Volume 2 Issue 2

1
Process Orientation And Analyzing Technology Of Big Data
Authors : M.Karthikeyan, Dr.N.Satish
Pages : 59-63

2
Energy Minimization Of Big Data Processing For Distributed
Authors : J.Litiya , M.Senthilkumar
Pages : 53-58

3
An Enhanced Security Implementation In Wireless Sensor Network
Authors : Princy S , Sasikumar P.K
Pages : 49-52

4
Efficient Approach For Resilient Detection Using
Authors : M. Mohana , S. Aanjan Kumar
Pages : 43-48

5
Protecting User Identity In Geo-social Applications Using
Authors : P.kruthika , T.sounderrajan
Pages : 40-42

6
Achieving Cloud Data Sharing Using Key Aggregate
Authors : K. Rajasrika , P.S. Smitha
Pages : 36-39

7
Model Driven Security Of Extending State Chart Notation
Authors : S.Sujaritha , S.Surendran
Pages : 31-35

8
Graph Cut Models For Simultaneous Tracking
Authors : G.Karthic , B.Lalitha
Pages : 25-30

9
Optimal Placement Of Gateway Based On Greedy Technique
Authors : K. Menaka , G.Shivaji Rao
Pages : 22-24

10
Social Behavior Of Global Community In Manet
Authors : P.Abirami , B.Vinoth
Pages : 16-21

11
A Robust User Authentication Scheme For Webapplications
Authors : R.Anita Ruth Sweetlin
Pages : 11-15

12
An Optimistic Solution For Peer-to-peer Multi Keyword
Authors : Subaira.A.S , Gayathri.R , Jenolin Rex.M
Pages : 6-10

13
Hardening Technique For Enhancing Security In Network
Authors : M Jenolin Rex, AVijayalakshmi, A S Subaira
Pages : 1-5