International Journal of Computer and Communication Technology
Volume 1, Issue 4 (2010)
Articles
A Simple Scheme for Visual Cryptography
Mihir Das, Jayanta l Kumar Pau, and Priya Ranjan Sinha Mahapatra
DOI: 10.47893/IJCCT.2010.1048
Elliptic Curve Cryptosystem for Email Encryption
Abhijit Mitra, Saikat Chakrabarty, and Poojarini Mitra
DOI: 10.47893/IJCCT.2010.1049
Cellular Automata Based Data Security Scheme in Computer Network using Single Electron Device
Jayanta Gope, Giriprakash H, and Subir Kumar Sarkar
DOI: 10.47893/IJCCT.2010.1050
Child Internet Protection System
deepshikha verma, Mayank Pathak, Rajesh Nigam, and Bhupendra Verma
DOI: 10.47893/IJCCT.2010.1051
Intrusion detection using clustering
Kusum Kumari Bharti, Sanyam Shukla, and Sweta Jain
DOI: 10.47893/IJCCT.2010.1052
Spam Filtering using Support Vector Machine
Priyanka Chhabra, Rajesh Wadhvani, and Sanyam Shukla
DOI: 10.47893/IJCCT.2010.1053
Network Intrusion Detection Using Multiclass Support Vector Machine
Arvind Mewada, Prafful Gedam, Shamaila Khan, and M. Udayapal Reddy
DOI: 10.47893/IJCCT.2010.1054
Virtualized DB Clustering and Server Consolidation: It’s Implementation with a Live Case Study
Ram Prasad Patnaik and Dambaru Dhara Nahak
DOI: 10.47893/IJCCT.2010.1055
CLOUD COMPUTING
Harinder Singh, T.Durga Pavan Kumar, and Shaik Jan Bhasha
DOI: 10.47893/IJCCT.2010.1056
Call Routing in Contact Center
Sarun Kumar, Milan Das, and Mudili Soujanya
DOI: 10.47893/IJCCT.2010.1057
Enabling Mainframe Assets to Services for SOA
Latha Sadanandam
DOI: 10.47893/IJCCT.2010.1058
A Goal Driven Framework for Service Discovery in Service-Oriented Architecture: A Multiagent Based Approach
Ujjal Marjit, Arup Sarkar, Subhrangsu Santra, and Utpal Biswas
DOI: 10.47893/IJCCT.2010.1059
Evaluating XPath Expressions on Light Weight BitCube
Mrs. Pranali P. Chaudhari
DOI: 10.47893/IJCCT.2010.1060
