Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
  • J. Thangakumar
  • Computer Science & Information Technology
  • 1, 1, December, 2011

  • AN ENHANCED PRE-PROCESSING RESEARCH FRAMEWORK FOR WEB LOG DATA USING A LEARNING ALGORITHM
  • V.V.R. Maheswara Rao
  • Computer Science & Information Technology
  • 1, 1, October, 2011

  • Review on Models for Generalized Predictive Controller
  • Ganesh. U. L
  • Computer Science & Information Technology
  • 1, 2, March, 2011

  • Employing Neocognitron Neural Network Base Ensemble Classifiers To Enhance Efficiency of Classification In Handwritten Digit Datasets
  • Neera Saxena
  • Computer Science & Information Technology
  • 1, 2, January, 2011

  • CISCO SYSTEM’S STRATEGIC USE OF THE INTERNET AND BUSINESS APPLICATIONS
  • Raju Vijaya
  • Computer Science & Information Technology
  • 1, 2, November, 2011

  • Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Predistribution using Reed Solomon Code
  • Aritra Dhar
  • Computer Science & Information Technology
  • 1, 2, September, 2011

  • INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
  • Thinn Mya Mya Swe
  • Computer Science & Information Technology
  • 1, 2, September, 2011

  • LANE CHANGE DETECTION AND TRACKING FOR A SAFE-LANE APPROACH IN REAL TIME VISION BASED NAVIGATION SYSTEMS
  • Gayathiri Somasundaram
  • Computer Science & Information Technology
  • 1, 2, August, 2012

  • EFFICIENCY OF DECISION TREES IN PREDICTING STUDENT’S ACADEMIC PERFORMANCE
  • S. Anupama Kumar
  • Computer Science & Information Technology
  • 1, 2, June, 2011

  • SPEECH CLASSIFICATION USING ZERNIKE MOMENTS
  • Manisha Pacharne
  • Computer Science & Information Technology
  • 1, 2, September, 2011

  • SPEECH CLASSIFICATION USING ZERNIKE MOMENTS
  • Manisha Pacharne
  • Computer Science & Information Technology
  • 1, 2, July, 2011

  • COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
  • Udai Pratap Rao
  • Computer Science & Information Technology
  • 1, 2, May, 2011

  • DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
  • Kameswara Rao
  • Computer Science & Information Technology
  • 1, 2, July, 2011

  • An Uncompressed Image Encryption Algorithm Based on DNA Sequences
  • Shima Ramesh Maniyath
  • Computer Science & Information Technology
  • 1, 2, June, 2011

  • THERMAL MODELING AND ANALYSIS OF 3- DIMENSINAL MEMORY INTEGRATION
  • Annmol Cherian
  • Computer Science & Information Technology
  • 1, 2, May, 2011

  • DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTURES – WEB SERVICES CASE STUDY
  • M.Upendra Kumar
  • Computer Science & Information Technology
  • 1, 2, September, 2014

  • ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR NETWORKS
  • Ablah AlAmri
  • Computer Science & Information Technology
  • 9, 6, December, 2017

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals