Issue | Title | |
Vol 4, No 3 (2012) | Polymorphism based Maintenance Prediction Scheme using Design Complexity Metrics | Abstract |
M. Latha, Dr. K. Duraiswamy | ||
Vol 7, No 5 (2015) | Power Reduction by Flip Flop Merging Technique Using Heuristic Algorithm | Abstract |
V. Nandhini, K. Ramprakash | ||
Vol 7, No 8 (2015) | Precoloring Extension (PrExt) for Interval Graphs | Abstract |
S. Gokilamani, R. Anandhi, M. Revathy | ||
Vol 6, No 8 (2014) | Preventing PC from Spam Zombies using SPOT and RE-ENCRYPTION Methods | Abstract |
G. Sathish Kumar, Dr. G. Gunasekaran | ||
Vol 7, No 7 (2015) | Privacy Enhancing Personalized Web Search with Ups Framework | Abstract |
R.M. Bins Mary, P. Kavitha | ||
Vol 7, No 3 (2015) | Privacy Preserving Firewall Optimization Over Cross Domains | Abstract |
J. Dhyaneshwaran, S. Saravanakumar, N. Selvaraj, S. Arulbalamurugan | ||
Vol 11, No 6 (2019) | Process Life Cycle Framework: A Conceptual Model and Literature Study of Business Process Re-Engineering for Software Engineering Management | Abstract |
Krunal J. Bhavsar, Dr. Vrutik Shah, Dr. Samir Gopalan | ||
Vol 4, No 7 (2012) | Processing Software Aging Analysis of Web Server through Machine Learning | Abstract |
G. Sumathi, R. Raju, J. Vidhya shankardevi | ||
Vol 4, No 4 (2012) | Processing Software Aging through Swarm Intelligence | Abstract |
R. Raju, G. Sumathi, J. Vidhyashankardevi | ||
Vol 8, No 5 (2016) | Profitable Valuation Model for Consumerism in Cloud Computing | Abstract |
P. Vignesh, S. Praveen Kumar, K. Elavarasi | ||
Vol 6, No 9 (2014) | Protection to SQL Injection Attack using Web Service | Abstract |
S.P. Shwetha, Meera Francis | ||
Vol 3, No 5 (2011) | Pseudo-Exhaustive Pattern Generators for BIST | Abstract |
N. Vijay, N. Muthumohanraj, A. Sathish Kumar | ||
Vol 11, No 5 (2019) | Psychology of Addictive Behaviors, Dependencies and its Treatment | Abstract |
Luvy Luvy | ||
Vol 7, No 6 (2015) | QSS: Question and Answer System Based on Social Networks for Non-Factual Queries | Abstract |
S. Sruthi, V.N. Rajavarman | ||
Vol 3, No 5 (2011) | Quantitative Analysis of Service Oriented Architectures | Abstract |
Dr.G. Zayaraz, Dr.V. Vijayalakshmi, M. Venkatesan, S. Mathivanan | ||
Vol 6, No 7 (2014) | Radio Frequency Identification for Public Distribution System in Smart Rationing | Abstract |
S. Yang, A. Andreo | ||
Vol 5, No 9 (2013) | Random Based Unit Testing For Automated Test Report Generation | Abstract |
M. Chandran | ||
Vol 3, No 11 (2011) | Rating Software Measurement Tools Based on Quality Factor | Abstract |
S. Karthikeyan, M. Jayanthan | ||
Vol 11, No 5 (2019) | Realization of Dynamic e-billing Web Application using .net Framework | Abstract |
A. Thiruneelakandan, Sejanus Joshua, Gracey Victor, Tasleem Yousoof, Ashivni Kumar Jaiswal | ||
Vol 9, No 4 (2017) | Real-Time Fair Sharing Bandwidth analysis using Energy Efficient Scheduling in VANET | Abstract |
R. Ramesh, Dr. E. Kamalavathi | ||
Vol 13, No 2 (2021) | Recruitment Assisting Platform | Abstract |
A. Amrutha, Riyaz Chaudhary, Shubham Kumar Singh, Spoorthi Yashwanth, Nagamani H Shahapure | ||
Vol 7, No 3 (2015) | Reduction of Test Data Volume Based On Viterbi Compression Algorithm | Abstract |
K.S. Neelukumari, A. Pavithra, N. Saranya, S. Vanitha | ||
Vol 3, No 5 (2011) | Reliability Assessment of Component Based Software Systems Using Software Component Roles | Abstract |
R. Chinnaiyan, M. Ambika, Dr.S. Somasundaram | ||
Vol 3, No 12 (2011) | Reliability of n – Cascade System when Stress and Strength follows Extreme Value Distribution | Abstract |
M. Tirumala Devi, K. Sandhya, T.S. Umamaheshwari | ||
Vol 3, No 7 (2011) | Requirement Elicitation: What is Left? | Abstract |
Arti Dhounchak, Kamna Solanki, Pardeep Vashist | ||
401 - 425 of 530 Items | << < 12 13 14 15 16 17 18 19 20 21 > >> |
ISSN: 0974 – 9632