Table of Contents
Articles
| Query Profile Obfuscation for Secure Transaction |
PDF
|
| R. Vijayalakshmi, A. Shamaladevi, N. Vidhya | 131-134 |
| Large Document Set Clustering: an Integrated Approach |
PDF
|
| Krishna Kumar Mohbey, G.S. Thakur | 135-139 |
| Clustering Algorithms using Different Distance |
PDF
|
| Elaiyaperumal Sakthivel, Kaliaperumal Senthamarai Kannan | 140-143 |
| Numerical Modeling of the Effect of Immobile Water Content on Nitrate Transport in an Unsaturated Porous System |
PDF
|
| M. Berlin, G. Suresh Kumar, Indumathi M Nambi | 144-150 |
| Efficient Information Retrieval System Based on Semantics |
PDF
|
| T. Mini | 151-155 |
| Data Extraction in Web Databases by Combining Tag and Value Similarity |
PDF
|
| J. Deepika, Dr. S. Senthamarai Kannan | 156-161 |
| Vulnerability Management in Web Applications |
PDF
|
| R. Thenmozhi, M. Priyadharshini, V. VidhyaLakshmi, K. Abirami | 162-167 |
| Hybrid Approaches for Outlier Detection and their Comparative Analysis |
PDF
|
| R. Anju, L N B Srinivas | 168-173 |
| Hierarchical Clustering With Multi-View Point Based Similarity Measure |
PDF
|
| S.U. Meena, P. Parthasarathi | 174-177 |
| Disambiguating the Appearances of People by an Automatic Discovery Model of Personal Name |
PDF
|
| D. Deepika, P. Betty | 178-181 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578