Issue | Title | |
Vol 10, No 2 (2018) | Vehicle Location Estimation by Dead Reckoning Using Inertial Measurement Unit Sensor in MEMS | Abstract |
S. Abinaya Shivani, V. Nivetha, J. Mubeena, K. Roshni Rajan, R. Prabakaran, N. J. R. Muniraj | ||
Vol 6, No 2 (2014) | Verifiable Secret Sharing Protocol for Mobile Ad-Hoc Networks | Abstract |
P. V. Siva Kumar, Rajasekhara Rao Kurra, Appala Naidu Tentu | ||
Vol 4, No 11 (2012) | Vertical Scalability Issues and Challenges in Cloud Computing:An Overview | Abstract |
M. Bala Vaishnavi, A. Stanislas, L. Arockiam | ||
Vol 3, No 2 (2011) | Virtual Environment Security-Considerations & Practices | Abstract |
S. Ranjitha Kumari, V. Kathiresan | ||
Vol 3, No 6 (2011) | Virtual Password Obscuring in Avoidance of Keyloggers | Abstract |
J. Jeysree | ||
Vol 1, No 6 (2009) | Virtualization:A Foundation for Cloud Computing | Abstract |
Manoj Devare, Mehdi Sheikhalishahi, Lucio Grandinetti | ||
Vol 7, No 6 (2015) | Visual Cryptography | Abstract |
Priya Sethi, Shipra Kataria, Deepika Bansal | ||
Vol 8, No 2 (2016) | Visual Exploration Based Comparative Analysis of Tag Cloud Layout | Abstract |
Darshita S. Pathak, Vidhi Jani | ||
Vol 9, No 3 (2017) | VLSI Implementation of Brain Tumor Segmentation Using Fuzzy C-Mean Clustering | Abstract |
S. Preethi | ||
Vol 4, No 1 (2012) | VLSI Implementation of Data Security Architecture | Abstract |
Dilip Thomas, K. S. M. Panicker | ||
Vol 5, No 4 (2013) | VM Inclusive MeBaSA for Virtualized Multi-Tier Cloud | Abstract |
Ramesh D. Kodi, M. Balavaishnavi | ||
Vol 3, No 7 (2011) | VPN:The Stride of Technology for Future Ready Business | Abstract |
Swarnangini Sinha, Vibha Thakur | ||
Vol 8, No 8 (2016) | Ways to Use Mobile Phones Safely | Abstract |
Bhumika S. Zalavadia | ||
Vol 3, No 9 (2011) | Web Services Composition towards an Agent Based and Context Oriented Approach | Abstract |
D. Karthikeyan, P. Arunkumar, P. Vidyasri | ||
Vol 3, No 14 (2011) | Weighted Nebulous Matching over Frequent Episode Rules Using Internet Anomaly Detection | Abstract |
B. Muthulakshmi | ||
Vol 3, No 3 (2011) | Wipe Out Brute Force and Exterminate Malware-Based Attacks Using High Secure One-Time Password by Grid-Clear-CAPTCHA (GCC)–Analytical Study | Abstract |
M. Viju Prakash, S. Jeya Shobana, P. Alwin Infant | ||
Vol 10, No 4 (2018) | Wireless and its Operating Features in Real Time World | Abstract |
P. Jaikumar Aravaanan, P. Josephine Arul Priya | ||
Vol 9, No 6 (2017) | Wireless BMI System with QT Application | Abstract |
Shreyans Shah | ||
Vol 5, No 1 (2013) | Wireless Navigation Using RFID Network | Abstract |
Kashif I. K. Sherwani, Arindam Chatterjee | ||
Vol 4, No 11 (2012) | Wireless Sensor Networks and Issues–A Survey | Abstract |
Shubha V. Rao, R. Sreelatha, M. Dakshayini, P. Jayarekha | ||
Vol 3, No 6 (2011) | Workflow Based Resource Allocation and Monitoring Using Mobile Agents | Abstract |
L. Venkatakrishnan, T. V. U. Kiran Kumar, M. A. Dorairengaswamy | ||
Vol 3, No 7 (2011) | Workflow Scheduling Using Heuristics Based Ant Colony Optimization | Abstract |
N. Pughazendi, J. Elayaraja | ||
901 - 922 of 922 Items | First Previous 32 33 34 35 36 37 |
Browse Title Index
Scroll