Vol 3, No 5 (2011)

Table of Contents

Vol 3, No 5 (2011)

Open Access Open Access  Restricted Access Subscription Access

Articles

Network Based Virtual Compilation–C/C++ and JAVA
Shiv Sutar, Umesh Mergu, Swapnil Thale
 Vol 3, No 5 (2011), Pagination: 281-284
ABSTRACT |  PDF     Abstract Views: 211  |  PDF Views: 3
Cloud Computing: Practice of Efficient Approaches, Techniques and Challenges for Data Centers
S. Manimegalai, C. Sumithiradevi, M. Punithavalli
 Vol 3, No 5 (2011), Pagination: 285-288
ABSTRACT |  PDF     Abstract Views: 218  |  PDF Views: 3
Consolidation of Projects & Applications for Challenged Networks
Hemal Shah, Yogeshwar P. Kosta, Maitrey Patel
 Vol 3, No 5 (2011), Pagination: 289-296
ABSTRACT |  PDF     Abstract Views: 227  |  PDF Views: 3
Enhanced Matrix Bloom Filter for Weak Password Identification
Arulanand Natarajan, S. Subramanian, K. Premalatha
 Vol 3, No 5 (2011), Pagination: 297-305
ABSTRACT |  PDF     Abstract Views: 208  |  PDF Views: 2
Synchronization in Chaotic Communication
R. Raja Kumar, A. Sampath, P. Indumathi
 Vol 3, No 5 (2011), Pagination: 306-311
ABSTRACT |  PDF     Abstract Views: 206  |  PDF Views: 3
Towards Development of QoS Based Data and Service Oriented Mashup Platform
J. M. Gnanasekar, T. V. Anil Kumar
 Vol 3, No 5 (2011), Pagination: 312-320
ABSTRACT |  PDF     Abstract Views: 214  |  PDF Views: 3
Motion Capture for Computer 3D Character Animation
G. Dheepa, S. Sukumaran, K. Prabha
 Vol 3, No 5 (2011), Pagination: 321-325
ABSTRACT |  PDF     Abstract Views: 236  |  PDF Views: 2
An Adaptive Reliable Multipath Centralized RWA Algorithm for All-Optical WDM Networks
T. K. Ramesh, Sandeep Kumar Konda, M. Swaraj Teja, Harshadeep, P. R. Vaya
 Vol 3, No 5 (2011), Pagination: 326-331
ABSTRACT |  PDF     Abstract Views: 241  |  PDF Views: 3
Energy Aware Next Hop and Route Selection with Improved Throughput (ENT) for Wireless Sensor Network
S. Barani, C. Gomathy
 Vol 3, No 5 (2011), Pagination: 332-338
ABSTRACT |  PDF     Abstract Views: 202  |  PDF Views: 3
Improving the Performance of Selfish Overlay Routing by Increasing the Throughput and Decreasing the Loss Rate Using Nash Equilibrium
S. Prayla Shyry, V. Ramachandran
 Vol 3, No 5 (2011), Pagination: 339-343
ABSTRACT |  PDF     Abstract Views: 233  |  PDF Views: 5
Implementation of XTEA in FPGA to Resolve the Attacks on TEA
M. Manjupriya, S. Senthil Kumar
 Vol 3, No 5 (2011), Pagination: 344-349
ABSTRACT |  PDF     Abstract Views: 311  |  PDF Views: 3
Load Balancing in Mesh Based Wireless Network Using Cluster Re-Configuration Algorithm
P. Vinoth Kumar, B. Chandra Mohan
 Vol 3, No 5 (2011), Pagination: 350-354
ABSTRACT |  PDF     Abstract Views: 222  |  PDF Views: 3
Mobile Agent Based Cooperative Intrusion Detection System and Minimization of Malicious Packet Losses
J. Arokia Renjit, K. L Shunmuganathan
 Vol 3, No 5 (2011), Pagination: 355-360
ABSTRACT |  PDF     Abstract Views: 220  |  PDF Views: 3
Dynamic Ad Insertion in Triple-Play Content Delivery Networks (CDNs)
Chitresh Markanda, Dattaprassanna Singbal, Snehal Sontale
 Vol 3, No 5 (2011), Pagination: 361-367
ABSTRACT |  PDF     Abstract Views: 198  |  PDF Views: 3