Collection's Items (Sorted by Submit Date in Descending order): 721 to 740 of 754
Preview | Issue Date | Title | Author(s) |
| - | SECURITY REQUIREMENTS IN CLOUD SYSTEM | Meerwal, Puneet |
| 2015-05 | TESTING FRAMEWORK FOR SOFTWARE PROCESSES | GUPTA, SHIKHA |
| - | STRATEGIES FOR WEB APPLICATION DEVELOPMENT METHODOLOGIES | Mittal, Anant |
| 2013-07-11 | EVALUATION OF WEBSITES USING MACHINE LEARNING ALGORITHM | Yadav, Prerana |
| 2013-06-20 | ON-TO-METHODOLOGY ONTOLOGY DEVELOPMENT METHODOLOGY | SINGH, MAGENDRA |
| 2012-09-17 | COST BASED GRAPHICAL VERTICAL FRAGMENTATION IN RELATIONAL DATABASED | VERMA, KUSHAL |
| 2012-06-28 | AN APPROACH TO DATA COMPRESSION TECHNIQUE | YADAV, R.K. |
| 2012-01-27 | OPTIMAL CAMERA AND LIGHT SOURCE PLACEMENT FOR SURVEILLANCE APPLICATIONS | GARG, RITU |
| 2012-01-27 | THROTTLE BASED APPROACH TO MITIGATE DISTRIBUTED DENIAL OF SERVICE ATTACK | GARG, DHWANI |
| 2012-01-27 | ANALYSIS OF HETEROGENEOUS PEER TO PEER VIDEO STREAMING | KUMAR, RAJ |
| 2012-01-27 | CUSTOMIZE UML ELEMENT & CODE GENERATOR UML MODELING TOOLBASED XUML | TRIPATHI, ASHISH |
| 2012-01-27 | CUSTOMIZE UML ELEMENT & CODE GENERATOR UML MODELING TOOLS BASED ON xUML | TRIPATHI, ASHISH |
| 2012-01-27 | AN ECC-TIMESTAMP BASED MUTUAL AUTHENTICATION AND KEY MANAGEMENT SCHEME FOR WSNs | INDRA, GAURAV |
| 2012-01-27 | DETECTION OF SUSPICIOUS ACTIVITY IN VIDEO SURVELLANCE | AGARWAL, ANURAG |
| 2011-12-15 | ELICITATION OF SECURITY REQUIREMENTS FOR ERP | CHAUDHRY, KRITIKA |
| 2011-12-15 | A COMPARATIVE STUDY OF CSA & GA BY MULTI OPTIMIZATION | SHARMA, VIPIN KUMAR |
| 2011-12-15 | CACHE MANAGEMENT FOR INTER VEHICLE COMMUNICATION | KUMAR, SUMIT |
| 2011-12-15 | FACE RECOGNITION SYSTEM USING MULTIPLE RECOGNIZER | SINGH, VIKAS |
| 2010-07-26 | INTEGRATED APPROACH FOR EMAIL SPAM FILTER | GARG, LOKESH |
| 2010-09-17 | HYBRID BIO-INSPIRED TECHNIQUES FOR LAND COVER FEATURES EXTRACTION - A REMOTE SENSING PERSPECTIVE | GOEL, LAVIKA |
Collection's Items (Sorted by Submit Date in Descending order): 721 to 740 of 754