Issue | Title | |
Vol 3, No 15 (2011) | Resource Reservation in Private Cloud | Abstract |
Bharti Ainapure, Ajinkya L. Pawar, Laxman C. Kumbhakar, Virendra C. Oswal, Nikhil S. Tarale | ||
Vol 2, No 6 (2010) | Restoring Internodes Connectivity in Networks of Moveable Sensors | Abstract |
R. AnbuRajan | ||
Vol 9, No 6 (2017) | Review Literature on Load Balancing Techniques | Abstract |
M. Indhumathi, K. Nandhini | ||
Vol 3, No 13 (2011) | Review of DNA Cryptology | Abstract |
U. Noorul Hussain, T. Chithralekha | ||
Vol 6, No 5 (2014) | Review of MANET:Applications & Challenges | Abstract |
Manpreet Singh, Malti Sarangal, Gurpreet Singh | ||
Vol 3, No 11 (2011) | Review of Routing and Switching | Abstract |
Shalaka Vijay Sawant, Shubha M. Puthran | ||
Vol 4, No 3 (2012) | Review of Scheduling Schemes and Performance Evaluation of an Enhanced Scheduler | Abstract |
D. Rosy Salomi Victoria, S. Senthil Kumar | ||
Vol 5, No 1 (2013) | Review of Transmission Power Control Techniques in MANET | Abstract |
Suchismita Rout, Ashok Kumar Turuk, Bibhudatta Sahoo | ||
Vol 12, No 11-12 (2020) | Review on Workflow Scheduling for Load Balancing in Cloud | Abstract |
Chih-Chieh Hung, Chu-Cheng Hsieh, M Elhoseny | ||
Vol 6, No 4 (2014) | Risk-Aware Approach for Handling Routing Attacks and Selfishness Using RBNC in MANET | Abstract |
P. Hemavathy, Kanmani Govindaraj, Karthika Kothandam | ||
Vol 4, No 9 (2012) | Risk-Based Kerberised Service with JINI in Pervasive Environment | Abstract |
M. Kavitha, D. Prakash | ||
Vol 9, No 9 (2017) | Robust Correlation of Encrypted Attack Traffic | Abstract |
S. Amuthavalli | ||
Vol 5, No 5 (2013) | Robust Security and Network Monitoring Using IP Packet Filtering | Abstract |
M. D. Swetha, A. Ajil Aylwin | ||
Vol 10, No 9 (2018) | Role of a Honeypot in Network Security – Survey | Abstract |
N. Harismita | ||
Vol 4, No 3 (2012) | Role of Fuzzy Logic in Information Routing-A Review | Abstract |
Paramjit Singh, Ajay K. Sharma, T. S. Kamal | ||
Vol 3, No 12 (2011) | Role of Smart Phones in Cloud Computing | Abstract |
N. Prasanna Balaji, U. Sreenivasulu, A. B. Ramesh | ||
Vol 2, No 2 (2010) | Role-Based Access Control Architecture in Grid Environments | Abstract |
M. Nithya, R. S. D. Wahida Banu | ||
Vol 2, No 3 (2010) | Routing and Wavelength Assignment Schemes in WDM Optical Networks | Abstract |
K. Aparna, S. Venkatachalam, G. R. Babu | ||
Vol 3, No 1 (2011) | Routing in Automatically Switched Optical Networks Using Hop Routing Algorithm | Abstract |
S. Indira Gandhi, V. Vaidehi, Xavier Fernando | ||
Vol 2, No 3 (2010) | RWA in the Presence of Wavelength Conversion in WDM Networks | Abstract |
S. Suryanarayana, K. Ravindra, K. Chenna Kesava Reddy | ||
Vol 3, No 2 (2011) | SAMON-C:Sensor Access and Monitoring in Cloud Environment | Abstract |
R. S. Ponmagal, J. Raja | ||
Vol 5, No 2 (2013) | Scalability Issues and Research Challenges in Cloud Computing | Abstract |
L. Arockiam, A. Stanislas | ||
Vol 1, No 3 (2009) | Scalable Contributory Key Agreement with Efficient Authentication | Abstract |
M. Rajaram, D. Thilagavathy | ||
Vol 2, No 7 (2010) | Scalable Energy Efficient Ad-Hoc on Demand Distance Vector Routing Protocol | Abstract |
Mandhir Kaur, Jasbir Singh Saini, Prabhneet Kaur | ||
Vol 3, No 4 (2011) | Scheduling in Computational Grid Using Improved Ant Colony Optimization Algorithm | Abstract |
L. M. Nithya, A. Shanmugam, J. Rajeshkumar | ||
751 - 775 of 922 Items | First Previous 26 27 28 29 30 31 32 33 34 35 Next Last |
Browse Title Index
Scroll