Categories

Full-Text AvailableAbstract Only

Show:
Sort By:
       211. Comparison of several cloud computing providers
Khyati Kothari
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       212. Distributed virtual machine allocation using DRR algorithm in cloud computing
Santhi.K and Priyadarshini.C
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       213. Do the sentiments on the net really matter?
Vanipriya and Thammireddy.K
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       214. Energy Saving Scheme for Wormhole Detection & Prevention in MANET & Sensor Networks
Pratima Singh, Ashish Srivastava and Nitesh Gupta
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       215. Phishing URL Detecting Using ANN Classification In Online Social Network
Vaibhav V. Satane and Rohit N. Devikar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       216. A Novel Nanometric Efficient Reversible Low Power Parity Preserving Full Adder/Subtractor
Ali Bolhassani, Mahdiar Ghadiry, Soudabeh Boroumand and Nayereh Hosseininia
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       217. An empirical study on secure and multiple web service collaborations
Nalini Priya.G, M V Rathnamma and Balamurugan Balusamy
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       218. A comparative survey of routing protocols in mobile ad hoc networks
S.Senthilkumar and B.Ananthampillai
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       219. A concept graph for rough set theory
B.Sankara Subramanian
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       220. An Overview on Different Techniques used in Intrusion Detection
Ashish Kumar, Deepesh Rawat and Ankit Aswal
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology