Table of Contents
Vol 2, No 12 (2010)
Open Access
Subscription Access
Articles
A Logical Topology Based Network Compositor for Packet Distribution System with Effective Edge Replacement | ||
P. R. Nirmal Binu, S. Karthikeyan | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 221 | PDF Views: 4 |
Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network | ||
Madhumathi Rajesh, Rama Sugavanam, G. R. Gangadevi | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 209 | PDF Views: 4 |
Optimized Power Management Protocol for Mobile Ad Hoc Networks | ||
R. Nandha Kumar, I. Mohan | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 216 | PDF Views: 3 |
An Energy Efficient Prediction Based Object Tracking Sensor Networks | ||
R. S. Bhuvaneeswaran, M. Sujatha, S. Sivaranjani | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 228 | PDF Views: 3 |
A New Efficient Geographic Multicast Protocol in Multicasting over Mobile Ad Hoc Networks for Qos Improvements | ||
N. Renuka Devi, R. Niranchana | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 240 | PDF Views: 3 |
TAB-Ticketing and Blinding for Realizing Anonymity and Traceability in Wireless Mesh Networks | ||
P. Saranya Devi, S. Shanmuga Preetha, S. Athilakshmi | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 211 | PDF Views: 3 |
Email Phishing Processing with Symmetric Key Cryptography via Network Credential | ||
A. Prabhu Chakkaravarthy | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 212 | PDF Views: 3 |
Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing | ||
M. N. Divakar, C. K. Raju Tumkur | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 215 | PDF Views: 3 |