•  
  •  
 

International Journal of Computer and Communication Technology

Volume 1, Issue 4 (2010)

Articles

PDF

A Simple Scheme for Visual Cryptography
Mihir Das, Jayanta l Kumar Pau, and Priya Ranjan Sinha Mahapatra
DOI: 10.47893/IJCCT.2010.1048

PDF

Elliptic Curve Cryptosystem for Email Encryption
Abhijit Mitra, Saikat Chakrabarty, and Poojarini Mitra
DOI: 10.47893/IJCCT.2010.1049

PDF

Cellular Automata Based Data Security Scheme in Computer Network using Single Electron Device
Jayanta Gope, Giriprakash H, and Subir Kumar Sarkar
DOI: 10.47893/IJCCT.2010.1050

PDF

Child Internet Protection System
deepshikha verma, Mayank Pathak, Rajesh Nigam, and Bhupendra Verma
DOI: 10.47893/IJCCT.2010.1051

PDF

Intrusion detection using clustering
Kusum Kumari Bharti, Sanyam Shukla, and Sweta Jain
DOI: 10.47893/IJCCT.2010.1052

PDF

Spam Filtering using Support Vector Machine
Priyanka Chhabra, Rajesh Wadhvani, and Sanyam Shukla
DOI: 10.47893/IJCCT.2010.1053

PDF

Network Intrusion Detection Using Multiclass Support Vector Machine
Arvind Mewada, Prafful Gedam, Shamaila Khan, and M. Udayapal Reddy
DOI: 10.47893/IJCCT.2010.1054

PDF

Virtualized DB Clustering and Server Consolidation: It’s Implementation with a Live Case Study
Ram Prasad Patnaik and Dambaru Dhara Nahak
DOI: 10.47893/IJCCT.2010.1055

PDF

CLOUD COMPUTING
Harinder Singh, T.Durga Pavan Kumar, and Shaik Jan Bhasha
DOI: 10.47893/IJCCT.2010.1056

PDF

Call Routing in Contact Center
Sarun Kumar, Milan Das, and Mudili Soujanya
DOI: 10.47893/IJCCT.2010.1057

PDF

Enabling Mainframe Assets to Services for SOA
Latha Sadanandam
DOI: 10.47893/IJCCT.2010.1058

PDF

A Goal Driven Framework for Service Discovery in Service-Oriented Architecture: A Multiagent Based Approach
Ujjal Marjit, Arup Sarkar, Subhrangsu Santra, and Utpal Biswas
DOI: 10.47893/IJCCT.2010.1059

PDF

Evaluating XPath Expressions on Light Weight BitCube
Mrs. Pranali P. Chaudhari
DOI: 10.47893/IJCCT.2010.1060

IJCCT Cover Art