Table of Contents
Articles
| Automatic Method Level Code Clones Removal Using Refactoring |
PDF
|
| N. Kavitha, S. Suguna | 85-88 |
| Optimization of Form Validation on the Client Side using Cross-Site Scripting |
PDF
|
| S. Balamurugan, E. Gurumoorthi, M. Vasuki | 89-93 |
| An Automatic Approach for Extracting Software Product Lines |
PDF
|
| S. Ayshwarya Lakshmi, C. Reikha, A. Ramachandran | 94-99 |
| Novel Algorithms-- K-Gen and L-Gen for Implementation of k-Anonymity and l-Diversity Properties |
PDF
|
| Ganesh Yernally, Dr. Andhe Pallavi | 100-106 |
| An Effective Analysis on Business Intelligence & Competitive Intelligence |
PDF
|
| A. Priyadarshini, G. Pandiyan | 107-112 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9632