Computer Science and Engineering
Collection home page
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 41
Issue Date | Title | Author(s) |
2012 | Aswin - A Model-Driven Framework For Automated Software Generation In Networked Environment | Ramesh, K. |
2013 | Attribute-Based Group Signature Schemes with Attribute Anonymity and Constant Size Signature | Ali, Syed Taqi |
2013 | A study on digital image Steganography and watermarking Schemes | Dharwadkar, Nagaraj V. |
2013 | Some Studies on Sequential Pattern Mining over Progressive Databases | Rao, A Suresh |
2014 | A study of weakly supervised learning Algorithms For sentiment analysis | Sristy, Nagesh Bhattu |
2014 | Attribute-Based Group Signature Schemes with Attribute Anonymity and Constant Size Signature | Ali, Syed Taqi |
2014 | Towards reversible data embedding For digital video using dct | Gujjunoori, Sagar |
2014 | A study on digital image Steganography and watermarking Schemes | Dharwadkar, Nagaraj V. |
2015 | Data Mining Algorithms for Certain In-Depth Analysis on Frequent Patterns in Large Databases | Suvvari, Somaraju |
2016 | Some studies on attribute reduction methods Using rough sets, boolean reasoning and Evolutionary algorithms | Chebrolu, Srilatha |
2016 | Study and Modelling of Design Strategies for Software Systems Performance Improvement | Vobugari, Sreekumar |
2018 | Mining Big Data for Frequent Patterns using MapReduce Computing | Saleti, Sumalatha |
2018 | Map-Reduce based Spatial Data Mining System for Co-location and Behavioural Patterns | Maiti, Sandipan |
2018 | Some Efficient Storage Structures for Spatial Raster Data on Commodity Clusters | Bhushan, R. Phani |
2018 | Algorithms to Improve the Efficiency of Scalar Multiplication on Koblitz Curve Based Elliptic Curve Cryptography and its Applications | Pinapati, Anil |
2018 | Big data frameworks-based approaches To graph data | Shaik, Fathimabi |
2023 | Design of Rumor Mitigation Approaches for Online Social Networks | Parimi, Priyanka |
2023 | Some Investigations of Machine Learning Models for Software Defects | B, Umamaheswara Sharma |
2023 | Hybrid Collaborative Filtering Mechanism for Multi-criteria and Cross-Domain Recommendations | Spoorthy, Gajji |
2022 | Privacy-Preserving Ciphertext-Policy Attribute-Based Search over Encrypted Data in Cloud Storage | Varri, Uma Sankararao |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 41