INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING Jan-Feb 2014 Volume-4, Issue-1

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1Efficient Adaptive Background Subtraction Based On Multi - Resolution Background Modeling and Updating
Mrs. S.Hemalatha, Mr. A. Sreenivasa Rao
IJRCSE/V4/1-501Download
2Scalable and Protected Sharing of Customer Medical Records in Cloud
Dr. Naga Srinivasu V. Sirasanagondla
IJRCSE/V4/1-502Download
3Maximization of Profit in Cloud Computing Using M/M/M Queuing Model
Pragna.D, M.Rajasekaran
IJRCSE/V4/1-503Download
4Efficiently Eliminating Inconsistency and Redundancy in Web Service Policies
Swathi.Molakalapalli, Kanmani S P
IJRCSE/V4/1-504Download
5Embedded Extended Visual Cryptography Schemes for Sharing Secret Images using Halftone Algorithm
Mrs. Uppalapati Srilakshmi, Mr. Jampani Satish Babu, Mr. Kancherla Balakrishna
IJRCSE/V4/1-505Download
6Privacy Awareness Of Spam E-Mails
P.Anusha Reddy
IJRCSE/V4/1-506Download
7 An Unobservable Routing Protocol without Worm Hole Attack
Divya Babu, Shanthi M
IJRCSE/V4/1-507Download
8 Personalized Mobile Search Engine using Click through Data
Sunil Kumar Arutla, Naveen Adusumilli
IJRCSE/V4/1-508Download
9 A System For Filtering Unwanted Messages From Online Social Network (OSN) User Walls Using Machine Learning Techniques
Gabbeta Srishyalam, Sateesh Nagavarapu
IJRCSE/V4/1-509Download
10 Discovering Of Misbehaving Forwards By Using Node Categorization Algorithm
Gummadi Vijaya Kumar, P Satya Narayana
IJRCSE/V4/1-510Download
11 Improving Embedding Capability Of Digital Stegno Images
Suresh Medapati, Medida Nagaraju
IJRCSE/V4/1-511Download
12 Mitigate the Gang Injecting False Data Attack in Wireless Sensor Networks
Potula Vijaya Kumar, Prof. B.R.Sarat Kumar
IJRCSE/V4/1-512Download
13 Type Ahead Keyword Query Search In Text
Philip Navadeep Kurakula, P Satya Narayana
IJRCSE/V4/1-513Download
14 Professionally Measuring Similarities between Objects in Dissimilar views of Hierarchical Clustering
B.Pradeep, K.John Paul
IJRCSE/V4/1-514Download