Open Access
Subscription or Fee Access
Table of Contents
Articles
A Survey on Attempts to Enhance Requirements Engineering Process | |
Hadeel E.Elsherbeiny, A. A. Abd El-Aziz, Nagy Ramadan | 135-139 |
A Framework for Spam Filtering Security Evaluation | |
Kunjali Pawar, Madhuri Patil | 140-144 |
Secured File Sharing in Cloud Computing | |
M. Deepak, C. Mathan Kumar, D. Suganya | 145-147 |
Security Analysis on Privacy Data Encryption in Many Order Using Magic Number | |
S. Srilekha | 148-150 |
Black Money Check: Integration of Big Data & Cloud Computing To Detect Black Money Rotation with Range-Aggregate Queries | |
B. Ashwini, N. Saranya, Sindhuja Sindhuja | 151-152 |
Estimating Soldiers War Field Locations Leveraging Large Scale Crowd Sourced Smart Phone Data Using Ibeacon | |
M. Jenath, G.R. Priyadharshini, R. Nafsin | 153-155 |
Automatic Summarization of Bug Reports | |
T. Sathiya Prakash, M. Vignesh Raj, S. Sree Kumar | 156-159 |
Dynamic Cloud Allocation by Managing Web Services and by Implementing Portfolio Thinking and Design Diversity | |
A. S. Athish, M. Malathi | 160-162 |
Adaptive Learning with Intelligent System using Reinforcement | |
J. Sowmya | 163-164 |
Eye (Everything You Do is Examined) - A e-Governance Initiative | |
M. Balashankar, S. Bharathchandran, V. Muruganantham, V. Bakkiyaraj, M. Chairmaprabhu | 165-166 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9632