Browse Title Index


 
Issue Title
 
Vol 8, No 6 (2016) Linux Architecture and Advantages Abstract
Bhumika S. Zalavadia
 
Vol 4, No 14 (2012) Literature Review on EAP Methods Abstract
Anupama Patil, Sameer Nagtilak, Shweta Mane
 
Vol 4, No 14 (2012) Literature Survey for Diminution of Envelope Fluctuation in SC-FDMA System for Uplink Transmission Abstract
T. Abisha, B. Bhuvaneswari
 
Vol 7, No 1 (2015) Literature Survey on Different Cloud Computing Infrastructure-as-a-Service Frameworks Abstract
Yogesh V. Jilhawar, M. Emmanuel
 
Vol 7, No 5 (2015) Literature Survey on Network Traffic Management in Software Defined Networking Abstract
Sachin A. Vanjari
 
Vol 3, No 14 (2011) Load Balancing at Peak Hours Using FIFO and Weighted Average Techniques in Cloud Computing Abstract
G. Radhamani, P. Mary Sriryn
 
Vol 3, No 5 (2011) Load Balancing in Mesh Based Wireless Network Using Cluster Re-Configuration Algorithm Abstract
P. Vinoth Kumar, B. Chandra Mohan
 
Vol 3, No 4 (2011) Location Based Scheduler for Independent Jobs in Computational Grids Abstract
P. Karthikeyan, B. Dhiyanesh
 
Vol 11, No 8 (2019) Location based Web Recommendation using Data Mining Techniques Abstract
Katayoun Farrahi, Angela Curl
 
Vol 1, No 2 (2009) Low Latency Seamless Transport Interface Abstract
Mauli Gulati, Deepak Garg
 
Vol 2, No 1 (2010) Low-Low Average Algorithm for Scheduling Request-Demanding Cloud Workflows with Overhead Abstract
V. Anbalagan
 
Vol 2, No 9 (2010) LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems Abstract
G. Satyavathy, M. Punithavalli
 
Vol 3, No 7 (2011) MAC Layer Based Insubordination Mechanism for Differentiating and Penalizing/Rewarding Opportunist Nodes in 802.11 WLAN Network Abstract
Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadauria
 
Vol 8, No 3 (2016) Maintaining Privacy for Multi-keyword Search on Encrypted Data:A Survey Abstract
Sushant Y. Kamble, Amit B. Chougule
 
Vol 3, No 1 (2011) Malicious Impostor Email Prevention Using Randomly Encrypted Address Book Abstract
R. Rajesh Perumal, J. Vinu
 
Vol 3, No 4 (2011) Malicious User Limit:A Decentralized Approach against Sybil Attacks Abstract
M. Kowsigan, K. Rajakumari
 
Vol 4, No 6 (2012) Managing Trust and Detecting the Guilty Party in P2P Networks Abstract
G. Nandhini, T. Kaleeswari, J. Brundha, G. MuthuKumar
 
Vol 2, No 9 (2010) Measurement of Denial of Service Attacks Using New Metrics Abstract
P. Kavithapandian, S. Muthukumar, Kannan Balasubramanian
 
Vol 2, No 9 (2010) Measuring Sustainable Development:Theory and Application Abstract
Joshua O. Miluwi
 
Vol 8, No 6 (2016) Mechanized Discovery of Malicious Attack and Providing Security using Frame Breaking in WoT Abstract
S. John Samuel, A. Mathan Gopi
 
Vol 5, No 8 (2013) Methods of Reducing False Alerts by Intrusion Detection System Abstract
Prajakta Sandeep Jadhav
 
Vol 5, No 2 (2013) Metric Based Scheduling Algorithm (MeBaSA) for Scaled Multi-Tier Clouds Abstract
Ramesh D. Kodi, M. Balavaishnavi
 
Vol 3, No 3 (2011) Middleware Architectural Framework for Secured Services in MANETs Abstract
T. Abdul Razak, R. Balasubramanian
 
Vol 3, No 7 (2011) Minimum Energy Consumption Channel Allocation Scheme in LR-WPAN Abstract
P. Kaushik, J. Singhai
 
Vol 2, No 9 (2010) Mitigating Denial-Of-Service Attacks on the Chord Overlay Network:A Location Hiding Approach Abstract
K. Venkatesh Sharma, K. Hanumantha Rao, K. Ramu
 
576 - 600 of 922 Items First Previous 19 20 21 22 23 24 25 26 27 28 Next Last