Volume-4-Issue-2-2017

Manuscript IDTITLEAuthorsDownloadViewDOI
IJCSMEV2I2001Quantifying Political Leaning from
Tweets, Retweets, and Retweeters
B.RISHITHA REDDY
*,A.SRI LAKSHMI
, J.DEEPTHI
Download View To be
assighned
IJCSMEV2I2002An Efficient Privacy-Preserving Ranked
Keyword Search Method
S.SRUTHI REDDY
*,A.SRI LAKSHMI
, J.DEEPTHI
Download View To be
assighned
IJCSMEV2I2003Contributory Broadcast Encryption with
Efficient Encryption and Short Ciphertexts
K.SAI KAVYA
*,A.SRI LAKSHMI
, J.DEEPTHI
Download View To be
assighned
IJCSMEV2I2004Spatial Re usability-Aware Routing in Multi-Hop
Wireless Networks
P.SWARNA LATHA
*,A.SRI LAKSHMI
, J.DEEPTHI
Download View To be
assighned
IJCSMEV2I2005Identity-Based Proxy-Oriented Data Uploading
and Remote Data Integrity Checking in Public Cloud
M.SAI SUDHA
*,SOMA SHEKAR
, J.DEEPTHI
Download View To be
assighned
IJCSMEV2I2006Detecting Malicious Facebook ApplicationsU.SRAVANI REDDY,
SOMA SHEKAR,
J.DEEPTHI
Download View To be
assighned
IJCSMEV2I2007Efficient Algorithms for Mining Top-K
High Utility Itemsets
P.YAMINI
*,SOMA SHEKAR
, J.DEEPTHI
Download View
To be
assighned
IJCSMEV2I2008ENERGY AND MEMORY EFFICIENT CLONE
DETECTION IN WIRELESS SENSOR NETWORKS
S.MOUNIKA
*,SOMA SHEKAR
, J.DEEPTHI
Download
View To be
assighned
IJCSMEV2I2009A Stable Approach for Routing Queries
in Unstructured P2P Networks
T.ALEKHYA
*,SRIKANTH
, J.DEEPTHI
Download View To be
assighned