International Journal of Computer and Communication Technology
Volume 5, Issue 1 (2014)
Articles
Crypto Steganography using linear algebraic equation
Pradeep Kumar Mallick and N.K. kamila
DOI: 10.47893/IJCCT.2014.1211
Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions
Zia Saquib, Santosh Kumar Soni, Sweta Suhasaria, and Anamika Singh
DOI: 10.47893/IJCCT.2014.1212
Incorporating FCM and Back Propagation Neural Network for Image Segmentation
Ebrahim. Aghajari and Dr.Mrs. Gharpure Damayanti
DOI: 10.47893/IJCCT.2014.1213
Performance Evaluation of Computation Intensive Tasks in Grid
P. Raghu and K. Sriram
DOI: 10.47893/IJCCT.2014.1214
A Mathematical Model for Randomly-Occurring Low-Rate Denial of Service Attacks
Nahush Chaturvedi and Hrushikesha Mohanty
DOI: 10.47893/IJCCT.2014.1215
A Secure Short Signature Scheme Based upon Biometric Security
Mousumi Parida and Sujata Mohanty
DOI: 10.47893/IJCCT.2014.1216
People, SHGs and Social Objectives: A Formal Framework
A B. Sagar and Hrushikesha Mohanty
DOI: 10.47893/IJCCT.2014.1217
Coding Schemes for Distributed Storage Systems: Implementation and Improvements
Saman Tabatabaeian, Rajendra P. Lal, and Wilson Naik
DOI: 10.47893/IJCCT.2014.1218
Open source Software ADOPTION: an academic perspective
Deepika Satyarajan and Vishwesh Akre
DOI: 10.47893/IJCCT.2014.1219
Event Based Approach for Web Services Composition
A. Vani Vathsala and Hrushikesha Mohanty
DOI: 10.47893/IJCCT.2014.1220
A Shared-Disk Database Approach towards Securing Data in the Cloud
Debi Prasad Mishra, Ranjita Mishra, and Animesh Tripathy
DOI: 10.47893/IJCCT.2014.1221
Goal Programming Approach for Selection of COTS Components in Designing a Fault Tolerant Modular Software System under Consensus Recovery Block Scheme
P. C. Jha and Vikram Bali
DOI: 10.47893/IJCCT.2014.1222
