Enhancing the Functionality of Moodle in CSE |
A. M. Geetha, A. Vidya |
Vol 2, No 1 (2015), Pagination: 3-15
|
ABSTRACT |
PDF
|
|
Abstract Views: 416 |
PDF Views: 146
|
Efficient Information Retrieval through Ontology in Semantic Web - Web Based Approach |
J. Anitha D'Souza |
Vol 2, No 1 (2015), Pagination: 16-22
|
ABSTRACT |
PDF
|
|
Abstract Views: 426 |
PDF Views: 188
|
An Empirical Study of Cloud Computing: Managing Garment Supply Chains |
Kavitha Venkatachari |
Vol 2, No 1 (2015), Pagination: 23-33
|
ABSTRACT |
PDF
|
|
Abstract Views: 428 |
PDF Views: 190
|
Mail Server, Cloud Server, Cloud Zoro Application, Using P2P File Sharing |
V. Umesh |
Vol 2, No 1 (2015), Pagination: 40-43
|
ABSTRACT |
PDF
|
|
Abstract Views: 439 |
PDF Views: 178
|
A Survey on Cloud Computing Threats |
S. Nirmal |
Vol 2, No 1 (2015), Pagination: 44-49
|
ABSTRACT |
PDF
|
|
Abstract Views: 444 |
PDF Views: 166
|
Cloud Computing Data Security in Cloud Computing for Banking |
Anand Tanvashi, B. Shravani |
Vol 2, No 1 (2015), Pagination: 50-61
|
ABSTRACT |
PDF
|
|
Abstract Views: 419 |
PDF Views: 183
|
A Comprehensive Approach to Intrusion Detection Alert Correlation |
L. Nalini |
Vol 2, No 1 (2015), Pagination: 69-71
|
ABSTRACT |
PDF
|
|
Abstract Views: 414 |
PDF Views: 201
|
Move to Intelligence through E-Governance : the Case of New Education Policy |
G. Sangeetha |
Vol 2, No 1 (2015), Pagination: 72-75
|
ABSTRACT |
PDF
|
|
Abstract Views: 235 |
PDF Views: 140
|