M.E./M.Tech. Computer Engineering : [818] Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 781 to 800 of 818
PreviewIssue DateTitleAuthor(s)
-Development of Models for Improving Software MaintenanceTripathi, Ashish Kumar
-REQUIREMENT ENGINEERING OF A WEB APPLICATIONMittal, Shashank
-INTEREST MINING FOR RECOMMENDATION SYSTEM IN VIRTUAL COMMUNITIESJAIN, ABHA
-Cache Coherence in Multi Processors ArchitectureARORA, POOJA
-SECURITY REQUIREMENTS IN CLOUD SYSTEMMeerwal, Puneet
2015-05TESTING FRAMEWORK FOR SOFTWARE PROCESSESGUPTA, SHIKHA
-STRATEGIES FOR WEB APPLICATION DEVELOPMENT METHODOLOGIESMittal, Anant
2013-07-11EVALUATION OF WEBSITES USING MACHINE LEARNING ALGORITHMYadav, Prerana
2013-06-20ON-TO-METHODOLOGY ONTOLOGY DEVELOPMENT METHODOLOGYSINGH, MAGENDRA
2012-09-17COST BASED GRAPHICAL VERTICAL FRAGMENTATION IN RELATIONAL DATABASEDVERMA, KUSHAL
2012-06-28AN APPROACH TO DATA COMPRESSION TECHNIQUEYADAV, R.K.
2012-01-27OPTIMAL CAMERA AND LIGHT SOURCE PLACEMENT FOR SURVEILLANCE APPLICATIONSGARG, RITU
2012-01-27THROTTLE BASED APPROACH TO MITIGATE DISTRIBUTED DENIAL OF SERVICE ATTACKGARG, DHWANI
2012-01-27ANALYSIS OF HETEROGENEOUS PEER TO PEER VIDEO STREAMINGKUMAR, RAJ
2012-01-27CUSTOMIZE UML ELEMENT & CODE GENERATOR UML MODELING TOOLBASED XUMLTRIPATHI, ASHISH
2012-01-27CUSTOMIZE UML ELEMENT & CODE GENERATOR UML MODELING TOOLS BASED ON xUMLTRIPATHI, ASHISH
2012-01-27AN ECC-TIMESTAMP BASED MUTUAL AUTHENTICATION AND KEY MANAGEMENT SCHEME FOR WSNsINDRA, GAURAV
2012-01-27DETECTION OF SUSPICIOUS ACTIVITY IN VIDEO SURVELLANCEAGARWAL, ANURAG
2011-12-15ELICITATION OF SECURITY REQUIREMENTS FOR ERPCHAUDHRY, KRITIKA
2011-12-15A COMPARATIVE STUDY OF CSA & GA BY MULTI OPTIMIZATIONSHARMA, VIPIN KUMAR
Collection's Items (Sorted by Submit Date in Descending order): 781 to 800 of 818