | Download Paper |
27 | Bandwidth Allocation for Vehicular Mobile Computing Using QOS | P.Jayamurugan, Dr.A.Kangaiammal,K.K.Kavitha | Download Paper |
28 | Comparative Evaluation of Web Image Search Engines in Multimedia Applications for Mining Necessary Images using Markov Chains | P.Mohanapriya, Dr.A.Kangaiammal, K.K.Kavitha | Download Paper |
29 | Detecting Spoofing Intruders for Hierarchical Ad Hoc Sensor Networks | S.Revathi, T.R.Vithya, K.K.Kavitha | Download Paper |