Browse Title Index


 
Issue Title
 
Vol 10, No 2 (2018) Vehicle Location Estimation by Dead Reckoning Using Inertial Measurement Unit Sensor in MEMS Abstract
S. Abinaya Shivani, V. Nivetha, J. Mubeena, K. Roshni Rajan, R. Prabakaran, N. J. R. Muniraj
 
Vol 6, No 2 (2014) Verifiable Secret Sharing Protocol for Mobile Ad-Hoc Networks Abstract
P. V. Siva Kumar, Rajasekhara Rao Kurra, Appala Naidu Tentu
 
Vol 4, No 11 (2012) Vertical Scalability Issues and Challenges in Cloud Computing:An Overview Abstract
M. Bala Vaishnavi, A. Stanislas, L. Arockiam
 
Vol 3, No 2 (2011) Virtual Environment Security-Considerations & Practices Abstract
S. Ranjitha Kumari, V. Kathiresan
 
Vol 3, No 6 (2011) Virtual Password Obscuring in Avoidance of Keyloggers Abstract
J. Jeysree
 
Vol 1, No 6 (2009) Virtualization:A Foundation for Cloud Computing Abstract
Manoj Devare, Mehdi Sheikhalishahi, Lucio Grandinetti
 
Vol 7, No 6 (2015) Visual Cryptography Abstract
Priya Sethi, Shipra Kataria, Deepika Bansal
 
Vol 8, No 2 (2016) Visual Exploration Based Comparative Analysis of Tag Cloud Layout Abstract
Darshita S. Pathak, Vidhi Jani
 
Vol 9, No 3 (2017) VLSI Implementation of Brain Tumor Segmentation Using Fuzzy C-Mean Clustering Abstract
S. Preethi
 
Vol 4, No 1 (2012) VLSI Implementation of Data Security Architecture Abstract
Dilip Thomas, K. S. M. Panicker
 
Vol 5, No 4 (2013) VM Inclusive MeBaSA for Virtualized Multi-Tier Cloud Abstract
Ramesh D. Kodi, M. Balavaishnavi
 
Vol 3, No 7 (2011) VPN:The Stride of Technology for Future Ready Business Abstract
Swarnangini Sinha, Vibha Thakur
 
Vol 8, No 8 (2016) Ways to Use Mobile Phones Safely Abstract
Bhumika S. Zalavadia
 
Vol 3, No 9 (2011) Web Services Composition towards an Agent Based and Context Oriented Approach Abstract
D. Karthikeyan, P. Arunkumar, P. Vidyasri
 
Vol 3, No 14 (2011) Weighted Nebulous Matching over Frequent Episode Rules Using Internet Anomaly Detection Abstract
B. Muthulakshmi
 
Vol 3, No 3 (2011) Wipe Out Brute Force and Exterminate Malware-Based Attacks Using High Secure One-Time Password by Grid-Clear-CAPTCHA (GCC)–Analytical Study Abstract
M. Viju Prakash, S. Jeya Shobana, P. Alwin Infant
 
Vol 10, No 4 (2018) Wireless and its Operating Features in Real Time World Abstract
P. Jaikumar Aravaanan, P. Josephine Arul Priya
 
Vol 9, No 6 (2017) Wireless BMI System with QT Application Abstract
Shreyans Shah
 
Vol 5, No 1 (2013) Wireless Navigation Using RFID Network Abstract
Kashif I. K. Sherwani, Arindam Chatterjee
 
Vol 4, No 11 (2012) Wireless Sensor Networks and Issues–A Survey Abstract
Shubha V. Rao, R. Sreelatha, M. Dakshayini, P. Jayarekha
 
Vol 3, No 6 (2011) Workflow Based Resource Allocation and Monitoring Using Mobile Agents Abstract
L. Venkatakrishnan, T. V. U. Kiran Kumar, M. A. Dorairengaswamy
 
Vol 3, No 7 (2011) Workflow Scheduling Using Heuristics Based Ant Colony Optimization Abstract
N. Pughazendi, J. Elayaraja
 
901 - 922 of 922 Items First Previous 32 33 34 35 36 37