NCRTICE - 2013 (Volume 1 - Issue 04)

Robust Identification of Movie Character using Face-Name Graph Matching
| Total Downloads : 0
Authors : Dr. K N Narasimha Murthy, Fardeen Pasha, Pramita P Mannari, Santhosh S Kashyap
Applications of Cloud Computing: a Survey
| Total Downloads : 0
Authors : Ajay Kumar.A.H., Asha Gowda Karegowda
Firewall Policy Anomaly Management
| Total Downloads : 0
Authors : Deepti N B , Nivedita Annayya Maravante , Rao Nisha A Padmanabh, Sreevalli V
Employing Crowdsourcing in Transportation Systems
| Total Downloads : 0
Authors : Chandan B, Skanda K, Karthik R S, Darshan M
Secure Data Transmission Routing Protocol for Multicastingc
| Total Downloads : 0
Authors : Bharath V N, Navile Nageshwara Naveen
Design and Development of Android Application to Access Faster Results
| Total Downloads : 0
Authors : Mr. Manjunath R, Arunjith.C
Optimization of Access Points By increasing the Frequencies in the Real Time Arun N Basavaraj Subhash Goni
| Total Downloads : 0
Authors : Arun N, Basavaraj Subhash Goni
Architecture Concept of a Wireless Body Area Sensor Network for Health Monitoring of Elderly People
| Total Downloads : 0
Authors : Archana B S, Supreeth.M.S, Shalini.K.S, Pramoda.C
Usage of Colors and Images for Authentication to avoid Shoulder Surfing
| Total Downloads : 0
Authors : Dr. K N Narasimha Murthy , Apoorva C, Trupti
Security Challenges for Next Generation Networks
| Total Downloads : 0
Authors : Anusha G E
ENSURING DISTRIBUTED ACCOUNTABILITYFOR DATA SHARING IN THE CLOUD
| Total Downloads : 0
Authors : Anoop Kumar Gupta, Dhaval Vaghani, Azhar Imam,
Homomorphic EncryptionUsingRNSTheorem
| Total Downloads : 0
Authors : Shishir Kumar Choudhary, Ankit Gupta
LAIC ? An Approach to Improve the Efficiency of Wireless Sensor Network
| Total Downloads : 0
Authors : Yashwanthkumar G.N
Security in Cloud Computing using Virtualization-Level
| Total Downloads : 0
Authors : Vachana M S, Vachana M S
A Survey on Grid Computing and its Applications
| Total Downloads : 0
Authors : Udaykumar Angadi, Asha Gowda Karegowda
Wireless Sensor Network Security model using Zero Knowledge Protocol
| Total Downloads : 0
Authors : Tejaswini.C.M, Chaitra.S
A Privacy-Preserving Routing and Incentive Protocol using Lightweight Approach for Hybrid Ad Hoc Wireless Network
| Total Downloads : 0
Authors : Anjan Baradwaj S, Naveen H R, Harish P, Praveen Kumar T S
Cloud- an adventure to a virtual world
| Total Downloads : 0
Authors : SOWBHAGYA.BN, BRUNDA.J, SUSHMITHA.S
A Comparitative Analysis of different Scheduling Algorithm for Different Real Time Operating Systems
| Total Downloads : 0
Authors : Suresh P, Maria Navin J R, Pradeep
Filtering Injected False Data in Wireless Sensor Networks by Bandwidth Efficient Co-operative Authentication Scheme
| Total Downloads : 0
Authors : Priyanka C, Sunaina P, SupriyaV, Vatsala N Gowda
 
 
© 2018 International Journal of Engineering Research & Technology - IJERT.ORG. All Rights Reserved.