NHPP MODELS WITH LOG LINEAR LAW BY SIMULATION MODELING
Dr.s.v.n.srinivasu,VOL 6-NO1-PP 3001-3014 (2014)
vol_6-no1-pp_3001-3014_2014.protected.pdf | |
File Size: | 251 kb |
File Type: |
IJCMI-Vol6-No2
Vampire Attacks: Draining Life from Wireless Adhoc Sensor Networks
Shaik Naseeruddin
http://ijctcsit.com/sijcmi/P127Z1D5821.pdf
A scalable server architecture for mobile presence services in social network applications
TIRUVEEDHULA RUPASREE
http://ijctcsit.com/sijcmi/P127Z1D5823.pdf
Enhanced Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
RANGANI HIMA BINDU
http://ijctcsit.com/sijcmi/P127Z1D5817.pdf
SOA Based CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
CHEKURI BRAHMAIAH
http://ijctcsit.com/sijcmi/P127Z1D5804.pdf
Annotating search results from web databases
MUPPARAJU VEERA NARYANA ¹
http://ijctcsit.com/sijcmi/P127Z1D5811.pdf
Distributed cooperative caching in social wireless networks
M.Srikanth yadav ¹
http://ijctcsit.com/sijcmi/P127Z1D5815.pdf
Cloud MOV : Cloud based Mobile TV
BILLA RAVI KUMAR¹
http://ijctcsit.com/sijcmi/P127Z1D5803.pdf
Error tolerant resource allocation and payment
RAJARAPU SRINIVASULU
http://ijctcsit.com/sijcmi/P127Z1D5816.pdf
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
DOODA VENKATA REDDY
http://ijctcsit.com/sijcmi/P127Z1D5808.pdf
Delay based network utility maximization
Nelaturi raja
http://ijctcsit.com/sijcmi/P127Z1D5808.pdf
Scalable and Sharing of Secure health records
SURA RANGASWAMY REDDY
http://ijctcsit.com/sijcmi/P127Z1D5822.pdf
Privacy-Preserving Public Auditing for Secure Cloud Storage
ADIMULAM NAGA PRAVEEN
http://ijctcsit.com/sijcmi/P127Z1D5802.pdf
Access Policy Consolidation For Event Processing Systems
M.NOOR MOHAMMAD ¹
http://ijctcsit.com/sijcmi/127Z1D5814.pdf
http://ijctcsit.com/sijcmi/127Z1D5810.pdf
Fast Data Collection in Tree-Based Wireless Sensor Networks
MANIKANTA N¹
Cloud computing for mobile users can offloading compution save energy
Sk.ASLAM¹
http://ijctcsit.com/sijcmi/127Z1D5820.pdf
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
MAGULURI VIMALA KUMARI¹
http://ijctcsit.com/sijcmi/12351D5836.pdf
Data Extraction Using Automated Information Extraction
Priyanka Popuri¹
http://ijctcsit.com/sijcmi/12U91D5814.pdf
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
V RAVINDRA REDDY UDUMULA
http://ijctcsit.com/sijcmi/127Z1D5824.pdf
A New Key Management Paradigm in Distributed Networks
Rupesh vajra Kumar.k
http://ijctcsit.com/sijcmi/127Z1D5819.pdf
Efficient Dynamic Source Routing Protocol in MANET’s
T.Uday Kiran¹
http://ijctcsit.com/sijcmi/12JU1D5817.pdf
IJCMI-VOL6-NO3
SECURE LOG MANAGEMENT IN CLOUD BY USING AES
Mr. CH.Seshu praveen
cloud_paper.pdf | |
File Size: | 1163 kb |
File Type: |
Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud
I.sriram murthy
new_paper.pdf | |
File Size: | 212 kb |
File Type: |
SNS Based Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
B. Murali Banaala, Y. Dasradh Ram Reddy.
paper1-modified-final.pdf | |
File Size: | 121 kb |
File Type: |
Simulation of Moving Targets and Sensor Direction Finding in Wireless Sensor Networks A. Praveen Kumar , I. Venkateswarlu
paper2-final.pdf | |
File Size: | 129 kb |
File Type: |
Better Safety and Efficiency in Attribute Based Data Sharing G. Kishore Kumar , G.
Sreenivasa Reddy
paper3-final.pdf | |
File Size: | 193 kb |
File Type: |
Enticement Compatible Privacy Protective Data Analysis
Syam Babu. Unnam , V. Srinivasa Reddy
paper4-final.pdf | |
File Size: | 117 kb |
File Type: |
Public Auditing With Privacy for Secure Public Cloud Storage
Seetha Maha Lakshmi.Thopuri , A. Srinivasa Rao
paper5-final.pdf | |
File Size: | 568 kb |
File Type: |