Table of Contents
Vol 2, No 2 (2010)
Open Access
Subscription Access
Articles
Performance Enhancement in Concurrent Multipath Transfer Using Limited–Receive Buffer | ||
M. Subramaniam, D. Manjula | ||
Vol 2, No 2 (2010), Pagination: 1-8 | ||
ABSTRACT | PDF | Abstract Views: 239 | PDF Views: 1 |
Performance Evaluation of Scalable Ad-Hoc Network Using Dynamic Address Routing (DART) | ||
T Shankar, A. Karthikeyan, V. Srividhya | ||
Vol 2, No 2 (2010), Pagination: 9-19 | ||
ABSTRACT | PDF | Abstract Views: 226 | PDF Views: 5 |
Role-Based Access Control Architecture in Grid Environments | ||
M. Nithya, R. S. D. Wahida Banu | ||
Vol 2, No 2 (2010), Pagination: 20-27 | ||
ABSTRACT | PDF | Abstract Views: 282 | PDF Views: 4 |
Designing an Architecture for Personalized E-Learning System Using Web Service and Semantic Web Technology | ||
K. Palanivel, S. Kuppuswami | ||
Vol 2, No 2 (2010), Pagination: 28-35 | ||
ABSTRACT | PDF | Abstract Views: 390 | PDF Views: 3 |
Handover Initiation in 3G/WLAN Integrated Networks | ||
K. Ayyappan, R. Surender, R. Kumar | ||
Vol 2, No 2 (2010), Pagination: 36-41 | ||
ABSTRACT | PDF | Abstract Views: 298 | PDF Views: 2 |
An Image Steganography Algorithm against Histogram and Statistical Analysis | ||
V. Vijayalakshmi, G. Zayaraz, V. Nagaraj | ||
Vol 2, No 2 (2010), Pagination: 42-49 | ||
ABSTRACT | PDF | Abstract Views: 250 | PDF Views: 2 |
An Approach for Twofold Defend Secure Mobile Voting | ||
P. Shanthi Bala | ||
Vol 2, No 2 (2010), Pagination: 50-55 | ||
ABSTRACT | PDF | Abstract Views: 252 | PDF Views: 1 |