Issue | Title | |
Vol 8, No 6 (2016) | Linux Architecture and Advantages | Abstract |
Bhumika S. Zalavadia | ||
Vol 4, No 14 (2012) | Literature Review on EAP Methods | Abstract |
Anupama Patil, Sameer Nagtilak, Shweta Mane | ||
Vol 4, No 14 (2012) | Literature Survey for Diminution of Envelope Fluctuation in SC-FDMA System for Uplink Transmission | Abstract |
T. Abisha, B. Bhuvaneswari | ||
Vol 7, No 1 (2015) | Literature Survey on Different Cloud Computing Infrastructure-as-a-Service Frameworks | Abstract |
Yogesh V. Jilhawar, M. Emmanuel | ||
Vol 7, No 5 (2015) | Literature Survey on Network Traffic Management in Software Defined Networking | Abstract |
Sachin A. Vanjari | ||
Vol 3, No 14 (2011) | Load Balancing at Peak Hours Using FIFO and Weighted Average Techniques in Cloud Computing | Abstract |
G. Radhamani, P. Mary Sriryn | ||
Vol 3, No 5 (2011) | Load Balancing in Mesh Based Wireless Network Using Cluster Re-Configuration Algorithm | Abstract |
P. Vinoth Kumar, B. Chandra Mohan | ||
Vol 3, No 4 (2011) | Location Based Scheduler for Independent Jobs in Computational Grids | Abstract |
P. Karthikeyan, B. Dhiyanesh | ||
Vol 11, No 8 (2019) | Location based Web Recommendation using Data Mining Techniques | Abstract |
Katayoun Farrahi, Angela Curl | ||
Vol 1, No 2 (2009) | Low Latency Seamless Transport Interface | Abstract |
Mauli Gulati, Deepak Garg | ||
Vol 2, No 1 (2010) | Low-Low Average Algorithm for Scheduling Request-Demanding Cloud Workflows with Overhead | Abstract |
V. Anbalagan | ||
Vol 2, No 9 (2010) | LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems | Abstract |
G. Satyavathy, M. Punithavalli | ||
Vol 3, No 7 (2011) | MAC Layer Based Insubordination Mechanism for Differentiating and Penalizing/Rewarding Opportunist Nodes in 802.11 WLAN Network | Abstract |
Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadauria | ||
Vol 8, No 3 (2016) | Maintaining Privacy for Multi-keyword Search on Encrypted Data:A Survey | Abstract |
Sushant Y. Kamble, Amit B. Chougule | ||
Vol 3, No 1 (2011) | Malicious Impostor Email Prevention Using Randomly Encrypted Address Book | Abstract |
R. Rajesh Perumal, J. Vinu | ||
Vol 3, No 4 (2011) | Malicious User Limit:A Decentralized Approach against Sybil Attacks | Abstract |
M. Kowsigan, K. Rajakumari | ||
Vol 4, No 6 (2012) | Managing Trust and Detecting the Guilty Party in P2P Networks | Abstract |
G. Nandhini, T. Kaleeswari, J. Brundha, G. MuthuKumar | ||
Vol 2, No 9 (2010) | Measurement of Denial of Service Attacks Using New Metrics | Abstract |
P. Kavithapandian, S. Muthukumar, Kannan Balasubramanian | ||
Vol 2, No 9 (2010) | Measuring Sustainable Development:Theory and Application | Abstract |
Joshua O. Miluwi | ||
Vol 8, No 6 (2016) | Mechanized Discovery of Malicious Attack and Providing Security using Frame Breaking in WoT | Abstract |
S. John Samuel, A. Mathan Gopi | ||
Vol 5, No 8 (2013) | Methods of Reducing False Alerts by Intrusion Detection System | Abstract |
Prajakta Sandeep Jadhav | ||
Vol 5, No 2 (2013) | Metric Based Scheduling Algorithm (MeBaSA) for Scaled Multi-Tier Clouds | Abstract |
Ramesh D. Kodi, M. Balavaishnavi | ||
Vol 3, No 3 (2011) | Middleware Architectural Framework for Secured Services in MANETs | Abstract |
T. Abdul Razak, R. Balasubramanian | ||
Vol 3, No 7 (2011) | Minimum Energy Consumption Channel Allocation Scheme in LR-WPAN | Abstract |
P. Kaushik, J. Singhai | ||
Vol 2, No 9 (2010) | Mitigating Denial-Of-Service Attacks on the Chord Overlay Network:A Location Hiding Approach | Abstract |
K. Venkatesh Sharma, K. Hanumantha Rao, K. Ramu | ||
576 - 600 of 922 Items | First Previous 19 20 21 22 23 24 25 26 27 28 Next Last |
Browse Title Index
Scroll