S. No Paper Title Paper ID Download
01. Query Processing for Personal Management Systems Based On Multidimensional Search Sri Redya Jadav M.Tech (Ph.D), C.H.Veena (PH.D), Prabhakara Rao Thota IJDCST/01/V-1/I-4/015
02. Optimized Metamorphic Relations for an automated SDLC Chillakanti Rambabu,Mr M.R.Raja Ramesh IJDCST/01/V-1/I-4/022
03. Data Security for Cloud Masses Based on Data Integrity Aluri Srinivas Rao, K. Rama Krishnaiah IJDCST/01/V-1/I-4/024
04. A Data Integrity Proofs in Cloud Storage with High PerformanceK.Sai Gowtham,S.Suresh Babu IJDCST/01/V-1/I-4/01
05. Enhanced Security Mechanisms in MPI as ES-MPICH2D.Gangadhar Rao, Balusa Anil Kumar IJDCST/01/V-1/I-4/02
06. A New Approach for Extremely Decentralized Data Accountability for Data Sharing in CloudB.Lakshmi Tirapatamma,Y.Sankararao IJDCST/01/V-1/I-4/03
07. A Novel Approach for Quality of Video Streaming in Multimedia Wireless Sensor NetworksSiva Naga Lakshmi Srihari Yenduri,Abdul Vahed IJDCST/01/V-1/I-4/04
08 Classification Methods for Detecting Jamming AttacksSuresh Bandi,Vakkalanka Venkata Syam IJDCST/01/V-1/I-4/031
9. Prevention of Code Injection Attacks Based on Shell InjectionG.Anil Babu,V.Srinivas IJDCST/01/V-1/I-4/032
10. Continuous Aggregation Queries Based on Procedures of Adaptive Query PlanningY.Leelakrishna,S.L.V.V.D Sarma,J.Nagaraju,E.Ramakrishna IJDCST/01/V-1/I-4/034
11. Automatic User Histories Using Top-K ResultsPodugu Anil Kumar,V.Srinivas IJDCST/01/V-1/I-4/037
12. Hybrid Load Balancers for an Effective Multipath Switching SystemM.Bharathi Rani,S.Suresh Babu IJDCST/01/V-1/I-4/058
13. Professionally Providing Security in Wireless Sensor NetworksRamesh Kammindi,G.Padmarao IJDCST/01/V-1/I-4/10
14. Scalable & Reliable Proofs in Multi Cloud Storage SystemR Sravanthi K, G.Padmarao IJDCST/01/V-1/I-4/011
15. Different View Points Measuring the Similarities in Web Based DocumentsD.Swarupa Lakshmi, K.Govardhana Babu IJDCST/01/V-1/I-4/022
16. An Efficient Detection of Disconnected Links in Wireless Sensor NetworkM.Rajalakshmi, G.Balaraju IJDCST/01/V-1/I-4/024
17. Recovery From Link And Node Failures In Multipath Routing Using IDAGP.Hima Bindu, B.Sri Hari IJDCST/01/V-1/I-4/040
18. Hybrid Steganography Using Multimedia(Image, Audio, Video) Concepts Based on Invariant Substitution TechniquesM.Vara Lakshmi, Sundaradasu Suresh IJDCST/01/V-1/I-4/061
19. Authentication Features Based on Sound SignaturesMedisetty baby Anusha,P.Radha Krishna IJDCST/01/V-1/I-4/062
20. Top K Fuzzy Search Results over XML DataCh.Lavanya Susanna,Dr.D.Rajeshwara Rao,PHD IJDCST/01/V-1/I-4/018
21. Hybrid Machine Learning Implementations for Classifying Cure-Ailments ResultsB.Srujana, Dr. M.R Narsinga Rao,PHD IJDCST/01/V-1/I-4/014