Evaluating Quality of Software Component using Metrics |
Gagan Prakash Negi |
Vol 14 (2015), Pagination: 1-10
|
ABSTRACT |
PDF
|
|
Abstract Views: 240 |
PDF Views: 0
|
Keyword Based Search and Its Consequences |
Dharminder Singh, Ashwani Sethi |
Vol 14 (2015), Pagination: 11-15
|
ABSTRACT |
PDF
|
|
Abstract Views: 239 |
PDF Views: 0
|
Semantic Web Based Technique for Network Security Situation Awareness Status Prediction |
Pardeep Bhandari, Manpreet Singh |
Vol 14 (2015), Pagination: 16-22
|
ABSTRACT |
PDF
|
|
Abstract Views: 227 |
PDF Views: 5
|
A Comparative Approach to Search Engine Ranking Strategies |
Dharminder Singh, Ashwani Sethi |
Vol 14 (2015), Pagination: 26-33
|
ABSTRACT |
PDF
|
|
Abstract Views: 338 |
PDF Views: 0
|
Green Computing: A Demand of Time |
Gagan Prakash Negi, Hemant Kapoor, Amit Kapoor |
Vol 14 (2015), Pagination: 34-36
|
ABSTRACT |
PDF
|
|
Abstract Views: 251 |
PDF Views: 0
|
Adventures in MF Authentication |
Thamraj Ghorsad, Swati Sonune |
Vol 14 (2015), Pagination: 37-46
|
ABSTRACT |
PDF
|
|
Abstract Views: 253 |
PDF Views: 0
|
A Review Onschemes for User Authentication |
Thamraj N. Ghorsad, R. S. Pippal, Badri Prasad Patel |
Vol 14 (2015), Pagination: 47-56
|
ABSTRACT |
PDF
|
|
Abstract Views: 206 |
PDF Views: 1
|
Implementation of Hybrid Authentication System Based on Sound Signature and Graphics for User Authentication |
Thamraj N. Ghorsad, R. S. Pippal, Badri Prasad Patel |
Vol 14 (2015), Pagination: 57-64
|
ABSTRACT |
PDF
|
|
Abstract Views: 223 |
PDF Views: 0
|