Published: 2015-03-31

VAMPIRE ATTACKS: DETECTION AND ELIMINATION OF DISHONEST NODES IN SENSOR NETWORKS

H.K. Chaudhari, C.S. Jadhav, M.S. Kalane, V.K. Kulkarni

386 - 391

DQF FOR LARGE VOLUME DATA

Uzma Kokalgave, Prof. Soumitra Das

403 - 407

BEST SEARCH AND RETRIEVAL PERFORMANCE EVALUATION WITH LUCENE INDEXING

Sonam Baban Borhade, Prof. Pankaj Agarkar

408 - 418

LOAD BALANCING STRATEGY BASED ON CLOUD PARTITIONING CONCEPT

Ms. Shilpa D. More, Prof. Arti Mohanpurkar

424 - 431

E-REAL ESTATE WEBSITE

A.P. Chandulkar, A.A. Darekar, S.K. Nanekar, S.V. Pawar

447 - 452

ERP SYSTEM FOR COLLEGE AUTOMATION USING RFID TAGS

Amritha Balachandran, Bharti Chauhan

437 - 446

FAULT NODE RECOVERY FOR A WIRELESS SENSOR NETWORK

M.D. Misal, V.A. Narke, S.P. Shinde, G.B. Zaware, Prof.S. Salve

476 - 479

DISTRIBUTED CO-OPERATIVE CACHING IN SOCIAL WIRELESS NETWORK (SWNET)

S. Inamke, V. Randhire, G. Lahare, N. Shejole

460 - 465

IMPLEMENTATION OF CLUSTERING-BASED FEATURE SUBSET SELECTION ALGORITHM-FAST

Vinod Wagh, Pankaj Bemberkar, Sonam Nikade, Mahendra Naradhania

453 - 459

DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER)

Narendra Shewale, Sharad Hadke, Mayur Kharote

470 - 475

IMPROVING RESOURCE UTILIZATION IN INFRASTRUCTURAL CLOUD

Abhinav Awasthi, Rohan Patil, Magzina Pinto, Vikram Sagadevan

466 - 469

ATTRIBUTE BASED ENCRYPTION IN PERSONAL HEALTH RECORD

Sourabh S Bhendawade, Ajinkya R Ugale, Ravi S Kurade, Hrushikesh S Kate

486 - 491