Issue | Title | |
Vol 1, No 2 (2009) | Reusability of Interfaces for Component-Based Software Development | Abstract |
R. Ravichandran, M. Punithavalli | ||
Vol 3, No 5 (2011) | Reverse Engineering Based Maintenance Prediction Scheme Using Design Complexity Metrics | Abstract |
M. Latha, K. Duraiswamy | ||
Vol 3, No 7 (2011) | Reverse Engineering of Bitlocker External Key Files and Meta Data-A Forensic Need | Abstract |
P. Srinivas Karthik, S. Dija, S. Magesh | ||
Vol 12, No 6-8 (2020) | Review on Lifestyle Trends of Changing Food Habits of Consumers | Abstract |
S. Barr, A Gilg | ||
Vol 7, No 2 (2015) | Review on Multiterm Inverted Index | Abstract |
P. S. Mahajan, A. R. Deshpande | ||
Vol 13, No 3 (2021) | Review Paper on Language Shift | Abstract |
C. Shraddha, Pankaj Dwivedi, S. B. Akshay, R. Ashwin, Dheeraj Ajay Mulegadhe, B. B. Dhanush | ||
Vol 5, No 4 (2013) | Rewriting Common Sub-Expressions for Optimizing Multiple SPARQL Queries | Abstract |
R. Gomathi, C. Sathya, D. Sharmila | ||
Vol 10, No 8 (2018) | Role Conflict and Job Satisfaction of Women in Academics in Selected Universities in Osun State, Nigeria | Abstract |
Adelugba Oluwatoyin, Ogunbameru O. A | ||
Vol 4, No 7 (2012) | Role of Fault Reporting in Existing Software Industry | Abstract |
Sandeep Dalal, Rajender Chhillar | ||
Vol 11, No 2 (2019) | Scalable Access Limitation for Privacy-Aware Media Sharing | Abstract |
B. Gopinathan, S. Shalini, M. Sumithra, V. Thenmozhi | ||
Vol 11, No 5 (2019) | School Administrator – Teacher Relationship: An Indicative Measure on the Learning Achievement of Students on ICT-Based Course | Abstract |
Corazon A. Quintos, Dennis G. Caballes, Edheson M. Gapad | ||
Vol 3, No 12 (2011) | Scope Creep, Scrap & Churn are NOT SINS in Requirements Engineering | Abstract |
S. P. Rahmesh, B. Madhavan | ||
Vol 7, No 5 (2015) | Search Engine Optimizer | Abstract |
A. S. Vinitha, G. Nivetha, M. M. Archana, O. Vinothini | ||
Vol 8, No 4 (2016) | Secure Authentication System for Civil Registry | Abstract |
B. Indhumathy, R. Aktharunisa Begum | ||
Vol 5, No 8 (2013) | Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems | Abstract |
Pavan Kumar Zammalamadaka, Yuva Krishna Aluri | ||
Vol 7, No 2 (2015) | Secure kNN Query Processing in Untrusted Cloud Environments | Abstract |
Devidas S. Thosar, Rajashree D. Thosar, Prashant J. Gadakh | ||
Vol 8, No 6 (2016) | Secured File Sharing in Cloud Computing | Abstract |
M. Deepak, C. Mathan Kumar, D. Suganya | ||
Vol 3, No 5 (2011) | Securing the Database Using SAAS Approach for Banking Application | Abstract |
T. Mythili, V. Venkatesakumar | ||
Vol 8, No 6 (2016) | Security Analysis on Privacy Data Encryption in Many Order Using Magic Number | Abstract |
S. Srilekha | ||
Vol 5, No 12 (2013) | Security and Privacy in Wired, Wireless, Mobile, Hybrid, Sensor and Ad Hoc Networks | Abstract |
M. Faizee Nisha, R. M. Nivedhidha, K. Arul Marie Joycee | ||
Vol 1, No 4 (2009) | Security Over Web Services Using Evidence Based Access Control | Abstract |
E. S. Shameem Sulthana, S. Kanmani | ||
Vol 10, No 7 (2018) | Selenium Test Automation Framework for Web Application | Abstract |
P. Anushree, S. P. Rajamohana | ||
Vol 8, No 1 (2016) | Self-Educating Tool Kit for Kids | Abstract |
Ramesh M. Kagalkar, Kajal Chavan, Asmita Jadhav, Ravina Patil, Asmita Rawool | ||
Vol 3, No 1 (2011) | Semantic Link Based Algorithm for Personalized Web Search | Abstract |
J. Jayanthi, N. Vinodhani, K. S. Jayakumar | ||
Vol 10, No 3 (2018) | Sentiment Analysis on Good Service Tax (GST) Using Twitter Data | Abstract |
G. Raja Meenakshi, V. Srividhya | ||
426 - 450 of 527 Items | First Previous 13 14 15 16 17 18 19 20 21 22 Next Last |
Browse Title Index
Scroll