Recent Articles

Found 7 results. Showing results for page 1 of 2

Providing security in mobile social network using the concept of keyadmin

Author: M. I. Peter Shiyam and J. Stephy Christina, Published Date: , No.of Downloads: 255

Download PDF

Product Characteristic Ranking and Its Uses

Author: S. Devika et al, Published Date: , No.of Downloads: 247

Download PDF

Enabling Multi-Keyword search over encrypted cloud data

Author: G.Vinoth Kumar et al, Published Date: , No.of Downloads: 305

Download PDF

Using Colour, Quality and Shape for efficient image search

Author: K. Prasanth et al, Published Date: , No.of Downloads: 256

Download PDF

Bayesian approach to web content filtering using multi-agent architecture

Author: Suganya A and Swatika N, Published Date: , No.of Downloads: 331

Download PDF