Issue | Title | |
Vol 5, No 3 (2017): March | The Competent Service Management and Reliable Trustworthiness in Cloud Environment | Abstract PDF [Full Text] |
Kilari Prasanna, Dasari Ravi Kumar | ||
Vol 5, No 4 (2017): April | The Data Storage and Assured Sharing Methodology among Differing Groups in Cloud Computing | Abstract PDF [Full Text] |
Polumahanti Sinddhuri, Ganiya Rajendra Kumar | ||
Vol 5, No 12 (2017): December | The Decentralized Probabilistic Method for Resource Sharing and Encrypted Data Stored In the Cloud | Abstract PDF[Full Text] |
T Tejeswi, N Seetayya | ||
Vol 2, No 12 (2014): December | The Dynamic Load Balancing Method On Game Theory For Distributed Systems | Abstract PDF[FULL TEXT] |
Lakshmi Sowjanya Sivalenka, CH Hemanandh, K.T.V Subbarao | ||
Vol 4, No 12 (2016): December | The Effect of Aggregate Gradation on Design Mix using Modified Bitumen | Abstract PDF [Full Text] |
Akash Kumar Naik, Barsha Baishali Malla | ||
Vol 6, No 7 (2018): July | The Efficient Adaptive Pre-Encoded Multipliers Based on (NR4SD) Encoding for Digital Signal Processing Applications | Abstract PDF [Full Text] |
Guggilla.Satya Sudha, Chintha.Sri Pothu Raju | ||
Vol 7, No 8 (2019): August- 2019 | The Efficient and probabilistic symmetric searchable encryption scheme in Cloud | Abstract PDF [Full Text] |
D. Vijaya Durga, A.P.V.D.L. Kumar | ||
Vol 5, No 7 (2017): July | The Enriched Object Oriented Software processes for Software Fault Prediction | Abstract PDF [Full Text] |
T Ravi Kumar, T Srinivasa Rao | ||
Vol 4, No 5 (2016): May | The Evolution of Microprocessor Chip: A historic overview of development | Abstract PDF [Full Text] |
Waqar Ahmad Jang, Waseem Khan, Sadawat Shah, Aadil Ahmad | ||
Vol 4, No 8 (2016): August | The Instinctive Outline towards Online Shortest Path | Abstract PDF [Full Text] |
T.Chandana Gouri | ||
Vol 3, No 10 (2015): October | The Methodology To Underrate Routing Incursion In Informatics Networks | Abstract PDF [Full Text] |
Gopala Krishna T, Sai M | ||
Vol 4, No 12 (2016): December | The Multi Owner Data Distribution using Identity Based Encryption on Cloud Storage | Abstract PDF [Full Text] |
V.R.S.S.D Sireesha, A Vishnupriya | ||
Vol 9, No 2 (2021): February | The multi storage Protocol with Ranked Multi-Keyword Search in Cloud | Abstract PDF [Full Text] |
Jala Prasadarao, M V V B S Kiran | ||
Vol 5, No 6 (2017): June | The Need Of Financial Statement Analysis In A Firm/An Orgnization | Abstract PDF [Full Text] |
G Suneetha | ||
Vol 6, No 1 (2018): January | The Probabilistic Methodology for Distinguishing Node Failures in Mobile Wireless Networks | Abstract PDF[Full Text] |
Ch Sri Krishna Satyanarayana Swamy, K.C. Pradeep | ||
Vol 2, No 11 (2014): November | The Process to disable ADHOC wireless sensor networks by depleting power using routing protocols | Abstract PDF[FULL TEXT] |
N Santoshi Lakshmi, M V.V.S.Narayana Murthy | ||
Vol 5, No 8 (2017): August | The Protected Optimization Totaling Outsourcing In A Case Study Of Linear Programming | Abstract PDF [Full Text] |
M Yuva Surya Rani, G. Krupa Havilah, M. Veerabhadra Rao | ||
Vol 3, No 9 (2015): September | The Quality Demonstration projected in Cloud supervisions | Abstract PDF[FULL TEXT] |
K Sireesha, M Radhika | ||
Vol 5, No 7 (2017): July | The Revocation Mechanism Of A Be Scheme Into Asymmetric GKA | Abstract PDF [Full Text] |
A. Anuradha, B.Sai Chandu | ||
Vol 6, No 12 (2018): December | The Secured Cloud Storage with Efficient Key Generation in cloud computing | Abstract PDF [Full Text] |
K Surya Kranthi, Kakarla Ravi kumar | ||
Vol 7, No 8 (2019): August- 2019 | The Secured Data Sharing For Multiauthority Access in Cloud Storage | Abstract PDF [Full Text] |
R.N.D.S.S. Lakshmi, B.V. Ram Kumar | ||
Vol 8, No 7 (2020): July | The Secured Financial Transaction Network using User Identity Verification | Abstract PDF [Full Text] |
Mallampalli Sneha, P Rama Krishna | ||
Vol 7, No 5 (2019): May | The Secured Multi-Keyword Ranked Search over Encrypted Data Stored in Cloud | Abstract PDF [Full Text] |
Raja Kondi, S. Srinivas | ||
Vol 5, No 11 (2017): November | The Study Exploration towards Side Friction Influences by traffic performance measures on roads | Abstract PDF [Full Text] |
Itrajula Adinarayana, Dr. N.C Anil | ||
Vol 8, No 3 (2020): March | The transition probability features between user click streams based on the social situation analytics; to detect malicious social bots | Abstract PDF [Full Text] |
Juvva Manjari, Nadella Sunil | ||
1001 - 1025 of 1075 Items | << < 36 37 38 39 40 41 42 43 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.