Issue | Title | |
Vol 6, No 9 (2014) | 3G Core Network Commissioning | Abstract |
Junaid Khan, V. Harini | ||
Vol 2, No 10 (2010) | A Basic study of Multiple Tree Multicast Routing Protocol Using MANET | Abstract |
S. Vijayaragavan, K. Duraiswamy | ||
Vol 5, No 9 (2013) | A Brief Study of Data Compression Algorithms | Abstract |
Yogesh Rathore, Manish K. Ahirwar, Rajeev Pandey | ||
Vol 3, No 11 (2011) | A Collective Processing Environment for Mobile Devices Using Grid | Abstract |
G. Pary, S. Sridhar | ||
Vol 6, No 4 (2014) | A Collusion-Resistant Acknowledgement-Based Scheme for Mitigation of Packet Drop in MANETs | Abstract |
G. D. Anjaly, J. C. Kavitha | ||
Vol 7, No 5 (2015) | A Comparative Analysis of Energy Efficient SP-LEACH and Classical LEACH Protocols of WSNs | Abstract |
P. Naveen Kumar, D. S. Anil Kumar, C. V. Sujana, A. V. Sumanth | ||
Vol 1, No 5 (2009) | A Comparative Analysis of Signature Schemes in a New Approach to Variant on ECDSA | Abstract |
M. Prabu, R. Shanmugalakshmi | ||
Vol 11, No 9 (2019) | A Comparative Study on Routing Protocols in VANET and MANET | Abstract |
A. P. Thangamuthu | ||
Vol 6, No 4 (2014) | A Comparison of Data Replication Schemes to Achieve an Optimum Query Delay and Efficient Data Access in MANETs | Abstract |
Joslin Anie Abraham, C. D. Suriyakala | ||
Vol 3, No 9 (2011) | A Comprehensive Investigation of Sip Protocol | Abstract |
N. Rakesh, T. R. Mahesh, S. K. Srivatsa | ||
Vol 6, No 9 (2014) | A Comprehensive Review on Intrusion Detection Systems | Abstract |
M. Sreenath | ||
Vol 7, No 5 (2015) | A Comprehensive Study of Wireless Sensor Networks | Abstract |
Sharanjeet Kaur | ||
Vol 11, No 12 (2019) | A Conversational User Interface (CUI) ChatBot Using Microsoft Bot Framework | Abstract |
A. V. Ramani, A. Vignesh | ||
Vol 4, No 5 (2012) | A Critique of Cloud Computing and its Security | Abstract |
Riyajuddin Y. Mujawar, Aiyeshabi S. Mulla | ||
Vol 3, No 4 (2011) | A Crucial Technology to Improve the Performance in Pervasive Computing | Abstract |
G. Rajeswari, B. Nithya, D. Mahendravarman | ||
Vol 2, No 6 (2010) | A Delay Aware Tree Based Technique in Wireless Sensor Network | Abstract |
V. Cibi Castro, R. Rajesh | ||
Vol 2, No 8 (2010) | A Descriptive Review of OSPF with Java RMI | Abstract |
Virpal Kaur, Monika Gupta, Parminder Kang | ||
Vol 2, No 6 (2010) | A Detailed Study on Cloud Computing Based on Security and Future Opportunities | Abstract |
A. Rajadurai, J. Ilanchezhian, V. Varadharassu, A. Ranjeeth | ||
Vol 6, No 7 (2014) | A Diffserv-Aware Multi-Protocol Label Switching Traffic Engineering Applied on Virtual Private Networks | Abstract |
Ayman E. A. Abdelaal, Fathi E. Abd El-Samie, Moawad I. Dessouky | ||
Vol 1, No 3 (2009) | A Distributed Cache Architecture with Snooping for QoS Routing in Large Networks | Abstract |
Andhe Dharani, P. Anupama | ||
Vol 3, No 6 (2011) | A Distributed Time Delay Model of Worms in Computer Network | Abstract |
Samir Kumar Pandey, Bimal Kumar Mishra, Prasanna Kumar Satpathy | ||
Vol 1, No 2 (2009) | A Dynamic Approach to Select a Proxy Using Link Properties for Scalable and Reliable Multicast Transport Layer Protocol | Abstract |
R. Sasikala, K. Duraiswamy | ||
Vol 4, No 3 (2012) | A Effective Edge Replacement Technique for Packet Distribution System using V-LAN | Abstract |
P. R. Nirmal Binu, K. Sudharson | ||
Vol 5, No 5 (2013) | A Energy Efficient Routing Method for Under Water Aural Sensor Network | Abstract |
S. Prabhu, V. Kandasamy, R. Murgan | ||
Vol 2, No 7 (2010) | A Frame Work for Code Injection Attack Investigation in Windows Environment | Abstract |
Deepak Singh Tomar, J. L. Rana, S. C. Shrivastava | ||
1 - 25 of 922 Items | 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll