Table of Contents
Vol 1, No 6 (2009)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Algorithm for Cryptanalysis with Application to Data Encryption Standard | ||
K. Ravikumar, A. Kannammal, S. A. Jameel | ||
Vol 1, No 6 (2009), Pagination: 240-244 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 184 | PDF Views: 4 |
Virtualization:A Foundation for Cloud Computing | ||
Manoj Devare, Mehdi Sheikhalishahi, Lucio Grandinetti | ||
Vol 1, No 6 (2009), Pagination: 245-254 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 176 | PDF Views: 4 |
Qualitative Comparison of 2-Dimensional and 3-Dimensional Directed Geographical IP Traceback with Generalization to N Directions | ||
A. Rajiv Kannan, K. Duaraiswamy, E. Sasikala | ||
Vol 1, No 6 (2009), Pagination: 255-259 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 161 | PDF Views: 5 |
IPv6 over Wireless Sensor Networks | ||
Vivek S. Deshpande, Vasundhara V. Ghate | ||
Vol 1, No 6 (2009), Pagination: 260-267 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 168 | PDF Views: 3 |
Lingering Bandwidth Estimation to Optimize the Resource Utilization for Mobile Ad Hoc Networks | ||
S. Suganya, S. Palaniammal | ||
Vol 1, No 6 (2009), Pagination: 268-272 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 176 | PDF Views: 3 |
Providing QOS for Mobile Ad-Hoc Network | ||
A. Boomarani Malany, R. M. Chandrasekaran | ||
Vol 1, No 6 (2009), Pagination: 273-282 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 178 | PDF Views: 3 |