Categories

Full-Text AvailableAbstract Only

Show:
Sort By:
       181. Parallel 2-Approximation algorithm to solve Travelling Salesman Problem
Rajnish Dashora and Shiven Saiwal
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       182. Secure storage of data in cloud
Sai Krishna Manohar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       183. The security of elliptic curve cryptography over RSA cryptography
G. Jai Arul Jose and C. Sajeev
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       184. A comparative study of buffer overflow anomaly in Java using findbugs, PMD and checkstyle
R.Singh, Rajnish Dashora and Shiven Saiwal
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       185. A Survey on Intrusion Detection Techniques and Real Time Traffic Analysis Mechanism
Mahendra Rai and Gyanendra Haldkar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       186. An overview of H.26x series and its applications
S.Vetrivel
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       187. Balancing SNS through Visualization
Dr. Latika Kharb
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       188. Multi Relational Learning (Classification) Based on Relation Data Using Weighted Voting Combination Technique
Amit Thakkar and Y P Kosta
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       189. A Comparison of Amazon Elastic Mapreduce and Azure Mapreduce
Bahman Rashidi, Esmail Asyabi and Talie Jafari
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       190. A Novel Approach to Distorted English Character Recognition Using Back Propagation Neural Network
Nachamai M, Joy Paulose, Ancy Kuruvilla, Nisha G and Sutha Devi S
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology