COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

Advanced Computing: An International Journal

ISSN :2229 - 6727[Online]; 2229 - 726X[Print]

November 2013, Volume 4, Number 6

The Study About the Analysis of Responsiveness Pair Clustering Tosocial Network Bipartite Graph [Pdf ]
Akira Otsuki1 and Masayoshi Kawamura2, 1Tokyo Institute of Technology, Japan and 2MK future software, Japan

Behavioural Biometrics and Cognitive Security Authentication Comparison Study [Pdf ]
Karan Khare1, Surbhi Rautji2 and Deepak Gaur3, 1Gradestack Pvt. Ltd, India, 2Oracle Technologies, India and 3AMITY University, India

The Students Demand Fulfillment and Personality in Using Blackberry [Pdf ]
Chairiawaty.,MSi, Yenni Yuniaty.,MSi, Anne Maryani.MSi and Nurahmawaty.MSi, Universitas Islam Bandung, Indonesia

September 2013, Volume 4, Number 5

Text Classification for Authorship Attribution Analysis[Pdf]
M. Sudheep Elayidom1, Chinchu Jose2, Anitta Puthussery2 and Neenu K Sasi2, 1Cochin University, India and 2Adi Shankara Institute of Engineering and Technology, India

July 2013, Volume 4, Number 4

Design an AR Application in Finding Preferred Dining Place With Social Network Capability (ARAFEPS) [Pdf]
Farhat, Avinanta Tarigan and Remi Senjaya, Gunadarma University, Indonesia

Effective Ways Cloud Computing Can Contribute to Education Success [Pdf]
BV Pranay kumar, Sumitha kommareddy and N.Uma Rani, CJITS, Jangaon, Warangal

May 2013, Volume 4, Number 3

CUDA Based Performance Evaluation of the Computational Efficiency of the DCT Image Compression Technique on Both the CPU and GPU[pdf]
Kgotlaetsile Mathews Modieginyane, Zenzo Polite Ncube and Naison Gasela, North West University, South Africa

A Model to Compare the Degree of Refactoring Opportunities of Three Projects Using A Machine Algorithm
[pdf]
Gauri Khurana and Sonika Jindal, Punjab Technical University, India

The Verification of Virtual Community Member's Socio-Demographic Profile[pdf ]
Fedushko Solomia1, Peleschyshyn Oksana2, Peleschyshyn Andriy1 and Syerov Yuriy1, 1Lviv Polytechnic National University, Ukraine and 2Ivan Franko National University of Lviv, Ukraine

Performance Evaluation of Ontology and Fuzzybase CBIR [pdf ]
Tajman sandhu and Parminder Singh, Chandigarh Engineering College, India

March 2013, Volume 4, Number 2

Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts[pdf ]
Yu Li and Sheng Zhong, University at Buffalo, USA

Method-Level Code Clone Modification using Refactoring Techniques for Clone Maintenance[pdf]
E. Kodhai and S. Kanmani, Pondicherry Engineering College, India

Rsa Signature: Behind The Scenes [pdf]
Dragan Vidakovic1, Dusko Parezanovic1, Olivera Nikolic2 and Jelena Kaljevic2, 1Gimnazija Ivanjica, Serbia and 2Singidunum University Belgrade, Serbia

Scaling Transform Methods For Compressing a 2D Graphical image[pdf ]
A. J. Rajeswari Joe and N. Rama, Bharathiyar University, India

Path Finding Solutions For Grid Based Graph[ pdf ]
R.Anbuselvi , Bishop Heber College, India

January 2013, Volume 4, Number 1

Veritas Mouseion 3d - Technology and Museum Information[ pdf ]
Janaina Mello and Irla Rocha, Federal University of Sergipe, Brazil

Secure Cloud Architecture [ pdf]
Kashif Munir and Sellapan Palaniappan, Malaysia University of Science and Technology, Malaysia

Design and Implementation of an IP based authentication mechanism for Open Source Proxy Servers in Interception Mode[ pdf]
Tejaswi Agarwal and Mike Leonetti, Vellore Institute of Technology, India

Two Phase Clandestain Image Encryption [pdf]
V Hemanth and R Praveen Kumar, Sree Vidyanikethan Engineering College, India

Speaker Verification Using Acoustic and Prosodic Features[ pdf ]
Utpal Bhattacharjee and Kshirod Sarmah, Rajiv Gandhi University, India

Do New Mobile Devices in Enterprises Pose A Serious Security Threat?[ pdf ]
Ali A Altalbe, Deanship of e-Learning and Distance Education-King Abdulaziz University, Saudi Arabia

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN