INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING Oct-Nov 2013 Volume-3, Issue-1

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1A Novel Approach for Providing Security to Cloud Computing
Shaik Rafi, J.V.AnilKumar
IJRCSE/V3/1-301Download
2Fastest & Efficient Image Searching from Large Scale Image Collection
Venkata Pavan Kumar Bonam, V.N.S Vijay Kumar
IJRCSE/V3/1-302Download
3An Efficient and Secure Data Publishing
Gurram Eswara Prasad, Nagaraju Medida
IJRCSE/V3/1-303Download
4Efficiently Identifying User Behaviors in Social Networks
Pullaiah Pinnika, G.Anantha Rao
IJRCSE/V3/1-304Download
5A New Approach to Protect the Location Privacy in Sensor Networks
N.Nalini, B. Purushotham
IJRCSE/V3/1-305Download
6Web Content Management by Using Mobile Management System
S. Ravi, A.Syamprasad
IJRCSE/V3/1-306Download
7Scalable and Strong Protection of Cloud Data for the Masses
Moses Sandepudi, Mr. G. Satish
IJRCSE/V3/1-307Download
8Background subtraction based on Local Shape
J.Dhanaji, T.Padmaja
IJRCSE/V3/1-308Download
9Ensuring Distributed Accountability for Data sharing in the Cloud through ip blocking
Merugumalli. Suresh Babu, Vulli Ganesh Dutt
IJRCSE/V3/1-309Download
10Efficiently Grouping the Similar Behaviours in Social Media Network
B.Rama Deepthi, A.Srinivasa Reddy
IJRCSE/V3/1-310Download
11SNRM-Implementation of Security by Non-Observable Routing in MANET
M. Shirisha, K. Ashok Babu
IJRCSE/V3/1-311Download
12Design of Qos Oriented Secure Data Transmission Protocol in MANET
Mohan Babu.S, B.Sandhya
IJRCSE/V3/1-312Download
13Influence of Enhanced MANET protocol in VANET
D. Anuradha, Prashanth Pise
IJRCSE/V3/1-313Download
14Fast Data Collection in Energy Aware Wireless Sensor Networks
Lokesh Kumar Alla
IJRCSE/V3/1-314Download
15A Novel Approach To Accountability For Data Sharing in The Cloudcomputing
V.Srinivasareddy, K.Srinivasa Rao, M.Sridevi
IJRCSE/V3/1-315Download
16Privacy Preserving Data Publishing Using Slicing
P.Sowmya Sri, R.Lakshmi Tulasi
IJRCSE/V3/1-316Download
17Iterative Joint Sentiment Topic Extraction from Text
V.Swaroopa, V.Vidya Sagar
IJRCSE/V3/1-317Download
18Data Sharing In Cloud Based On Advanced Encryption Standards and Assuring For Accountability
Boddupalli Datta Kiran, Bala Krishna Yakkala
IJRCSE/V3/1-318Download
19A Survey of Framework for Implementing a Trust Aware Routing Of WSN
Nelofer Amreen, S.P.Anandaraj, S.Poornima, K.Johnson
IJRCSE/V3/1-319Download
20File Sharing and Correlation in Unstrusted Peer-To-Peer Network
K.Yallareddy, Navnath Kale
IJRCSE/V3/1-320Download
21A Secure Sharing Of Personal Health Information Using Attribute Based Encryption
Shriharsh Mandava, K. Nageshwara Rao
IJRCSE/V3/1-321Download
22Building Trust Between Outsource R and Worker with Payments of Outsourced Computation
K.Shalivahan Reddy, K. Nageshwara Rao
IJRCSE/V3/1-322Download
23Control the Congestion and Traffic Using Priority and Admission Control Algorithms
D.Udayadurgarani, Dr. P. Harini
IJRCSE/V3/1-323Download
24Sync: Two Words Zero Retransmission to Overhead to an Approach of Retransmission
K.Moinuddin, Mr. N Pavan Kumar, Ms.Vajeeda Sultana
IJRCSE/V3/1-324Download
25Packet Switched Networks Forwarding in Social Mobile Wireless Networks of Selfishness
Sana Ahmadi, Mr. N Pavan Kumar, Mr. M N A Baig
IJRCSE/V3/1-325Download
26Spot: Spam Zombies Detection Monitoring Outgoing Messages
Vasu Babu Gavini , B.Sreenivasa Rao
IJRCSE/V3/1-326Download