International Journal of Computer and Communication Technology
Volume 5, Issue 4 (2014)
Articles
Checkpointing Orchestrated Web Services
A. Vani Vathsala and Hrushikesha Mohanty
DOI: 10.47893/IJCCT.2014.1248
A Correctness Criterion for Eager Approach Validation for Transactional Memory System
Ravi Kumar and Sathya Peri
DOI: 10.47893/IJCCT.2014.1249
The Effect of Social Online Networking Service on Public Libraries via Critical Systems Heuristics (CSH) :A Case Study
Samaneh Ahmadi
DOI: 10.47893/IJCCT.2014.1250
A Grid Computing Based Power System Monitoring Tool Using Gridgain
Subrat K. Patro, Subhendu S. Paik, Dr D. S. Roy, and Avinash Kumar
DOI: 10.47893/IJCCT.2014.1251
Secure Key Pre-distribution in Wireless Sensor Networks Using Combinatorial Design and Traversal Design Based Key Distribution
Saba Khalid, Faiyaz Ahmad, and Mohd. Rizwan Beg
DOI: 10.47893/IJCCT.2014.1252
Issues of Emotion-Based Multi-Agent System
ARUSHI THAKUR and DIVYA RISHI SAHU
DOI: 10.47893/IJCCT.2014.1253
Atherosclerosis Detection Using Music
NIHARIKA JHA
DOI: 10.47893/IJCCT.2014.1254
Load Balancing in Computational Grids Using Ant Colony Optimization Algorithm
SOWMYA SURYADEVERA, JAISHRI CHOURASIA, SONAM RATHORE, and ABDUL JHUMMARWALA
DOI: 10.47893/IJCCT.2014.1255
Privacy Preserved Centralized Model for Counter Terrorism
ABHISHEK SACHAN and DEVSHRI ROY
DOI: 10.47893/IJCCT.2014.1256
Novel Techniques to Eradicate Energy Inefficiencies That Abbreviate The Lifetime of The Cell Phone Based WSNs
WILSON THOMAS and LAJISH V. L
DOI: 10.47893/IJCCT.2014.1257
OBSTACLE DETECTION AND NAVIGATION OF AUTONOMOUS ROBOT
HIMANSU SEKHAR SASMAL, TAPAN NAYAK, and Srikanta Patnaik
DOI: 10.47893/IJCCT.2014.1258
Clustering Based Classification and Analysis of Data
NEERAJ SAHU, D. S. RAJPUT, R. S. THAKUR, and G. S. THAKUR
DOI: 10.47893/IJCCT.2014.1259
Exploiting Data Mining Techniques For Improving the Efficiency of Time Series Data
TARUN DHAR DIWAN, PRADEEP CHOUKSEY, R. S. THAKUR, and BHARAT LODHI
DOI: 10.47893/IJCCT.2014.1260
Application of Data Mining Technique in Stock Market : An Analysis
SACHIN KAMBEY, R. S. THAKUR, and SHAILESH JALORI
DOI: 10.47893/IJCCT.2014.1261
A Novel Approach For Information Security With Automatic Variable Key Using Fibonacci Q-Matrix
SHALIGRAM PRAJAPAT, AMBER JAIN, and R. S. THAKUR
DOI: 10.47893/IJCCT.2014.1262
