Open Access
Subscription or Fee Access
Table of Contents
Articles
Query Profile Obfuscation for Secure Transaction | |
R. Vijayalakshmi, A. Shamaladevi, N. Vidhya | 131-134 |
Large Document Set Clustering: an Integrated Approach | |
Krishna Kumar Mohbey, G.S. Thakur | 135-139 |
Clustering Algorithms using Different Distance | |
Elaiyaperumal Sakthivel, Kaliaperumal Senthamarai Kannan | 140-143 |
Numerical Modeling of the Effect of Immobile Water Content on Nitrate Transport in an Unsaturated Porous System | |
M. Berlin, G. Suresh Kumar, Indumathi M Nambi | 144-150 |
Efficient Information Retrieval System Based on Semantics | |
T. Mini | 151-155 |
Data Extraction in Web Databases by Combining Tag and Value Similarity | |
J. Deepika, Dr. S. Senthamarai Kannan | 156-161 |
Vulnerability Management in Web Applications | |
R. Thenmozhi, M. Priyadharshini, V. VidhyaLakshmi, K. Abirami | 162-167 |
Hybrid Approaches for Outlier Detection and their Comparative Analysis | |
R. Anju, L N B Srinivas | 168-173 |
Hierarchical Clustering With Multi-View Point Based Similarity Measure | |
S.U. Meena, P. Parthasarathi | 174-177 |
Disambiguating the Appearances of People by an Automatic Discovery Model of Personal Name | |
D. Deepika, P. Betty | 178-181 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578