1 |
ADAPTIVE REROUTING TO AVOID LOCAL CONGESTION IN MANETS
Authors:Saranya . A, C.Tamilselvi
|
2 |
INFORMATION SEEKING IN ONLINE HEALTHCARE COMMUNITIES: THE DUAL INFLUENCE FROM SOCIAL SELF AND PERSONAL SELF
Authors:Deepa R, C.Renuga, C.Tamilselvi
|
3 |
ADAPTIVE ENERGY STORAGE MANAGEMENT IN GREEN WIRELESS NETWORKS
Authors:Gayathri . M, C.Renuga, C.Tamilselvi
|
4 |
RESEARCH ON TRUST SENSING BASED SECURE ROUTING MECHANISM FOR WIRELESS SENSOR NETWORK
Authors:Janani . P, C.Renuga, C.Tamilselvi
|
5 |
DETECTING STRESS BASED ON SOCIAL INTERACTIONS IN SOCIAL NETWORKS
Authors:Kanaka .P, C.Renuga, C.Tamilselvi
|
6 |
EFFICIENT KEYWORD AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION
Authors:Karthika . M, C.Renuga, C.Tamilselvi
|
7 |
LEARNING MULTI-INSTANCE DEEP DISCRIMINATIVE PATTERNS FOR IMAGE CLASSIFICATION
Authors:Kayalvizhi . N, R.Radha
|
8 |
A DYNAMIC HOP-AWARE BUFFER MANAGEMENT SCHEME FOR MULTI-HOP AD HOC NETWORKS
Authors:Latha. M, R.Radha
|
9 |
MY PRIVACY MY DECISION: CONTROL OF PHOTO SHARING ON ONLINE SOCIAL NETWORKS
Authors:Malathi.M, R.Radha
|
10 |
BRAIN TUMOUR EXTRACTION FROM D MRI IMAGES USING MATLAB
Authors:Manimozhi.S, K.Anbumathi
|
11 |
TOWARDS A RELIABLE DETECTION OF COVERT TIMING CHANNELS OVER REAL-TIME NETWORK TRAFFIC
Authors:Manjutha.S, K.Anbumathi
|
12 |
RATE, ENERGY, AND DELAY TRADEOFFS IN WIRELESS MULTICAST: NETWORK CODING VS. ROUTING
Authors:Meena.S, K.Anbumathi
|
13 |
SHARING-AWARE ONLINE VIRTUAL MACHINE PACKING IN HETEROGENEOUS RESOURCE CLOUDS
Authors:Preethika.R, K.Anbumathi
|
14 |
AN ENERGY-EFFICIENT TARGET-TRACKING STRATEGY FOR MOBILE SENSOR NETWORKS
Authors:Priyanka.P, V.Parameswari, R.Radha
|
15 |
ENERGY AWARE AODV ROUTING PROTOCOL USING TRUST MANAGEMENT FOR MANET BASED MILITARY ENVIRONMENT
Authors:Ramya.R, V.Parameswari
|
16 |
ENERGY-EFFICIENT QUERY PROCESSING IN WEB SEARCH ENGINES
Authors:Ramya.G, V.Parameswari, R.Radha
|
17 |
EFFICIENT CLUE-BASED ROUTE SEARCH ON ROAD NETWORKS
Authors:Saranya.S, C.Tamilselvi
|
18 |
USER-SERVICE RATING PREDICTION BY EXPLORING SOCIAL USERS’ RATING BEHAVIORS
Authors:Sakthipriya.M, V.Parameswari, R.Radha
|
19 |
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
Authors:Sathya Priya.G.A, C.Tamilselvi
|
20 |
TOP-K QUERY PROCESSING AND MALICIOUS NODE IDENTIFICATION BASED ON NODE GROUPING IN MANETS
Authors:Sindhuja.S, R.Radha, C.Tamilselvi
|
21 |
CONNECTING SOCIAL MEDIA TO E COMMERCE: COLD-START PRODUCT RECOMMENDATION USING MICROBLOGGING INFORMATION
Authors:Suganya.S, R.Radha, C.Tamilselvi
|
22 |
SECURE AND EFFICIENT DATA COMMUNICATION PROTOCOL FOR WIRELESS BODY AREA NETWORKS
Authors:Vanitha.R, R.Radha, V.Parameswari
|
23 |
A LIGHTWEIGHT SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING
Authors:Vennila.D, R.Radha, V.Parameswari
|
24 |
COMPARISON BETWEENCLUSTERING AND CLASSIFICATIONALGORITHMSWITH K-MEANS AND NAVIE-BAYES
Authors:R.Radhika
|
25 |
A SECURE INTRUSION DETECTION SYSTEM AGAINST DDOS ATTACK IN WIRELESS MOBILE AD-HOC NETWORK
Authors:Priya.P, K.Anbumathi
|