IJCTT-Volume 4 Iss 2 No 2 Issue 2013
|
S.No
|
Title/Author Name
|
Paper Id
|
|
16
|
IJCTT-V4I2P116
|
|
| 17 |
Architecting Service based Sensor Networks for the adept assimilation - R.S.Ponmagal |
IJCTT-V4I2P117 |
| 18 |
An Application of Collaborative Data Mining in Social Network for Viral Marketing - Shalini Sharma,Vishal Shrivastava |
IJCTT-V4I2P118 |
| 19 |
Reliable Data Delivery in Mobile Ad-Hoc Network using Fisheye State Routing - S.Ganesh |
IJCTT-V4I2P119 |
| 20 |
Multicasting Over Manet Through Segmp By Secure Zone Leader Election - Bhavana.B.Turorikar, M.A.Shukla |
IJCTT-V4I2P120 |
| 21 |
Routers Optimization and Minimizing Forwarding States with Explicit Multicast Forwarding - D.Evangelin, J.Jelsteen, J.Alice Pushparani, J.Nelson Samuel Jebastin |
IJCTT-V4I2P121 |
| 22 |
- Amruta Mantri, Priyanka Nawale, Trupti Pardeshi, Rajeshwary Shisode, Reena Pagare |
IJCTT-V4I2P122 |
| 23 |
Dual Encryption Schema With Cheating Text and NTRU - Jagadeeshbabu.G, Rakesh Nayak |
IJCTT-V4I2P123 |
| 24 |
Secure Mobile System Using NTRU Encrypt - Ramanjaneyulu.S, Rakesh Nayak |
IJCTT-V4I2P124 |
| 25 |
A Overview of Software Verification & Validation and Selection Process - Omprakash Deshmukh, Mandakini Kaushik |
IJCTT-V4I2P125 |
| 26 |
A Comparative Study of Various Parallel Longest Common Subsequence Algorithms - M.V.Ramakrishnan, Prof.Mrs.Sumathy Eswaran |
IJCTT-V4I2P126 |
| 27 |
- Skimpy Garg, Jagpreet Kaur |
IJCTT-V4I2P127 |
| 28 |
Spectral Flatness Measurements for Detection of C-Worms - Rajesh Jaladi , Mr. Rakesh Nayak |
IJCTT-V4I2P128 |
| 29 |
Data Security and Privacy in Data Mining: Research Issues & Preparation - Dileep Kumar Singh, Vishnu Swaroop |
IJCTT-V4I2P129 |