Volume 02 , Issue 02, 2014

 Article # Article Title & Authors  

1.


ENERGY USAGE CAN BE MONITORED AT MULTIPLE LEVELS OF THE WIRING TREE  (Page: 01-13)
Dr. Md. Anish
DOI:16.10090.IJSRR.2014.V2I02.287391.2328

2.


MINING WEB GRAPHS FOR RECOMMENDATIONS USING COLLABORATIVE FILTERING AND QUERY SUGGESTION TECHNIQUES  (Page: 14-26)
Toshi Patel, Dimpy Singh, Modassir Anis, Anjali Gangwar
DOI:16.10090.IJSRR.2014.V2I02.287391.2329

3.


VISUAL CRYPTOGRAPHY :CRYPTOGRAPHIC TECHNIQUE  (Page: 27-41)
Ankita Saxena, Vinay Rishiwal, Amit Doegar
DOI:16.10090.IJSRR.2014.V2I02.287391.2330

4.


DIFFERENT ACTIVITIES INVOLVED IN SOFTWARE TESTING LIFE CYCLE  (Page: 42-53)
Shobhit Gupta, Rifa Nizam Khan
DOI:16.10090.IJSRR.2014.V2I02.287391.2331

5.


AN ANALYSIS ON SECURITY ISSUES IN CLOUD COMPUTING  (Page: 54-62)
Vandana, Arti Mishra, Meenakshi Pathak, Shikha Arya
DOI:16.10090.IJSRR.2014.V2I02.287391.2332

6.


PARALLEL PROGRAMMING MODELS  (Page: 63-70)
Shikha Arya, Arti Mishra
DOI:16.10090.IJSRR.2014.V2I02.287391.2333