Issue | Title | |
Vol 4, No 11 (2016): November | The Associated User Query Creation to Minimize Annoying Results from Web | Abstract PDF [Full Text] |
Lenka Usha Mounika, G.V.L Narayana | ||
Vol 3, No 11 (2015): November | The cloud Approach for Consistent Appropriate deduplication | Abstract PDF [FULL TEXT] |
Alamuri Dheeraj, P Krishna Sai | ||
Vol 3, No 10 (2015): October | The cloud Methodology for Reliable approved deduplication | Abstract PDF[FULL TEXT] |
Ravi Raj Kuna, R Chandra sekhar | ||
Vol 5, No 3 (2017): March | The Competent Service Management and Reliable Trustworthiness in Cloud Environment | Abstract PDF [Full Text] |
Kilari Prasanna, Dasari Ravi Kumar | ||
Vol 5, No 4 (2017): April | The Data Storage and Assured Sharing Methodology among Differing Groups in Cloud Computing | Abstract PDF [Full Text] |
Polumahanti Sinddhuri, Ganiya Rajendra Kumar | ||
Vol 5, No 12 (2017): December | The Decentralized Probabilistic Method for Resource Sharing and Encrypted Data Stored In the Cloud | Abstract PDF[Full Text] |
T Tejeswi, N Seetayya | ||
Vol 2, No 12 (2014): December | The Dynamic Load Balancing Method On Game Theory For Distributed Systems | Abstract PDF[FULL TEXT] |
Lakshmi Sowjanya Sivalenka, CH Hemanandh, K.T.V Subbarao | ||
Vol 4, No 12 (2016): December | The Effect of Aggregate Gradation on Design Mix using Modified Bitumen | Abstract PDF [Full Text] |
Akash Kumar Naik, Barsha Baishali Malla | ||
Vol 6, No 7 (2018): July | The Efficient Adaptive Pre-Encoded Multipliers Based on (NR4SD) Encoding for Digital Signal Processing Applications | Abstract PDF [Full Text] |
Guggilla.Satya Sudha, Chintha.Sri Pothu Raju | ||
Vol 7, No 8 (2019): August- 2019 | The Efficient and probabilistic symmetric searchable encryption scheme in Cloud | Abstract PDF [Full Text] |
D. Vijaya Durga, A.P.V.D.L. Kumar | ||
Vol 5, No 7 (2017): July | The Enriched Object Oriented Software processes for Software Fault Prediction | Abstract PDF [Full Text] |
T Ravi Kumar, T Srinivasa Rao | ||
Vol 12, No 1 (2024): May - June | The Evolution and Impact of Cryptocurrencies on Global Financial Systems: Technological Foundations, Current Applications, and Future Challenges | Abstract PDF [Full Text] |
Boddu Laxman, Gudi V. Chandra Sekhar, Pal Both Dol | ||
Vol 4, No 5 (2016): May | The Evolution of Microprocessor Chip: A historic overview of development | Abstract PDF [Full Text] |
Waqar Ahmad Jang, Waseem Khan, Sadawat Shah, Aadil Ahmad | ||
Vol 4, No 8 (2016): August | The Instinctive Outline towards Online Shortest Path | Abstract PDF [Full Text] |
T.Chandana Gouri | ||
Vol 3, No 10 (2015): October | The Methodology To Underrate Routing Incursion In Informatics Networks | Abstract PDF [Full Text] |
Gopala Krishna T, Sai M | ||
Vol 4, No 12 (2016): December | The Multi Owner Data Distribution using Identity Based Encryption on Cloud Storage | Abstract PDF [Full Text] |
V.R.S.S.D Sireesha, A Vishnupriya | ||
Vol 9, No 2 (2021): February | The multi storage Protocol with Ranked Multi-Keyword Search in Cloud | Abstract PDF [Full Text] |
Jala Prasadarao, M V V B S Kiran | ||
Vol 5, No 6 (2017): June | The Need Of Financial Statement Analysis In A Firm/An Orgnization | Abstract PDF [Full Text] |
G Suneetha | ||
Vol 6, No 1 (2018): January | The Probabilistic Methodology for Distinguishing Node Failures in Mobile Wireless Networks | Abstract PDF[Full Text] |
Ch Sri Krishna Satyanarayana Swamy, K.C. Pradeep | ||
Vol 2, No 11 (2014): November | The Process to disable ADHOC wireless sensor networks by depleting power using routing protocols | Abstract PDF[FULL TEXT] |
N Santoshi Lakshmi, M V.V.S.Narayana Murthy | ||
Vol 5, No 8 (2017): August | The Protected Optimization Totaling Outsourcing In A Case Study Of Linear Programming | Abstract PDF [Full Text] |
M Yuva Surya Rani, G. Krupa Havilah, M. Veerabhadra Rao | ||
Vol 3, No 9 (2015): September | The Quality Demonstration projected in Cloud supervisions | Abstract PDF[FULL TEXT] |
K Sireesha, M Radhika | ||
Vol 5, No 7 (2017): July | The Revocation Mechanism Of A Be Scheme Into Asymmetric GKA | Abstract PDF [Full Text] |
A. Anuradha, B.Sai Chandu | ||
Vol 6, No 12 (2018): December | The Secured Cloud Storage with Efficient Key Generation in cloud computing | Abstract PDF [Full Text] |
K Surya Kranthi, Kakarla Ravi kumar | ||
Vol 7, No 8 (2019): August- 2019 | The Secured Data Sharing For Multiauthority Access in Cloud Storage | Abstract PDF [Full Text] |
R.N.D.S.S. Lakshmi, B.V. Ram Kumar | ||
1001 - 1025 of 1079 Items | << < 36 37 38 39 40 41 42 43 44 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â