Issue | Title | |
Vol 5, No 5 (2013) | Android Programming:Remote Access to Customer Information for Cable Operators | Abstract |
Sudhanshu Jiteshkumar Vora, N. Showme, Sai Kishore Gorege, S. T. S. Subhash Krishna | ||
Vol 11, No 8 (2019) | Android-Based Attendance System | Abstract |
T. E. Somefun, A. Abdulkareem, C. O. A. Awosope, C. T. Somefun, O. Ipinyemi | ||
Vol 8, No 3 (2016) | Anomaly Based Intrusion Detection Network System | Abstract |
Rucha Sonawane, Trushali Tajane, Pooja Chavan, Samiksha Mali, Preeti Joshi | ||
Vol 2, No 7 (2010) | Applicability of Control Charts in Software Processes | Abstract |
G. Vijaya, S. Arumugam | ||
Vol 1, No 5 (2009) | Applicability of Control Charts in Software Processes | Abstract |
G. Vijaya, S. Arumugam | ||
Vol 1, No 2 (2009) | Applicability of Control Charts in Software Processes | Abstract |
G. Vijaya, S. Arumugam | ||
Vol 4, No 3 (2012) | Application of Artificial Neural Network for Procedure and Object Oriented Software Effort Estimation | Abstract |
Jagannath Singh, Bibhudatta Sahoo | ||
Vol 4, No 11 (2012) | Application of SPC in CMM Level 3 Companies to Improve Process Capability with Respect to Effort Deviation and Schedule Deviation | Abstract |
R. Ravichandran, M. Punithavalli, V. Vijayalakshmi | ||
Vol 5, No 8 (2013) | Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography | Abstract |
Tarun Dhar Diwan, Aaqib Rshid, Vinay Sahu | ||
Vol 13, No 3 (2021) | Application Performance Management Using Pull-based Methodology | Abstract |
D. Salangai Nayagi, M. Chandana, Nivedita Adiveppa Kagi, KS. Shri Gowri | ||
Vol 5, No 12 (2013) | Applications of Data Mining Techniques in Higher Education | Abstract |
B. Shathya | ||
Vol 10, No 6 (2018) | Applying of Clod Computing Strategy in Risk Management | Abstract |
R. K. Meenakshi | ||
Vol 3, No 8 (2011) | Applying Services Orchestration on Loan E-Market | Abstract |
V. Portchelvi, V. Prasanna Venkatesan | ||
Vol 1, No 2 (2009) | Applying Voice Analytics in Contact Centre Services | Abstract |
A. Gurusankar, Rajeswari Sridhar | ||
Vol 4, No 3 (2012) | Arabic Speech Recognition by MFCC and Bionic Wavelet Transform Using a Multi Layer Perceptron for Voice Control | Abstract |
M. Ben Nasr, M. Talbi, A. Cherif | ||
Vol 12, No 11-12 (2020) | Artificial Intelligence and Software based models for Cancer Prediction System | Abstract |
F. Werblin, X. Zhu | ||
Vol 2, No 2 (2010) | Assessment of Software Quality through Object Oriented Metrics | Abstract |
E. Chandra, P. Edith Linda | ||
Vol 10, No 4 (2018) | Assorted Database Query Methodology in DB2 Universal Data Joiner | Abstract |
L. Kathirvelkumaran, R. Muralidharan | ||
Vol 2, No 9 (2010) | Augmenting CMM Model to Measure and Enhance Quality of Education | Abstract |
E. Chandra, D. Francis Xavier Christopher, S. D. Vijaykumar | ||
Vol 8, No 2 (2016) | Augmenting Institutional Management Portal for Cross Platform Computing Using Apache Cordovo (Phonegap) & PHP | Abstract |
S. Dineshwaran, K. Karthik Raj, T. Mohan Raj, P. Yuvaraj | ||
Vol 13, No 1 (2021) | Authentication and Fraud Detection | Abstract |
V. Sneka | ||
Vol 5, No 12 (2013) | Automated Behavioral & Acceptance Testing of Refactoring Engines | Abstract |
M. Sheela, C. RubyGnanaselvam | ||
Vol 3, No 3 (2011) | Automated Test Case from UML Diagram Using Data Mining Approach | Abstract |
A. V. K. Shanthi, G. Mohan Kumar | ||
Vol 3, No 6 (2011) | Automated Test Cases Generation from UML Class Diagram with Genetic Operator | Abstract |
A. V. K. Shanthi, D. Parthiban, G. Mohan Kumar | ||
Vol 3, No 6 (2011) | Automated Tool to Calculate Complexity of Object Oriented Program | Abstract |
Karan Dhadge, Reena Pagare, Saurabh Karajgikar, Anand Magadum, Chakreshprasad Mahajan | ||
151 - 175 of 527 Items | First Previous 2 3 4 5 6 7 8 9 10 11 Next Last |
Browse Title Index
Scroll