Vol 3, No 14 (2011)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents


Analysis and Pattern Deduction on Linguistic based Mean and Fuzzy Association Rule Algorithm on any Geo-referenced Crime Point Data PDF
R. Sridhar, S.R. Sathyaraj, S. Balasubramaniam 846-849
GPU-Accelerated Focus and Context based Visualization of Volume Data PDF
Priyanka Sinha, Anupam Agrawal 850-853
Implementation of Information Security System with Proposed Substitution Cipher Model using Cryptography Tools and Methods PDF
R. Venkateswaran, Dr.V. Sundaram 854-857
Simple Password Protector PDF
I. Rajasekhar, M. Srikanth, M. Sreelatha, M. Shashi 858-861
Defending DoS Attacks Using a Puzzle-Based Approach and Tracing Back to the Attacker PDF
Anup Mathew Abraham, Shweta Vincent 862-865
A Comprehensive Study on Data Mining Process with Distribution PDF
Dr. Rajayyagari Sivaram, Kethavarapu. Uma Pavan Kumar, Gummadi Kalyan Chakravarthy 866-868
The Centroid Initialization for K-Means Clustering Algorithm based on T-Score Ranking Method PDF
V. Kathiresan, Dr.P. Sumathi 869-872
Selecting Optimal Weighted Medoids for Clustering PDF
B. VaraPrasada Rao, M. Sreelatha, M. Shashi 873-877
Exploring User Navigation with the Synergy of Modified Ant Based Clustering and LCS Classification PDF
M. Raji, N. Muthumani 878-882
PurposeNet – A Semantic Knowledgebase PDF
P. Kiran Mayee 883-890

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9578