Table of Contents
Vol 3, No 14 (2011)
Open Access
Subscription Access
Articles
The Mobile Based Remote Networking and Monitoring the Remote System in Dynamic Position | ||
G. Pary, S. Sridhar | ||
Vol 3, No 14 (2011), Pagination: 876-882 | ||
ABSTRACT | PDF | Abstract Views: 222 | PDF Views: 1 |
Load Balancing at Peak Hours Using FIFO and Weighted Average Techniques in Cloud Computing | ||
G. Radhamani, P. Mary Sriryn | ||
Vol 3, No 14 (2011), Pagination: 883-889 | ||
ABSTRACT | PDF | Abstract Views: 245 | PDF Views: 2 |
Comparison of Percentage of Emission in Optical Communication for Different Receivers | ||
K. V. Satya Kumar, T. Durga Prasad, K. Sridevi, T. Gowri, M. Ramesh | ||
Vol 3, No 14 (2011), Pagination: 890-893 | ||
ABSTRACT | PDF | Abstract Views: 249 | PDF Views: 1 |
A Novel Method for Controlling and Monitoring of Data Acquisition System | ||
N. Jayamma, B. Hari Krishna | ||
Vol 3, No 14 (2011), Pagination: 894-897 | ||
ABSTRACT | PDF | Abstract Views: 252 | PDF Views: 1 |
Network Centric Warfare-Concepts and Challenges | ||
D. Anand, Raja, E. G. Rajan | ||
Vol 3, No 14 (2011), Pagination: 898-902 | ||
ABSTRACT | PDF | Abstract Views: 228 | PDF Views: 13 |
An Efficient Algorithm for Token Management of Message Dependent Deadlocks Recovery Architecture | ||
Rinkle Rani Aggarwal, Nidhi Garg | ||
Vol 3, No 14 (2011), Pagination: 903-908 | ||
ABSTRACT | PDF | Abstract Views: 223 | PDF Views: 1 |
Performance Analysis and Comparison of Scheduling Algorithm in MANET’s | ||
Sanjeev Kumar, Yogesh Chaba, Amandeep | ||
Vol 3, No 14 (2011), Pagination: 909-914 | ||
ABSTRACT | PDF | Abstract Views: 225 | PDF Views: 5 |
A Survey on Resource Management in Cloud Computing Using Ontology Approach | ||
R. Lakshmi Devi, L. S. Jayashree | ||
Vol 3, No 14 (2011), Pagination: 915-919 | ||
ABSTRACT | PDF | Abstract Views: 239 | PDF Views: 3 |
Job Scheduling in Grids with QoS Satisfaction Using Ant Colony Optimization (ACO) | ||
P. Devaki, M. L. Valarmathi | ||
Vol 3, No 14 (2011), Pagination: 920-923 | ||
ABSTRACT | PDF | Abstract Views: 212 | PDF Views: 3 |
Security Analysis in Graphical Password Schemes | ||
S. Yamini | ||
Vol 3, No 14 (2011), Pagination: 924-929 | ||
ABSTRACT | PDF | Abstract Views: 219 | PDF Views: 3 |
New Authentication Mechanism with Home Agent in Next Generation Mobile Internet Protocol - Version6 (MIPv6) | ||
D. Sathish | ||
Vol 3, No 14 (2011), Pagination: 930-937 | ||
ABSTRACT | PDF | Abstract Views: 203 | PDF Views: 3 |
Weighted Nebulous Matching over Frequent Episode Rules Using Internet Anomaly Detection | ||
B. Muthulakshmi | ||
Vol 3, No 14 (2011), Pagination: 938-940 | ||
ABSTRACT | PDF | Abstract Views: 218 | PDF Views: 3 |
GT Approach for Detecting Application DoS Attacks | ||
D. Jebakumar Immanuel, C. Sangeetha | ||
Vol 3, No 14 (2011), Pagination: 941-946 | ||
ABSTRACT | PDF | Abstract Views: 214 | PDF Views: 3 |
A Non-Intrusive BIST Capability for UART | ||
D. Mahesh Kumar, A. M. Sreeram | ||
Vol 3, No 14 (2011), Pagination: 947-952 | ||
ABSTRACT | PDF | Abstract Views: 226 | PDF Views: 3 |