Issue | Title | |
Vol 5, No 9 (2013) | The Survey on Energy Aware Routing | Abstract |
K. Panimalar, S. Pushpalatchumy, M. Abiya | ||
Vol 4, No 5 (2012) | The Undo Sent E-Mail (USE) Protocol | Abstract |
K. Shanthi, A .P. Subapriya, R. Kalaivani | ||
Vol 3, No 9 (2011) | Theoretical Analysis and Performance Measurement of MEMS Based Pressure Sensor | Abstract |
T. Sripriya, J. Jayalakshmi | ||
Vol 8, No 1 (2016) | Theoretical Description and Performance Analysis of Various IEEE 802.11 Standards | Abstract |
Dilpreet Kaur Grover | ||
Vol 10, No 7 (2018) | Three Layer End-To-End Data Transaction Using Firewall | Abstract |
R. Ramya Krishna, R. Sankar | ||
Vol 2, No 3 (2010) | Time-Bound Key Management Scheme for Secure Broadcasting Using ECC | Abstract |
S. Christobel Diana, P. Golda Jeyasheeli | ||
Vol 7, No 9 (2015) | Tomorrow of Internet of Things | Abstract |
Bhumika S. Zalavadia | ||
Vol 3, No 5 (2011) | Towards Development of QoS Based Data and Service Oriented Mashup Platform | Abstract |
J. M. Gnanasekar, T. V. Anil Kumar | ||
Vol 4, No 7 (2012) | Towards Digital Quality Power to the Nines | Abstract |
K. M. Valsamma | ||
Vol 4, No 1 (2012) | Traffic Facet Psychoanalysis through Cryptography for an Attack | Abstract |
B. Muthulakshmi | ||
Vol 2, No 6 (2010) | Transaction Processing System for Efficient Maintenance of Databases in Cloud | Abstract |
S. Bala Manohari, R. Sasikala | ||
Vol 4, No 8 (2012) | Transient Performance of a Cabtyre Cable–Physical Parameters Determination by Measurements | Abstract |
Asha Shendge, Naoto Nagaoka | ||
Vol 1, No 4 (2009) | Troubleshooting Networks Using Internet Control Message Protocol | Abstract |
M. Anand Kumar, K. Appathurai, P. Nagarajan | ||
Vol 4, No 5 (2012) | Truncated and Optimized Pilot-to-Data Power Ratio for MIMO-OFDM Systems | Abstract |
Prasad Rayi, T. Manikyala Rao, Ch. Madhu Sudhan | ||
Vol 7, No 10 (2015) | Tube Rack Security Checking Using Wireless Sensor Systems | Abstract |
H. Ambika, N. Kavitha, A. Daison Raj, S. Suguna | ||
Vol 8, No 4 (2016) | Tuning the Cell Planning Problem in Mobile Upbringing to Optimize the Cost and Path Using Self-Motivated Algorithm | Abstract |
T. Prince, S. Thabasu Kannan | ||
Vol 2, No 11 (2010) | UDP Based Analysis of Ad Hoc on-Demand Distance Vector Protocol in MANET | Abstract |
Annapurna Singh, Mishra Shailendra | ||
Vol 4, No 9 (2012) | Ultra High Tech Multi-Pipelining String Matching for Deep Packet Inspection | Abstract |
N. Kannaiya Raja, K. Arulanandam, R. Prabhu | ||
Vol 7, No 8 (2015) | Underwater Wireless Sensor Networks (UWSN), Architecture, Routing Protocols, Simulation and Modeling Tools, Localization, Security Issues and Some Novel Trends | Abstract |
S. EL-Rabaie, D. Nabil, R. Mahmoud, Mohammed A. Alsharqawy | ||
Vol 4, No 11 (2012) | User Authentication Mechanism for Sharing E-Resource in Educational Clouds | Abstract |
I. Arulmani, L. Arockiam, N. Veeraragavan | ||
Vol 4, No 3 (2012) | User Preferred Optimal Execution Path Selection from Quality Enabled Multi-Path Web Service Composition Graph | Abstract |
S. Justin Samuel, T. Sasipraba | ||
Vol 3, No 11 (2011) | User-Controlled Privacy Preserving Identity Management for Cloud Computing | Abstract |
Viswanathan Pachaiyappan, R. Chandrasekar | ||
Vol 10, No 4 (2018) | Uses of Grid Computing in Educational Infrastructure | Abstract |
N. M. Abroja, A. Afila Parveen, R. Sathish Kumar | ||
Vol 4, No 8 (2012) | Validating the Rule set with BDD & Usage with GEM for Improving Efficiency of Firewalls | Abstract |
M. Kasi Viswanadh, P. Harini | ||
Vol 8, No 4 (2016) | Various Scheduling Algorithm Based on Admission Control for Wireless Sensor Networks | Abstract |
K. Kowsalya, S. Sabitha | ||
876 - 900 of 922 Items | First Previous 31 32 33 34 35 36 37 Next Last |
Browse Title Index
Scroll