IJAICE - Journal Papers

Process Orientation And Analyzing Technology Of Big Data

Authors :   M.Karthikeyan, Dr.N.Satish | Pages : 59-63

Energy Minimization Of Big Data Processing For Distributed

Authors :   J.Litiya , M.Senthilkumar | Pages : 53-58

An Enhanced Security Implementation In Wireless Sensor Network

Authors :   Princy S , Sasikumar P.K | Pages : 49-52

Efficient Approach For Resilient Detection Using

Authors :  M. Mohana , S. Aanjan Kumar | Pages : 43-48

Protecting User Identity In Geo-social Applications Using

Authors :   P.kruthika , T.sounderrajan | Pages : 40-42

Achieving Cloud Data Sharing Using Key Aggregate

Authors :  K. Rajasrika , P.S. Smitha | Pages : 36-39

Model Driven Security Of Extending State Chart Notation

Authors :   S.Sujaritha , S.Surendran | Pages : 31-35

Graph Cut Models For Simultaneous Tracking

Authors :   G.Karthic , B.Lalitha | Pages : 25-30

Optimal Placement Of Gateway Based On Greedy Technique

Authors :   K. Menaka , G.Shivaji Rao | Pages : 22-24

Social Behavior Of Global Community In Manet

Authors :   P.Abirami , B.Vinoth | Pages : 16-21

A Robust User Authentication Scheme For Webapplications

Authors :   R.Anita Ruth Sweetlin | Pages : 11-15

An Optimistic Solution For Peer-to-peer Multi Keyword

Authors :  Subaira.A.S , Gayathri.R , Jenolin Rex.M | Pages : 6-10

Hardening Technique For Enhancing Security In Network

Authors :  M Jenolin Rex, AVijayalakshmi, A S Subaira | Pages : 1-5