Collection's Items (Sorted by Submit Date in Descending order): 801 to 820 of 824
| Preview | Issue Date | Title | Author(s) |
| 2012-01-27 | CUSTOMIZE UML ELEMENT & CODE GENERATOR UML MODELING TOOLBASED XUML | TRIPATHI, ASHISH |
| 2012-01-27 | CUSTOMIZE UML ELEMENT & CODE GENERATOR UML MODELING TOOLS BASED ON xUML | TRIPATHI, ASHISH |
| 2012-01-27 | AN ECC-TIMESTAMP BASED MUTUAL AUTHENTICATION AND KEY MANAGEMENT SCHEME FOR WSNs | INDRA, GAURAV |
| 2012-01-27 | DETECTION OF SUSPICIOUS ACTIVITY IN VIDEO SURVELLANCE | AGARWAL, ANURAG |
| 2011-12-15 | ELICITATION OF SECURITY REQUIREMENTS FOR ERP | CHAUDHRY, KRITIKA |
| 2011-12-15 | A COMPARATIVE STUDY OF CSA & GA BY MULTI OPTIMIZATION | SHARMA, VIPIN KUMAR |
| 2011-12-15 | CACHE MANAGEMENT FOR INTER VEHICLE COMMUNICATION | KUMAR, SUMIT |
| 2011-12-15 | FACE RECOGNITION SYSTEM USING MULTIPLE RECOGNIZER | SINGH, VIKAS |
| 2010-07-26 | INTEGRATED APPROACH FOR EMAIL SPAM FILTER | GARG, LOKESH |
| 2010-09-17 | HYBRID BIO-INSPIRED TECHNIQUES FOR LAND COVER FEATURES EXTRACTION - A REMOTE SENSING PERSPECTIVE | GOEL, LAVIKA |
| 2006-01-27 | A GENETIC APPROACH TO EVOLVE FINITE STATE AUTOMATA | SINGHAI, SHRADDHA |
| 2010-08-05 | A NOVEL APPROACH FOR SECURITY AUTHENTICATION ARCHITECTURE BASED ON ELLIPTIC CURVE CRYPTOGRAPHY | KIDWAI, FARZIL |
| 2010-04-06 | MULTICASTING APPROACH FOR MOBILE AD-HOC NETWORKS AND ITS PERFORMANCE ANALYSIS | JAIN, RINKY |
| 2010-07-22 | TO IMPLEMENT DAT BASE PERFORMANCE TUNING REPORTS WITH HELP OF TOOLS | SINGH, MAHESH |
| 2010-09-17 | SECURITY ARCHITECTURE MODELING AND DESIGN USING RULE BASED DECISION TREE APPROACH | THUKRAL, RAHUL |
| 2008-07-03 | REDESIGN OF XFORMS + XFDL AND ENRICHING WITH FEATURES FROM XFA | MEENA, KALPESH KUMAR |
| 2010-07-26 | A PURSUIT-EVASION GAME BASED ON MENTAL FUNCTIONS AND RATIONAL-CHOICE THEORY | OBEROI, ANURADHA |
| 2006-01-27 | ESTEBLISHMENT OF GRID COMPUTING ENVIRONMENT FOR GRID FTP CLIENT SERVER MODEL | AGARWAL, MANU |
| 2010-12-03 | MINING SPATIAL ASSOCIATION RULES IN IMAGE DATABASES USING 9-DLT AND ITS COMPARISON WITH MINING VIWEPOINT PATTERNS IN IMAGE DATABASES | LATA, KUSUM |
| 2010-11-24 | DOCUMENT RANKING AND CLASSIFICATION USING COSINE SIMILARITY AND PARAMETER FREE THRESHOLD | BATHLA, GOURAV |
Collection's Items (Sorted by Submit Date in Descending order): 801 to 820 of 824