Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
AUTHENTICATION AND KEY AGREEMENT IN 3GPP NETWORKS
Krishna Prakash
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
SINGLE IMAGE FOG REMOVAL BASED ON FUSION STRATEGY
V. Thulasika
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
ENHANCEMENT AND SEGMENTATION OF HISTORICAL RECORDS
Soumya A
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
HASHTAG RECOMMENDATION SYSTEM IN A P2P SOCIAL NETWORKING APPLICATION
Keerthi Nelaturu
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
FAULT-TOLERANCE AWARE MULTI OBJECTIVE SCHEDULING ALGORITHM FOR TASK SCHEDULING IN COMPUTATIONAL GRID
Dinesh Prasad Sahu
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
STABLE DRUG DESIGNING BY MINIMIZING DRUG PROTEIN INTERACTION ENERGY USING PSO
Anupam Ghosh
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS
Deepa B
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
WEB MINING BASED FRAMEWORK FOR ONTOLOGY LEARNING
C.Ramesh
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
TURNOVER PREDICTION OF SHARES USING DATA MINING TECHNIQUES: A CASE STUDY
Shashaank D.S
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
TOPIC MODELING: CLUSTERING OF DEEP WEBPAGES
Muhunthaadithya C
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
DESIGNING A ROUTING PROTOCOL FOR UBIQUITOUS NETWORKS USING ECA SCHEME
Chandrashekhar Pomu Chavan
Computer Science & Information Technology
Volume 5, Number 13, July, 2015
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
P. Sardey
Computer Science & Information Technology
Volume 5, Number 15, August, 2015
SDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
Anandi Giridharan
Computer Science & Information Technology
Volume 5, Number 14, August, 2015
HIERARCHICAL DEEP LEARNING ARCHITECTURE FOR 10K OBJECTS CLASSIFICATION
Atul Laxman Katole
Computer Science & Information Technology
Volume 5, Number 14, August, 2015
IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP
LIU Ying
Computer Science & Information Technology
Volume 5, Number 14, August, 2015
THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIA
Abdullah Alhammadi
Computer Science & Information Technology
Volume 5, Number 14, August, 2015
X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE DECISION TREE IN ARTIFICIAL NEURAL NETWORKS
Awudu Karim
Computer Science & Information Technology
Volume 5, Number 14, August, 2015
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129