Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer and Distributed System

ISSN: 2278--5183
Publisher: Council for Innovative Research


ADD TO MY LIST
 
A Framework for Evaluation and Validation of Information Security Policy

Author(s): Satish Kumar
Volume: 1
Issue: 3
Year: 2012
A Novel Data Mining Approach for Information Hiding

Author(s): Shikha Sharma
Volume: 1
Issue: 3
Year: 2012
Signature Analysis based Character Recognition Approach

Author(s): Muheet Ahmed Butt
Volume: 1
Issue: 3
Year: 2012
Study and Analysis of The Team Structures on Development Processes

Author(s): Satish Kumar
Volume: 2
Issue: 3
Year: 2013
SOFTWARE TESTING AND SOFTWARE DEVELOPMENT LIFECYCLES

Author(s): Chitra Wasnik
Volume: 2
Issue: 3
Year: 2013
Domino Effect Analysis and Assessment of Industrial Sites: A Review of

Author(s): Farid Kadri
Volume: 2
Issue: 3
Year: 2013
Securing data using 4 variables linear block cipher Asymmetric key Algorithm

Author(s): Prakash Kuppuswamy
Volume: 1
Issue: 3
Year: 2012
Image Preprocessing Methods in Image Recognition

Author(s): Satish Kumar Alaria
Volume: 1
Issue: 3
Year: 2012
CLOUD COMPUTING ENVIRONMENT: PROBLEMS IN IMPLEMENTATION

Author(s): arti sharma
Volume: 1
Issue: 3
Year: 2012
Performance Analysis of Cloud Storage Applications

Author(s): Amit Puri
Volume: 1
Issue: 3
Year: 2012
GSLDA- BASED FACE DETECTION

Author(s): Ravindra Bhika Phase
Volume: 1
Issue: 3
Year: 2012
An Identity-Based Security for Nodes in EAD File Replication in P2P Systems

Author(s): Praveenkumar Bhuvaneswaran
Volume: 1
Issue: 3
Year: 2012
Automation Framework of Browser Based Testing Tool Watir

Author(s): Amit Puri
Volume: 1
Issue: 3
Year: 2012
Comparative Analysis of Various Cryptographic Algorithms

Author(s): Satish Kumar
Volume: 1
Issue: 3
Year: 2012
Software Code Clone Detection Model

Author(s): Amit Puri
Volume: 1
Issue: 3
Year: 2012
A Review of Security Weaknesses in Bluetooth

Author(s): Mini Singh Ahuja
Volume: 1
Issue: 3
Year: 2012
Conditional shortest path routing in Delay tolerant networks

Author(s): S. Divya
Volume: 1
Issue: 3
Year: 2012
Distributed Warehouses:A review on design methods and recent trends

Author(s): Sagar Yeruva
Volume: 1
Issue: 3
Year: 2012
MRC Approach for Fast Link Failure Recovery in IP Network

Author(s): salil saurabh
Volume: 1
Issue: 2
Year: 2012
An algorithm for Secure formatting of memory

Author(s): Dhillon Amrit
Volume: 1
Issue: 2
Year: 2012
COMPREHENSIVE ANALYSIS OF COOPERATION AND MISBEHAVIOR ISSUES IN AD HOC WIRELESS NETWORKS

Author(s): Atul Kumar Purohit
Volume: 1
Issue: 2
Year: 2012
Analysis of Googledocs and Ms Word 2007

Author(s): Satish Kumar
Volume: 1
Issue: 2
Year: 2012
An Efficient Architecture for Automatic Face Expression Detection

Author(s): Amanur Rehman
Volume: 1
Issue: 2
Year: 2012
UML implementation of E-Tendering using Secret Key Digital Watermarking

Author(s): sirsendu sarbavidya | Sunil Karforma
Volume: 1
Issue: 2
Year: 2012
CO-OP WRITING FOR ENGINEERING GRADUATES WITH CLOUD SUPPORT

Author(s): maria michael visuwasam | maria michael visuwasam
Volume: 1
Issue: 2
Year: 2012
Study of Various Software Metrics for Insertion Sort

Author(s): Amit Puri
Volume: 1
Issue: 2
Year: 2012
A NOVEL APPROACH OF LOSSLESS IMAGE COMPRESSION USING TWO TECHNIQUES

Author(s): Tanureet Kaur
Volume: 1
Issue: 2
Year: 2012
Distributed Collaborative Key Agreement Protocol for Dynamic Peer Groups

Author(s): vibha Vibha
Volume: 1
Issue: 2
Year: 2012
Different Approaches of CBIR Techniques

Author(s): Jashanbir Singh Kaleka | Jagpal Singh | Reecha Sharma
Volume: 1
Issue: 2
Year: 2012
Cascade Algorithm of Image Watermarking Based on Multiple Wavelet Components

Author(s): Amol R Madane
Volume: 1
Issue: 2
Year: 2012
Task Scheduling with Parallel Genetic Environment using Stepping Stone Method

Author(s): Rachhpal Singh
Volume: 1
Issue: 2
Year: 2012
Web Data Mining Using FiVaTech

Author(s): V Naveen Kumar
Volume: 1
Issue: 2
Year: 2012
Comparative Study of Management Information System and Decision Support System

Author(s): Rachhpal Singh | Ankur Bhardwaj | Robin Sharma
Volume: 2
Issue: 2
Year: 2013
Communication Information Technology: Academic Role & Responsibilities

Author(s): Muheet Ahmed Butt
Volume: 2
Issue: 2
Year: 2013
Managing e-learning using clouds: A cost-effective boon in 21st century

Author(s): Sunita Manro
Volume: 1
Issue: 1
Year: 2012
Security Issues in Cloud based e-Governance model

Author(s): Rajan Manro
Volume: 1
Issue: 1
Year: 2012
ANALYSIS OF LINEAR AND BINARY SEARCH AGLORITHMS

Author(s): Sapinder Kaur
Volume: 1
Issue: 1
Year: 2012
An Efficient Density based Improved K- Medoids Clustering algorithm

Author(s): Masthan Mohammed
Volume: 2
Issue: 1
Year: 2012
Legacy Information System Development: Problems and Issues

Author(s): Muheet Ahmed Butt
Volume: 2
Issue: 1
Year: 2012
Concurrency Control Protocol for Multidimensional databases using Clipping & Indexing

Author(s): Sharath Chandra Lagisetty
Volume: 2
Issue: 1
Year: 2012
Information Extraction from Pre-Preprinted Documents

Author(s): Muheet Ahmed Butt
Volume: 2
Issue: 1
Year: 2012
Working Of Indexes Oracle 10g

Author(s): Navpreet Singh
Volume: 2
Issue: 1
Year: 2012
Checkpoint-based Intelligent Fault tolerance For Cloud Service Providers

Author(s): Rejin Paul
Volume: 2
Issue: 1
Year: 2012
A New Parallel Partition Prime Multiple Algorithm for Data Mining

Author(s): Partha Pratim Bhattacharya
Volume: 2
Issue: 1
Year: 2012
A Survey on Intrusion Detection using Data Mining Techniques

Author(s): R. Venkatesan
Volume: 2
Issue: 1
Year: 2012
Gamification in Education - Learn Computer Programming with Fun

Author(s): Balraj Kumar
Volume: 2
Issue: 1
Year: 2012
QUANTUM CRYPTOGRAPHY: A NEW GENERATION OF INFORMATION SECURITY SYSTEM

Author(s): Ritesh Kumar Jain
Volume: 2
Issue: 1
Year: 2012
TRANSFORMATION OF MULTIPLE ENGLISH TEXT SENTENCES TO VOCAL SANSKRIT USING RULE BASED TECHNIQUE

Author(s): uday chandrakant patkar
Volume: 2
Issue: 1
Year: 2012
Hierarchical Hybrid Energy Efficient Distributed Clustering Algorithm

Author(s): Kavi Kumar Khedo
Volume: 2
Issue: 1
Year: 2012
Study of Various Class Oriented Metrics

Author(s): Prabhjot Kaur Sood
Volume: 2
Issue: 1
Year: 2012
Project Monitoring and MILESTONES Through the PERT Analysis

Author(s): D.V. S.R.B. MSubrahmanyam
Volume: 2
Issue: 1
Year: 2012
Anonymous Processing of Query in Road Networks

Author(s): Ravi Kiran
Volume: 2
Issue: 1
Year: 2012
Analyzing the Effect of Queuing Disciplines On Network Performance

Author(s): sukhjit singh Sehra | Sumeet Kaur Sehra | Navjot Kaur
Volume: 2
Issue: 1
Year: 2012
Implementation of DSR Protocol by Using Distributed Cache Update Algorithms

Author(s): S. Tharani
Volume: 2
Issue: 1
Year: 2012
Why do you need a reservation system?      Save time & money - Smart Internet Solutions