Table of Contents
Articles
| Favourable Meeting Location Sharing with Logical Privacy |
PDF
|
| M. Priyadharshan | 249-251 |
| An Efficient Maximal Web Access Patterns Mining |
PDF
|
| M. Aswinrani, M. Sowmiya, N. Gobinathan | 252-257 |
| Protection to SQL Injection Attack using Web Service |
PDF
|
| S.P. Shwetha, Meera Francis | 258-261 |
| Evaluating Terrain Diversities in Cell Phone User Behavior and Issues with Regard To Request Executive |
PDF
|
| N. Kavitha, J.K. Jothi Kalpana, H. Ambika, R. Dhashnamoorthy | 262-269 |
| Impact and Benefits of Cloud Computing On E-Commerce Industry Development |
PDF
|
| S. Shobana, S. KavithaMurugesan, K. Anargha, R. Aishwarya | 270-274 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9632