Issue | Title | |
Vol 4, No 9 (2012) | A Framework for Dynamic Multipath Self Reconfiguration Mechanism in Wireless Mesh Network | Abstract |
R. Lakshmipriya, S. Rajasoundaran, S. Janakiraman | ||
Vol 3, No 3 (2011) | A General Approach for Defending Code-Injection Attacks | Abstract |
J. Sajeev, Rose Rani John, I. Bildass Santhosham | ||
Vol 8, No 8 (2016) | A Guide to Ethical Hacking Attacks and Recent Tools | Abstract |
B.L. Anupama, Arya Vijayakumaran Nair, Bastian Babu | ||
Vol 1, No 8 (2009) | A Heterogeneous Multiprocessor System-on-Chip Architecture Incorporating Memory Allocation | Abstract |
T. Thillaikkarasi, A. Jagadeesan, K. Duraiswamy | ||
Vol 2, No 10 (2010) | A Heuristic Profile Based Intruder Detection Scheme on MANET | Abstract |
T. Abdul Razak, R. Balasubramanian | ||
Vol 5, No 4 (2013) | A Hierarchical Attribute BASED Technique for Bendy and Scalable Access in Cloud Computing | Abstract |
K. Bhuvaneshwari, O. G. Harini Vardhan | ||
Vol 4, No 6 (2012) | A High Throughput Pattern Matching Using Byte Filtered Bit_Split Algorithm | Abstract |
C. R. Rathish, P. Devasundar | ||
Vol 3, No 11 (2011) | A Hybrid Approach for Feature Selection in Improving the Efficiency of Wireless Intrusion Detection Systems | Abstract |
K. Selva Kumar, R. Saminathan, S. Suganthi | ||
Vol 10, No 1 (2018) | A Idea to Provide Optimistic Solution for Perceived Latency | Abstract |
N. Kavitha, V. Vadivu | ||
Vol 3, No 9 (2011) | A Key Management Scheme for VANET Based on Vector Group | Abstract |
S. Christal, S. Sumitha | ||
Vol 2, No 12 (2010) | A Logical Topology Based Network Compositor for Packet Distribution System with Effective Edge Replacement | Abstract |
P. R. Nirmal Binu, S. Karthikeyan | ||
Vol 6, No 3 (2014) | A Low Noise Figure LNA Design and Simulation for Ultra-Wideband Communication | Abstract |
S. Vasantha | ||
Vol 3, No 15 (2011) | A Narrative Loom to Secured Strewn Assorted Milieu in Network Architecture | Abstract |
P. Visu, E. Kannan, S. Koteeswaran, N. Pughazendi | ||
Vol 4, No 14 (2012) | A Network Intrusion Detection System for Memory Architecture | Abstract |
Neena Aelias | ||
Vol 5, No 7 (2013) | A New Age Architecture and Streamlined Energy Sensor Routing Scheme Using Indigenously Developed Green Energy Relative Direction Based Sensor Routing Scheme | Abstract |
P. C. Gopi, R. Sharmila, V. Vijayalakshmi | ||
Vol 1, No 1 (2009) | A New Approach for Internet Congestion Avoidance and Traffic Splitting | Abstract |
M. Azath, R. S. D. Wahida banu | ||
Vol 6, No 7 (2014) | A New Approach to Improve the Performance of Dynamic Distributed Networks | Abstract |
Shahram Jamali, Khadije Hourali | ||
Vol 2, No 11 (2010) | A New Approach to Telugu Text Steganography by Shifting Inherent Vowel Signs | Abstract |
Sravani Alameti, Sake Pothalaiah, K. Ashok Babu | ||
Vol 4, No 11 (2012) | A New Approach:Proactive Verifiable Security Scheme Based On Threshold with Key Refreshment | Abstract |
Rashmi Singh, Satya Verma | ||
Vol 4, No 2 (2012) | A New Architecture and Solution for Web Bulletin Board Security from Spamming Attack | Abstract |
Fouzia Sultana, Stephen Charles, A. Govardhan | ||
Vol 4, No 7 (2012) | A New Cluster based Protocol for Wireless Sensor Actor Network | Abstract |
R. Senthil Kumaran, P. Paruthi IlamVazthuthi | ||
Vol 2, No 12 (2010) | A New Efficient Geographic Multicast Protocol in Multicasting over Mobile Ad Hoc Networks for Qos Improvements | Abstract |
N. Renuka Devi, R. Niranchana | ||
Vol 7, No 8 (2015) | A New Load Balancing Algorithm for Cloud Computing | Abstract |
Younes Ranjbar, Ali Ghaffari | ||
Vol 3, No 6 (2011) | A New Protocol Stack for 6LoWPAN–An Overview | Abstract |
R. B. Jagadeesha | ||
Vol 7, No 7 (2015) | A New Trust Management for Secure Communication using MANET | Abstract |
M. Suhasini, M. Swapna, C. Usha | ||
26 - 50 of 922 Items | First Previous 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll