Sl. No. | Paper Title | Authors | Download Paper |
1 | AREA & DELAY EFFICIENT ADDERS FOR ARITHMETIC APPLICATIONS USING QCA | PADIGALA SRINIVASARAO, K.VENKANNA | Download Paper |
2 | CLOUD-ASSISTED CONTENT SHARING NETWORKS ON ATTRIBUTE-BASED ACCESS TO SCALABLE MEDIA | Nunna Saraawathi,S, Santhi Priya | Download Paper |
3 | Design and Implementation of Decimal Matrix Code for Correcting Cell Upsets in Memories | ATHUNURU BHUPALAREDDY, VENKANNA KOTA | Download Paper |
4 | Horizontally Distributed Databases for Secure Mining of Association Rules | MadhaviLatha, DhulipallaRamya Krishna | Download Paper |
5 | Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud | Anusha Jaliparthi, CH. Ravindra Reddy | Download Paper |
6 | Performance of sheltered IC for exposure of Security Hacking Attacks by using Scan Based TPG | K.RAMESH, M.PURNASEKHAR | Download Paper |
7 | Plan and Implementation of BIST for ISCAS-85 c432 Combinational Circuit | G.Lakshmi Divya, N.Praveen Kumar | Download Paper |
8 | A Novel Approach to Discover User Search Goals Using Feedback Sessions | KONAPARTHI CHANDRAKALAVATHI, K.VENKATESWARARAO | Download Paper |
9 | Meta Cloud: Private Cloud as a Service | MIRIYALA PULLARAO, K.VENKATESWARARAO | Download Paper |
10 | Reversible Logic Gates: Less Dissipation Of Heat And Low Power Consumption | M.VENKATESWARA RAO, D.DAYAKAR RAO | Download Paper |
11 | Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks | Dodda Sunitha, Dr.A.Nagaraju, Dr. G.Narsimha | Download Paper |
12 | Propose and Execution of Decimal Matrix Code for Correcting Cell Upsets in Memories | S.RAMESH BABU, T.BABU RAO | Download Paper |
13 | Hiding Of Encrypted Information Using Stochastic Diffusion | Manibharathi B, Rizvana M, Srinivasan R | Download Paper |
14 | Humanizing Queries for Large Scale Image Search | G. CHAKRAPANI, M.VENKATESH NAIK | Download Paper |
15 | Distributed Virtual Switch based Attack Detection and Countermeasure Selection for VM’s | T. PUSHPAVATHI, D. ANUSHA | Download Paper |
16 | Collaborative Node Multi Level Hybrid Security Scheme for Intrusion Detection in MANETS | Katnekaluva Rajendra Babu, P. Namratha | Download Paper |
17 | Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption | T.Preetham, PollankiKusuma | Download Paper |