Table of Contents
Articles
| Balancing the Computation-Intensive Function and User Privacy Disclosure at Different Security Levels | PDF [Full Text] |
| Varrey Dedipya, Mounica Bandaru | 741-745 |
| A Secure Off-Line MICO Payment Approach Using Multiple Physical Unclonable Functions | PDF [Full Text] |
| Mounica Nethala, G.P Madhuri | 746-750 |
| A Multi User Data Share For Data Privacy and Defend Un-authorized Access | PDF [Full Text] |
| Konakalla Vishnu Priyanka, Vakkalagadda Rajesh Babu | 751-754 |
| A Matrix Framework Factorization on a Sentiment Based Rating Prediction Method tackles Cyber bullying Detection | PDF [Full Text] |
| Shiny Prathyusha Kambham, G.P Madhuri | 755-758 |
| Privacy Protection Data and Batch Auditing Through Public Auditing Scheme | PDF [Full Text] |
| Amiripalli Naga Vamsi Krishna, P. Bala Krishna Prasad | 759-762 |
| Crawling Objects From An LBS Website Through Public KNN Web Search Interface Auditing Scheme | PDF [Full Text] |
| Ganji Aarathi, G.Guru Kesava Das | 763-766 |
| Multi Scale Index For Exact And Appropriate NKS Query Processing | PDF [Full Text] |
| Sanam Himabindu Naga Durga, T. Padmaja | 767-770 |
| A New Key Issuing Protocol To Resolve Key Escrow Problem | PDF [Full Text] |
| Kokiripati Sai lakshmi, Kasani Vaddikasulu | 771-774 |
| CRA - Aided Authentication for a Large Amount Of Various Cloud Services | PDF [Full Text] |
| A. Anuradha, A. Mohana Rao | 775-777 |
| Enabling the Fusion Of Local Sensitivity And Low Rank Factorization To Mitigate The Risk Of Over Fitting | PDF [Full Text] |
| A. Anuradha, A.V.V. Satish | 778-780 |
| To Improve The Inference Capability Using Traces From WSN Deployments | PDF [Full Text] |
| A. Anuradha, B.Lakshmi Durga | 781-784 |
| The Revocation Mechanism Of A Be Scheme Into Asymmetric GKA | PDF [Full Text] |
| A. Anuradha, B.Sai Chandu | 785-788 |
| Key Distribution And Privacy Preserving In An Access Controlled Cloud Computing | PDF [Full Text] |
| A. Anuradha, Ch. Karthik | 789-792 |
| Path Planning By Caching To Avoid Shortest Path Computation | PDF [Full Text] |
| A. Anuradha, D. Kumar Sai Ganesh | 793-796 |
| An Optimal Combination of Diverse Distance Metrics On Multiple Modalities | PDF [ Full Text] |
| A. Anuradha, D. Priyanka | 797-799 |
| An Access Control Scheme for The WBNS Using Sign Signcryption | PDF [Full Text] |
| A. Anuradha, A. Sravani | 800-802 |
| Node Failure Detection And Fault Management In Mobile Wireless Networks With Persistent Connectivity | PDF [Full Text] |
| A. Anuradha, G. Venkatesh | 803-805 |
| Open API Service To Generate CDA Documents Based On Cloud Computing | PDF [Full Text] |
| A. Anuradha, K. Issack Babu | 806-808 |
| Improving Accuracy of Named Entity Recognition on Social Media | PDF [Full Text] |
| Bongi Vijay, D.T.V Dharmajee Rao | 809-814 |
| The Enriched Object Oriented Software processes for Software Fault Prediction | PDF [Full Text] |
| T Ravi Kumar, T Srinivasa Rao | 815-821 |
| An Advanced Control Strategy for an IPM Synchronous Generator Based Wind Turbine | PDF [Full Text] |
| Sunkara Naga Satya Hari Prasad, J Ramesh | 822-826 |
| Micro-blogging attributes to Latent Feature Representation for Product Recommendations | PDF [Full Text] |
| Kollimarla Sravanthi, K Sheeba Rani | 827-829 |
| Study On Strength Development Of Concrete With Partial Replacement Of Silica Fume & Fly ash | PDF [Full Text] |
| P. Nageswara Rao, G. Klayan | 830-838 |
| Low Latency Mac Design For Low Power DSP Applications | PDF [Full Text] |
| Kadali Swathi, M Srihari | 840-844 |
| Design And Implementation Of Efficient Multiplier Using Vedic Sutras | PDF [Full Text] |
| Theppala Devi, Perabathula Satyavani | 845-850 |
| Efficient LUT Based Filter Design Using Approximate Algorithm | PDF [Full Text] |
| Bathina Rajeswari, G S S Prasada Rao | 851-855 |
| Low Complex And Reconfigurable Fir Filter Using Low Power Architecture | PDF [Full Text] |
| Medisetti Mahalakshmi, P Naga Raju | 856-860 |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


