Volume-3 , Issue-1 , Jan - 2015 Go Back

Open Access   Article

A Deterministic Parallel Computing Approach Optimised for Multicore Architecture

Shahid Iqbal
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.58-60, Jan-2015
Open Access   Article

Testing Event Driven Systems By Using Observe-Model-Exercise Paradigm With Unknown Input Spaces

OME;User Interface;Context-sensitive GUIs;Test Case Generation;Quality Concepts
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.61-64, Jan-2015
Open Access   Article

E-Learning Security Requirements

Meenal Chavan and Poonam Manjare
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.65-68, Jan-2015
Open Access   Article

Automatic Evaluation of Descriptive Answer Using Pattern Matching Algorithm

Pranali Nikam , Mayuri Shinde ,Rajashree Mahajan , Shashikala Kadam
Review Paper | Journal Paper
Vol.3 , Issue.1 , pp.69-71, Jan-2015
Open Access   Article

Chaos based Image Watermarking using IWT and SVD

A.Kala and K.Thaiyalnayaki
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.72-75, Jan-2015
Open Access   Article

Survey on Network and Device Aware QoS Approach for Mobile Streaming

Mohanakrishnan and M. Azath2
Review Paper | Journal Paper
Vol.3 , Issue.1 , pp.76-79, Jan-2015
Open Access   Article

A Survey on Major Security Issues for Health Data in Wireless Medical Sensor Networks

C. Gayathri and D.Sathya
Survey Paper | Journal Paper
Vol.3 , Issue.1 , pp.80-84, Jan-2015
Open Access   Article

Secure Data Transform in Encrypted Image Using Steganography Technique

Malatesh M, Smt. Anitha G and Ujjini Venkatesh
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.85-89, Jan-2015
Open Access   Article

A Survey on User Authentication Protocols

Prajitha M V
Survey Paper | Journal Paper
Vol.3 , Issue.1 , pp.90-96, Jan-2015
Open Access   Article

An Analysis of Classification and Clustering Techniques used in Data Mining

Vishakha D. Charhate and Poonam A. Manjare
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.97-100, Jan-2015
First    Previous    Next    Last