IJAICE - Journal Papers

Securing Privacy In Personalized Web Search

Authors :  Arunkumar R | Pages : 69 - 77

Secure Data Sharing Mechanism For Mobile Users Group Using Binary Tree Based Key Generation In Cloud

Authors :  Venkataramana K, Marimuthu K, Muneeshwaran A, Nagaveni G, Ramya R | Pages : 63 - 68

Reverse Auction To Trade Unused Cloud Computing Resources

Authors :  Venkataramana K, Bharathi S, Ananthi P | Pages : 56 - 62

Bathymetry Data Analysis And Depth Measurement

Authors :  Yamini S, Marimuthu K, Muneeshwaran A, Nagaveni G, Ramya R | Pages : 50 - 55

Cluster Concentric Circles Based Undersampling To Handle Unbalanced Data

Authors :  Mehala G, Bharathi S, Gajalakshmi S | Pages : 43 - 49

Ideal Routing Established On Artificial Bee Camp

Authors :  Dr. SIVAKUMAR K | Pages : 37 - 42

An Competent And Responsible Resource Partaking

Authors :  Dr.D.SATISHKUMAR, Dr. SIVAKUMAR.K , Mr. D. KALEESWARAN | Pages : 33-36

Securing Wireless Devices Using Location Based Services

Authors :  GOWRISHANKAR . R , T.MANIVEL | Pages : 25 - 32

Diversity Channel Allocation And Routing For Wireless Mesh Networks

Authors :  J.JEEVAREKHA , E.HEMALATHA , R.GOWRISHANKAR | Pages : 10 - 18

Searchable Symmetric Encryption : Top-k Query Processing

Authors :  G.NIVEDHITHA , P.BHUVANESHWARI | Pages : 6 - 9

Effective And Efficient Traffic Scrutiny In Sweet Server With Data Privacy

Authors :  Dr. E. PUNARSELVAM , S. GOPI | Pages : 1 - 5