Browse Title Index


 
Issue Title
 
Vol 4, No 9 (2012) A Framework for Dynamic Multipath Self Reconfiguration Mechanism in Wireless Mesh Network Abstract
R. Lakshmipriya, S. Rajasoundaran, S. Janakiraman
 
Vol 3, No 3 (2011) A General Approach for Defending Code-Injection Attacks Abstract
J. Sajeev, Rose Rani John, I. Bildass Santhosham
 
Vol 8, No 8 (2016) A Guide to Ethical Hacking Attacks and Recent Tools Abstract
B.L. Anupama, Arya Vijayakumaran Nair, Bastian Babu
 
Vol 1, No 8 (2009) A Heterogeneous Multiprocessor System-on-Chip Architecture Incorporating Memory Allocation Abstract
T. Thillaikkarasi, A. Jagadeesan, K. Duraiswamy
 
Vol 2, No 10 (2010) A Heuristic Profile Based Intruder Detection Scheme on MANET Abstract
T. Abdul Razak, R. Balasubramanian
 
Vol 5, No 4 (2013) A Hierarchical Attribute BASED Technique for Bendy and Scalable Access in Cloud Computing Abstract
K. Bhuvaneshwari, O. G. Harini Vardhan
 
Vol 4, No 6 (2012) A High Throughput Pattern Matching Using Byte Filtered Bit_Split Algorithm Abstract
C. R. Rathish, P. Devasundar
 
Vol 3, No 11 (2011) A Hybrid Approach for Feature Selection in Improving the Efficiency of Wireless Intrusion Detection Systems Abstract
K. Selva Kumar, R. Saminathan, S. Suganthi
 
Vol 10, No 1 (2018) A Idea to Provide Optimistic Solution for Perceived Latency Abstract
N. Kavitha, V. Vadivu
 
Vol 3, No 9 (2011) A Key Management Scheme for VANET Based on Vector Group Abstract
S. Christal, S. Sumitha
 
Vol 2, No 12 (2010) A Logical Topology Based Network Compositor for Packet Distribution System with Effective Edge Replacement Abstract
P. R. Nirmal Binu, S. Karthikeyan
 
Vol 6, No 3 (2014) A Low Noise Figure LNA Design and Simulation for Ultra-Wideband Communication Abstract
S. Vasantha
 
Vol 3, No 15 (2011) A Narrative Loom to Secured Strewn Assorted Milieu in Network Architecture Abstract
P. Visu, E. Kannan, S. Koteeswaran, N. Pughazendi
 
Vol 4, No 14 (2012) A Network Intrusion Detection System for Memory Architecture Abstract
Neena Aelias
 
Vol 5, No 7 (2013) A New Age Architecture and Streamlined Energy Sensor Routing Scheme Using Indigenously Developed Green Energy Relative Direction Based Sensor Routing Scheme Abstract
P. C. Gopi, R. Sharmila, V. Vijayalakshmi
 
Vol 1, No 1 (2009) A New Approach for Internet Congestion Avoidance and Traffic Splitting Abstract
M. Azath, R. S. D. Wahida banu
 
Vol 6, No 7 (2014) A New Approach to Improve the Performance of Dynamic Distributed Networks Abstract
Shahram Jamali, Khadije Hourali
 
Vol 2, No 11 (2010) A New Approach to Telugu Text Steganography by Shifting Inherent Vowel Signs Abstract
Sravani Alameti, Sake Pothalaiah, K. Ashok Babu
 
Vol 4, No 11 (2012) A New Approach:Proactive Verifiable Security Scheme Based On Threshold with Key Refreshment Abstract
Rashmi Singh, Satya Verma
 
Vol 4, No 2 (2012) A New Architecture and Solution for Web Bulletin Board Security from Spamming Attack Abstract
Fouzia Sultana, Stephen Charles, A. Govardhan
 
Vol 4, No 7 (2012) A New Cluster based Protocol for Wireless Sensor Actor Network Abstract
R. Senthil Kumaran, P. Paruthi IlamVazthuthi
 
Vol 2, No 12 (2010) A New Efficient Geographic Multicast Protocol in Multicasting over Mobile Ad Hoc Networks for Qos Improvements Abstract
N. Renuka Devi, R. Niranchana
 
Vol 7, No 8 (2015) A New Load Balancing Algorithm for Cloud Computing Abstract
Younes Ranjbar, Ali Ghaffari
 
Vol 3, No 6 (2011) A New Protocol Stack for 6LoWPAN–An Overview Abstract
R. B. Jagadeesha
 
Vol 7, No 7 (2015) A New Trust Management for Secure Communication using MANET Abstract
M. Suhasini, M. Swapna, C. Usha
 
26 - 50 of 922 Items First Previous 1 2 3 4 5 6 7 8 9 10 Next Last